High-Performance Regular Expression Processing for Cross-Domain Systems with High Assurance Requirements |
|
Programmable Hardware Support for Ubiquitous Micro-Policy Enforcement |
|
Generating Proof-Carrying Code for the UDP protocol |
|
Mining and Understanding Software Enclaves (MUSE) |
|
Local Temporal Reasoning |
|
Through the Lens of Abstraction |
|
Multi-App Security Analysis: Looking for Android App Collusion |
|
Triceratops: Privacy-protecting Mobile Apps |
|
An Aircraft Electric Power System Domain-Specific Language for Reactive Control Protocols |
|
ArmoredSoftware: Trust in the cloud |
|
SpeAR: Specification and Analysis of Requirements |
|
Cryptol version 2: An Open Source Cryptol |
|
The Cyber-Physical Limits of Control |
|
Keynote Presentation: Neal Ziring |
|
Survey on the Barriers to the Industrial Adoption of Formal Methods |
|
ARE: A System for Automated Reverse Engineering |
|
ARSENAL: Automatic Requirements Specification Extraction from Natural Language |
|
Access Control Policy Tool (ACPT), an assurance tool that combines symbolic model checking with combinatorial coverage |
|
A High-Confidence Broker of Security Services |
|
High-Assurance Java Card |
|
Synthesis of a Complex Software Vulnerability Analyzer (SVA) |
|
The SLAM Project: Debugging System Software via Static Analysis |
|
Practical Model Checking |
|
High Confidence Software and Systems |
|
Programatica: The Early Years — A Personal Recollection |
|