Marcus Vlp
Technische Universitt Dresden, Germany

Why Operating-System Developers Write Barbaric Code and How To Verify It None the Less

Abstract:

Despite constant progress in languages, operating-system developers are typically rather prudent in adapting new features and languages and stick with languages such as C / C++ that are known to be unsafe from a type-safety perspective. Even worse, operating systems often contain code that explicitly violates type correctness and that often is not even conforming to the C / C++ standard. Drawing several examples from L4-family microkernel, I will try to defend some of the decisions that resulted in such barbaric code and present some ideas for verifying it.

 I will briefly introduce our concept of well-behaving memory, which is at the root of our C++ semantics for verifying kernel code. I will talk about type sensitivity, which is our slightly different view on type and memory safety and highlight directions where our kernel will be moving and how we may verify it when it arrives there.

Poster




Host: Andre Platzer
Appointments: Denny Marous <dcm@cs.cmu.edu>






Friday, April 5, 2013
2:00 PM
Gates & Hillman Centers 6501

Principles of Programming Seminars