L4.verified |
|
The Next IDE: Informative Development Environment |
|
Visualizing Information Flow through C Programs |
|
VAST: Visualization of Attack Surface for Targeting |
|
Using Java PathFinder for Program Understanding and Defect Visualization |
|
Alchemy: Three Ways of Transmutating Programs into Circuits |
|
Replacing Testing with Formal Verification in Intel® Core™ i7 Processor Execution Engine Validation |
|
Proof-Carrying Data Secure Computation on Untrusted Execution Platforms |
|
Generating Implementations of Error Correcting Codes using Kansas Lava |
|
HWMAC: Hardware-Enforced Fine-Grained Policy-Driven Security |
|
Security Systems Engineering |
|
Automated Synthesis of SAT Solvers |
|
Support for Supertype Abstraction in JML |
|
A Retrospective on Constructive Verification |
|
COTS Strategy |
|
Rule-Based Static Analysis of Network Protocol |
|
Run-time Systems for High-Assurance Systems |
|
AURA: A Programming Language with Authorization and Audit |
|
Security as a System-Level Constraint |
|
Predicting Where Software Systems will be Attacked |
|
Analyzing a Cross-domain Component: Lessons Learned and Future Directions |
|
SCADE 6: A Model-Based Development Environment to meet Strong Certification Objectives while Reducing Costs |
|
Formal Specifications on Industrial-Strength Code |
|
Verified Software: The Next Steps |
|
DoD Software Assurance Concept of Operations |
|