- Видео 8
- Просмотров 35
VeTSS RI
Добавлен 29 мар 2023
The Research Institute on Verified Trustworthy Software Systems (VeTSS) is a UK Academic Research Institute in Cyber Security, VeTSS is jointly hosted by the University of Surrey and Imperial College London.
One of four research institutes within the National Cyber Security Centre (NCSC), VeTSS brings together leading academics, industry professionals, regulators and government representatives to ensure research into software stays focused on the safety and security challenges faced by the UK and mitigates the risks posed.
One of four research institutes within the National Cyber Security Centre (NCSC), VeTSS brings together leading academics, industry professionals, regulators and government representatives to ensure research into software stays focused on the safety and security challenges faced by the UK and mitigates the risks posed.
Martin Nyx Brain “A Pyramid Of (Formal) Software Verification, Part 1”, VeTSS Summer School 2024
Talk Martin Nyx Brain, City, University of London, at the VeTSS Summer School 2024.
Over the past few years there has been significant progress in the various fields of software verification resulting in many useful tools and successful deployments, both academic and commercial. However much of the work describing these tools and ideas is written by and for the research community. The scale, diversity and focus of the literature can act as a barrier, separating industrial users and the wider academic community from the tools that could make their work more efficient, more certain and more productive. This tutorial gives a simple classification of verification techniques in terms of a pyram...
Over the past few years there has been significant progress in the various fields of software verification resulting in many useful tools and successful deployments, both academic and commercial. However much of the work describing these tools and ideas is written by and for the research community. The scale, diversity and focus of the literature can act as a barrier, separating industrial users and the wider academic community from the tools that could make their work more efficient, more certain and more productive. This tutorial gives a simple classification of verification techniques in terms of a pyram...
Просмотров: 8
Видео
Martin Nyx Brain “A Pyramid Of (Formal) Software Verification, Part 2”, VeTSS Summer School 2024
Просмотров 514 дней назад
Talk by Martin Nyx Brain, City, University of London, at the VeTSS Summer School 2024. Over the past few years there has been significant progress in the various fields of software verification resulting in many useful tools and successful deployments, both academic and commercial. However much of the work describing these tools and ideas is written by and for the research community. The scale,...
Mark Batty, “Relaxed memory concurrency semantics and reasoning, Part 1”, VeTSS Summer School 2024
Просмотров 414 дней назад
Talk by Mark Batty, University of Kent, at the VeTSS Summer School 2024. Processors and GPUs are concurrent, they rely on shared memory to communicate, and they feature complex and varied memory subsystems. Compilers aggressively optimise code through thread-local analysis and by leveraging global invariants. As a consequence, these systems admit relaxed memory behaviours, where no sequential i...
Kerstin Eder, “Whole Systems Energy Transparency, Part 1”, VeTSS Summer School 2024
Просмотров 314 дней назад
Talk by Kerstin Eder, University of Bristol, University of Surrey, at the VeTSS Summer School 2024. Energy efficiency is now a major, if not the major, constraint in electronic systems engineering. Significant progress has been made in low power hardware design for several decades. The potential for savings is now far greater at the higher levels of abstraction in the system stack. The greatest...
Kerstin Eder, “Whole Systems Energy Transparency, Part 2”, VeTSS Summer School 2024
Просмотров 514 дней назад
Talk by Kerstin Eder, University of Bristol, University of Surrey, at the VeTSS Summer School 2024. Energy efficiency is now a major, if not the major, constraint in electronic systems engineering. Significant progress has been made in low power hardware design for several decades. The potential for savings is now far greater at the higher levels of abstraction in the system stack. The greatest...
I. Boureanu, “Formal Verification of Privacy in Cryptographic Protocols, 1”, VeTSS Summer School 24
Просмотров 714 дней назад
Ioana Boureanu, “Formal Verification of Privacy in Cryptographic Protocols: Theory and Practice, Part 1”, VeTSS Summer School 2024 Talk by Ioana Boureanu, University of Surrey, at the VeTSS Summer School 2024. In this tutorial we will try to understand why it is hard to formally verify privacy-like properties, such as strong secrecy, anonymity, unlinkability or lack of information flow, in well...
I. Boureanu, “Formal Verification of Privacy in Cryptographic Protocols 2”, VeTSS Summer School 2024
Просмотров 114 дней назад
Ioana Boureanu, “Formal Verification of Privacy in Cryptographic Protocols: Theory and Practice, Part 1”, VeTSS Summer School 2024 Talk by Ioana Boureanu, University of Surrey, at the VeTSS Summer School 2024. In this tutorial we will try to understand why it is hard to formally verify privacy-like properties, such as strong secrecy, anonymity, unlinkability or lack of information flow, in well...
Mark Batty, “Relaxed memory concurrency semantics and reasoning, Part 2”, VeTSS Summer School 2024
Просмотров 214 дней назад
Talk by Mark Batty, University of Kent, at the VeTSS Summer School 2024. Processors and GPUs are concurrent, they rely on shared memory to communicate, and they feature complex and varied memory subsystems. Compilers aggressively optimise code through thread-local analysis and by leveraging global invariants. As a consequence, these systems admit relaxed memory behaviours, where no sequential i...