Faulty Logic: Reasoning about Fault Tolerant Programs
暂无分享,去创建一个
[1] John C. Reynolds,et al. Separation logic: a logic for shared mutable data structures , 2002, Proceedings 17th Annual IEEE Symposium on Logic in Computer Science.
[2] J. Cheney,et al. A sequent calculus for nominal logic , 2004, LICS 2004.
[3] G. Winskel. The formal semantics of programming languages , 1993 .
[4] Gürhan Küçük,et al. Reducing reorder buffer complexity through selective operand caching , 2003, ISLPED '03.
[5] David Walker,et al. Fault-tolerant typed assembly language , 2007, PLDI '07.
[6] David I. August,et al. Design and evaluation of hybrid fault-detection systems , 2005, 32nd International Symposium on Computer Architecture (ISCA'05).
[7] David Naccache,et al. The Sorcerer's Apprentice Guide to Fault Attacks , 2006, Proceedings of the IEEE.
[8] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[9] Peter W. O'Hearn,et al. BI as an assertion language for mutable data structures , 2001, POPL '01.
[10] David I. August,et al. SWIFT: software implemented fault tolerance , 2005, International Symposium on Code Generation and Optimization.
[11] Glynn Winskel,et al. The formal semantics of programming languages - an introduction , 1993, Foundation of computing series.
[12] Edward J. McCluskey,et al. Software-implemented EDAC protection against SEUs , 2000, IEEE Trans. Reliab..
[13] David Walker,et al. Static typing for a faulty lambda calculus , 2006, ICFP '06.
[14] Naresh R. Shanbhag,et al. Energy-efficient signal processing via algorithmic noise-tolerance , 1999, Proceedings. 1999 International Symposium on Low Power Electronics and Design (Cat. No.99TH8477).
[15] Cheng Wang,et al. Software-based transparent and comprehensive control-flow error detection , 2006, International Symposium on Code Generation and Optimization (CGO'06).
[16] David Walker,et al. Reasoning about Control Flow in the Presence of Transient Faults , 2008, SAS.
[17] Andrew W. Appel,et al. Using memory errors to attack a virtual machine , 2003, 2003 Symposium on Security and Privacy, 2003..
[18] M. Elsman. Fault-Tolerant Voting in a Simply-Typed Lambda Calculus , 2007 .
[19] Edward J. McCluskey,et al. Control-flow checking by software signatures , 2002, IEEE Trans. Reliab..
[20] David I. August,et al. Automatic Instruction-Level Software-Only Recovery , 2006, IEEE Micro.
[21] Ravishankar K. Iyer,et al. SymPLFIED: Symbolic program-level fault injection and error detection framework , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).