1 Early Life
Mike Gordon was born in Ripon, Yorkshire to John Gordon and Daphne Mavis Gordon (née More). He had perhaps a lonely childhood: he was an only child, and his father committed suicide when Mike was eight years old. His mother sent him as a boarding pupil first to “the notorious Dartington Hall” (where he forgot how to read) and then to Bedales school, which he regarded “as being my home between the ages of eight and 18” gordonfifty. Bedales was then a mixed, progressive school specialising in the arts.
Mike was a quiet pupil but showed early signs of a lively, scientific mind. He built model aeroplanes, some petrol powered and radio controlled. Once he slipped into the chemistry lab and synthesised methyl mercaptan, to impress his friends with its terrible smell. On another occasion, he made nitrogen triiodide crystals — which explode when stepped on — and sprinkled them in the library.^{1}^{1}1Simon Laughlin, email, 8 February 2018 Pupils called him Gecko because of his bright, prominent eyes and surprised expression: a look he never lost.^{2}^{2}2Stephen Levinson, email, 17 January 2018
In 1966, Mike was accepted to Cambridge University to study engineering. As preparation, he took a gap year as a management trainee at the North Thames Gas Board gordonmanagement. This was his first exposure to the real world after a childhood spent at boarding school, and it came as a shock. The staff were divided on class lines, white coats for the management and brown coats for the workers, with separate toilets and canteens. He observed time and motion studies and the compilation of tables listing, for example, “how long it would take to put a single screw into a wall for different screw sizes”; these data would then be used to set deadlines for workers. He liked to joke about this system, but he clearly saw it as wasteful and oppressive. He spent much of his time at the Beckton Gas Works: a vast, bleak and partly derelict site that would later become the shattered city of Hué in Stanley Kubrick’s Vietnam war movie, Full Metal Jacket.
Mike’s gap year experience destroyed his enthusiasm for engineering. But during this time he stumbled upon symbolic logic, buying logic books to read while commuting between home and the Beckton Gas Works. And so he decided to study mathematics as “the furthest subject from engineering that didn’t involve writing essays”. Initially he struggled with mathematics (his subject change would be forbidden today), but he improved year after year and eventually graduated with a First:
Although I found the course very tough, it gave me the tools and confidence to feel that with sufficient effort … I could master any mathematical material I needed. This laid a solid foundation for my subsequent academic career. gordonstruggling
Mike’s first exposure to computers came in 1969, after his second year at Cambridge, when he took a summer job at the National Physical Laboratory (NPL) gordonnpl. He learnt how to boot up a Honeywell DDP516 by manually keying in a loader using switches and to load machine code via paper tape. This machine was likely the inspiration for the 16bit minicomputer that Mike designed later as the canonical example for his verification techniques. He worked on pattern recognition, writing code to identify printed characters by testing for specific features. Today, machine learning is invariably used for such tasks, and in fact Mike wrote a final year essay on perceptrons, a primitive type of neural network. This experience lured Mike to Edinburgh University’s School of Artificial Intelligence, where he ultimately specialised in programming language theory.
2 Research Milieu: Verification and Semantics
Computer programming has been plagued by errors from the earliest days. Ideas for verifying programs mathematically proliferated during the 1960s. Robert Floyd proposed a methodology for attaching and verifying logical assertions within flowcharts [12]. In a landmark paper [19], C A R Hoare (FRS 1982) proposed a similar technique but taking the form of a novel logical calculus combining program fragments and mathematical assertions. It worked beautifully, at least on small examples.
This technique was a form of programming language semantics: a precise specification of the meaning of every construct of a given programming language. For example, consider the program fragment A+B, for computing the sum of the values of A and B, two computable expressions. What happens if the sum is too large to be represented on the computer? What if B, although nonzero, is much smaller than A, so precision is lost and A+B turns out to equal A? Further complications arise if evaluating A and B causes side effects, such as writing to memory; then there is no reason why A+B should equal B+A or why A+A should equal 2*A
. For another example, suppose we have a vector
V whose components are V[1], …, V[], and consider a command to copy data into V. If more than elements are supplied then they may get copied into an arbitrary part of memory. This is the classic buffer overflow error, which has caused innumerable security vulnerabilities. One remedy for such issues is to precisely specify the semantics of every programming language construct so that ambiguities and vulnerabilities can be identified and eliminated.During the 1960s, Dana Scott and Christopher Strachey were developing the denotational approach to semantics [35]. This involves defining functions mapping programming constructs such as expressions, statements and types into suitable mathematical domains. A key idea is the use of partial orderings to deal with nontermination. For example, if and are computable partial functions on the natural numbers, then means that for all , if is defined then , and we say “ approximates ”. That idea came from recursive function theory. But once we accept that not everything is a number and grasp the need for functions themselves to be values, this simplifies to if and only if for all . Basic domains like the natural numbers are made into partial orderings by affixing a “bottom element” , with for every natural number . Domain theory requires functions to be monotonic — if then . The intuition is that a computable function cannot know that its argument is failing to terminate, and can never do more with less. Functions must also be continuous (limitpreserving). The intuition is that an infinite computation delivers nothing more than the results of successive finite computations. Sometimes called fixedpoint theory, these techniques could specify the semantics of any recursive function definition.
Scott’s 1970 Oxford technical report [35] — still rewarding to read — outlined this mathematically sophisticated and elegant approach. It set off a frenzy of activity. Researchers strove to extend and simplify Scott and Strachey’s highly abstruse techniques, while relating them to Hoare logic on the one hand and to more intuitive semantic notions on the other.
