toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

240
active users

#formalverification

0 posts0 participants0 posts today
Jan :rust: :ferris:<p><span class="h-card" translate="no"><a href="https://kolektiva.social/@d10c4n3" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>d10c4n3</span></a></span> </p><p>Yes, this is another issue with the current <a href="https://floss.social/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> architecture: they can't learn or improve. It's one big monolith - not composed of smaller parts (that could individually be improved or composed with each other).</p><p>There _are_ AI architectures that are _actually reliable_...</p><p><a href="https://floss.social/@janriemer/114454349034565839" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">floss.social/@janriemer/114454</span><span class="invisible">349034565839</span></a></p><p>...but our industry has decided to hyperfocus on bullshit machines.</p><p><span class="h-card" translate="no"><a href="https://mastodon.online/@larsmb" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>larsmb</span></a></span> </p><p><a href="https://floss.social/tags/ArtificialIntelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ArtificialIntelligence</span></a> <a href="https://floss.social/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a></p>
Jan :rust: :ferris:<p>The inner magic behind the Z3 theorem prover - Microsoft Research (October 2019):</p><p><a href="https://www.microsoft.com/en-us/research/blog/the-inner-magic-behind-the-z3-theorem-prover/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">microsoft.com/en-us/research/b</span><span class="invisible">log/the-inner-magic-behind-the-z3-theorem-prover/</span></a></p><p><a href="https://floss.social/tags/Z3" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Z3</span></a> <a href="https://floss.social/tags/SMT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SMT</span></a> <a href="https://floss.social/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a> <a href="https://floss.social/tags/ModelChecking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ModelChecking</span></a> <a href="https://floss.social/tags/Proof" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Proof</span></a></p>
Jan :rust: :ferris:<p>F* (fstar) Interactive Tutorial:</p><p><a href="https://fstar-lang.org/tutorial/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">fstar-lang.org/tutorial/</span><span class="invisible"></span></a></p><p>I'm only like 10% into the tutorial, but this language is CRAZY (fun)! :awesome: 😄 </p><p>I try to learn the fundamentals of it, so I can use the backend of it in <a href="https://floss.social/tags/Aeneas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Aeneas</span></a>... so I can ultimately formally verify my <a href="https://floss.social/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> crate (former attempts with <a href="https://floss.social/tags/Creusot" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Creusot</span></a> and <a href="https://floss.social/tags/Kani" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kani</span></a> failed for me).</p><p>Aeneas:<br><a href="https://github.com/AeneasVerif/aeneas" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/AeneasVerif/aeneas</span><span class="invisible"></span></a></p><p>See part two of toot for a toy example of proving function equivalence</p><p>1/2</p><p><a href="https://floss.social/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a> <a href="https://floss.social/tags/FunctionalProgramming" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FunctionalProgramming</span></a> <a href="https://floss.social/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a></p>
Jan :rust: :ferris:<p>Re: Help us create a vision for Rust's future 👆 </p><p>In the mid- to long-term I can see <a href="https://floss.social/tags/Rust" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Rust</span></a> focus more and more on facilitating <a href="https://floss.social/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a> - it perfectly aligns with <a href="https://floss.social/tags/RustLang" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RustLang</span></a>'s vision of enabling everyone to build _reliable_ and efficient software.</p><p>First step is probably to have a common contract language, which might enable interoperability of different verification tools.</p><p>(Disclaimer: I'm a total newbie in the field of formal verification, but I find it absolutely fascinating!)</p>
Rob Sison<p>There's now a video up of the talk I gave at this year's seL4 Summit, on the status of UNSW's projects to verify Time Protection and Microkit-based userland OS services for the seL4 microkernel:</p><p><a href="https://youtu.be/7wcFx6OTEL4" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/7wcFx6OTEL4</span><span class="invisible"></span></a></p><p><a href="https://aus.social/tags/sel4summit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>sel4summit</span></a> <a href="https://aus.social/tags/seL4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>seL4</span></a> <a href="https://aus.social/tags/verification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>verification</span></a> <a href="https://aus.social/tags/operatingsystems" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>operatingsystems</span></a> <a href="https://aus.social/tags/microkernel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>microkernel</span></a> <a href="https://aus.social/tags/IsabelleHOL" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IsabelleHOL</span></a> <a href="https://aus.social/tags/HOL4" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HOL4</span></a> <a href="https://aus.social/tags/ITP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITP</span></a> <a href="https://aus.social/tags/modelchecking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>modelchecking</span></a> <a href="https://aus.social/tags/formalmethods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formalmethods</span></a> <a href="https://aus.social/tags/formalverification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formalverification</span></a> <a href="https://aus.social/tags/formal_methods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formal_methods</span></a> <a href="https://aus.social/tags/formal_verification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formal_verification</span></a></p>
