Learn More
Modern computer systems consist of a multitude of abstraction layers (e.g., OS kernels, hypervisors, device drivers, network protocols), each of which defines an interface that hides the implementation details of a particular set of functionality. Client programs built on top of each layer can be understood solely based on the interface, independent of the(More)
Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. A promising step toward conquering this challenge is to formally verify that the end-to-end behavior of the computing system really satisfies various information-flow policies. Unfortunately,(More)
Complete formal verification of a non-trivial concurrent OS kernel is widely considered a grand challenge. We present a novel compositional approach for building certified concurrent OS kernels. Concurrency allows interleaved execution of kernel/user modules across different layers of abstraction. Each such layer can have a different set of observable(More)
An operating system (OS) kernel forms the lowest level of any system software stack. The correctness of the OS kernel is the basis for the correctness of the entire system. Recent efforts have demonstrated the feasibility of building formally verified general-purpose kernels, but it is unclear how to extend their work to verify the functional correctness of(More)
Swertia mussotii Franch. is an important traditional Tibetan medicinal plant with pharmacological properties effective in the treatment of various ailments including hepatitis. Secoiridoids are the major bioactive compounds in S. mussotii. To better understand the secoiridoid biosynthesis pathway, we generated transcriptome sequences from the root, leaf,(More)
Pharmacologically active constituents from traditional medicinal plants have received great attention as sources of novel agents, pharmaceutical intermediates, and chemical entities for synthetic or semisynthetic drugs due to their potent pharmacological activities, low toxicity, and economic viability. Numerous components have been isolated from(More)
Tibetan ethnomedicine is famous worldwide, both for its high effectiveness and unique cultural background. Many poisonous plants have been widely used to treat disorders in the Tibetan medicinal system. In the present review article, some representative poisonous plant species are introduced in terms of their significance in traditional Tibetan medicinal(More)
Today's cloud services extensively rely on replication techniques to ensure availability and reliability. In complex datacenter network architectures, however, seemingly independent replica servers may inadvertently share deep dependencies (e.g., aggregation switches). Such unexpected common dependencies may potentially result in correlated failures(More)
My research goal is to make critical software systems truly reliable and secure through formal verification. As the backbone of modern software systems, operating system (OS) kernels have great impacts on the reliability and security of today’s computing hosts. OS kernels, however, are complicated, highly concurrent, and prone to bugs. For the past several(More)
  • 1