Denotational semantics makes heavy use of the calculus [1]: a tiny, primitive language of functions. Terms of the calculus include

variables , , ,

abstractions , where is a term, and

applications , where and are terms.
The abstraction is intended to represent a function, and can be “reduced” to : the result of substituting for in . Versions of the calculus are used in denotational semantics and higherorder logic. The original, untyped calculus can express arbitrary computations, but its terms are meaningless symbol strings. The typed calculus assigns types to all variables, yielding a straightforward settheoretic semantics: types denote sets and abstractions denote functions. The typed system is therefore more intuitive, but also more restrictive. It assigns the type if has type and has type ; it allows only if has type and has type . It rejects terms like , Turing’s fixed point combinator, which can express recursion.
A danger with these beautiful but sophisticated mathematical techniques is that they might be used incorrectly, not capturing the intended behaviour of the programming constructs being defined. To eliminate this risk, one could specify the behaviour in a more natural form (so called operational semantics) and prove the two specifications to be equivalent. This was the topic of the dissertation gordonevaluation for which Mike received his PhD from the University of Edinburgh in 1973, supervised by Rod Burstall.
Mike proved the equivalence of the denotational and operational semantics of pure LISP. He presented an early example of what is now called a structural operational semantics: reduction relations defined as logical inference systems.
Mike Gordon’s thesis … contains a pretty rulebased operational semantics, with the environment needed to model dynamic binding incorporated in the configuration; this was the first treatment of part of a real programming language. [32, p. 5]
LISP presented a particular challenge due to its unusual treatment of variables. And so Mike obtained an invitation from LISP’s inventor, John McCarthy, to work for a year at his Artificial Intelligence Laboratory at Stanford University.
3 Edinburgh, Stanford and Edinburgh LCF
The period from 1970 to 1981 set the stage for Mike’s career. In 1970, when Mike began his PhD research at Edinburgh, computer science there was fragmented among rival departments. He worked in the Department of Machine Intelligence, which was part of the School of Artificial Intelligence. While he undertook research on the semantics of LISP, others in the school were working on formal logic and automated reasoning.
Formal logic is concerned with precisely specified languages along with symbols for logical connectives such as “and” (), “or” (), “not” (), “implies” () and the quantifiers: “for all” () and “there exists” (). A formal calculus includes strict rules for deducing conclusions from assumptions. Firstorder logic (also known as predicate calculus) is the simplest such system. It presupposes a fixed, nonempty universe of mathematical values (which could be numbers, sets, polygons, etc.).
There have always been those who felt that formal logic somehow captured human reasoning. During the 1970s, many practitioners of artificial intelligence felt that if one could only automate reasoning in the predicate calculus, one could automate thought itself. (Yes, it sounds ridiculous now.) McCarthy, a leading AI pioneer, held this view strongly. Mike’s first meeting with McCarthy went like this:
He went to McCarthy’s office. With no preliminary, John said “I believe everything can be done in firstorder predicate calculus.” Mike said nothing. John got up and walked out of his office. Soon he returned though, said “with suitable extensions” and he left again.^{3}^{3}3According to Richard Waldinger, as relayed by Bruce Anderson in an email dated 20180404
So when (in 1974) Mike took up a postdoctoral position at the Stanford AI Lab, he was again working on semantics alongside people focused on formal logic. He organised a discussion group on reasoning about programs, attracting researchers from Stanford and nearby research institutes. After work, he would go home to Richard Waldinger’s shared house in Palo Alto. Waldinger also worked on logic and theorem proving, at the Stanford Research Institute’s Artificial Intelligence Center.
One project at the Stanford AI Lab was Stanford LCF [26], led by Robin Milner (FRS 1988). It has an amusing backstory. In 1969, Scott wrote a manuscript [36] introducing a logical calculus with a rule called fixedpoint induction, superseding a number of earlier techniques. (Scott’s logic was quite different from Hoare’s, which was concerned with program code.) Scott was concerned with pure recursive functions written in the typed calculus, for which he proposed a domaintheoretic semantics. He began his paper boldly:
No matter how much wishful thinking we do, the theory of types is here to stay. There is no other way to make sense of the foundations of mathematics.^{4}^{4}4Italics in original [36, p. 413]
Scott was firmly committing himself to the typed calculus. But one month later, Scott made the astonishing discovery of a model for the untyped calculus. So he withheld this work from publication, and it became known to researchers only through faded Xerox copies. Working at Stanford, Milner along with Whitfield Diffie (ForMemRS 2017), Richard Weyhrauch and Malcolm Newey wrote a computer program to implement Scott’s logic, which Milner named the Logic for Computable Functions or LCF. Milner had already left Stanford by the time Mike arrived. By 1975 they were both in Edinburgh and working together on a new version of LCF, along with Chris Wadsworth.
Stanford LCF had two major limitations. Stored proofs used too much memory, and its fixed command repertoire required lengthy, repetitive sequences of steps even for elementary proofs. Milner realised that he could address both problems by providing a programmable metalanguage, which he called ML. Making the prover programmable allowed users to automate any repetitive steps. Moreover, through a language concept known as abstract types, no proofs would have to be stored. An abstract type enforces the use of a fixed set of operations; by making those operations coincide precisely with a logic’s rules of inference, we could define the type of theorems. The abstraction barrier would ensure that theorems were constructed strictly according to the rules. This technique works for essentially any logic gordonlogiclcf.
