| Increased Information Flow Needs for High-Assurance Composite Evaluations |  | 
          
                                                                                        | High Confidence Software and Systems: A Rockwell Collins Perspective |  | 
          
                                                                                        | Theorem Provers as High Assurance Programming Environments |  | 
          
                                                                                        | Usage of Intermediate Java Byte Code to Verify Wireless Java Applications |  | 
          
                                                                                        | Formally Verified Encryption of High-Level Datatypes: An Application of Polytypism |  | 
          
                                                                                        | Transparency: An Application Context for High Confidence Software and Systems (HCSS) Tools and Methods |  | 
          
                                                                                        | Modelling Key Distribution, Art to Science |  | 
          
                                                                                        | Security by Construction - Engineering Software to Exceed EAL5 |  | 
          
                                                                                        | Synthesis of Provably Correct Java Card Applets and Platform |  | 
          
                                                                                        | Designing and Testing a High Assurance ASN.1 Compiler |  | 
          
                                                                                        | Organically Assured and Survivable Information Systems |  | 
          
                                                                                        | Code Generation for High-Assurance Java Card Applets |  | 
          
                                                                                        | vFaat: von Neumann Formal Analysis and Annotation Tool |  | 
          
                                                                                        | Cryptyc: A Cryptographic Protocol Typechecker |  | 
          
                                                                                        | Programatica Tools for Certifiable, Auditable Development of High Assurance Systems in Haskell |  | 
          
                                                                                        | Trustworthy Refinement through Intrusion-Aware Design (TRIAD) |  | 
          
                                                                                        | Overview FAA IT & ISS R&D: Security Today Security Tomorrow |  | 
          
                                                                                        | Secure Software from Design to Binary |  | 
          
                                                                                        | Large Scale Separation Through Monads: The Oregon Separation Kernel |  | 
          
                                                                                        | Cryptol: A Domain Specific Language for Cryptography |  | 
          
                                                                                        | GemClassifier, a Formally Developed Smart Card |  | 
          
                                                                                        | Compositional Assurance for MILS |  | 
          
                                                                                        | Verifying a High-Performance Micro-kernel |  | 
          
                                                                                        | ARM Verification |  | 
          
                                                                                        | Circuit Specification, Abstraction, and Reverse Engineering |  |