| A Formal Semantics for ASN.1 |
|
| Static Analysis for High Assurance and Security |
|
| Formal Methods Anecdotes: Worse Is Better! |
|
| Trust Relationships |
|
| Manifest Safety and Security |
|
| Justifiable Confidence? Making Software Dependable |
|
| The Haskell Lightweight VM |
|
| TSE and Applications |
|
| The Separation and Krenz Specifications Version 3.0 |
|
| CDSA Initial Review |
|
| A Brief Introduction to Cryptol |
|
| Trusting Software |
|
| To Trust or Not to Trust, That is the Question? |
|
| Specware |
|
| Specware - Producing Software Correct by Construction |
|
| System Synthesis: Towards a new paradigm and discipline for knowledge, software, and system development and maintenance |
|
| Toward a Provably-Correct Implementation of the JVM Bytecode Verifier |
|
| A Formal Specification of Java - Class Loading |
|
| An Approach to Software Vulnerability Analysis (SVA) |
|
| Network Vulnerability Analysis, A Formal Approach |
|
| Reverse Engineering for the Detection of Undesirable Functionality in Commercial Software |
|
| JAVA Model Checking |
|
| Model Checking Programs |
|
| A Proof of the Church-Rosser Theorem for the Lambda Calculus in Higher Order Logic |
|
| A Solver for Non-linear Boolean Functions |
|