期刊文献+

可信编译器构造的翻译确认方法简述 被引量:2

Brief Overview of Translation Validation Method in Trusted Compiler Construction
下载PDF
导出
摘要 编译器的安全可信问题日益引起重视,特别是在安全关键系统中,编译器的误编译将会造成重大的损失。消除误编译的传统方法是大量的测试,但是测试难以达到完全覆盖,并不能充分地保证编译器的安全可信。近年来,形式化验证方法被成功用于可信编译器的构造中。一种方法是对编译器本身进行形式化验证,经过严密的证明,可杜绝误编译的发生。然而,这种方法可能"冻结"编译器的设计,阻碍编译器未来可能的优化和完善。翻译确认是另外一种用于可信编译器构造的形式化方法,它避免了对编译器自身的验证,有很好的可重用性,近年来在编译器验证领域得到了广泛研究,已取得令人瞩目的成果。介绍了翻译确认方法的概念及研究进展。 There is a growing awareness of the security and reliability of compilers in recent years.Especially in the safety-critical systems,the miscompilation can make a huge damage.The conventional approach to weeding out miscompilation is heavy test,but test is impossible to achieve full cover and can not guarantee that compiler is safe and trustworthy.In recent years,formal verification method has been successfully used to construct the trusted compiler.One approach is to perform formal verification for compiler itself.It can put an end to miscompilation by strict proof.However,this approach tends to'freeze'the compiler design,and discourages any future improvements and revisions.Translation validation is another formal method that can be used to construct trusted compiler,which avoids the verification for the compiler itself,and has good reusability.It has been widely researched in the compiler verification field,and has already obtained remarkable achievements.The concept and research progress of translation validation are discussed in this paper.
出处 《计算机科学》 CSCD 北大核心 2014年第S1期334-338,共5页 Computer Science
基金 国家自然基金项目(61170051 612702086 90818019)资助
关键词 可信编译器 形式化验证方法 翻译确认 确认器 Trusted compiler,Formal verification method,Translation validation,Validator
  • 相关文献

参考文献11

  • 1何炎祥,刘陶,吴伟.可信编译器关键技术研究[J].计算机工程与科学,2010,32(8):1-6. 被引量:7
  • 2Jean-Baptiste Tristan,Paul Govereau,Greg Morrisett.Evaluating value-graph translation validation for LLVM[J].ACM SIGPLAN Notices.2011(6) 被引量:1
  • 3Jean-Baptiste Tristan,Xavier Leroy.A simple, verified validator for software pipelining[J].ACM SIGPLAN Notices.2010(1) 被引量:1
  • 4Xavier Leroy.Formal verification of a realistic compiler[J].Communications of the ACM.2009(7) 被引量:1
  • 5Jean-Baptiste Tristan,Xavier Leroy.Verified validation of lazy code motion[J].ACM SIGPLAN Notices.2009(6) 被引量:1
  • 6Ross Tate,Michael Stepp,Zachary Tatlock,Sorin Lerner.Equality saturation[J].ACM SIGPLAN Notices.2009(1) 被引量:1
  • 7Jean-Baptiste Tristan,Xavier Leroy.Formal verification of translation validators[J].ACM SIGPLAN Notices.2008(1) 被引量:1
  • 8Benjamin Goldberg,Lenore Zuck,Clark Barrett.Into the Loops: Practical Issues in Translation Validation for Optimizing Compilers[J].Electronic Notes in Theoretical Computer Science.2005(1) 被引量:1
  • 9Xavier Rival.Symbolic transfer function-based approaches to certified compilation[J].ACM SIGPLAN Notices.2004(1) 被引量:1
  • 10Lenore Zuck,Amir Pnueli,Yi Fang,Benjamin Goldberg,Ying Hu.Translation and Run-Time Validation of Optimized Code 1 1 This research was supported in part by NSF grant CCR-0098299, ONR grant N00014-99-1-0131, and the John von Neumann Minerva Center for Verification of Reactive Systems.[J].Electronic Notes in Theoretical Computer Science.2002(4) 被引量:1

二级参考文献27

  • 1Wheeler D A. Countering Trusting Trust Through Diverse Double-Compiling[M]. Tucson, AZ: IEEE Computer Society, 2005. 被引量:1
  • 2Boujarwah A S, Saleh K. Compiler Test Case Generation Methods:A Survey and Assessment[J]. Information and Software Technology, 1997,39(9):617-625. 被引量:1
  • 3Yoshikawa T,Shimura K, Ozawa T. Random Program Generator for Java JIT Compiler Test System[C]//Proc of the 3rd Int'l Conf on Quality Software, 2003:20. 被引量:1
  • 4Miller S P, Anderson E A, Wagner L G, et al. Formal Verification of Flight Critical Software[C]//Proc of the AIAA Guidance Navigation and Control Conf and Exhibit,2005. 被引量:1
  • 5Heitmeyer C L, Archer M, Leonard E, et al. Applying Formal Methods to a Certifiably Secure Software System[J]. IEEE Trans on Software Engineering, 2008,34 ( 1 ) : 82-98. 被引量:1
  • 6Feinerer I, Salzer G. A Comparison of Tools for Teaching Formal Software Verification[J]. Formal Aspects of Computing, 2009,21(3) :293-301. 被引量:1
  • 7Yoo J Jee E, Cha S.Formal Modeling and Verification of Safety- Critical Software[J]. IEEE Software, 2009,26(3) :42-49. 被引量:1
  • 8Cowan C,Pu C, Maier D, et al. StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks[C] //Proc of the 7th USENIX Security Symp, 1998. 被引量:1
  • 9Thompson K. Reflections on Trusting Trust[J]. Communications of the ACM, 1984,27(8):761-763. 被引量:1
  • 10Palmer E R. An Introduction to Citadel - A Secure Crypto Coprocessor for Workstations[C]//Proc of the IFIP SEC' 94 Conf, 1994. 被引量:1

共引文献6

同被引文献7

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部