topic.netsem.group.bib

@comment{{This file has been generated by bib2bib 1.96}}
@comment{{Command line: /usr/bin/bib2bib -c topic:"netsem" -ob topic.netsem.group.bib groupbib.bib}}
@inproceedings{Ridge:2009:VDS:1480881.1480934,
  author = {Ridge, Thomas},
  title = {Verifying Distributed Systems: The Operational Approach},
  conf = {POPL 2009},
  booktitle = {Proceedings of the 36th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages},
  series = {POPL '09},
  year = {2009},
  isbn = {978-1-60558-379-2},
  location = {Savannah, GA, USA},
  pages = {429--440},
  numpages = {12},
  opturl = {http://doi.acm.org/10.1145/1480881.1480934},
  doi = {10.1145/1480881.1480934},
  acmid = {1480934},
  publisher = {ACM},
  address = {New York, NY, USA},
  keywords = {distributed, ground and symbolic evaluation, hoare-style assertions, hol, inductive reasoning, infrastructure, invariants, linearizability, local reasoning, network protocol, ocaml, operational semantics, persistent queue, refinement, rely/guarantee, separation},
  abstract = {
This work develops an integrated approach to the verification of behaviourally rich programs, founded directly on operational semantics. The power of the approach is demonstrated with a state-of-the-art verification of a core piece of distributed infrastructure, involving networking, a filesystem, and concurrent OCaml code. The formalization is in higher-order logic and proof support is provided by the HOL4 theorem prover.

Difficult verification problems demand a wide range of techniques. Here these include ground and symbolic evaluation, local reasoning, separation, invariants, Hoare-style assertional reasoning, rely/guarantee, inductive reasoning about protocol correctness, multiple refinement, and linearizability. While each of these techniques is useful in isolation, they are even more so in combination. The first contribution of this paper is to present the operational approach and describe how existing techniques, including all those mentioned above, may be cleanly and precisely integrated in this setting.

The second contribution is to show how to combine verifications of individual library functions with arbitrary and unknown user code in a compositional manner, focusing on the problems of private state and encapsulation.

The third contribution is the example verification itself. The infrastructure must behave correctly under arbitrary patterns of host and network failure, whilst for performance reasons the code also includes data races on shared state. Both features make the verification particularly challenging.
},
  topic = {netsem},
  pdf = {http://www.cl.cam.ac.uk/~pes20/group_papers/ridge09popl.pdf},
  project = {http://www.cl.cam.ac.uk/~pes20/Netsem}
}