Skip to main content

Showing 1–24 of 24 results for author: Sagiv, M

.
  1. arXiv:2211.02330  [pdf, other

    cs.DC cs.PL

    This is not the End: Rethinking Serverless Function Termination

    Authors: Kalev Alpernas, Aurojit Panda, Mooly Sagiv

    Abstract: Elastic scaling is one of the central benefits provided by serverless platforms, and requires that they scale resource up and down in response to changing workloads. Serverless platforms scale-down resources by terminating previously launched instances (which are containers or processes). The serverless programming model ensures that terminating instances is safe assuming all application code runn… ▽ More

    Submitted 4 November, 2022; originally announced November 2022.

  2. arXiv:2205.06911  [pdf, other

    cs.DB

    Blockaid: Data Access Policy Enforcement for Web Applications

    Authors: Wen Zhang, Eric Sheng, Michael Chang, Aurojit Panda, Mooly Sagiv, Scott Shenker

    Abstract: Modern web applications serve large amounts of sensitive user data, access to which is typically governed by data-access policies. Enforcing such policies is crucial to preventing improper data access, and prior work has proposed many enforcement mechanisms. However, these prior methods either alter application semantics or require adopting a new programming model; the former can result in unexpec… ▽ More

    Submitted 31 May, 2022; v1 submitted 13 May, 2022; originally announced May 2022.

    Comments: Extended technical report for OSDI 2022 paper

  3. arXiv:2111.00324  [pdf, other

    cs.PL

    Property-Directed Reachability as Abstract Interpretation in the Monotone Theory

    Authors: Yotam M. Y. Feldman, Mooly Sagiv, Sharon Shoham, James R. Wilcox

    Abstract: Inferring inductive invariants is one of the main challenges of formal verification. The theory of abstract interpretation provides a rich framework to devise invariant inference algorithms. One of the latest breakthroughs in invariant inference is property-directed reachability (PDR), but the research community views PDR and abstract interpretation as mostly unrelated techniques. This paper sho… ▽ More

    Submitted 18 January, 2022; v1 submitted 30 October, 2021; originally announced November 2021.

    Comments: Extended version of a POPL 2022 paper: https://dl.acm.org/doi/10.1145/3498676

  4. arXiv:2106.01240  [pdf, other

    cs.CR cs.LO

    Phoenix: A Formally Verified Regenerating Vault

    Authors: Uri Kirstein, Shelly Grossman, Michael Mirkin, James Wilcox, Ittay Eyal, Mooly Sagiv

    Abstract: An attacker that gains access to a cryptocurrency user's private keys can perform any operation in her stead. Due to the decentralized nature of most cryptocurrencies, no entity can revert those operations. This is a central challenge for decentralized systems, illustrated by numerous high-profile heists. Vault contracts reduce this risk by introducing artificial delay on operations, allowing abor… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

  5. Some Complexity Results for Stateful Network Verification

    Authors: Kalev Alpernas, Aurojit Panda, Alexander Rabinovich, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner

    Abstract: In modern networks, forwarding of packets often depends on the history of previously transmitted traffic. Such networks contain stateful middleboxes, whose forwarding behaviour depends on a mutable internal state. Firewalls and load balancers are typical examples of stateful middleboxes. This work addresses the complexity of verifying safety properties, such as isolation, in networks with finite… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: This is a pre-print of an article published in Formal Methods in System Design. The final authenticated version is available online at: https://doi.org/10.1007/s10703-018-00330-9

    Journal ref: Formal Methods in System Design 54 (2019) 191-231

  6. arXiv:2106.00966  [pdf, other

    cs.LO

    Temporal Prophecy for Proving Temporal Properties of Infinite-State Systems

    Authors: Oded Padon, Jochen Hoenicke, Kenneth L. McMillan, Andreas Podelski, Mooly Sagiv, Sharon Shoham

    Abstract: Various verification techniques for temporal properties transform temporal verification to safety verification. For infinite-state systems, these transformations are inherently imprecise. That is, for some instances, the temporal property holds, but the resulting safety property does not. This paper introduces a mechanism for tackling this imprecision. This mechanism, which we call temporal prophe… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

