Title Date
L4.verified
The Next IDE: Informative Development Environment
Visualizing Information Flow through C Programs
VAST: Visualization of Attack Surface for Targeting
Using Java PathFinder for Program Understanding and Defect Visualization
Alchemy: Three Ways of Transmutating Programs into Circuits
Replacing Testing with Formal Verification in Intel® Core™ i7 Processor Execution Engine Validation
Proof-Carrying Data Secure Computation on Untrusted Execution Platforms
Generating Implementations of Error Correcting Codes using Kansas Lava
HWMAC: Hardware-Enforced Fine-Grained Policy-Driven Security
Security Systems Engineering
Automated Synthesis of SAT Solvers
Support for Supertype Abstraction in JML
A Retrospective on Constructive Verification
COTS Strategy
Rule-Based Static Analysis of Network Protocol
Run-time Systems for High-Assurance Systems
AURA: A Programming Language with Authorization and Audit
Security as a System-Level Constraint
Predicting Where Software Systems will be Attacked
Analyzing a Cross-domain Component: Lessons Learned and Future Directions
SCADE 6: A Model-Based Development Environment to meet Strong Certification Objectives while Reducing Costs
Formal Specifications on Industrial-Strength Code
Verified Software: The Next Steps
DoD Software Assurance Concept of Operations