Edinburgh LCF was finished by 1979 mgordon79. It introduced a simple and effective architecture for interactive—as opposed to fully automatic—theorem proving. And far from being a mere metalanguage, ML gordonmetalanguage was seen as a general programming language with a highly innovative design. Mike had been fully involved in these great achievements gordontacticsmilner, but was already preparing to strike out on his own. He had already written what would become the standard textbook on denotational semantics gordondenotational. With software verification apparently becoming a reality, Mike was the first to think seriously about verifying hardware.
By 1979, Edinburgh’s Department of Computer Science had been transformed by a crowd of new arrivals. These included Rod Burstall and Gordon Plotkin (FRS 1992), who had moved from the Department of Artificial Intelligence, as well as Robin Milner, who had arrived earlier. Hardware and systems people found themselves cheek by jowl with a great many theoreticians. Mike’s friendly and modest personality allowed him to overcome resentful tribal divisions. He wanted to investigate the semantics of hardware, and that required talking to the hardware specialists. By 1981, Mike had elaborated an approach to hardware verification — including theoretical development and fully worked out examples — that could scale to large devices gordonchdl,gordonmodel. He also had an invitation to join the rapidly expanding Computer Laboratory at Cambridge.
4 Cambridge and the Emergence of Hardware Verification
The first user of Edinburgh LCF was Avra Cohn. A PhD student of Milner’s, she had used it to prove the correctness of an abstract compiler [5, 6]. She was also Mike’s wife. They had first met at Richard Waldinger’s house during Mike’s postdoctoral year at Stanford. Now, years later, they were sharing an office at Edinburgh. As the first LCF user, Avra influenced its design by pointing out bugs and suggesting improvements. She and Mike were already working together, a collaboration that would continue for many years. They got married in 1979, and together they brought LCF to Cambridge.
As a new University Lecturer, Mike had much to occupy him. By October 1983, he was teaching an advanced course entitled Topics in Programming Language Theory gordontopics, with an ambitious syllabus: the predicate calculus, Hoare logic, the
calculus, automatic theorem proving using the resolution method, and logic programming. Some of the material from his course notes later found its way into his second textbook mgordon88b, covering programming language theory and including LISP code to implement some of the techniques.
He also held a Science Research Council grant (jointly with Milner at Edinburgh) to continue the LCF project. Here I entered the picture, having been hired as a postdoc under this grant. I still remember Mike’s kindness in meeting me at the airport and helping me take all my stuff to Cambridge. Avra helped me to get started with LCF. She gave me her code, a bundle of utilities written in ML to help carry out LCF proofs. These included sophisticated heuristic tools based on pattern matching. It’s remarkable that this code had not already been incorporated into Edinburgh LCF, which was truly a barebones environment. Modified and extended by myself and others, Avra’s code lives on in today’s systems. For I had decided to take Edinburgh LCF apart, and aided by Gérard Huet of the Inria
^{5}^{5}5Institut national de recherche en informatique et en automatique, the French national research institute for computer science. lab near Paris, put it back together again. The point was to make LCF more usable and much, much faster.Meanwhile, Mike was continuing to develop his ideas. We can trace their evolution from his 1981 Edinburgh technical report gordonmodel. At 75 pages, this was a substantial document, not to be confused with the short conference version gordonchdl. Already he was treating both combinational devices such as adders and sequential devices such as storage registers. Some examples were at the gate level and others were at the transistor level.
From the beginning, Mike had the ambition of scalability. He presented a simple microcoded computer (Fig. 1) complete with a specification of the machine instructions and microinstructions, including a microprogram. The detailed design took up 21 pages.
While combinational devices can easily be modelled as functions from inputs to outputs, sequential devices are trickier to formalise, as they have internal state. Mike’s initial idea was to use the power of domain theory. First he defined the domain of signals (where is a set of wires) to denote the set of functions from to some fixed set of values. Sequential devices were also modelled as functions, incorporating the internal state as part of the result [p. 8]gordonmodel:
The domain of sequential behaviours from to is defined to be the least solution of the domain equation:
Such a behaviour maps the input to the output paired with a new (which models the possibility of an internal state change). A precursor to this technique can already be seen in his brief note on the semantics of sequential machines gordonmachines. For the sake of uniformity, he proposed regarding combinational devices as the degenerate case of sequential devices (with an empty internal state), so everything would involve recursive domain equations. But he was unhappy with this highpowered approach [p. 9]gordonmodel and was apparently trying to use operational semantics:
The reader might wonder why we use sequential behaviours at all — why not just work with machines?… In fact, at various times during the development of our model, we have tried to eliminate behaviours in favour of machines, in order to avoid having to use the recursive domain equation which defines . We have never succeeded.
But eventually, he did succeed, finding something even simpler than “machines”: pure logic.
His ambition reflected the broad scope of denotational semantics and the power of domain theory. The components of a computer, including families of input lines carrying timeindexed signals, could be modelled by mathematical functions, possibly nested. It’s striking to see diagrams in this early report typical of his much later work (Figs. 1 and 2). Its main ingredients were already evident, including the notational devices for connecting devices together and hiding internal wires. The mathematical underpinnings would change drastically, but the conception remained the same.
By 1983, Mike had put his ideas into practice with his Logic for Sequential Machines. He implemented this formalism on top of the Cambridge LCF code base, calling the resulting system LCF_LSM gordonlcflsm. Two major changes are evident from his former work. One was the abandonment of domain theory, with its requirement that every domain had to be a partial ordering. The need to deal with the associated “bottom” value () tended to clutter proofs. Mike thought it could go away temporarily. (It never came back.)
That led to the other major change: the replacement of functions by machines. Previously gordonmodel he had used to denote a domain of functions, including the possibility of a state change. Now Mike had figured out how to model sequential devices without using functions, while continuing to regard a combinational device as simply a sequential device with an empty state.
