{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:17:08Z","timestamp":1743070628414,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030035914"},{"type":"electronic","value":"9783030035921"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03592-1_9","type":"book-chapter","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T04:45:32Z","timestamp":1542948332000},"page":"155-176","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Formalising Executable Specifications of Low-Level Systems"],"prefix":"10.1007","author":[{"given":"Paolo","family":"Torrini","sequence":"first","affiliation":[]},{"given":"David","family":"Nowak","sequence":"additional","affiliation":[]},{"given":"Narjes","family":"Jomaa","sequence":"additional","affiliation":[]},{"given":"Mohamed Sami","family":"Cherif","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,24]]},"reference":[{"key":"9_CR1","unstructured":"Torrini, P., Nowak, D., Cherif, M.S., Jomaa, N.: The repository of DEC (2018). https:\/\/github.com\/2xs\/dec.git"},{"key":"9_CR2","unstructured":"Gu, R., et al.: CertiKOS: an extensible architecture for building certified concurrent OS kernels. In: OSDI, pp. 653\u2013669 (2016)"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Klein, G., et al.: seL4: formal verification of an OS kernel. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 207\u2013220 (2009)","DOI":"10.1145\/1629575.1629596"},{"key":"9_CR4","unstructured":"Jomaa, N., Torrini, P., Nowak, D., Grimaud, G., Hym, S.: Proof-oriented design of a separation kernel with minimal trusted computing base. In: Proceedings of AVOCS 2018, 16 p. (2018). http:\/\/www.cristal.univ-lille.fr\/~nowakd\/pipdesign.pdf"},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07964-5","volume-title":"Interactive Theorem Proving and Program Development. Coq\u2019Art: The Calculus of Inductive Constructions","author":"Y Bertot","year":"2004","unstructured":"Bertot, Y., Casteran, P.: Interactive Theorem Proving and Program Development. Coq\u2019Art: The Calculus of Inductive Constructions. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-662-07964-5"},{"key":"9_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45949-9","volume-title":"Isabelle\/HOL: A Proof Assistant for Higher-Order Logic","author":"T Nipkow","year":"2002","unstructured":"Nipkow, T., Wenzel, M., Paulson, L.C.: Isabelle\/HOL: A Proof Assistant for Higher-Order Logic. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45949-9"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Bergougnoux, Q., Grimaud, G., Iguchi-Cartigny, J.: Porting the Pip proto-kernel\u2019s model to multi-core environments. In: IEEE-DASC 2018, 8 p. (2018)","DOI":"10.1109\/DASC\/PiCom\/DataCom\/CyberSciTec.2018.00108"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Yaker, M., et al.: Ensuring IoT security with an architecture based on a separation kernel. In: FiCloud 2018, 8 p. (2018)","DOI":"10.1109\/FiCloud.2018.00025"},{"key":"9_CR9","unstructured":"Bergougnoux, Q., et al.: The repository of Pip (2018). http:\/\/pip.univ-lille1.fr"},{"key":"9_CR10","unstructured":"Zhao, Y., Sanan, D., Zhang, F., Liu, Y.: High-assurance separation kernels: a survey on formal methods. arXiv preprint arXiv:1701.01535 (2017)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Dam, M., Guanciale, R., Khakpour, N., Nemati, H., Schwarz, O.: Formal verification of information flow security for a simple ARM-based separation kernel. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS 2013, pp. 223\u2013234. ACM (2013)","DOI":"10.1145\/2508859.2516702"},{"key":"9_CR12","unstructured":"Hym, S., Oudjail, V.: The repository of Digger (2017). https:\/\/github.com\/2xs\/digger"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Blazy, S., Leroy, X.: Mechanized semantics for the Clight subset of the C language. J. Autom. Reason. 43, 263\u2013288 (2009)","DOI":"10.1007\/s10817-009-9148-3"},{"key":"9_CR14","unstructured":"Torrini, P., Nowak, D.: DEC 1.0 specification (2018). https:\/\/github.com\/2xs\/dec.git"},{"issue":"2","key":"9_CR15","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/0304-3975(92)90014-7","volume":"103","author":"M Felleisen","year":"1992","unstructured":"Felleisen, M., Hieb, R.: The revised report on the syntactic theories of sequential control and state. Theor. Comput. Sci. 103(2), 235\u2013271 (1992)","journal-title":"Theor. Comput. Sci."},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Moggi, E.: Notions of computation and monads. Inf. Comput. 93, 55\u201392 (1991)","DOI":"10.1016\/0890-5401(91)90052-4"},{"key":"9_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1007\/978-3-662-46734-3_4","volume-title":"Transactions on Aspect-Oriented Software Development XII","author":"M Churchill","year":"2015","unstructured":"Churchill, M., Mosses, P.D., Sculthorpe, N., Torrini, P.: Reusable components of semantic specifications. In: Chiba, S., Tanter, \u00c9., Ernst, E., Hirschfeld, R. (eds.) Transactions on Aspect-Oriented Software Development XII. LNCS, vol. 8989, pp. 132\u2013179. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46734-3_4"},{"key":"9_CR18","first-page":"17","volume":"60\u201361","author":"GD Plotkin","year":"2004","unstructured":"Plotkin, G.D.: A structural approach to operational semantics. J. Log. Algebr. Program. 60\u201361, 17\u2013139 (2004)","journal-title":"J. Log. Algebr. Program."