Skip to main content

Showing 1–6 of 6 results for author: Cheang, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2211.02179  [pdf, other

    cs.CR

    Verifying RISC-V Physical Memory Protection

    Authors: Kevin Cheang, Cameron Rasmussen, Dayeol Lee, David W. Kohlbrenner, Krste Asanović, Sanjit A. Seshia

    Abstract: We formally verify an open-source hardware implementation of physical memory protection (PMP) in RISC-V, which is a standard feature used for memory isolation in security critical systems such as the Keystone trusted execution environment. PMP provides per-hardware-thread machine-mode control registers that specify the access privileges for physical memory regions. We first formalize the functiona… ▽ More

    Submitted 3 November, 2022; originally announced November 2022.

    Comments: SECRISC-V 2019 Workshop

  2. Cerberus: A Formal Approach to Secure and Efficient Enclave Memory Sharing

    Authors: Dayeol Lee, Kevin Cheang, Alexander Thomas, Catherine Lu, Pranav Gaddamadugu, Anjo Vahldiek-Oberwagner, Mona Vij, Dawn Song, Sanjit A. Seshia, Krste Asanović

    Abstract: Hardware enclaves rely on a disjoint memory model, which maps each physical address to an enclave to achieve strong memory isolation. However, this severely limits the performance and programmability of enclave programs. While some prior work proposes enclave memory sharing, it does not provide a formal model or verification of their designs. This paper presents Cerberus, a formal approach to secu… ▽ More

    Submitted 14 November, 2022; v1 submitted 30 September, 2022; originally announced September 2022.

    Comments: ACM CCS 2022

  3. arXiv:2208.03699  [pdf, other

    cs.LO

    UCLID5: Multi-Modal Formal Modeling, Verification, and Synthesis

    Authors: Elizabeth Polgreen, Kevin Cheang, Pranav Gaddamadugu, Adwait Godbole, Kevin Laeufer, Shaokai Lin, Yatin A. Manerkar, Federico Mora, Sanjit A. Seshia

    Abstract: UCLID5 is a tool for the multi-modal formal modeling, verification, and synthesis of systems. It enables one to tackle verification problems for heterogeneous systems such as combinations of hardware and software, or those that have multiple, varied specifications, or systems that require hybrid modes of modeling. A novel aspect of \uclid is an emphasis on the use of syntax-guided and inductive sy… ▽ More

    Submitted 7 August, 2022; originally announced August 2022.

    Comments: 12 pages plus appendix. Published at CAV 2022

  4. arXiv:2007.06760  [pdf, ps, other

    cs.PL

    Synthesis in Uclid5

    Authors: Federico Mora, Kevin Cheang, Elizabeth Polgreen, Sanjit A. Seshia

    Abstract: We describe an integration of program synthesis into Uclid5, a formal modelling and verification tool. To the best of our knowledge, the new version of Uclid5 is the only tool that supports program synthesis with bounded model checking, k-induction, sequential program verification, and hyperproperty verification. We use the integration to generate 25 program synthesis benchmarks with simple, known… ▽ More

    Submitted 16 July, 2020; v1 submitted 13 July, 2020; originally announced July 2020.

  5. arXiv:1701.06462  [pdf

    cs.CV

    Using Convolutional Neural Networks to Count Palm Trees in Satellite Images

    Authors: Eu Koon Cheang, Teik Koon Cheang, Yong Haur Tay

    Abstract: In this paper we propose a supervised learning system for counting and localizing palm trees in high-resolution, panchromatic satellite imagery (40cm/pixel to 1.5m/pixel). A convolutional neural network classifier trained on a set of palm and no-palm images is applied across a satellite image scene in a sliding window fashion. The resultant confidence map is smoothed with a uniform filter. A non-m… ▽ More

    Submitted 23 January, 2017; originally announced January 2017.

  6. arXiv:1701.06439  [pdf

    cs.CV

    Segmentation-free Vehicle License Plate Recognition using ConvNet-RNN

    Authors: Teik Koon Cheang, Yong Shean Chong, Yong Haur Tay

    Abstract: While vehicle license plate recognition (VLPR) is usually done with a sliding window approach, it can have limited performance on datasets with characters that are of variable width. This can be solved by hand-crafting algorithms to prescale the characters. While this approach can work fairly well, the recognizer is only aware of the pixels within each detector window, and fails to account for oth… ▽ More

    Submitted 23 January, 2017; originally announced January 2017.

    Comments: 5 pages, 3 figures, International Workshop on Advanced Image Technology, January, 8-10, 2017. Penang, Malaysia. Proceeding IWAIT2017

    ACM Class: I.4.0, I.5.1, I.5.4, I.7.5