    Comments: 11 pages, presented at FMCAD 2018

  7. arXiv:2105.07663  [pdf, other

    cs.LO

    Summing Up Smart Transitions

    Authors: Neta Elad, Sophie Rain, Neil Immerman, Laura Kovács, Mooly Sagiv

    Abstract: Some of the most significant high-level properties of currencies are the sums of certain account balances. Properties of such sums can ensure the integrity of currencies and transactions. For example, the sum of balances should not be changed by a transfer operation. Currencies manipulated by code present a verification challenge to mathematically prove their integrity by reasoning about computer… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: This submission is an extended version of the CAV 2021 paper "Summing Up Smart Transitions", by N. Elad, S. Rain, N. Immerman, L. Kovács and M. Sagiv

    ACM Class: F.3.1; F.4.1

  8. arXiv:2008.09909  [pdf, other

    cs.PL

    Learning the Boundary of Inductive Invariants

    Authors: Yotam M. Y. Feldman, Mooly Sagiv, Sharon Shoham, James R. Wilcox

    Abstract: We study the complexity of invariant inference and its connections to exact concept learning. We define a condition on invariants and their geometry, called the fence condition, which permits applying theoretical results from exact concept learning to answer open problems in invariant inference theory. The condition requires the invariant's boundary---the states whose Hamming distance from the inv… ▽ More

    Submitted 9 November, 2020; v1 submitted 22 August, 2020; originally announced August 2020.

  9. arXiv:1910.12256  [pdf, other

    cs.PL

    Complexity and Information in Invariant Inference

    Authors: Yotam M. Y. Feldman, Neil Immerman, Mooly Sagiv, Sharon Shoham

    Abstract: This paper addresses the complexity of SAT-based invariant inference, a prominent approach to safety verification. We consider the problem of inferring an inductive invariant of polynomial length given a transition system and a safety property. We analyze the complexity of this problem in a black-box model, called the Hoare-query model, which is general enough to capture algorithms such as IC3/PDR… ▽ More

    Submitted 18 January, 2020; v1 submitted 27 October, 2019; originally announced October 2019.

  10. arXiv:1909.03130  [pdf, other

    cs.DC

    Automating Cluster Management with Weave

    Authors: Lalith Suresh, Joao Loff, Faria Kalim, Nina Narodytska, Leonid Ryzhyk, Sahan Gamage, Brian Oki, Zeeshan Lokhandwala, Mukesh Hira, Mooly Sagiv

    Abstract: Modern cluster management systems like Kubernetes and Openstack grapple with hard combinatorial optimization problems: load balancing, placement, scheduling, and configuration. Currently, developers tackle these problems by designing custom application-specific algorithms---an approach that is proving unsustainable, as ad-hoc solutions both perform poorly and introduce overwhelming complexity to t… ▽ More

    Submitted 6 September, 2019; originally announced September 2019.

  11. arXiv:1905.07739  [pdf, other

    cs.PL

    Inferring Inductive Invariants from Phase Structures

    Authors: Yotam M. Y. Feldman, James R. Wilcox, Sharon Shoham, Mooly Sagiv

    Abstract: Infinite-state systems such as distributed protocols are challenging to verify using interactive theorem provers or automatic verification tools. Of these techniques, deductive verification is highly expressive but requires the user to annotate the system with inductive invariants. To relieve the user from this labor-intensive and challenging task, invariant inference aims to find inductive invari… ▽ More

    Submitted 19 May, 2019; originally announced May 2019.

  12. arXiv:1802.08984  [pdf, other

    cs.PL cs.CR

    Secure Serverless Computing Using Dynamic Information Flow Control

    Authors: Kalev Alpernas, Cormac Flanagan, Sadjad Fouladi, Leonid Ryzhyk, Mooly Sagiv, Thomas Schmitz, Keith Winstein

    Abstract: The rise of serverless computing provides an opportunity to rethink cloud security. We present an approach for securing serverless systems using a novel form of dynamic information flow control (IFC). We show that in serverless applications, the termination channel found in most existing IFC systems can be arbitrarily amplified via multiple concurrent requests, necessitating a stronger terminati… ▽ More

    Submitted 25 February, 2018; originally announced February 2018.

