Title Date
High-Performance Regular Expression Processing for Cross-Domain Systems with High Assurance Requirements
Programmable Hardware Support for Ubiquitous Micro-Policy Enforcement
Generating Proof-Carrying Code for the UDP protocol
Mining and Understanding Software Enclaves (MUSE)
Local Temporal Reasoning
Through the Lens of Abstraction
Multi-App Security Analysis: Looking for Android App Collusion
Triceratops: Privacy-protecting Mobile Apps
An Aircraft Electric Power System Domain-Specific Language for Reactive Control Protocols
ArmoredSoftware: Trust in the cloud
SpeAR: Specification and Analysis of Requirements
Cryptol version 2: An Open Source Cryptol
The Cyber-Physical Limits of Control
Keynote Presentation: Neal Ziring
Survey on the Barriers to the Industrial Adoption of Formal Methods
ARE: A System for Automated Reverse Engineering
ARSENAL: Automatic Requirements Specification Extraction from Natural Language
Access Control Policy Tool (ACPT), an assurance tool that combines symbolic model checking with combinatorial coverage
A High-Confidence Broker of Security Services
High-Assurance Java Card
Synthesis of a Complex Software Vulnerability Analyzer (SVA)
The SLAM Project: Debugging System Software via Static Analysis
Practical Model Checking
High Confidence Software and Systems
Programatica: The Early Years — A Personal Recollection