LCF_LSM was inspired by Milner’s Calculus of Communicating Systems (CCS), a mathematical model of concurrent computing [27]. CCS is concerned with systems composed of a fixed number of processes that can send messages to each other synchronously (where the sender and receiver act at the same time) and change state. CCS includes principles for demonstrating that two apparently different systems exhibit identical behaviour. Similarly, LCF_LSM concerns components with labelled wires that can be connected together. Wires can also be renamed or hidden. In LCF_LSM, we can write both specifications of desired behaviour and implementations built from smaller components. We can prove that two components have the same behaviour and prove that implementations satisfy a specification.
To illustrate the notation, the following formula specifies the behaviour of the counter in Fig. 3.
COUNT(n) == dev{switch,in,out}.{out = n}; COUNT(switch>inn+1)
The device has the three wires shown (the system clock is implicit and never appears in specifications). The output line equals the counter’s stored value. At each clock tick, the counter loads the value of the input line if switch is true and otherwise increments itself.
Great things were achieved with LCF_LSM. John Herbert gordonherbert used it to verify a bespoke chip design for the Cambridge Fast Ring, an early local area network. Mike used it to verify his computer [p. 1]gordoncomputer:
The entire specification and verification described here took several months, but this includes some extending and debugging of LCF_LSM (necessary, as this was our first big example). I estimate that it would take me two to four weeks to do another similar exercise now. The complete proof requires several hours CPU time on a 2 megabyte Vax750. I found it necessary to prove some of the bigger lemmas … in batch mode overnight.
This tremendous achievement demonstrated that hardware verification was becoming a reality. Nevertheless, Mike was not satisfied [p. 22]gordonlcflsm:
The selection of rules currently included in LSM is rather ad hoc — I have just implemented what seemed needed for the examples I have done. … Further experimental work is needed.
Later in the report (pp. 37–8), he mentions the possibility of replacing LSM by some form of predicate logic.
5 HigherOrder Logic, the HOL System and the VIPER Microprocessor
Today Mike’s wish to use ordinary logic may seem natural, but in the 1980s many people were introducing specialised formalisms. I had given myself the research goal of providing support for multiple formalisms, only to see Mike’s choice of higherorder logic gradually take over the verification world. Few people favoured his choice at the time. I certainly didn’t, sharing the views of most logicians:
Unlike firstorder logic and some of its less baroque extensions, second and higherorder logic have no coherent wellestablished theory; the existent material consisting merely of scattered remarks quite diverse with respect to character and origin. [38, p. 241]
Firstorder logic was also strongly preferred by many researchers in artificial intelligence, such as McCarthy at Stanford, as we have seen. And yet, higherorder logic could be seen as a return to tradition:
The logics considered from 1879 to 1923 … were generally richer than firstorder logic [and] … at least as rich as secondorder logic … It was in Skolem’s work on set theory (1923) that firstorder logic was first proposed as all of logic and that set theory was first formulated within firstorder logic. [28, p. 127]
The difference between these “orders” of logic concerns their treatments of sets and functions. Recall that the symbol (the universal quantifier) means “for all” and we can write statements like to assert the commutativity of addition. Here, and presumably range over numbers of some sort. But consider the following logical formula:
(1) 
The universally quantified variable, , is a predicate, and is a formula. But quantification over predicates is forbidden in firstorder logic. Firstorder logic allows quantification only over some fixed domain of individuals; secondorder logic also allows quantification over functions and predicates defined on individuals; higherorder logic allows quantification over arbitrary functions and predicates whose arguments may themselves be other functions and predicates.
Higherorder logic includes a type system to govern all this. For firstorder logic there is no need, as all variables range over individuals and it is not essential to introduce different sorts of individuals, although this is sometimes done anyway. With higherorder logic, Church [4] used the following types:^{6}^{6}6Church used a different syntax, nearly incomprehensible to modern eyes.

, the type of individuals

, the type of the truth values True and False

, the type of functions from to
These include as a special case , the type of predicates on type . For formula (1) to make sense, the variable must have type and must have type . Higherorder logic is an extension of Church’s typed calculus.
Mike introduced higherorder logic to the verification world in 1986 mgordon86, sketching its syntax and semantics. He presented examples including an inverter, a full adder (implemented in terms of transistors) and a sequential multiplier. The state in a sequential device is modelled by taking the values on wires to be functions of time, indexed by integers. Then the output of a device at time can be related to its input at time . Mike credited Ben Moszkowski with ideas for reasoning about timing properties. Credit for the suggestion of higherorder logic went to Keith Hanna [14], who later decided to try his luck with more advanced type theories. But Mike’s simple choice was the right one.
Mike’s paper contains the definitive enunciation of the approach of representing hardware devices by relations or predicates. Recall that device behaviours were given first by recursive domain equations gordonmodel and then by dedicated terms gordonlcflsm. But with higherorder logic, the behaviour of a device is simply a relation over ’s external lines, with no distinction between inputs and outputs. Devices are connected together by equating the corresponding lines. Wires are hidden from the outside by existential quantification: mathematically, this is the composition of relations. For example, the formula^{7}^{7}7There is an error in this formula in Mike’s original paper mgordon86.
represents the device shown in Fig. 4. Two standard logical symbols, and , have replaced the special notation we saw in the last line of Fig. 2.
The relational approach is the right way to model individual transistors. Terminals and are neither inputs nor outputs, but are the terminals of a switch, controlled by , the gate (Fig. 5).
