bRIGHT: From Context to Interest |
|
AFOSR: Information, Operations, and Security Program Review |
|
Semi-automated Test Case Generation for ACAS X Implementation Validation |
|
Combining Property-based Testing and Fuzzing |
|
Model-Based Grey-Box Fuzzing |
|
Security Policy and Resiliency Tools and ANalysis (SPARTAN) |
|
Deriving Formal Specifications from Natural Language Requirements using ARSENAL 2 |
|
Automated Rapid Certification of Software |
|
Semantics-Driven Testing of the PKCS11 API |
|
Automating Avionics Certification activities using Formal Methods |
|
Understanding Attestation: Analyzing Protocols that Use Quotes |
|
Checked C: Safe C, Incrementally |
|
C3E_Fall2019_TravelExpenseWorksheet.xlsx |
|
Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It |
|
Content Moderation and the Problem of Meshed Cognition |
|
What Blockchain Got Right, No Really |
|
Hardware/Software Coassurance using Algorithmic C and ACL2 |
|
End-to-end correctness theorems spanning software and hardware |
|