Oh and on formal verification—I don’t have the ref, but someone working in network security commented that formally verified systems aren’t used because they don’t generally work. Their formal verification doesn’t apply to complex real world situations. I wish I remembered where I’d seen that comment.
Oh and on formal verification—I don’t have the ref, but someone working in network security commented that formally verified systems aren’t used because they don’t generally work. Their formal verification doesn’t apply to complex real world situations. I wish I remembered where I’d seen that comment.