{"title":"Using HOL To Produce Custom Verification Tools","authors":"D. Shepherd","doi":"10.1109/HOL.1991.596283","DOIUrl":null,"url":null,"abstract":"HOL is a general purpose verification tool and as such has been applied to many verification problems. However, due to its generality it is not as eficient as a specially written tool would be. This paper demonstrates how HOL can be used to generate a special purpose tool whose correctness has been established through proof. This is shown through an example of some work pelformed as part of the IMS T9000 design and explains how this could be turn, with improvements, into a more general technique. It should be understood that this paper does not set out to demonstrate a method for verifying ROM compaction but uses this task as an illustration of a potential technique for developing secure special purpose tools.","PeriodicalId":213603,"journal":{"name":"1991., International Workshop on the HOL Theorem Proving System and Its Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1991-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"1991., International Workshop on the HOL Theorem Proving System and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/HOL.1991.596283","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
HOL is a general purpose verification tool and as such has been applied to many verification problems. However, due to its generality it is not as eficient as a specially written tool would be. This paper demonstrates how HOL can be used to generate a special purpose tool whose correctness has been established through proof. This is shown through an example of some work pelformed as part of the IMS T9000 design and explains how this could be turn, with improvements, into a more general technique. It should be understood that this paper does not set out to demonstrate a method for verifying ROM compaction but uses this task as an illustration of a potential technique for developing secure special purpose tools.