},{"key":"9_CR19","unstructured":"Leroy, X.: Using Coq\u2019s evaluation mechanisms in anger (2015). http:\/\/gallium.inria.fr\/blog\/coq-eval\/"},{"key":"9_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/978-3-540-71067-7_16","volume-title":"Theorem Proving in Higher Order Logics","author":"D Cock","year":"2008","unstructured":"Cock, D., Klein, G., Sewell, T.: Secure microkernels, state monads and scalable refinement. In: Mohamed, O.A., Mu\u00f1oz, C., Tahar, S. (eds.) TPHOLs 2008. LNCS, vol. 5170, pp. 167\u2013182. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71067-7_16"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-642-03359-9_30","volume-title":"Theorem Proving in Higher Order Logics","author":"W Swierstra","year":"2009","unstructured":"Swierstra, W.: A Hoare logic for the state monad. In: Berghofer, S., Nipkow, T., Urban, C., Wenzel, M. (eds.) TPHOLs 2009. LNCS, vol. 5674, pp. 440\u2013451. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03359-9_30"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Wadler, P.: Comprehending monads. Math. Struct. Comput. Sci. 2, 461\u2013493 (1992)","DOI":"10.1017\/S0960129500001560"},{"key":"9_CR23","unstructured":"Cherif, M.S.: Project report - modelling and verifying the Pip protokernel in a deep embedding of C (2017). https:\/\/github.com\/2xs\/dec.git"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Gibbons, J., Wu, N.: Folding domain-specific languages: deep and shallow embeddings (functional pearl). In: Proceedings of the ACM SIGPLAN International Conference on Functional Programming, ICFP, vol. 49 (2014)","DOI":"10.1145\/2628136.2628138"},{"key":"9_CR25","first-page":"143","volume":"44","author":"J Svenningsson","year":"2015","unstructured":"Svenningsson, J., Axelsson, E.: Combining deep and shallow embedding of domain-specific languages. Comput. Lang. Syst. Struct. 44, 143\u2013165 (2015)","journal-title":"Comput. Lang. Syst. Struct."},{"key":"9_CR26","doi-asserted-by":"crossref","unstructured":"Jovanovic, V., Shaikhha, A., Stucki, S., Nikolaev, V., Koch, C., Odersky, M.: Yin-yang: concealing the deep embedding of DSLs. In: Proceedings of the 2014 International Conference on Generative Programming: Concepts and Experiences. GPCE 2014, pp. 73\u201382. ACM (2014)","DOI":"10.1145\/2658761.2658771"},{"key":"9_CR27","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1017\/S0956796809007205","volume":"19","author":"J Carette","year":"2009","unstructured":"Carette, J., Kiselyov, O., Shan, C.: Finally tagless, partially evaluated: tagless staged interpreters for simpler typed languages. J. Funct. Program. 19, 509\u2013543 (2009)","journal-title":"J. Funct. Program."},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/978-3-540-30142-4_22","volume-title":"Theorem Proving in Higher Order Logics","author":"M Wildmoser","year":"2004","unstructured":"Wildmoser, M., Nipkow, T.: Certifying machine code safety: shallow versus deep embedding. In: Slind, K., Bunker, A., Gopalakrishnan, G. (eds.) TPHOLs 2004. LNCS, vol. 3223, pp. 305\u2013320. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-30142-4_22"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"O\u2019Connor, L., et al.: Refinement through restraint: bringing down the cost of verification. In: Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming, ICFP 2016, pp. 89\u2013102. ACM (2016)","DOI":"10.1145\/2951913.2951940"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Delaware, B., Pit-Claudel, C., Gross, J., Chlipala, A.: Fiat: deductive synthesis of abstract data types in a proof assistant. In: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, pp. 689\u2013700 (2015)","DOI":"10.1145\/2676726.2677006"},{"key":"9_CR31","doi-asserted-by":"publisher","unstructured":"Chlipala, A.: The Bedrock structured programming system: combining generative metaprogramming and Hoare logic in an extensible program verifier. In: Morrisett, G., Uustalu, T. (eds.) ACM SIGPLAN International Conference on Functional Programming, ICFP 2013, Boston, MA, USA, 25\u201327 September 2013, pp. 391\u2013402. ACM (2013). https:\/\/doi.org\/10.1145\/2500365.2500592","DOI":"10.1145\/2500365.2500592"},{"key":"9_CR32","doi-asserted-by":"publisher","unstructured":"Vijayaraghavan, M., Chlipala, A., Arvind, Dave, N.: Modular deductive verification of multiprocessor hardware designs. In: Kroening, D., P\u0103s\u0103reanu, C. (eds.) CAV 2015. LNCS, vol. 9207, pp. 109\u2013127. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-319-21668-3_7","DOI":"10.1007\/978-3-319-21668-3_7"},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Gu, R., et al.: Deep specifications and certified abstraction layers. In: Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2015, pp. 595\u2013608. ACM (2015)","DOI":"10.1145\/2676726.2676975"}],"container-title":["Lecture Notes in Computer Science","Verified Software. Theories, Tools, and Experiments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03592-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T15:05:34Z","timestamp":1657206334000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-03592-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030035914","9783030035921"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03592-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"24 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"VSTTE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Working Conference on Verified Software: Theories, Tools, and Experiments","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oxford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"vstte2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/vstte18.it.uu.se\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"79% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}