Kensan<p>New article up on ACM on Ada/SPARK title "Co-Developing Programs and Their Proof of Correctness". PDF is also available for download.</p><p><a href="https://cacm.acm.org/magazines/2024/3/280078-co-developing-programs-and-their-proof-of-correctness/fulltext" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cacm.acm.org/magazines/2024/3/</span><span class="invisible">280078-co-developing-programs-and-their-proof-of-correctness/fulltext</span></a></p><p><a href="https://mastodon.social/tags/ada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ada</span></a> <a href="https://mastodon.social/tags/spark" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>spark</span></a> <a href="https://mastodon.social/tags/formalverification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formalverification</span></a></p>
Yaroslav Khnygin<p>This week I hosted a monthly meetup of Lisp Ireland, where Rafael Sadykov presented his talk "Lisp &amp; Hardware Verification with ACL2".</p><p>ACL2 is a theorem prover implemented in a subset of Common Lisp, and the talk discussed how it can be used for formal verification of various systems, and for hardware verification in particular.</p><p>The recording was uploaded here: <a href="https://www.youtube.com/watch?v=iFEb9p54x_Q" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=iFEb9p54x_</span><span class="invisible">Q</span></a></p><p><a href="https://mastodon.ie/tags/LispIreland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LispIreland</span></a> <a href="https://mastodon.ie/tags/Meetup" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Meetup</span></a> <a href="https://mastodon.ie/tags/TechTalk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechTalk</span></a> <a href="https://mastodon.ie/tags/Lisp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lisp</span></a> <a href="https://mastodon.ie/tags/CommonLisp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CommonLisp</span></a> <a href="https://mastodon.ie/tags/ACL2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ACL2</span></a> <a href="https://mastodon.ie/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a> <a href="https://mastodon.ie/tags/HardwareVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HardwareVerification</span></a> <a href="https://mastodon.ie/tags/Ireland" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ireland</span></a></p>
José A. Alonso<p>The importance of formal verification. <a href="https://formal.land/blog/2024/02/02/formal-verification-for-aleph-zero" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">formal.land/blog/2024/02/02/fo</span><span class="invisible">rmal-verification-for-aleph-zero</span></a> <a href="https://mathstodon.xyz/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a></p>
José A. Alonso<p>Generating and exploiting automated reasoning proof certificates. ~ Haniel Barbosa, Clark Barrett, Byron Cook, Bruno Dutertre, Gereon Kremer, Hanna Lachnitt, Aina Niemetz, Andres Nötzli, Alex Ozdemir, Mathias Preiner, Andrew Reynolds, Cesare Tinelli, Yoni Zohar. <a href="https://cacm.acm.org/magazines/2023/10/276632-generating-and-exploiting-automated-reasoning-proof-certificates/abstract" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cacm.acm.org/magazines/2023/10</span><span class="invisible">/276632-generating-and-exploiting-automated-reasoning-proof-certificates/abstract</span></a> <a href="https://mathstodon.xyz/tags/AutomatedReasoning" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AutomatedReasoning</span></a> <a href="https://mathstodon.xyz/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a></p>
Frederic Jacobs<p>One of the challenges with the deployment of more automated reasoning is often the tooling. Cool to see <a href="https://mastodon.social/tags/Cryspen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cryspen</span></a> invest in a new integrated development and verification environment based on hax. Congrats <span class="h-card" translate="no"><a href="https://mastodon.social/@franziskus" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>franziskus</span></a></span> and team :) <br><a href="https://cryspen.com/post/cyber-campus-hax/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cryspen.com/post/cyber-campus-</span><span class="invisible">hax/</span></a></p><p><a href="https://mastodon.social/tags/FormalMethods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalMethods</span></a> <a href="https://mastodon.social/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a></p>
Frederic Jacobs<p>Galois applied GPT-4 to generate a SAW memory safety proof for salsa20. Interesting example of what's currently possible at the intersection of LLMs and Formal Verification. Clearly more to come in that space.<br><a href="https://mastodon.social/tags/FormalMethods" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalMethods</span></a> <a href="https://mastodon.social/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a> <a href="https://mastodon.social/tags/LLM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LLM</span></a> <br><a href="https://galois.com/blog/2023/08/applying-gpt-4-to-saw-formal-verification/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">galois.com/blog/2023/08/applyi</span><span class="invisible">ng-gpt-4-to-saw-formal-verification/</span></a></p>
