Skip to main content

Showing 1–11 of 11 results for author: Roscoe, A W

Searching in archive cs. Search in all archives.
.
  1. arXiv:2205.07529  [pdf, other

    cs.SE cs.LO

    Specification is Law: Safe Creation and Upgrade of Ethereum Smart Contracts

    Authors: Pedro Antonino, Juliandson Ferreira, Augusto Sampaio, A. W. Roscoe

    Abstract: Smart contracts are the building blocks of the "code is law" paradigm: the smart contract's code indisputably describes how its assets are to be managed - once it is created, its code is typically immutable. Faulty smart contracts present the most significant evidence against the practicality of this paradigm; they are well-documented and resulted in assets worth vast sums of money being compromis… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

  2. arXiv:2205.05594  [pdf, ps, other

    cs.CR

    Delay Encryption by Cubing

    Authors: Ivo Maffei, A. W. Roscoe

    Abstract: Delay Encryption (often called Timed-Release Encryption) is a scheme in which a message is sent into the future by ensuring its confidentiality only for a given amount of time. We propose a new scheme based on a novel time-lock puzzle. This puzzle relies on the assumption that repeated squaring is an inherently sequential process. We perform an extensive and practical analysis of many classical an… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: 30 pages

  3. arXiv:2112.00346  [pdf, other

    cs.CR cs.SE

    Trusted And Confidential Program Analysis

    Authors: Han Liu, Pedro Antonino, Zhiqiang Yang, Chao Liu, A. W. Roscoe

    Abstract: We develop the concept of Trusted and Confidential Program Analysis (TCPA) which enables program certification to be used where previously there was insufficient trust. Imagine a scenario where a producer may not be trusted to certify its own software (perhaps by a foreign regulator), and the producer is unwilling to release its sources and detailed design to any external body. We present a protoc… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

  4. arXiv:2105.05962  [pdf, other

    cs.CR cs.AR cs.SE

    Guardian: symbolic validation of orderliness in SGX enclaves

    Authors: Pedro Antonino, Wojciech Aleksander Wołoszyn, A. W. Roscoe

    Abstract: Modern processors can offer hardware primitives that allow a process to run in isolation. These primitives implement a trusted execution environment (TEE) in which a program can run such that the integrity and confidentiality of its execution are guaranteed. Intel's Software Guard eXtensions (SGX) is an example of such primitives and its isolated processes are called \emph{enclaves}. These guarant… ▽ More

    Submitted 12 May, 2021; originally announced May 2021.

  5. arXiv:2002.02710  [pdf, other

    cs.PL cs.CR cs.LO cs.SE

    Formalising and verifying smart contracts with Solidifier: a bounded model checker for Solidity

    Authors: Pedro Antonino, A. W. Roscoe

    Abstract: The exploitation of smart-contract vulnerabilities can have catastrophic consequences such as the loss of millions of pounds worth of crypto assets. Formal verification can be a useful tool in identifying vulnerabilities and proving that they have been fixed. In this paper, we present a formalisation of Solidity and the Ethereum blockchain using the Solid language and its blockchain; a Solid progr… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

    ACM Class: D.2.4; D.3.1; D.3.3; F.3.1; F.3.2; F.3.3

  6. arXiv:1904.09875  [pdf, ps, other

    cs.FL cs.LO

    Translating between models of concurrency

    Authors: David Mestel, A. W. Roscoe

    Abstract: Hoare's Communicating Sequential Processes (CSP) admits a rich universe of semantic models closely related to the van Glabbeek spectrum. In this paper we study finite observational models, of which at least six have been identified for CSP, namely traces, stable failures, revivals, acceptances, refusal testing and finite linear observations. We show how to use the recently-introduced \emph{priorit… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

  7. arXiv:1807.11609  [pdf, other

    cs.IT cs.DM

    A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics

    Authors: Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: From the output produced by a memoryless deletion channel from a uniformly random input of known length $n$, one obtains a posterior distribution on the channel input. The difference between the Shannon entropy of this distribution and that of the uniform prior measures the amount of information about the channel input which is conveyed by the output of length $m$, and it is natural to ask for whi… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: 11 pages, 2 figures

  8. arXiv:1802.00703  [pdf, other

    cs.IT cs.DM

    From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions

    Authors: Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: A binary string transmitted via a memoryless i.i.d. deletion channel is received as a subsequence of the original input. From this, one obtains a posterior distribution on the channel input, corresponding to a set of candidate supersequences weighted by the number of times the received subsequence can be embedded in them. In a previous work it is conjectured on the basis of experimental data that… ▽ More

    Submitted 4 March, 2019; v1 submitted 2 February, 2018; originally announced February 2018.

    Comments: 25 pages, 2 figures, submitted to IEEE Transactions on Information Theory; added references, minor writing improvements, fixed a minor flaw in section 5, improved notation, added proof of entropy minimization for the Rényi entropy for the case of single deletions, improved the presentation of the proofs in the appendix, added more details to the framework section, results unchanged

  9. arXiv:1611.08418  [pdf, other

    cs.SE

    Card games as pointer structures: case studies in mobile CSP modelling

    Authors: A. W. Roscoe

    Abstract: The author has long enjoyed using the CSP refinement checker FDR to solve puzzles, as witnessed by examples in \cite{tpc,ucs}. Recent experiments have shown that a number of games of patience (card games for one) are now well within bounds. We discuss the modelling approaches used to tackle these and avoid symmetric states. For two such games we reveal much higher percentages of winnable games tha… ▽ More

    Submitted 25 November, 2016; originally announced November 2016.

    Comments: Example files available on author's website

  10. A Static Analysis Framework for Livelock Freedom in CSP

    Authors: Joel Ouaknine, Hristina Palikareva, A. W. Roscoe, James Worrell

    Abstract: In a process algebra with hiding and recursion it is possible to create processes which compute internally without ever communicating with their environment. Such processes are said to diverge or livelock. In this paper we show how it is possible to conservatively classify processes as livelock-free through a static analysis of their syntax. In particular, we present a collection of rules, based o… ▽ More

    Submitted 27 September, 2013; v1 submitted 27 April, 2013; originally announced April 2013.

    Comments: 53 pages, 20 figures

    Journal ref: Logical Methods in Computer Science, Volume 9, Issue 3 (September 23, 2013) lmcs:884

  11. arXiv:cs/0405103  [pdf, ps, other

    cs.LO

    On model checking data-independent systems with arrays without reset

    Authors: R. S. Lazic, T. C. Newcomb, A. W. Roscoe

    Abstract: A system is data-independent with respect to a data type X iff the operations it can perform on values of type X are restricted to just equality testing. The system may also store, input and output values of type X. We study model checking of systems which are data-independent with respect to two distinct type variables X and Y, and may in addition use arrays with indices from X and values from… ▽ More

    Submitted 26 May, 2004; originally announced May 2004.

    Comments: Appeared in Theory and Practice of Logic Programming, vol. 4, no. 5&6, 2004

    ACM Class: D.1.6; D.3.2

    Journal ref: Theory and Practice of Logic Programming, vol. 4, no. 5&6, 2004