  13. arXiv:1802.08795  [pdf, other

    cs.CV

    Constrained Image Generation Using Binarized Neural Networks with Decision Procedures

    Authors: Svyatoslav Korneev, Nina Narodytska, Luca Pulina, Armando Tacchella, Nikolaj Bjorner, Mooly Sagiv

    Abstract: We consider the problem of binary image generation with given properties. This problem arises in a number of practical applications, including generation of artificial porous medium for an electrode of lithium-ion batteries, for composed materials, etc. A generated image represents a porous medium and, as such, it is subject to two sets of constraints: topological constraints on the structure and… ▽ More

    Submitted 23 February, 2018; originally announced February 2018.

  14. arXiv:1801.04032  [pdf, other

    cs.PL

    Online Detection of Effectively Callback Free Objects with Applications to Smart Contracts

    Authors: Shelly Grossman, Ittai Abraham, Guy Golan-Gueta, Yan Michalevsky, Noam Rinetzky, Mooly Sagiv, Yoni Zohar

    Abstract: Callbacks are essential in many programming environments, but drastically complicate program understanding and reasoning because they allow to mutate object's local states by external objects in unexpected fashions, thus breaking modularity. The famous DAO bug in the cryptocurrency framework Ethereum, employed callbacks to steal $150M. We define the notion of Effectively Callback Free (ECF) object… ▽ More

    Submitted 11 January, 2018; originally announced January 2018.

    Comments: 31 pages. Technical Report for the paper presented in POPL'18 with the same title

  15. Bounded Quantifier Instantiation for Checking Inductive Invariants

    Authors: Yotam M. Y. Feldman, Oded Padon, Neil Immerman, Mooly Sagiv, Sharon Shoham

    Abstract: We consider the problem of checking whether a proposed invariant $\varphi$ expressed in first-order logic with quantifier alternation is inductive, i.e. preserved by a piece of code. While the problem is undecidable, modern SMT solvers can sometimes solve it automatically. However, they employ powerful quantifier instantiation methods that may diverge, especially when $\varphi$ is not preserved. A… ▽ More

    Submitted 20 August, 2019; v1 submitted 24 October, 2017; originally announced October 2017.

    Journal ref: Logical Methods in Computer Science, Volume 15, Issue 3 (August 21, 2019) lmcs:4018

  16. arXiv:1710.07191  [pdf, other

    cs.PL cs.DC cs.LO

    Paxos Made EPR: Decidable Reasoning about Distributed Protocols

    Authors: Oded Padon, Giuliano Losa, Mooly Sagiv, Sharon Shoham

    Abstract: Distributed protocols such as Paxos play an important role in many computer systems. Therefore, a bug in a distributed protocol may have tremendous effects. Accordingly, a lot of effort has been invested in verifying such protocols. However, checking invariants of such protocols is undecidable and hard in practice, as it requires reasoning about an unbounded number of nodes and messages. Moreover,… ▽ More

    Submitted 19 October, 2017; originally announced October 2017.

    Comments: 61 pages. Full version of paper by the same title presented in OOPSLA 2017

  17. arXiv:1709.06662  [pdf, other

    stat.ML cs.AI cs.CR cs.LG

    Verifying Properties of Binarized Deep Neural Networks

    Authors: Nina Narodytska, Shiva Prasad Kasiviswanathan, Leonid Ryzhyk, Mooly Sagiv, Toby Walsh

    Abstract: Understanding properties of deep neural networks is an important challenge in deep learning. In this paper, we take a step in this direction by proposing a rigorous way of verifying properties of a popular class of neural networks, Binarized Neural Networks, using the well-developed means of Boolean satisfiability. Our main contribution is a construction that creates a representation of a binarize… ▽ More

    Submitted 31 May, 2018; v1 submitted 19 September, 2017; originally announced September 2017.

    Comments: 10 pages

  18. arXiv:1708.05904  [pdf, other

    cs.PL

    Abstract Interpretation of Stateful Networks

    Authors: Kalev Alpernas, Roman Manevich, Aurojit Panda, Mooly Sagiv, Scott Shenker, Sharon Shoham, Yaron Velner

    Abstract: Modern networks achieve robustness and scalability by maintaining states on their nodes. These nodes are referred to as middleboxes and are essential for network functionality. However, the presence of middleboxes drastically complicates the task of network verification. Previous work showed that the problem is undecidable in general and EXPSPACE-complete when abstracting away the order of packet… ▽ More

    Submitted 4 July, 2018; v1 submitted 19 August, 2017; originally announced August 2017.