Mike treated an inverter containing two transistors. Note that the power and ground are viewed as explicit components, connected to the transistors by internal wires, and . Later in the paper, Mike treats a full adder consisting of 24 transistors. He credits this example to Inder Dhingra and comments, “Such a proof would be difficult with the usual representation of combinational circuits as boolean functions. Relations rather than functions are needed to model bidirectionality.” [p. 162]mgordon86
The methodology for verifying such a device is simplicity itself and scales all the way from this inverter to a fullsized computer. You define two predicates, say INVERTER (describing the desired behaviour of the inverter) and INVERTER_IMP (describing an implementation in terms of smaller components, as in Fig. 6). Those smaller components will typically be regarded abstractly; there is no need to go all the way down to the transistor level. Then you prove that INVERTER_IMP implies INVERTER for all and . This states that every configuration of values on the wires permitted by the implementation is also permitted by the specification.
Some weaknesses of the methodology are also clear. One is that electronic issues such as gate delays and voltage levels are abstracted away. This approach will not tell you that one output is trying to drive too many inputs or that a combinational circuit is too slow. It is a general limitation of mathematical models that they can never capture the real world in full.
A specific limitation of this approach is that there exists one implementation that satisfies all specifications. Simply connect power to ground; that is formalised as , which can prove anything. Nobody would do this on purpose, but a design could accidentally short circuit for certain combinations of inputs. The specification would be satisfied but the implementation would burn. One solution to this difficulty is to prove the converse of the implication above (every behaviour allowed by the specification is satisfied by the implementation), but this is not always possible: most specifications allow some diversity of behaviours. Other measures can be used to check the sanity of the implementation.
Once again, Mike had the task of building a theorem prover, starting with the Cambridge LCF base and creating the world’s first interactive implementation of higherorder logic. Avra Cohn was again the first user and, along with Mike, verified a counter circuit cohncounter,cohncountertr.^{8}^{8}8The technical report cohncountertr contains the full HOL proof, some 30 pages of code. This was a pilot study towards the first landmark HOL proof: the VIPER 32bit microprocessor [10]. The counter, which originated with the UK’s Royal Signals and Radar Establishment (RSRE), comprises nine flipflops and a couple of dozen gates including the counter logic. A complication of the design is that one can request either a single or a double count; the latter is implemented by calling the increment logic twice, so the machine has a twobit control state and its timing is not uniform. The verification requires reasoning about temporal properties of the circuit.
The verification of the VIPER microprocessor was the first proof of its kind, establishing HOL as a verification platform for realistic hardware. Yet again, this was the work of Avra Cohn. VIPER was designed by RSRE for military purposes, hence the interest in verification; it was specified in a series of levels, from abstract to concrete. Cohn verified the equivalence of the first two levels [9], and later, the second pair of levels [7].
Overshadowing these achievements was a controversy over what Cohn had actually accomplished [24]. Exasperated by exaggerations of her work in marketing material, she wrote a paper [8] pointing out the inherent limitations of her work in particular and hardware verification in general. She had indeed verified a major part of the VIPER design but not down to the gate level, and the specification omitted some important operating modes. More fundamentally, “verification involves a pair of models that bear an uncheckable and possibly imperfect relation to the intended design and to the actual device” [8, p. 131–2]. In other words, both the designer’s objectives and the device’s physical manifestation lie beyond the scope of formal verification.
6 The Golden Age of HOL
The name of Mike’s new prover, HOL88, marks 1988 as the official start of the higherorder logic era mgordon88a. The achievements reported above had already been attracting a steady stream of PhD students. Graham Birtwistle and Jeff Joyce joyceproving used HOL88 to verify a simplified version of the Gordon Computer, which they called Tamarack.^{9}^{9}9Recently, Thomas Türk got a version of this old proof working on the latest version of HOL. It now runs in a couple of seconds. Tom Melham developed a comprehensive package for defining recursive data structures [25], such as lists and trees; with Mike, he wrote the first HOL manual mgordonhol. And there was much more. International meetings on hardware verification were dominated by work done using HOL88 [2, 3]. In 1991, Sara Kalvala compiled a snapshot of HOL activity around the world, listing over eighty diverse projects [21].
By this time, HOL88 was being supplanted by Konrad Slind’s faster HOL90, which eventually became today’s HOL4 [37]. Other systems inspired by HOL88 include John Harrison’s HOL Light [16]. In the USA, researchers chose an extended form of higherorder logic as the basis for their Prototype Verification System (PVS) [30]. With my own verification tool (Isabelle), I would continue to push firstorder logic and set theory as a basis for verification until the late 90s, when the dominance of higherorder logic became overwhelming. The other major formalism for verification is dependent type theory, exemplified by Coq [11], which is a powerful extension of higherorder logic.
Mike was elected to the Royal Society in 1994, the year when the risk posed by hardware defects burst into public view. A floatingpoint division error in the Pentium processor forced Intel to recall millions of chips at a cost of $475 million [29]
. Until that date, many theorem provers did not even support negative numbers; it was suddenly urgent to deal with floatingpoint arithmetic and numerical algorithms. Harrison tackled this
[15]; he went on to accomplish great things in formalised mathematics, including verifying a floatingpoint exponential function [17] and (much later) playing a major role in verifying the celebrated Kepler conjecture [13].Another landmark was the verification of probabilistic algorithms, which exploit randomness. They can achieve great efficiency, but their result is only guaranteed to be correct with a certain probability, e.g. of the form
. To verify such an algorithm means to show that the probability of an error is no worse than the specification. Joe Hurd formalised enough measure theory to verify a variety of probabilistic algorithms [20]. Harrison and Hurd’s work led to the substantial libraries of analysis found in many of today’s verification systems. They are just two of Mike’s many students who did great things in HOL’s golden age.7 Software Verification, ARM6 and Verified Compilers
Mike’s most farreaching project was his collaboration with Graham Birtwistle to verify a modern processor. By the year 2000, several processors had been formally verified, but none were fullscale commercial designs containing advanced features such as instruction pipelining. The project involved working with ARM, whose processors are found in billions of mobile phones around the world. Anthony Fox, working at Cambridge, verified the ARM6 processor. This work yielded a complete specification of the ARM6’s instruction set architecture. Other researchers built projects upon that, aimed at verifying machinelanguage code foxspecification. But to tell this story properly, we need to go back to the 1980s.