Franziskus<p>End of March I have been at the Real World Crypto Symposium to give a talk on the hacspec language, the hax tool, and the libcrux crypto library.</p><p>Read more about it on Cryspen's blog.</p><p><a href="https://cryspen.com/post/rwc-2023/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">cryspen.com/post/rwc-2023/</span><span class="invisible"></span></a></p><p><a href="https://mastodon.social/tags/cryptography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cryptography</span></a> <a href="https://mastodon.social/tags/formalverification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formalverification</span></a> <a href="https://mastodon.social/tags/tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tools</span></a> <a href="https://mastodon.social/tags/conference" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conference</span></a></p>
Daniel Grosse<p>Woohoo! Our book, "Formal Verification of Structurally Complex Multipliers," has officially arrived in hardcover format! After putting in years of work, it's an indescribable feeling to finally have the physical copy in my hands.</p><p>More information: <a href="https://link.springer.com/book/10.1007/978-3-031-24571-8" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="ellipsis">link.springer.com/book/10.1007</span><span class="invisible">/978-3-031-24571-8</span></a></p><p><a href="https://fosstodon.org/tags/SymbolicComputerAlgebra" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SymbolicComputerAlgebra</span></a> <a href="https://fosstodon.org/tags/SCA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SCA</span></a> <a href="https://fosstodon.org/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a> <a href="https://fosstodon.org/tags/Circuits" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Circuits</span></a> <a href="https://fosstodon.org/tags/Hardware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hardware</span></a> <a href="https://fosstodon.org/tags/Springer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Springer</span></a></p>
Frederic Jacobs<p>Gluing together Hacspec, Jasmin and SSProve using Coq for end-to-end verification, from spec to implementation.</p><p>It's great to see more integration efforts between formal verification stacks to improve confidence that implementations still satisfy all higher-level security properties.</p><p><a href="https://mastodon.social/tags/FV" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FV</span></a> <a href="https://mastodon.social/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a><br><a href="https://eprint.iacr.org/2023/185" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">eprint.iacr.org/2023/185</span><span class="invisible"></span></a></p>
Steve Easterbrook<p>A fuller <a href="https://fediscience.org/tags/introduction" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>introduction</span></a>.</p><p>My PhD was in software systems analysis: how to handle poorly understood, conflicting system requirements (<a href="https://fediscience.org/tags/RequirementsEngineering" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RequirementsEngineering</span></a>)</p><p>This led me to explore socio-cognitive processes of large teams (<a href="https://fediscience.org/tags/DistributedCognition" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DistributedCognition</span></a>, <a href="https://fediscience.org/tags/STS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>STS</span></a>, <a href="https://fediscience.org/tags/Ethnography" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ethnography</span></a>)</p><p>I have worked for NASA studying software safety for spacecraft (<a href="https://fediscience.org/tags/FormalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FormalVerification</span></a>, <a href="https://fediscience.org/tags/OrganizationalBehaviour" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OrganizationalBehaviour</span></a>)</p><p>Now I study <a href="https://fediscience.org/tags/ClimateModels" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClimateModels</span></a> + do <a href="https://fediscience.org/tags/ClimateData" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ClimateData</span></a> analytics, using all the above, plus <a href="https://fediscience.org/tags/SystemsThinking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SystemsThinking</span></a>, <a href="https://fediscience.org/tags/DataScience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataScience</span></a>, &amp; <a href="https://fediscience.org/tags/ML" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ML</span></a></p>
theruran 💻 🌐 :cereal_killer:<p>worth posting this again, for those programmers who are having wicked thoughts of writing security-critical software in C or C++</p><p>Source: "Exploitation in the era of <a href="https://hackers.town/tags/formalVerification" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>formalVerification</span></a>: A peek at a new frontier with <a href="https://hackers.town/tags/Ada" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ada</span></a> / <a href="https://hackers.town/tags/SPARK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SPARK</span></a>" by Adam Zabrocki and Alex Tereshkin, <a href="https://hackers.town/tags/DEFCON30" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON30</span></a>, 2022</p><p><a href="https://hackers.town/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://hackers.town/tags/DEFCON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON</span></a></p>