Peter Sewell

Orcid: 0000-0001-9352-1013

Affiliations:
  • University of Cambridge, UK


According to our database1, Peter Sewell authored at least 93 papers between 1994 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An Axiomatic Basis for Computer Programming on the Relaxed Arm-A Architecture: The AxSL Logic.
Proc. ACM Program. Lang., January, 2024

Formal Mechanised Semantics of CHERI C: Capabilities, Undefined Behaviour, and Provenance.
Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2024

2023
CN: Verifying Systems C Code with Separation-Logic Refinement Types.
Proc. ACM Program. Lang., January, 2023

The Arm Morello Evaluation Platform - Validating CHERI-Based Security in a High-Performance System.
IEEE Micro, 2023

2022
VIP: verifying real-world C idioms with integer-pointer casts.
Proc. ACM Program. Lang., 2022

Relaxed virtual memory in Armv8-A (extended version).
CoRR, 2022

Islaris: verification of machine code against authoritative ISA semantics.
Proceedings of the PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation, San Diego, CA, USA, June 13, 2022

Relaxed virtual memory in Armv8-A.
Proceedings of the Programming Languages and Systems, 2022

Verified Security for the Morello Capability-enhanced Prototype Arm Architecture.
Proceedings of the Programming Languages and Systems, 2022

2021
Engineering with Full-scale Formal Architecture: Morello, CHERI, Armv8-A, and RISC-V.
Proceedings of the Formal Methods in Computer Aided Design, 2021

Underpinning the foundations: sail-based semantics, testing, and reasoning for production and CHERI-enabled architectures (invited talk).
Proceedings of the CPP '21: 10th ACM SIGPLAN International Conference on Certified Programs and Proofs, 2021

Isla: Integrating Full-Scale ISA Semantics and Axiomatic Concurrency Models.
Proceedings of the Computer Aided Verification - 33rd International Conference, 2021

2020
Rigorous engineering for hardware security: Formal modelling and proof in the CHERI design and implementation process.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020


ARMv8-A System Semantics: Instruction Fetch in Relaxed Architectures.
Proceedings of the Programming Languages and Systems, 2020

2019
Exploring C semantics and pointer provenance.
Proc. ACM Program. Lang., 2019

ISA semantics for ARMv8-a, RISC-v, and CHERI-MIPS.
Proc. ACM Program. Lang., 2019

Engineering with Logic: Rigorous Test-Oracle Specification and Validation for TCP/IP and the Sockets API.
J. ACM, 2019

Through computer architecture, darkly.
Commun. ACM, 2019

Cerberus-BMC: A Principled Reference Semantics and Exploration Tool for Concurrent and Sequential C.
Proceedings of the Computer Aided Verification - 31st International Conference, 2019

CheriABI: Enforcing Valid Pointer Provenance and Minimizing Pointer Privilege in the POSIX C Run-time Environment.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Simplifying ARM concurrency: multicopy-atomic axiomatic and operational models for ARMv8.
Proc. ACM Program. Lang., 2018

2017
Mixed-size concurrency: ARM, POWER, C/C++11, and SC.
Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages, 2017

2016
A concurrency semantics for relaxed atomics that permits optimisation and avoids thin-air executions.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Modelling the ARMv8 architecture, operationally: concurrency and ISA.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Into the depths of C: elaborating the de facto standards.
Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2016

An operational semantics for C/C++11 concurrency.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

The missing link: explaining ELF static linking, semantically.
Proceedings of the 2016 ACM SIGPLAN International Conference on Object-Oriented Programming, 2016

2015
Not-Quite-So-Broken TLS: Lessons in Re-Engineering a Security Protocol Specification and Implementation.
Proceedings of the 24th USENIX Security Symposium, 2015

SibylFS: formal specification and oracle-based testing for POSIX and real-world file systems.
Proceedings of the 25th Symposium on Operating Systems Principles, 2015

An integrated concurrency and core-ISA architectural envelope definition, and test oracle, for IBM POWER multiprocessors.
Proceedings of the 48th International Symposium on Microarchitecture, 2015

The Problem of Programming Language Concurrency Semantics.
Proceedings of the Programming Languages and Systems, 2015

2014
POPL 2014 program chair's report.
ACM SIGPLAN Notices, 2014

Lem: reusable engineering of real-world semantics.
Proceedings of the 19th ACM SIGPLAN international conference on Functional programming, 2014

2013
Principles of POPL.
ACM SIGPLAN Notices, 2013

CompCertTSO: A Verified Compiler for Relaxed-Memory Concurrency.
J. ACM, 2013

2012
Fences in weak memory models (extended version).
Formal Methods Syst. Des., 2012

Clarifying and compiling C/C++ concurrency: from C++11 to POWER.
Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2012

Synchronising C/C++ and POWER.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2012

Tales from the jungle.
Proceedings of the ACM SIGPLAN International Conference on Functional Programming, 2012

False Concurrency and Strange-but-True Machines - (Abstract).
Proceedings of the CONCUR 2012 - Concurrency Theory - 23rd International Conference, 2012

An Axiomatic Memory Model for POWER Multiprocessors.
Proceedings of the Computer Aided Verification - 24th International Conference, 2012

2011
Multi-Core Memory Models and Concurrency Theory (Dagstuhl Seminar 11011).
Dagstuhl Reports, 2011

Litmus: Running Tests against Hardware.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2011

Relaxed-memory concurrency and verified compilation.
Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2011

Robin Milner 1934--2010: verification, languages, and concurrency.
Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2011

Mathematizing C++ concurrency.
Proceedings of the 38th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2011

Understanding POWER multiprocessors.
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011

