Twitter | Pretraživanje | |
Gernot Heiser
Microkernel dude
2.042
Tweetovi
49
Pratim
1.238
Osobe koje vas prate
Tweetovi
Gernot Heiser 29. sij
‘Embarrassingly slow’: Australia’s broadband internet ranked fourth slowest in OECD – well done, !
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser proslijedio/la je tweet
CPS-IoT Week 28. sij
Are you from non US institutions and would love to be in Sydney for CPS-IoT Week 2020? We're pleased to announce Student Travel Grants for Non-US Institutions.
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser proslijedio/la je tweet
aquigley 23. sij
I’m looking forward to becoming the head of school in Computer Science and Engineeering in Sydney Australia.
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser proslijedio/la je tweet
Next Day Video 16. sij
Verified seL4 on secure RISC-V processors
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 17. sij
Returning home from the smell of smoke has been replaced by the smell of extinguished fire. Grateful for the rain!
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 19. pro
Odgovor korisniku/ci @PLT_cheater
You can't get security from running on something insecure
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 19. pro
I’m looking for a PhD student with strong systems skills for developing a secure, Android-based IoT OS running on
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 13. pro
Odgovor korisniku/ci @PLT_cheater @asadahmedrafiq i 3 ostali
Agree with s/hardware/software/g. Software systems tend to be even more complex than hardware, less regular, and unit tests achieve even less
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 13. pro
It's not just about "trivial detail", it that was all, formal methods wouldn't be worth much. It's corner cases, and unforeseen interaction of features that break systems, and only formal methods can prevent this
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 12. pro
Tutorial on running on the Renode simulator, presented by DornerWorks at
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 12. pro
posters at#RISCVSUMMIT, presented by Critical Technologies Inc
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 12. pro
Odgovor korisniku/ci @wwwuse @alison_chaiken i 2 ostali
It's mathematically proving program correctness
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 9. pro
What does ’s license imply? tl;dr nothing you should have to worry about; it won’t infect your valuable IP and in most cases you shouldn’t even touch the GPLed code
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 8. pro
Odgovor korisniku/ci @paulmckrcu @alison_chaiken i 2 ostali
Of course, any testing is also against a spec, but an informal and usually incomplete one. With formal specs incompleteness is easy to see and it's possible to prove soundness. Also, formal verification forced you to be explicit about your assumptions
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 7. pro
if you're identifying equivalence classes you're already using formal methods!
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 7. pro
Odgovor korisniku/ci @alison_chaiken @wattsamata @dvhart_
To quote Dijkstra: Testing can only show the presence of bugs, never their absence. 100% coverage only shows all code is exercised, but not all possible code paths – that would in general be infeasible due to state explosion.
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 6. pro
Odgovor korisniku/ci @dcasnowdon
If you're into RISC-V definitely
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 5. pro
Are you going to the in San Jose next week? There’ll be a number of seL4 activities: My talk "seL4 on RISC-V: Verified OS for True Security” Wed 1.50pm, the DornerWorks tutorial "seL4 on RISC-V Renode”, and a poster from the seL4-US CoE
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser 5. pro
Entrepreneur Ada Guan, CEO of Rich Data Corporation was today’s CSE Graduation speaker. Turns out she did my Advanced OS course >20 years ago. AOS, the training ground of the IT elite
Reply Retweet Označi sa "sviđa mi se"
Gernot Heiser proslijedio/la je tweet
VUSec 4. pro
We compiled a long list of Threats to Validity/Relevance in Security Research for our students, building on common sense & our papers on malware experiments and on benchmarking (and inspired by 's excellent blog). Perhaps useful for others?
Reply Retweet Označi sa "sviđa mi se"