With HOL, Mike introduced a strict treatment of definitions: a new constant could be introduced only by asserting , where is a term not mentioning and without free variables. While axioms can lead to contradictions, definitions are conservative. Mike also introduced a principle for declaring new types as nonempty subsets of other types mgordonhistory. Recursive definitions would require explicit fixed point constructions, though these would soon be automated using ML [25]. The HOL group may have had Bertrand Russell in mind [34, p. 71]:
The method of ‘postulating’ what we want has many advantages; they are the same as the advantages of theft over honest toil.
Russell was referring to the tedious construction of the real numbers from the rationals using Dedekind cuts, which was formalised by Harrison [15]. While other verification groups preferred theft, Mike and his students were firmly committed to rigour.
In the 1970s, Mike had chosen hardware verification because software verification seemed likely to be solved soon. But that clearly wasn’t happening (it still hasn’t), and already in 1988, Mike was thinking about using HOL to verify software.
The work described here is part of a long term project on verifying combined hardware/software systems by mechanized formal proof. [p. 3]gordonmechanizing
This eventually led to intensive research into techniques of verifying software, in MLlike languages and machine language, right down to the bit level.
The dominant approach to software verification, Hoare logic [19], concerned triples of the form
where was an executable statement, was the precondition and was the postcondition. This Hoare triple asserted that would hold after the execution of provided held beforehand and the execution terminated. Hoare logic allowed clear, natural proofs, but many difficulties soon manifested themselves. It assumed that the Boolean expressions of the programming language could be identified with the quantifierfree formulas of the assertion language in which and were written. But Boolean expressions are executable and subject to all the ambiguities and complexities that make semantics necessary in the first place. Many verification systems based on Hoare logic were of doubtful correctness or required users to assume many axioms.
Mike decided to implement Hoare logic upon the sound and expressive platform of HOL. His innovation gordonmechanizing was to define a simple programming language by a formal operational semantics; the Hoarestyle rules would then be derived, not simply asserted. Following his definitional approach, there would be no axioms. Through the power of ML — a modified prettyprinter disguising all the machinery — users would be given the illusion that they were working in Hoare logic.
This was the first example of what is now called a shallow embedding: a formalism (here Hoare logic) is not defined in HOL but merely simulated, yielding a convenient proof environment for that formalism. If instead we define the formalism inductively as a mathematical object, then we have a deep embedding. The formalism’s metatheory can easily be developed, but conducting derivations within the formalism will be painful. Over the years, many assertion languages would be implemented in HOL and other systems using one or the other approach bowengordonshallow. Hoarestyle precondition/postcondition calculi remained a favourite. These techniques were well understood by the year 2000, when the ARM6 verification project commenced.
This landmark project, jointly between the universities of Cambridge and Leeds, was funded by the EPSRC. Birtwistle at Leeds would specify the instruction set architecture (ISA) and the processor implementation;^{10}^{10}10The ISA describes the computer as a machine language programmer sees it. The implementation is in terms of memory, registers and an arithmetic/logic unit (ALU). Mike at Cambridge would formalise and verify these specifications using HOL4. Anthony Fox, a postdoc of Mike’s, undertook the Cambridge task and took about a year to prove that a model of the ARM6 processor correctly implemented the corresponding ISA. Fox went on to specify other ARM instruction sets, and independently, other researchers formalised the x86 and PowerPC. These exceptionally detailed ISA specifications (and associated tools) formed a resource that would be widely used.
With Magnus Myreen, a new PhD student, Mike decided to verify machine code programs. Prior work on verifying machine code was frustrated by the frame problem: the need to state explicitly which parts of the machine state were left unchanged. (When you flush the toilet, you don’t wonder whether your car doors will unlock.)
A formalism known as separation logic [33] had been proposed to deal with the frame problem, and Mike suggested adapting those ideas to higherorder logic. Myreen developed techniques to generate Hoarestyle assertions for each machine instruction while specifying only which parts of the state changed myreenfoxhoare,myreenhoare. He was then able to make a decompiler: to translate a string of machine instructions into a mathematical function expressing the state transformation, the equivalence automatically verified in HOL4 myreenmachinecode,myreenfunctionextraction. To crown it all, verified decompilation provided a means of verifying the result of compilation: the translation of source code to machine code. Myreen’s technology allowed him to create verified LISP interpreters in three different machine languages myreenLISP. Myreen’s PhD thesis won the British Computer Society’s Distinguished Dissertation Award in 2010. His choice of LISP echoes Mike’s own PhD thesis gordonevaluation.
These outstanding results attracted substantial followup funding. One of the most striking outcomes is CakeML, a version of the ML language implemented as a mathematical function in HOL [23]. Ramama Kumar et al. followed a “bootstrapping” procedure, initially using HOL itself to translate fragments of CakeML into binary code; they thus obtained a usable compiler that has been proven to generate correct binary code. This solves the chicken and egg problem of compiler correctness: if you verify a compiler that is written in a highlevel language, what compiler do you use to translate it correctly into binary? Mike’s students and colleagues could not resist the temptation to apply these techniques to HOL itself [22]. And so another of Mike’s students was honoured: Kumar won the ACM SIGPLAN Doctoral Dissertation Award for 2017.
