• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

HACMS 计划:运用形式化方法消除可被利用的漏洞。

The HACMS program: using formal methods to eliminate exploitable bugs.

作者信息

Fisher Kathleen, Launchbury John, Richards Raymond

机构信息

Department of Computer Science, Tufts University, Medford, MA, USA

DARPA, Arlington, VA, USA.

出版信息

Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0401.

DOI:10.1098/rsta.2015.0401
PMID:28871050
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5597724/
Abstract

For decades, formal methods have offered the promise of verified software that does not have exploitable bugs. Until recently, however, it has not been possible to verify software of sufficient complexity to be useful. Recently, that situation has changed. SeL4 is an open-source operating system microkernel efficient enough to be used in a wide range of practical applications. Its designers proved it to be fully functionally correct, ensuring the absence of buffer overflows, null pointer exceptions, use-after-free errors, etc., and guaranteeing integrity and confidentiality. The CompCert Verifying C Compiler maps source C programs to provably equivalent assembly language, ensuring the absence of exploitable bugs in the compiler. A number of factors have enabled this revolution, including faster processors, increased automation, more extensive infrastructure, specialized logics and the decision to co-develop code and correctness proofs rather than verify existing artefacts. In this paper, we explore the promise and limitations of current formal-methods techniques. We discuss these issues in the context of DARPA's HACMS program, which had as its goal the creation of high-assurance software for vehicles, including quadcopters, helicopters and automobiles.This article is part of the themed issue 'Verified trustworthy software systems'.

摘要

几十年来,形式化方法一直承诺能提供没有可利用漏洞的经过验证的软件。然而,直到最近,还无法验证具有足够复杂性以实用的软件。最近,这种情况发生了变化。SeL4是一个开源操作系统微内核,其效率足以用于广泛的实际应用。其设计者证明它在功能上完全正确,确保不存在缓冲区溢出、空指针异常、使用后释放错误等,并保证完整性和保密性。CompCert验证C编译器将源C程序映射到可证明等效的汇编语言,确保编译器中不存在可利用的漏洞。有几个因素促成了这场革命,包括更快的处理器、更高的自动化程度、更广泛的基础设施、专门的逻辑以及共同开发代码和正确性证明而非验证现有工件的决定。在本文中,我们探讨了当前形式化方法技术的前景和局限性。我们在国防高级研究计划局(DARPA)的HACMS项目背景下讨论这些问题,该项目的目标是创建用于车辆(包括四轴飞行器、直升机和汽车)的高可信度软件。本文是主题为“经过验证的可信软件系统”的特刊的一部分。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a218/5597724/3833cbb6578e/rsta20150401-g3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a218/5597724/6018f5312248/rsta20150401-g1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a218/5597724/29299abbe7df/rsta20150401-g2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a218/5597724/3833cbb6578e/rsta20150401-g3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a218/5597724/6018f5312248/rsta20150401-g1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a218/5597724/29299abbe7df/rsta20150401-g2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a218/5597724/3833cbb6578e/rsta20150401-g3.jpg

相似文献

1
The HACMS program: using formal methods to eliminate exploitable bugs.HACMS 计划:运用形式化方法消除可被利用的漏洞。
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0401.
2
Provably trustworthy systems.可证明可信的系统。
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0404.
3
Compositional relaxed concurrency.组合式宽松并发
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0406.
4
Formal verification: will the seedling ever flower?形式验证:幼苗会开花吗?
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0402.
5
Position paper: the science of deep specification.立场文件:深度规范科学
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2016.0331.
6
Industrial hardware and software verification with ACL2.使用ACL2进行工业硬件和软件验证。
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0399.
7
A formally certified end-to-end implementation of Shor's factorization algorithm.肖尔因式分解算法的正式认证的端到端实现。
Proc Natl Acad Sci U S A. 2023 May 23;120(21):e2218775120. doi: 10.1073/pnas.2218775120. Epub 2023 May 15.
8
Program synthesis: challenges and opportunities.程序合成:挑战与机遇。
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0403.
9
Bugs in computational chemistry software and their consequences: the importance of the source code.计算化学软件中的漏洞及其后果:源代码的重要性。
J Mol Model. 2003 Aug;9(4):271-2. doi: 10.1007/s00894-003-0141-1. Epub 2003 Jul 11.
10
What's in a code? Towards a formal account of the relation of ontologies and coding systems.代码中包含什么?迈向本体论与编码系统关系的形式化描述。
Stud Health Technol Inform. 2007;129(Pt 1):730-4.

引用本文的文献

1
An integrated modeling, verification, and code generation for uncrewed aerial systems: less cost and more efficiency.无人机系统的集成建模、验证与代码生成:更低成本、更高效率。
PeerJ Comput Sci. 2025 Jan 9;11:e2575. doi: 10.7717/peerj-cs.2575. eCollection 2025.
2
Position paper: the science of deep specification.立场文件:深度规范科学
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2016.0331.
3
Verified trustworthy software systems.经过验证的可信软件系统。
Philos Trans A Math Phys Eng Sci. 2017 Oct 13;375(2104). doi: 10.1098/rsta.2015.0408.