|
56 | 56 | - [Two Kinds of Invariants: Safety and Validity](https://www.ralfj.de/blog/2018/08/22/two-kinds-of-invariants.html) |
57 | 57 | - [Unsafe Rust and Miri](https://www.youtube.com/watch?v=svR0p6fSUYY&t=213s) |
58 | 58 |
|
59 | | -Wed Oct 8 2025: |
60 | | -Operating Systems |
| 59 | +Wed Oct 8 2025: Operating Systems |
61 | 60 | - *Reading*: |
62 | 61 | - [TickTock: Verified Isolation in a Production Embedded OS](https://ranjitjhala.github.io/static/sosp25-ticktock.pdf) by Vivien Rindisbacher et al. |
63 | 62 | - *Optional reading*: |
64 | 63 | - [Flux: Liquid Types for Rust](./papers/flux.pdf) |
65 | 64 |
|
66 | | -Mon Oct 13 2025: Guest lecture: Evan Johnson |
67 | | - |
68 | | -Wed Oct 15 2025: Guest lecture: Evan Johnson |
69 | | - |
70 | | -Mon Oct 20 2025: Operating Systems |
| 65 | +Mon Oct 13 2025: Operating Systems |
71 | 66 | - *Reading*: |
72 | 67 | - [Theseus: an Experiment in Operating System Structure and State Management](https://www.usenix.org/conference/osdi20/presentation/boos) by Kevin Boos et al. |
73 | 68 |
|
74 | | -Wed Oct 22 2025: Operating Systems |
| 69 | +Wed Oct 15 2025: Operating Systems |
75 | 70 | - *Reading*: |
76 | 71 | - [Beyond isolation: OS verification as a foundation for correct applications](https://dl.acm.org/doi/10.1145/3593856.3595899) by Matthias Brun, et al. |
77 | 72 |
|
78 | | -Mon Oct 27 2025: Operating Systems |
| 73 | +Mon Oct 20 2025: Operating Systems |
79 | 74 | - *Reading*: |
80 | 75 | - [Atmosphere: Towards Practical Verified Kernels in Rust](https://dl.acm.org/doi/10.1145/3625275.3625401) by Xiangdong Chen, et al. |
81 | 76 |
|
82 | | -Wed Oct 29 2025: Virtual Machines |
| 77 | +Wed Oct 22 2025: Virtual Machines |
83 | 78 | - *Reading*: |
84 | 79 | - [Securing a Multiprocessor KVM Hypervisor with Rust](https://dl.acm.org/doi/10.1145/3698038.3698562) by Yu-Hsun Chiang, et al. |
85 | 80 |
|
86 | | -Mon Nov 3 2025: Virtual Machines |
| 81 | +Mon Oct 27 2025: Virtual Machines |
87 | 82 | - *Reading*: |
88 | 83 | - [Firecracker: Lightweight Virtualization for Serverless Applications](https://www.usenix.org/system/files/nsdi20-paper-agache.pdf) by Alexandru Agache et al. |
89 | 84 |
|
90 | | -Wed Nov 5 2025: Confidential VMs |
| 85 | +Wed Oct 29 2025: Confidential VMs |
91 | 86 | - *Reading*: |
92 | 87 | - [VERISMO: A Verified Security Module for Confidential VMs](https://www.usenix.org/system/files/osdi24-zhou.pdf) by Ziqiao Zhou et al. |
93 | 88 |
|
94 | | -Mon Nov 10 2025: The Cloud |
| 89 | +Mon Nov 3 2025: The Cloud |
95 | 90 | - *Reading*: |
96 | 91 | - [Systems Correctness Practices at Amazon Web Services](https://dl.acm.org/doi/10.1145/3729175) by Marc Brooker and Ankush Desai |
97 | 92 |
|
| 93 | +Wed Nov 5 2025: TBA |
| 94 | + |
| 95 | +Mon Nov 10 2025: TBA |
| 96 | + |
98 | 97 | Wed Nov 12 2025: TBA |
99 | 98 |
|
100 | 99 | Mon Nov 17 2025: Guest Lecture |
|
0 commit comments