8 Legacy
The verification world of today is substantially shaped by Mike’s work. Conferences for HOL users have been held annually since 1988, now broadened to related systems under the name Interactive Theorem Proving (ITP). The leading interactive theorem provers follow the LCF approach, are implemented in some version of ML, and support higherorder logic or something stronger. Hardware verification is widely used in industry, while academic research continues apace.
Mike was always keenly interested in all these developments. He worked on many projects connected with hardware description languages, interoperability of verification tools and other technologies. He was fully aware of rival methods, including model checking (to verify system properties by enumeration of finite but large state spaces) and binary decision diagrams (BDDs: graphbased data structures capable of manipulating extremely large propositional formulas efficiently). He found an ingenious way of combining BDDs with HOL gordonbdd,gordonpuzzletool. He admired the hardware verification research of the University of Texas at Austin using ACL2 — a theorem prover based on an utterly different design from HOL’s — and worked to link up that prover with HOL gordonembeddingacl2, combining their complementary strengths.
Although Mike rejected engineering as a degree course, it’s clear that he wanted to make an impact on the world. By talking to real hardware designers, he learnt about their practices and problems. He devoted his career to finding realistic solutions. Ironically, although his decision to tackle hardware may have been prompted by a feeling that software was being solved, software developers have generally been uninterested in verification: software can always be patched, and the industry is protected by sweeping warranty disclaimers. However, hardware is not fully solved: the complexity of modern processor designs still makes complete verification unaffordable. Only a few critical components get formal scrutiny.
Much more could be written. Many of Mike’s other students accomplished great things and found prominent positions in academia or industry. Mike had a keen interest in computational linguistics: he obtained a Masters degree in linguistics from Cambridge in 1974, and engaged in sponsored research along with Stephen Pulman on applications of higherorder logic to the semantics of natural language. Mike had many teaching and administrative responsibilities, including his role in the planning of the William Gates Building, which now houses the Department and opened in 2001, and his many duties as Deputy Head of Department.
Then there is his personal life. Avra, his wife, eventually retired from active research to bring up their two sons, Katriel and Reuben. She and Mike continued to discuss verification at home. Both of their sons went on to do PhDs in computing: Katriel in cybersecurity at Oxford, Reuben in computational linguistics at Stanford. Somehow this completes the circle.
Mike will be remembered for his kindness and modesty — always eager to confess his failings while concealing his triumphs — and his gentle sense of humour.
Additional information on the history of this period has been written by Mike himself mgordonhistory,gordontacticsmilner and by his colleagues [18, 31].
Acknowledgements
Avra Cohn and Katriel CohnGordon answered many questions and made unique manuscripts available. Mike’s former colleagues, students and others supplied valuable tidbits of information and insightful comments. These include Bruce Anderson, Jasmin Blanchette, Jon Crowcroft, Warren Hunt, Sara Kalvala, Simon Laughlin, Joe LeslieHurd, Stephen Levinson, Magnus Myreen, Michael Norrish, Gordon Plotkin, Lee Smith, Terence Moore and Richard Waldinger.
Data accessibility.
No experimental data involved.
Competing interests.
Not applicable.
Funding.
Much of the research reported here was supported by the EPSRC or its predecessors, or EU funding agencies, going back 40 years.
Short bio of author.
Lawrence Paulson FRS is Professor of Computational Logic at the University of Cambridge, where he has held established positions since 1983. He has written over 100 refereed conference and journal papers as well as four books. In the 1980s, he worked with Mike Gordon on further development of the LCF proof assistant, which became the foundation of Gordon’s LCF_LSM and HOL systems. He introduced the popular Isabelle theorem proving environment in 1986, and made contributions to the verification of cryptographic protocols, the formalisation of mathematics, automated theorem proving technology, and other fields. He achieved a formal analysis of the ubiquitous TLS protocol, which is used to secure online shopping, and the formal verification of Gödel’s second incompleteness theorem. In 2008, he introduced MetiTarski, an automatic theorem prover for realvalued functions such as logarithms and exponentials. He has the honorary title of Distinguished Affiliated Professor from the Technical University of Munich and is a Fellow of ACM as well as the Royal Society. He holds a PhD in Computer Science from Stanford University, and a BS in Mathematics from the California Institute of Technology.
Note to Editor.
The Computer Laboratory has undertaken to ensure the continued validity of the URLs for Mike’s autobiographical webpages (dated 2017).
References to Other Authors
 [1] H. P. Barendregt. The Lambda Calculus: Its Syntax and Semantics. NorthHolland, 1984.
 [2] G. Birtwistle and P. A. Subrahmanyam, editors. VLSI Specification, Verification and Synthesis. Kluwer Academic Publishers, 1988.
 [3] G. Birtwistle and P. A. Subrahmanyam, editors. Current Trends in Hardware Verification and Automated Theorem Proving. Springer, 1989.
 [4] A. Church. A formulation of the simple theory of types. Journal of Symbolic Logic, 5:56–68, 1940.
 [5] A. Cohn. Machine Assisted Proofs of Recursion Implementation. PhD thesis, University of Edinburgh, 1979.
 [6] A. Cohn. The equivalence of two semantic definitions: A case study in LCF. SIAM J. Comput., 12(2):267–285, 1983.
 [7] A. Cohn. Correctness properties of the Viper block model: The second level. In Birtwistle and Subrahmanyam [3], pages 1–91.
