Clover: Closed-Loop Verifiable Code Generation |
|
ARBITER & UPSAT: Assuring Open Source Software |
|
Zero Trust Design and Assurance Patterns for Cyber-Physical Systems |
|
Industrial Scale Proof Engineering for Critical Trustworthy Applications (INSPECTA) |
|
High-Assurance Synthesis and Analysis Techniques for Memory-Safe Programming Languages |
|
Developing and Maintaining the Assurance of Software with Open-Source Components: Challenges and Tools |
|
Automatic Program Transformation |
|
Correct-by-construction Cryptographic Hardware via Explicit Staging Transformations |
|
Optim(L): Generating Lazy APIs from DAGs of Actions |
|
Fireside Chat with Joshua Baron of the White House National Security Council |
|
Assuring Transformative Technologies |
|
Putting a Roof Over Your Head: Object-Oriented Programming in Rust |
|
Practical Software Supply Chain Assurance |
|
Reverse Architecting Software Binaries |
|
DYKONDO: Debloating Container Images for Reduced Attack Surface and Edge Deployments |
|
Measurements to Improve AI/ML Training Data Sets |
|
Cognitive Programming Model for Reliable and Inspectable Automated Decision Making using Large Language Models |
|
The Challenges of Software Assurance and Supply Chain Risk Management |
|
2024 ISEF Winners |
|
Beyond Net Risk for Autonomous Vehicles |
|
Using Assurance Cases for a Go/No Go Decision: Theory and Practice - Bloomfield |
|
Using Assurance Cases for a Go/No Go Decision: Theory and Practice - Diemert |
|
Lessons Learned in Regulating Self Driving Cars |
|
Using WorkFlow+ to Assure Safety of Automotive Over-the-air Software Updates |
|