Sound Modular Verification of C Code Executing in an Unverified Context
暂无分享,去创建一个
[1] Bertrand Meyer,et al. Applying 'design by contract' , 1992, Computer.
[2] David Walker,et al. Modular Protections against Non-control Data Attacks , 2011, 2011 IEEE 24th Computer Security Foundations Symposium.
[3] Frank Piessens,et al. Fides: selectively hardening software application components against kernel-level or process-level malware , 2012, CCS '12.
[4] Mark A. Hillebrand,et al. VCC: A Practical System for Verifying Concurrent C , 2009, TPHOLs.
[5] Shuang Wu,et al. Analysis of BLAKE2 , 2014, CT-RSA.
[6] George C. Necula,et al. CCured: type-safe retrofitting of legacy code , 2002, POPL '02.
[7] Viktor Vafeiadis,et al. Bi-abductive Resource Invariant Synthesis , 2009, APLAS.
[8] Peter W. O'Hearn,et al. Smallfoot: Modular Automatic Assertion Checking with Separation Logic , 2005, FMCO.
[9] Wolfram Schulte,et al. VCC: Contract-based modular verification of concurrent C , 2009, 2009 31st International Conference on Software Engineering - Companion Volume.
[10] Úlfar Erlingsson,et al. Low-Level Software Security: Attacks and Defenses , 2007, FOSAD.
[11] James Cheney,et al. Cyclone: A Safe Dialect of C , 2002, USENIX Annual Technical Conference, General Track.
[12] Frank Piessens,et al. Expressive modular fine-grained concurrency specification , 2011, POPL '11.
[13] Frank Piessens,et al. Secure Compilation to Modern Processors , 2012, 2012 IEEE 25th Computer Security Foundations Symposium.
[14] Frank Piessens,et al. Software verification with VeriFast: Industrial case studies , 2014, Sci. Comput. Program..
[15] Michael Norrish,et al. seL4: formal verification of an OS kernel , 2009, SOSP '09.
[16] Frank Piessens,et al. A Quick Tour of the VeriFast Program Verifier , 2010, APLAS.
[17] Matthias Felleisen,et al. Correct blame for contracts: no more scapegoating , 2011, POPL '11.
[18] Ohio Library,et al. Programming Languages , 2013, Lecture Notes in Computer Science.
[19] Michael K. Reiter,et al. Flicker: an execution infrastructure for tcb minimization , 2008, Eurosys '08.
[20] Wei-Ngan Chin,et al. Runtime Checking for Separation Logic , 2008, VMCAI.
[21] Todd M. Austin,et al. Efficient detection of all pointer and array access errors , 1994, PLDI '94.
[22] Matthew J. Parkinson,et al. jStar: towards practical verification for java , 2008, OOPSLA.
[23] Michael D. Ernst,et al. An overview of JML tools and applications , 2003, International Journal on Software Tools for Technology Transfer.
[24] Wolfram Schulte,et al. Runtime verification of .NET contracts , 2003, J. Syst. Softw..
[25] Juan Chen,et al. Gradual typing embedded securely in JavaScript , 2014, POPL.
[26] Benjamin C. Pierce,et al. Contracts made manifest , 2010, POPL '10.
[27] Frank Piessens,et al. Sancus: Low-cost Trustworthy Extensible Networked Devices with a Zero-software Trusted Computing Base , 2013, USENIX Security Symposium.
[28] Martín Abadi,et al. Protection in Programming-Language Translations , 1998, ICALP.
[29] Juan Chen,et al. Fully abstract compilation to JavaScript , 2013, POPL.
[30] ChinWei-Ngan,et al. Automated verification of shape, size and bag properties via user-defined predicates in separation logic , 2012 .
[31] Matthias Felleisen,et al. Contract Soundness for object-oriented languages , 2001, OOPSLA '01.
[32] James Newsome,et al. Design, Implementation and Verification of an eXtensible and Modular Hypervisor Framework , 2013, 2013 IEEE Symposium on Security and Privacy.
[33] Marco Patrignani,et al. Secure Compilation to Protected Module Architectures , 2015, TOPL.
[34] Nikolai Kosmatov,et al. An Optimized Memory Monitoring for Runtime Assertion Checking of C Programs , 2013, RV.
[35] John C. Reynolds,et al. Separation logic: a logic for shared mutable data structures , 2002, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science.