Author image not provided
 Lee Pike

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article4.38
Citation Count92
Publication count21
Publication years2005-2017
Available for download11
Average downloads per article199.36
Downloads (cumulative)2,193
Downloads (12 Months)204
Downloads (6 Weeks)21
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


21 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 21
Result page: 1 2

Sort by:

1
May 2017 IEEE Software: Volume 34 Issue 3, May 2017
Publisher: IEEE Computer Society Press
Bibliometrics:
Citation Count: 0

Previous research revealed pervasive software vulnerabilities in modern automobiles. This article presents a rejoinder to that research, discussing four general approaches to secure automotive software systems: compile-time assurance, runtime protection, automated testing, and architectural security. The authors discuss these approaches in the context of previous automotive exploits and the authors' ...

2 published by ACM
August 2015 Haskell '15: Proceedings of the 2015 ACM SIGPLAN Symposium on Haskell
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 0,   Downloads (12 Months): 13,   Downloads (Overall): 159

Full text available: PDFPDF
Ivory is a language that enforces memory safety and avoids most undefined behaviors while providing low-level control of memory- manipulation. Ivory is embedded in a modern variant of Haskell, as implemented by the GHC compiler. The main contributions of the paper are two-fold. First, we demonstrate how to embed the ...
Keywords: Embedded Systems, Embedded Domain Specific Languages
Also published in:
January 2016  ACM SIGPLAN Notices - Haskell '15: Volume 50 Issue 12, December 2015

3 published by ACM
July 2015 ACM Transactions on Information and System Security (TISSEC): Volume 18 Issue 2, December 2015
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 68,   Downloads (Overall): 465

Full text available: PDFPDF
This work examines the use of model checking techniques to verify system-level security properties of a collection of interacting virtual machines. Specifically, we examine how local access control policies implemented in individual virtual machines and a hypervisor can be shown to satisfy global access control constraints. The SAL model checker ...
Keywords: virtualization, model checking, Access control

4 published by ACM
September 2014 Haskell '14: Proceedings of the 2014 ACM SIGPLAN symposium on Haskell
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 1,   Downloads (12 Months): 13,   Downloads (Overall): 74

Full text available: PDFPDF
QuickCheck is a powerful library for automatic test-case generation. Because QuickCheck performs random testing, some of the counterexamples discovered are very large. QuickCheck provides an interface for the user to write shrink functions to attempt to reduce the size of counter examples. Hand-written implementations of shrink can be complex, inefficient, ...
Keywords: test-case generalization, delta-debugging, property-based testing
Also published in:
May 2015  ACM SIGPLAN Notices - Haskell '14: Volume 49 Issue 12, December 2014

5 published by ACM
August 2014 ICFP '14: Proceedings of the 19th ACM SIGPLAN international conference on Functional programming
Publisher: ACM
Bibliometrics:
Citation Count: 6
Downloads (6 Weeks): 10,   Downloads (12 Months): 47,   Downloads (Overall): 471

Full text available: PDFPDF
We report on our experiences in synthesizing a fully-featured autopilot from embedded domain-specific languages (EDSLs) hosted in Haskell. The autopilot is approximately 50k lines of C code generated from 10k lines of EDSL code and includes control laws, mode logic, encrypted communications system, and device drivers. The autopilot was built ...
Keywords: embedded domain specific languages, embedded systems
Also published in:
November 2014  ACM SIGPLAN Notices - ICFP '14: Volume 49 Issue 9, September 2014

6 published by ACM
January 2014 PLPV '14: Proceedings of the ACM SIGPLAN 2014 Workshop on Programming Languages meets Program Verification
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 1,   Downloads (12 Months): 19,   Downloads (Overall): 126

Full text available: PDFPDF
We briefly describe the use of embedded domain-specific languages to improve programmer productivity and increase software assurance in the context of building a fully-featured autopilot for unpiloted aircraft.
Keywords: high-assurance, programming language design

7
December 2013 Innovations in Systems and Software Engineering: Volume 9 Issue 4, December 2013
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Runtime verification (RV) is a natural fit for ultra-critical systems that require correct software behavior. Due to the low reliability of commodity hardware and the adversity of operational environments, it is common in ultra-critical systems to replicate processing units (and their hosted software) and incorporate fault-tolerant algorithms to compare the ...
Keywords: Distributed systems, Monitoring, Real-time systems, Runtime verification

8 published by ACM
September 2012 ICFP '12: Proceedings of the 17th ACM SIGPLAN international conference on Functional programming
Publisher: ACM
Bibliometrics:
Citation Count: 5
Downloads (6 Weeks): 0,   Downloads (12 Months): 16,   Downloads (Overall): 218

Full text available: PDFPDF
Embedded domain-specific languages (EDSLs) are an approach for quickly building new languages while maintaining the advantages of a rich metalanguage. We argue in this experience report that the "EDSL approach" can surprisingly ease the task of building a high-assurance compiler. We do not strive to build a fully formally-verified tool-chain, ...
Keywords: compiler, embedded domain-specific language, verification
Also published in:
October 2012  ACM SIGPLAN Notices - ICFP '12: Volume 47 Issue 9, September 2012

9
October 2011 FMCAD '11: Proceedings of the International Conference on Formal Methods in Computer-Aided Design
Publisher: FMCAD Inc
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 31

Full text available: PDFPDF
Control systems design is a multifaceted field, drawing not only on control theory, but on results from computer science, electrical engineering, mechanical engineering, and physics. A controller often must satisfy regimented size, weight, power, and timing constraints, integrate with the overall system, and perform properly in a variety of harsh ...