  19. arXiv:1610.02101  [pdf, other

    cs.LO

    On the automated verification of web applications with embedded SQL

    Authors: Shachar Itzhaky, Tomer Kotek, Noam Rinetzky, Mooly Sagiv, Orr Tamir, Helmut Veith, Florian Zuleger

    Abstract: A large number of web applications is based on a relational database together with a program, typically a script, that enables the user to interact with the database through embedded SQL queries and commands. In this paper, we introduce a method for formal automated verification of such systems which connects database theory to mainstream program analysis. We identify a fragment of SQL which captu… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: 25 pages

    MSC Class: 68P15; 68Q60 ACM Class: D.3.2; F.3.1

  20. arXiv:1607.00991  [pdf, other

    cs.NI

    Verifying Reachability in Networks with Mutable Datapaths

    Authors: Aurojit Panda, Ori Lahav, Katerina Argyraki, Mooly Sagiv, Scott Shenker

    Abstract: Recent work has made great progress in verifying the forwarding correctness of networks . However, these approaches cannot be used to verify networks containing middleboxes, such as caches and firewalls, whose forwarding behavior depends on previously observed traffic. We explore how to verify reachability properties for networks that include such "mutable datapath" elements. We want our verificat… ▽ More

    Submitted 4 July, 2016; originally announced July 2016.

  21. arXiv:1409.7687  [pdf, other

    cs.NI cs.LO

    Verifying Isolation Properties in the Presence of Middleboxes

    Authors: Aurojit Panda, Ori Lahav, Katerina Argyraki, Mooly Sagiv, Scott Shenker

    Abstract: Great progress has been made recently in verifying the correctness of router forwarding tables. However, these approaches do not work for networks containing middleboxes such as caches and firewalls whose forwarding behavior depends on previously observed traffic. We explore how to verify isolation properties in networks that include such "dynamic datapath" elements using model checking. Our work… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

    Comments: Under submission to NSDI

  22. Simulating reachability using first-order logic with applications to verification of linked data structures

    Authors: Tal Lev-Ami, Neil Immerman, Thomas Reps, Mooly Sagiv, Siddharth Srivastava, Greta Yorsh

    Abstract: This paper shows how to harness existing theorem provers for first-order logic to automatically verify safety properties of imperative programs that perform dynamic storage allocation and destructive updating of pointer-valued structure fields. One of the main obstacles is specifying and proving the (absence) of reachability properties among dynamically allocated cells. The main technical cont… ▽ More

    Submitted 27 May, 2009; v1 submitted 30 April, 2009; originally announced April 2009.

    Comments: 30 pages, LMCS

    ACM Class: F.3.1; F.3.2; F.4.1

    Journal ref: Logical Methods in Computer Science, Volume 5, Issue 2 (May 28, 2009) lmcs:680

  23. A Logic of Reachable Patterns in Linked Data-Structures

    Authors: Greta Yorsh, Alexander Rabinovich, Mooly Sagiv, Antoine Meyer, Ahmed Bouajjani

    Abstract: We define a new decidable logic for expressing and checking invariants of programs that manipulate dynamically-allocated objects via pointers and destructive pointer updates. The main feature of this logic is the ability to limit the neighborhood of a node that is reachable via a regular expression from a designated node. The logic is closed under boolean operations (entailment, negation) and ha… ▽ More

    Submitted 24 May, 2007; originally announced May 2007.

    Journal ref: Foundations of Software Science and Computation Structures (29/03/2006) p. 94-110

  24. arXiv:cs/0312014  [pdf, ps, other

    cs.LO

    Logical Characterizations of Heap Abstractions

    Authors: G. Yorsh, T. Reps, M. Sagiv, R. Wilhelm

    Abstract: Shape analysis concerns the problem of determining "shape invariants" for programs that perform destructive updating on dynamically allocated storage. In recent work, we have shown how shape analysis can be performed, using an abstract interpretation based on 3-valued first-order logic. In that work, concrete stores are finite 2-valued logical structures, and the sets of stores that can possibly… ▽ More

    Submitted 16 March, 2005; v1 submitted 7 December, 2003; originally announced December 2003.

    ACM Class: D.2.4