| Tools to Support Enterprise Assurance Arguments |
|
| Tools for Information Security Assurance Arguments |
|
| Evaluatable, High-Assurance Microprocessors |
|
| Reliability Testing of COTS Security-based Software Applications |
|
| Programatica Tutorial |
|
| Program Synthesis for Performance |
|
| Accessible Integrated Formal Reasoning Environments in Classroom Instruction of Mathematics |
|
| Technology Transfer Challenges with the S&T Community |
|
| Tech Transfer of Software Tools |
|
| VehicleForge.mil: A Distributed, Semantically-Aware Framework to Support the Needs of the Open Hardware Community |
|
| Preventing Exploits Against Software Of Uncertain Provenance |
|
| VIBRANCE: Automatic Removal of Security Vulnerabilities from Java Applications |
|
| Compositional Verification of Architectural Models |
|
| Formal Synthesis of Efficient Verified Emulators |
|
| Synthesizing Architectural Models of Cyber-Physical Systems |
|
| Static Previrtualization |
|
| Synthesis of Concurrent Garbage Collectors |
|
| Preventing Exploits Against Software Of Uncertain Provenance |
|
| Formal Synthesis of Efficient Verified Emulators |
|
| The Ramification Rule of Separation Logic |
|
| Verification of Elliptic Curve Cryptography |
|
| Axe: An Automated Formal Equivalence Checking Tool for Programs |
|
| Reasoning About Non-Determinism in Programs |
|
| FUSE: Inter-Application Security for Android |
|
| Framework for Evaluating Information Flows in Multicore Architectures for High Assurance Systems |
|