 [8] A. Cohn. The notion of proof in hardware verification. Journal of Automated Reasoning, 5(2):127–139, 1989.
 [9] A. J. Cohn. A proof of correctness of the VIPER microprocessor: The first level. In Birtwistle and Subrahmanyam [2], pages 27–71.
 [10] W. J. Cullyer. Implementing safety critical systems: The VIPER microprocessor. In Birtwistle and Subrahmanyam [2], pages 1–25.
 [11] G. Dowek et al. The Coq proof assistant user’s guide. Technical Report 134, INRIARocquencourt, 1991. Version 5.6.
 [12] R. W. Floyd. Assigning meanings to programs. In Proceedings, Symposium on Applied Mathematics, volume 19, pages 19–32. American Mathematical Society, 1967.
 [13] T. C. Hales et al. A formal proof of the Kepler conjecture. arXiv.org, abs/1501.02155, Jan. 2015.
 [14] F. K. Hanna and N. Daeche. Specification and verification of digital systems using higherorder predicate logic. IEE Proceedings E  Computers and Digital Techniques, 133(5):242–254, September 1986.
 [15] J. Harrison. Constructing the real numbers in HOL. Formal Methods in System Design, 5:35–59, 1994.
 [16] J. Harrison. HOL Light: A tutorial introduction. In M. K. Srivas and A. J. Camilleri, editors, Formal Methods in ComputerAided Design: FMCAD ’96, LNCS 1166, pages 265–269. Springer, 1996.
 [17] J. Harrison. Floating point verification in HOL Light: the exponential function. Formal Methods in System Design, 16:271–305, 2000.
 [18] J. Harrison, J. Urban, and F. Wiedijk. History of interactive theorem proving. In J. Siekmann, editor, Handbook of the History of Logic (Computational Logic), volume 9, pages 135–214. Elsevier, 2014.
 [19] C. A. R. Hoare. An axiomatic basis for computer programming. In C. A. R. Hoare and C. B. Jones, editors, Essays in Computing Science, pages 45–58. PrenticeHall, 1989. Originally published in 1969.
 [20] J. Hurd. Verification of the MillerRabin probabilistic primality test. Journal of Logic and Algebraic Programming, 56:3–21, 2002.
 [21] S. Kalvala. HOL around the world. In M. Archer, J. J. Joyce, K. N. Levitt, and P. J. Windley, editors, International Workshop on the HOL Theorem Proving System and its Applications, pages 4–12. IEEE Computer Society, 1991.
 [22] R. Kumar, R. Arthan, M. O. Myreen, and S. Owens. Selfformalisation of higherorder logic: Semantics, soundness, and a verified implementation. J. Autom. Reasoning, 56(3):221–259, 2016.
 [23] R. Kumar, M. O. Myreen, M. Norrish, and S. Owens. CakeML: A verified implementation of ML. In ACM SIGPLANSIGACT Symposium on Principles of Programming Languages, POPL ’14, pages 179–191. ACM, 2014.
 [24] D. MacKenzie. The fangs of the VIPER. Nature, 352:467–468, Aug. 1991.
 [25] T. F. Melham. Automating recursive type definitions in higher order logic. In Birtwistle and Subrahmanyam [3], pages 341–386.
 [26] R. Milner. Implementation and applications of Scott’s logic for computable functions. ACM SIGPLAN Notices, 7(1):1–6, 1972.
 [27] R. Milner. A Calculus of Communicating Systems. Springer, 1980. LNCS 92.
 [28] G. H. Moore. The emergence of firstorder logic. In W. Aspray and P. Kitcher, editors, History and Philosophy of Modern Mathematics, pages 95–135. University of Minnesota Press, 1988. Online at http://hdl.handle.net/11299/185662.
 [29] T. R. Nicely. Pentium FDIV flaw, 2011. FAQ page online at http://www.trnicely.net/pentbug/pentbug.html.
 [30] S. Owre, J. M. Rushby, and N. Shankar. PVS: A prototype verification system. In D. Kapur, editor, Automated Deduction — CADE11 International Conference, volume 607 of LNAI 607, pages 748–752. Springer, 1992.
 [31] L. C. Paulson. Computational logic: Its origins and applications. Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, 474(2210), 2018.
 [32] G. D. Plotkin. The origins of structural operational semantics. The Journal of Logic and Algebraic Programming, 6061:3–15, 2004.
 [33] J. C. Reynolds. Separation logic: A logic for shared mutable data structures. In 17th Annual IEEE Symposium on Logic in Computer Science, pages 55–74. IEEE Computer Society, 2002.
 [34] B. Russell. Introduction to Mathematical Philosophy. Cosimo, 2007. First published in 1919.

[35]
D. S. Scott.
Outline of a mathematical theory of computation.
Technical Report PRG2, University of Oxford, Oxford, England, Nov. 1970.  [36] D. S. Scott. A typetheoretical alternative to ISWIM, CUCH, OWHY. Theoretical Comput. Sci., 121:411–440, 1993. Annotated version of the 1969 manuscript.
 [37] K. Slind and M. Norrish. A brief overview of HOL4. In O. A. Mohamed, C. Muñoz, and S. Tahar, editors, Theorem Proving in Higher Order Logics, TPHOLs 2008, LNCS 5170, pages 28–32. Springer, 2008.
 [38] J. Van Benthem and K. Doets. Higherorder logic. In D. Gabbay and F. Guenthner, editors, Handbook of Philosophical Logic: Volume I: Elements of Classical Logic, pages 275–329. Springer Netherlands, 1983.
Comments
There are no comments yet.