Lem: A Lightweight Tool for Heavyweight Semantics.
Proceedings of the Interactive Theorem Proving - Second International Conference, 2011

2010
Nomadic pict: Programming languages, communication infrastructure overlays, and semantics for mobile computation.
ACM Trans. Program. Lang. Syst., 2010

Ott: Effective tool support for the working semanticist.
J. Funct. Program., 2010

x86-TSO: a rigorous and usable programmer's model for x86 multiprocessors.
Commun. ACM, 2010

Memory, an elusive abstraction.
Proceedings of the 9th International Symposium on Memory Management, 2010

Fences in Weak Memory Models.
Proceedings of the Computer Aided Verification, 22nd International Conference, 2010

2009
A Better x86 Memory Model: x86-TSO.
Proceedings of the Theorem Proving in Higher Order Logics, 22nd International Conference, 2009

The semantics of x86-CC multiprocessor machine code.
Proceedings of the 36th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2009

The semantics of power and ARM multiprocessor machine code.
Proceedings of the POPL 2009 Workshop on Declarative Aspects of Multicore Programming, 2009

2008
Dynamic rebinding for marshalling and update, via redex-time and destruct-time reduction.
J. Funct. Program., 2008

A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service.
Proceedings of the FM 2008: Formal Methods, 2008

2007
<i>Mutatis Mutandis</i>: Safe and predictable dynamic software updating.
ACM Trans. Program. Lang. Syst., 2007

Acute: High-level programming language design for distributed computation.
J. Funct. Program., 2007

The java module system: core design and semantic definition.
Proceedings of the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2007

2006
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations.
Proceedings of the 33rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2006

Type-safe distributed programming for OCaml.
Proceedings of the ACM Workshop on ML, 2006, Portland, Oregon, USA, September 16, 2006, 2006

Rigorous Protocol Design in Practice: An Optical Packet-Switch MAC in HOL.
Proceedings of the 14th IEEE International Conference on Network Protocols, 2006

2005
Passive-attack analysis for connection-based anonymity systems.
Int. J. Inf. Sec., 2005

Process Calculi: The End of the Beginning?: (From Thought Experiments to Experimental Semantics).
Proceedings of the Workshop "Essays on Algebraic Process Calculi", 2005

It Is Time to Mechanize Programming Language Metatheory.
Proceedings of the Verified Software: Theories, 2005

Mechanized Metatheory for the Masses: The PoplMark Challenge.
Proceedings of the Theorem Proving in Higher Order Logics, 18th International Conference, 2005

Rigorous specification and conformance testing techniques for network protocols, as applied to TCP, UDP, and sockets.
Proceedings of the ACM SIGCOMM 2005 Conference on Applications, 2005

Mutatis mutandis: safe and predictable dynamic software updating.
Proceedings of the 32nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2005

2004
Models for name-passing processes: interleaving and causal.
Inf. Comput., 2004

Cassandra: Distributed Access Control Policies with Tunable Expressiveness.
Proceedings of the 5th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2004), 2004

Cassandra: Flexible Trust Management, Applied to Electronic Health Records.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Secure Composition of Untrusted Code: Box pi, Wrappers, and Causality.
J. Comput. Secur., 2003

Global abstraction-safe marshalling with hash types.
Proceedings of the Eighth ACM SIGPLAN International Conference on Functional Programming, 2003

Dynamic rebinding for marshalling and update, with destruct-time?
Proceedings of the Eighth ACM SIGPLAN International Conference on Functional Programming, 2003

2002
From rewrite rules to bisimulation congruences.
Theor. Comput. Sci., 2002

Rigour is good for you <i>and</i> feasible: reflections on formal treatments of C and UDP sockets.
Proceedings of the 10th ACM SIGOPS European Workshop, Saint-Emilion, France, July 1, 2002, 2002

Timing UDP: Mechanized Semantics for Sockets, Threads, and Failures.
Proceedings of the Programming Languages and Systems, 2002

2001
The UDP Calculus: Rigorous Semantics for Real Networking.
Proceedings of the Theoretical Aspects of Computer Software, 4th International Symposium, 2001

Nomadic pict: correct communication infrastructure for mobile computation.
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001

Modules, abstract types, and distributed versioning.
Proceedings of the Conference Record of POPL 2001: The 28th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2001

2000
Nomadic Pict: language and infrastructure design for mobile agents.
IEEE Concurr., 2000

Preface.
Proceedings of the 4th International Workshop on High-Level Concurrent Languages, 2000

Secure Composition of Untrusted Code: Wrappers and Causality Types.
Proceedings of the 13th IEEE Computer Security Foundations Workshop, 2000

1999
Secure Composition of Insecure Components.
Proceedings of the 12th IEEE Computer Security Foundations Workshop, 1999

1998
Location-Independent Communication for Mobile Agents: A Two-Level Architecture.
Proceedings of the Internet Programming Languages, 1998

Global/Local Subtyping and Capability Inference for a Distributed pi-calculus.
Proceedings of the Automata, Languages and Programming, 25th International Colloquium, 1998

From Rewrite to Bisimulation Congruences.
Proceedings of the CONCUR '98: Concurrency Theory, 1998

1997
Nonaxiomatisability of Equivalences over Finite State Processes.
Ann. Pure Appl. Log., 1997

On Implementations and Semantics of a Concurrent Programming Language.
Proceedings of the CONCUR '97: Concurrency Theory, 1997

1994
Bisimulation is Not Finitely (First Order) Equationally Axiomatisable
Proceedings of the Ninth Annual Symposium on Logic in Computer Science (LICS '94), 1994


  Loading...