Tools to Support Enterprise Assurance Arguments |
|
Tools for Information Security Assurance Arguments |
|
Evaluatable, High-Assurance Microprocessors |
|
Reliability Testing of COTS Security-based Software Applications |
|
Programatica Tutorial |
|
Program Synthesis for Performance |
|
Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics |
|
Technology Transfer Challenges with the S&T Community |
|
Tech Transfer of Software Tools |
|
VehicleForge.mil: A Distributed, Semantically-Aware Framework to Support the Needs of the Open Hardware Community |
|
Preventing Exploits Against Software Of Uncertain Provenance |
|
VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications |
|
Compositional Verification of Architectural Models |
|
Formal Synthesis of Efficient Verified Emulators |
|
Synthesizing Architectural Models of Cyber-Physical Systems |
|
Static Previrtualization |
|
Synthesis of Concurrent Garbage Collectors |
|
Preventing Exploits Against Software Of Uncertain Provenance |
|
Formal Synthesis of Efficient Verified Emulators |
|
The Ramification Rule of Separation Logic |
|
Verification of Elliptic Curve Cryptography |
|
Axe: An Automated Formal Equivalence Checking Tool for Programs |
|
Reasoning About Non-Determinism in Programs |
|
FUSE: Inter-Application Security for Android |
|
Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems |
|