Skip to main content

Showing 1–3 of 3 results for author: Klimis, V

.
  1. arXiv:2405.18575  [pdf, other

    cs.PL

    Lost in Interpretation: Navigating Challenges in Validating Persistency Models Amid Vague Specs and Stubborn Machines, All with a Sense of Humour

    Authors: Vasileios Klimis, Alastair F. Donaldson, Viktor Vafeiadis, John Wickerson, Azalea Raad

    Abstract: Memory persistency models provide a foundation for persistent programming by specifying which (and when) writes to non-volatile memory (NVM) become persistent. Memory persistency models for the Intel-x86 and Arm architectures have been formalised, but not empirically validated against real machines. Traditional validation methods %such as %extensive litmus testing used for memory \emph{consistency… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  2. arXiv:2008.06149  [pdf, other

    cs.NI

    Model Checking Software-Defined Networks with Flow Entries that Time Out (version with appendix)

    Authors: Vasileios Klimis, George Parisis, Bernhard Reus

    Abstract: Software-defined networking (SDN) enables advanced operation and management of network deployments through (virtually) centralised, programmable controllers, which deploy network functionality by installing rules in the flow tables of network switches. Although this is a powerful abstraction, buggy controller functionality could lead to severe service disruption and security loopholes, motivating… ▽ More

    Submitted 15 January, 2022; v1 submitted 13 August, 2020; originally announced August 2020.

  3. arXiv:2004.11988  [pdf, other

    cs.NI

    Towards Model Checking Real-World Software-Defined Networks (version with appendix)

    Authors: Vasileios Klimis, George Parisis, Bernhard Reus

    Abstract: In software-defined networks (SDN), a controller program is in charge of deploying diverse network functionality across a large number of switches, but this comes at a great risk: deploying buggy controller code could result in network and service disruption and security loopholes. The automatic detection of bugs or, even better, verification of their absence is thus most desirable, yet the size o… ▽ More

    Submitted 20 July, 2020; v1 submitted 24 April, 2020; originally announced April 2020.