Compiler Verification and Beyond: Verified Tools for High-Assurance Software |
|
Verified Compiler Technology and Separation Logic for Reasoning about Concurrent C Programs |
|
Towards High-Assurance Run-Time Systems |
|
Using the Cambridge ARM Model to Verify the Concrete Machine Code of seL4 |
|
Let's Build Secure Systems on a Correct Kernel |
|
Developing Secure Mobile Architectures: The COTS Challenge |
|
Applying Formal Methods to Prove Correctness of Surgical Robot Software |
|
Verifying Timing-Centric Software Systems |
|
Copilot: Cyber-Physical System Run-Time Verification |
|
Making High-Confidence Systems Low-Cost |
|
Dynamic Enforcement of Knowledge-Based Security Policies |
|
Enforcing Information Flow Policies via Generation of Monitors in Java Card Runtime Environments |
|
Guardol: A Domain-Specific Language for Guards Supporting Strong Automated Formal Analysis |
|
Information Security: The Legacy of a Maginot Line in Cyberspace |
|
Security Inception - Exploiting the Software Ecosystem |
|
Matching Logic |
|
Analysis-Based Verification: A Programmer-Oriented Approach to the Assurance of Mechanical Program Properties |
|
Automatically Identifying Exploitable Bugs |
|
CAS Static Analysis Tool Study Overview |
|
The Open World Framework |
|
Parametric Verification of Address Space Separation |
|
Proposed Formal Methods Supplement for RTCA DO 178C |
|
Moving-Target Defense With Configuration-Space Randomization |
|
High Assurance Crypto-Development with Cryptol |
|
Software Analysis Workbench (SAW) |
|