computing   55874

« earlier    

Formally verified big step semantics out of x86-64 binaries
This paper presents a methodology for generating formally proven equivalence theorems between decompiled x86-64 machine code and big step semantics. These proofs are built on top of two additional contributions. First, a robust and tested formal x86-64 machine model containing small step semantics for 1625 instructions. Second, a decompilation-into-logic methodology supporting both x86-64 assembly and machine code at large scale. This work enables black-box binary verification, i.e., formal verification of a binary where source code is unavailable. As such, it can be applied to safety-critical systems that consist of legacy components, or components whose source code is unavailable due to proprietary reasons. The methodology minimizes the trusted code base by leveraging machine-learned semantics to build a formal machine model. We apply the methodology to several case studies, including binaries that heavily rely on the SSE2 floating-point instruction set, and binaries that are obtained by compiling code that is obtained by inlining assembly into C code.
computing  formal_verification 
53 minutes ago by whitequark
BBC - iWonder - How the world came to be run by computer code
The history of digital code, from the invention of the binary number system in 1679 to mobile apps today.
bbc  computer  computing  history  timeline 
5 hours ago by gilberto5757
Twitter
RT : connected to a KS10 running ITS running PEEK from Symbolics Genera terminal simulating an Imlac
retro  computing  from twitter_favs
yesterday by briantrice
B.S. Computer Science - Core Requirements | College of Computing
CS Ethics Requirement
(Choose one of the following) CS 4001
CS 4002
CS 4726
SLS 3110
 
 
Junior Design Requirement
(Choose one of the following) CS Junior Design & Technical Writing: CS 3311 with LMC 3432 and CS 3312 with LMC 3431
(Total of 6 hours)
Vertically Integrated Projects (VIP): 5 semester hours VIP and LMC 3403
(Total of 8 hours)
Georgia Tech Research Option: 9 semester hours of Research, LMC 4701, and LMC 4702
(Total of 11 hours)
Georgia Tech Create-X Program: 1 Semester of Start-Up Lab or Idea-to-Prototype, 1 Semester of Idea-to-Prototype, and LMC 3403
(Total of 9 hours)
 
B.S.  Computer  Science  -  Core  Requirements  |  College  of  Computing  komal  Neha  sonu  neeraj  gaTech  comp 
yesterday by neerajsinghvns
How to access a remote computer using Google Remote Desktop
If both you and your troubled relative use the Chrome browser (or own a Chromebook), you can use the Chrome Remote app to easily gain temporary control of their computer to either fix the issue or show them what to do. It’s available for PCs, Macs, Linux systems, and Chromebooks; there are also separate apps for iOS and Android.
computing  google  software 
2 days ago by terry
Childhood's End | Edge.org
The genius — sometimes deliberate, sometimes accidental — of the enterprises now on such a steep ascent is that they have found their way through the looking-glass and emerged as something else. Their models are no longer models. The search engine is no longer a model of human knowledge, it is human knowledge. What began as a mapping of human meaning now defines human meaning, and has begun to control, rather than simply catalog or index, human thought. No one is at the controls. If enough drivers subscribe to a real-time map, traffic is controlled, with no central model except the traffic itself. The successful social network is no longer a model of the social graph, it is the social graph. This is why it is a winner-take-all game. Governments, with an allegiance to antiquated models and control systems, are being left behind.

The next revolution will be the ascent of analog systems over which the dominion of digital programming comes to an end. Nature’s answer to those who sought to control nature through programmable machines is to allow us to build machines whose nature is beyond programmable control
computing  ai 
2 days ago by libbymiller

« earlier    

related tags

#t#theory  &  &next&read  -  1990s  8-bit  a  acm  age  ai  algorithm  algoritms  analog  analogue  analytics  and  appleii  appleiigs  argument  art  article  artue  audio  austin-kleon  austria  b.s.  bbc  bell-labs  bi  big  bivalence  blockchain  blog  book  books  business  children  cloud  code  college  columbus'  comp  compiler  compsci  computer  computers  computerscience  concepts  containerization  core  course  cpu  craft  cryptography  cs  culture  dance  data  database  databases  design  dev  development  digital  distributed  distribution  dragon  dwave  ebooks  economics  editing  editor  eink  electronics  embroidery  encryption  engineering  errorhandling  esoteric  essay  ethics  europe  fabric  facebook  fatherhood  featured  filing  formal_verification  fractal  ft  fun  futurism  garage-band  gatech  geek  general-purpose  glass  gold  google  graphics  hack  hacker  hacking  hardware  harvey  haskell  history  hold  ibm  ibm’s  ifttt  in  info  inspiration  intelligence  interesting  interface  internet  intro  ir  irene-posch  is  italian  javascript  julia  knitting  komal  lake  language  learning  linux  linz  lisp  list  literature  logic  logo  logs  louis  lxc  maker  math  membership  microcomputer  microsoft  models  modem  monitor  mouse  ms  music  neeraj  neha  networking  networks  nlp  notes  now  obituary  of  old  open_source  operating-system  organisation  organization  papers  parenting  people  personal  physics  plan9  plt  posts  privacy  professional-development  prog  programmable  programming  quantum-computing  quantum  quantum_computing  r  rant  raspberrypi  reality  reference  regulation  reproducibility  requirements  research  resistant  retro  retrocomputing  retroinformatica  review  rust  scheme  science  scip  scripting  search  security  sharing  simulator  society  soft.computing  software  solver  sonu  sound  spacetime  statistics  story  system  systemprogramming  technology  television  text  textile  textiles  the  theory  thread  timeline  tips-and-tricks  tools  tpm  transmission  trends  trs-80  tutorial  tv  ui  ux  video  webdev  weird  wikipedia  windows  word  wordprocessor  words  writer  writing  wsl  wtf  | 

Copy this bookmark:



description:


tags: