A Formal Semantics for ASN.1 |
|
Static Analysis for High Assurance and Security |
|
Formal Methods Anecdotes: Worse Is Better! |
|
Trust Relationships |
|
Manifest Safety and Security |
|
Justifiable Confidence? Making Software Dependable |
|
The Haskell Lightweight VM |
|
TSE and Applications |
|
The Separation and Krenz Specifications Version 3.0 |
|
CDSA Initial Review |
|
A Brief Introduction to Cryptol |
|
Trusting Software |
|
To Trust or Not to Trust, That is the Question? |
|
Specware |
|
Specware - Producing Software Correct by Construction |
|
System Synthesis: Towards a new paradigm and discipline for knowledge, software, and system development and maintenance |
|
Toward a Provably-Correct Implementation of the JVM Bytecode Verifier |
|
A Formal Specification of Java - Class Loading |
|
An Approach to Software Vulnerability Analysis (SVA) |
|
Network Vulnerability Analysis, A Formal Approach |
|
Reverse Engineering for the Detection of Undesirable Functionality in Commercial Software |
|
JAVA Model Checking |
|
Model Checking Programs |
|
A Proof of the Church-Rosser Theorem for the Lambda Calculus in Higher Order Logic |
|
A Solver for Non-linear Boolean Functions |
|