| Tools to Support Enterprise Assurance Arguments |  | 
          
                                                                                        | Tools for Information Security Assurance Arguments |  | 
          
                                                                                        | Evaluatable, High-Assurance Microprocessors |  | 
          
                                                                                        | Reliability Testing of COTS Security-based Software Applications |  | 
          
                                                                                        | Programatica Tutorial |  | 
          
                                                                                        | Program Synthesis for Performance |  | 
          
                                                                                        | Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics |  | 
          
                                                                                        | Technology Transfer Challenges with the S&T Community |  | 
          
                                                                                        | Tech Transfer of Software Tools |  | 
          
                                                                                        | VehicleForge.mil: A Distributed, Semantically-Aware Framework to Support the Needs of the Open Hardware Community |  | 
          
                                                                                        | Preventing Exploits Against Software Of Uncertain Provenance |  | 
          
                                                                                        | VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications |  | 
          
                                                                                        | Compositional Verification of Architectural Models |  | 
          
                                                                                        | Formal Synthesis of Efficient Verified Emulators |  | 
          
                                                                                        | Synthesizing Architectural Models of Cyber-Physical Systems |  | 
          
                                                                                        | Static Previrtualization |  | 
          
                                                                                        | Synthesis of Concurrent Garbage Collectors |  | 
          
                                                                                        | Preventing Exploits Against Software Of Uncertain Provenance |  | 
          
                                                                                        | Formal Synthesis of Efficient Verified Emulators |  | 
          
                                                                                        | The Ramification Rule of Separation Logic |  | 
          
                                                                                        | Verification of Elliptic Curve Cryptography |  | 
          
                                                                                        | Axe: An Automated Formal Equivalence Checking Tool for Programs |  | 
          
                                                                                        | Reasoning About Non-Determinism in Programs |  | 
          
                                                                                        | FUSE: Inter-Application Security for Android |  | 
          
                                                                                        | Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems |  |