10
September 2011 RV'11: Proceedings of the Second international conference on Runtime verification
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 11

Runtime verification (RV) is a natural fit for ultra-critical systems, where correctness is imperative. In ultra-critical systems, even if the software is fault-free, because of the inherent unreliability of commodity hardware and the adversity of operational environments, processing units (and their hosted software) are replicated, and fault-tolerant algorithms are used ...

11
May 2011 Formal Aspects of Computing: Volume 23 Issue 3, May 2011
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

This paper demonstrates how to use a satisfiability modulo theories (SMT) solver together with a bounded model checker to verify properties of real-time physical layer protocols. The method is first used to verify the Biphase Mark protocol, a protocol that has been verified numerous times previously, allowing for a comparison ...
Keywords: Biphase Mark, Real-time, Infinite-state model checking, Physical layer, UART, Satisfiability modulo theories (SMT)

12
March 2011 ICSTW '11: Proceedings of the 2011 IEEE Fourth International Conference on Software Testing, Verification and Validation Workshops
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

Control-flow integrity (CFI) checks ensure that programs respect their static call-graphs at runtime. A program might violate its call-graph due to malicious attacks such as shell code injection or return-to-libc style exploits. CFI checking can also be beneficial during testing to discover properties of control-flow, as well as at deployment ...
Keywords: run-time monitoring, control-flow, static-analysis, stack protection

13
November 2010 RV'10: Proceedings of the First international conference on Runtime verification
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 16

We address the problem of runtime monitoring for hard realtime programs--a domain in which correctness is critical yet has largely been overlooked in the runtime monitoring community. We describe the challenges to runtime monitoring for this domain as well as an approach to satisfy the challenges. The core of our ...

14 published by ACM
September 2009 Haskell '09: Proceedings of the 2nd ACM SIGPLAN symposium on Haskell
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 6,   Downloads (Overall): 123

Full text available: PDFPDF
We present by example a new application domain for functional languages: emulators for embedded real-time protocols. As a case-study, we implement a simple emulator for the Biphase Mark Protocol, a physical-layer network protocol in Haskell. The surprising result is that a pure functional language with no built-in notion of time ...
Keywords: functional programming, emulation, physical-layer protocol testing

15
November 2007 FMCAD '07: Proceedings of the Formal Methods in Computer Aided Design
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 10

Time-triggered systems are distributed systems in which the nodes are independently-clocked but maintain synchrony with one another. Time-triggered protocols depend on the synchrony assumption the underlying system provides, and the protocols are often formally verified in an untimed or synchronous model based on this assumption. An untimed model is simpler ...

16 published by ACM
November 2007 AFM '07: Proceedings of the second workshop on Automated formal methods
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 4,   Downloads (Overall): 138

Full text available: PDFPDF
SRI's Symbolic Analysis Laboratory (SAL) is a high-level language-interface to a collection of state-of-the-art model checking tools. SAL contains novel and powerful features, many of which are not available in other model checkers. In this experience report, I highlight some of the features I have particularly found useful, drawing examples ...

17 published by ACM
August 2006 ACL2 '06: Proceedings of the sixth international workshop on the ACL2 theorem prover and its applications
Publisher: ACM
Bibliometrics:
Citation Count: 9
Downloads (6 Weeks): 0,   Downloads (12 Months): 8,   Downloads (Overall): 197

Full text available: PDFPDF
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code. 1 We report the use of ACL2 in building a verifying compiler for μCryptol , a stream-based language for encryption algorithm specification that targets Rockwell Collins' AAMP7 microprocessor (and is ...
Keywords: optimizing compiler, ACL2, certification, certifying compiler, cryptography, verifying compiler, high-assurance

18
May 2006 IEEE Transactions on Software Engineering: Volume 32 Issue 5, May 2006
Publisher: IEEE Press
Bibliometrics:
Citation Count: 2

We describe some inconsistencies in John Rushby's axiomatization of time-triggered algorithms that he presented in these transactions and that he formally specifies and verifies in the mechanical theorem-prover PVS. We present corrections for these inconsistencies that have been checked for consistency in PVS.
Keywords: synchronous systems, time-triggered algorithms, Formal methods, formal verification, Formal methods, formal verification, time-triggered algorithms, synchronous systems, PVS., PVS.

19
March 2006 TACAS'06: Proceedings of the 12th international conference on Tools and Algorithms for the Construction and Analysis of Systems
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 14

The Biphase Mark Protocol (BMP) and 8N1 Protocol are physical layer protocols for data transmission. We present a generic model in which timing and error values are parameterized by linear constraints, and then we use this model to verify these protocols. The verifications are carried out using SRI's SAL model ...

20
January 2006
Bibliometrics:
Citation Count: 4

Fault-tolerant real-time distributed control systems are being developed for next-generation aircraft and automobiles. They employ numerous complex protocols; because their uses are safety-critical, the design and implementation of these protocols must be error-free. The following modeling considerations make the formal verification of these protocols difficult: faults, real-time constraints, distributed control, ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us