C3E Workshop 2011 Final Report |
|
Z3str3: A DPLL(T) Solver for a Theory of Strings and Integers |
|
Proving Amazon's s2n Correct |
|
SunDew: Systematic Automated Security Testing |
|
Cross-Tool Semantics for Protocol Security Goals |
|
Certifying SAT Proofs |
|
Levels of Software Assurance in SPARK |
|
Identifying Security Critical Properties for the Dynamic Verification of a Processor |
|
Development of Verified Message Encoder/Decoder for Automotive V2V Communications |
|
A Translationally Inspired Model for Autonomous Device Self-Regulation |
|
Jana - Private Data as a Service |
|
The Semantics of Privacy: From Privacy Policy Analysis to Code-Level Enforcement |
|
Applying NIST's new Privacy Risk Management Framework |
|
Keynote Presentation: Differential Privacy and Data Analysis |
|
Keynote Presentation: Privacy Engineering: Just Another Unicorn? |
|
A Commitment Logic for Reasoning about Trust in Complex Systems |
|
Certified Multiplicative Weights Update, or Verified Learning Without Regret |
|
Verified Data Structures for Trusted Autonomy: A Compilation Approach |
|
Keynote Presentation - John Launchbury |
|
Design Studio for Rigorous System Design using Architecture Styles and BIP |
|
Keynote Presentation: Formal Methods and the Defense Industrial Base |
|
Keynote Presentation: Symmetries in Software |
|
VU Travel Reimbursement Worksheet for Workshops |
|