Skip to content

Commit

Permalink
regenerate after: Update Ismail's talk info
Browse files Browse the repository at this point in the history
  • Loading branch information
gshen42 committed Apr 16, 2024
1 parent 811308d commit b181e46
Show file tree
Hide file tree
Showing 3 changed files with 34 additions and 7 deletions.
20 changes: 17 additions & 3 deletions index.xml
Original file line number Diff line number Diff line change
Expand Up @@ -52,9 +52,9 @@
</tr>

<tr>
<td>April 19</td>
<td>Kuru Ismail</td>
<td><em>TBD</em></td>
<td><a href="#april-19">April 19</a></td>
<td>Ismail Kuru</td>
<td>Modal Abstractions for Virtualizing Memory Addresses</td>
</tr>

<tr>
Expand Down Expand Up @@ -137,6 +137,20 @@

<p><strong>Bio:</strong> Dan works as a postdoc at the University of Southern Denmark and is receiving his PhD from the University of Illinois at Urbana-Champaign (UIUC). He is the author of the UIGC library for Akka, which provides fault-tolerant resource management for distributed actor systems. Dan’s research focuses on making distributed reactive applications easier to write and reason about.</p>

<h2 id="april-19">April 19</h2>

<p><strong>Speaker:</strong> Ismail Kuru</p>

<p><strong>Title:</strong> Modal Abstractions for Virtualizing Memory Addresses</p>

<p><strong>Abstract:</strong> Virtual Memory Managers are critical pieces of general-purpose OS kernels. They enable virtualizing the addresses of memory regions by realizing the address translation mechanism using CPU’s memory management’s (MMU) kernel-controlled page tables. Operating systems manipulate these virtualized memory mappings to isolate untrusted processes, restrict which memory is accessible to different processes, hide memory limits from user programs, etc.</p>

<p>Unfortunately, verifying them becomes challenging as they are interfaced by the complex hardware: the page tables are updated via writes to those memory locations, using addresses that are themselves virtualized! Prior work on verification of VMM has either only handled a single address space, trusted significant pieces of assembly code, or resorted to direct reasoning over machine semantics rather than exposing a clean logical interface.</p>

<p>In this talk, I will be explaining the logical abstractions, some of which are inspired by Hybrid Logic and allow us to mention resources (virtualized memory addresses) belonging to different address spaces within the same specification.</p>

<p><strong>Bio:</strong> I am Ismail Kuru, a final year PhD student at Drexel University, and I am advised by Dr. Colin S. Gordon. Right before coming to Drexel, I was a senior software engineer at CRYTEK Gaming Company. Before then, I had finished my computer science masters courses at TU Munich and graduated with an M.S. degree from Koc University as a Microsoft Research EMEA scholar for graduate studies.</p>

<hr />

<p><a href="../">Archive</a></p>
Expand Down
20 changes: 17 additions & 3 deletions lsd-seminar/2024sp/index.html
Original file line number Diff line number Diff line change
Expand Up @@ -233,9 +233,9 @@ <h1 itemprop="name">Languages, Systems, and Data Seminar (Spring 2024)</h1>
</tr>

<tr>
<td>April 19</td>
<td>Kuru Ismail</td>
<td><em>TBD</em></td>
<td><a href="#april-19">April 19</a></td>
<td>Ismail Kuru</td>
<td>Modal Abstractions for Virtualizing Memory Addresses</td>
</tr>

<tr>
Expand Down Expand Up @@ -318,6 +318,20 @@ <h2 id="april-12">April 12</h2>

<p><strong>Bio:</strong> Dan works as a postdoc at the University of Southern Denmark and is receiving his PhD from the University of Illinois at Urbana-Champaign (UIUC). He is the author of the UIGC library for Akka, which provides fault-tolerant resource management for distributed actor systems. Dan’s research focuses on making distributed reactive applications easier to write and reason about.</p>

<h2 id="april-19">April 19</h2>

<p><strong>Speaker:</strong> Ismail Kuru</p>

<p><strong>Title:</strong> Modal Abstractions for Virtualizing Memory Addresses</p>

<p><strong>Abstract:</strong> Virtual Memory Managers are critical pieces of general-purpose OS kernels. They enable virtualizing the addresses of memory regions by realizing the address translation mechanism using CPU&rsquo;s memory management&rsquo;s (MMU) kernel-controlled page tables. Operating systems manipulate these virtualized memory mappings to isolate untrusted processes, restrict which memory is accessible to different processes, hide memory limits from user programs, etc.</p>

<p>Unfortunately, verifying them becomes challenging as they are interfaced by the complex hardware: the page tables are updated via writes to those memory locations, using addresses that are themselves virtualized! Prior work on verification of VMM has either only handled a single address space, trusted significant pieces of assembly code, or resorted to direct reasoning over machine semantics rather than exposing a clean logical interface.</p>

<p>In this talk, I will be explaining the logical abstractions, some of which are inspired by Hybrid Logic and allow us to mention resources (virtualized memory addresses) belonging to different address spaces within the same specification.</p>

<p><strong>Bio:</strong> I am Ismail Kuru, a final year PhD student at Drexel University, and I am advised by Dr. Colin S. Gordon. Right before coming to Drexel, I was a senior software engineer at CRYTEK Gaming Company. Before then, I had finished my computer science masters courses at TU Munich and graduated with an M.S. degree from Koc University as a Microsoft Research EMEA scholar for graduate studies.</p>

<hr />

<p><a href="../">Archive</a></p>
Expand Down
1 change: 0 additions & 1 deletion themes/academic
Submodule academic deleted from 8d596f

0 comments on commit b181e46

Please sign in to comment.