Lazy Self-composition for Security Verification
暂无分享,去创建一个
Sharad Malik | Pramod Subramanyan | Aarti Gupta | Yakir Vizel | Weikun Yang | S. Malik | Aarti Gupta | W. Yang | Pramod Subramanyan | Y. Vizel
[1] Nikolaj Bjørner,et al. Z3: An Efficient SMT Solver , 2008, TACAS.
[2] Carlos V. Rozas,et al. Innovative instructions and software model for isolated execution , 2013, HASP '13.
[3] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[4] Kenneth L. McMillan,et al. Interpolation and SAT-Based Model Checking , 2003, CAV.
[5] Andrew C. Myers,et al. JFlow: practical mostly-static information flow control , 1999, POPL '99.
[6] John M. Rushby,et al. Proof of separability: A verification technique for a class of a security kernels , 1982, Symposium on Programming.
[7] Arie Gurfinkel,et al. Interpolating Property Directed Reachability , 2014, CAV.
[8] Stephen McCamant,et al. DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation , 2011, NDSS.
[9] David Brumley,et al. All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.
[10] Nimrod Partush,et al. Refining interprocedural change-impact analysis using equivalence relations , 2017, ISSTA.
[11] Jorge A. Navas,et al. The SeaHorn Verification Framework , 2015, CAV.
[12] Michael R. Clarkson,et al. Civitas: Toward a Secure Voting System , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[13] Gilles Barthe,et al. Relational Verification Using Product Programs , 2011, FM.
[14] Alexander Aiken,et al. Secure Information Flow as a Safety Problem , 2005, SAS.
[15] Grigory Fedyukovich,et al. Synchronizing Constrained Horn Clauses , 2017, LPAR.
[16] Michael Hicks,et al. Decomposition instead of self-composition for proving the absence of timing channels , 2017, PLDI.
[17] Roksana Boreli,et al. On the effectiveness of dynamic taint analysis for protecting against private information leaks on Android-based devices , 2013, 2013 International Conference on Security and Cryptography (SECRYPT).
[18] Armin Biere,et al. Symbolic Model Checking without BDDs , 1999, TACAS.
[19] Isil Dillig,et al. Precise Detection of Side-Channel Vulnerabilities using Quantitative Cartesian Hoare Logic , 2017, CCS.
[20] Alberto Pettorossi,et al. Relational Verification Through Horn Clause Transformation , 2016, SAS.
[21] Marco Patrignani,et al. Secure Compilation to Protected Module Architectures , 2015, TOPL.
[22] Michael R. Clarkson,et al. Hyperproperties , 2008, 2008 21st IEEE Computer Security Foundations Symposium.
[23] Vikram S. Adve,et al. LLVM: a compilation framework for lifelong program analysis & transformation , 2004, International Symposium on Code Generation and Optimization, 2004. CGO 2004..
[24] Pedro R. D'Argenio,et al. Secure information flow by self-composition , 2004, Proceedings. 17th IEEE Computer Security Foundations Workshop, 2004..
[25] Edmund M. Clarke,et al. Counterexample-guided abstraction refinement , 2003, 10th International Symposium on Temporal Representation and Reasoning, 2003 and Fourth International Conference on Temporal Logic. Proceedings..
[26] Isil Dillig,et al. Cartesian hoare logic for verifying k-safety properties , 2016, PLDI.
[27] Peter J. Denning,et al. Certification of programs for secure information flow , 1977, CACM.
[28] Geoffrey Smith,et al. A Sound Type System for Secure Flow Analysis , 1996, J. Comput. Secur..
[29] Aaron R. Bradley,et al. SAT-Based Model Checking without Unrolling , 2011, VMCAI.
[30] J. Meseguer,et al. Security Policies and Security Models , 1982, 1982 IEEE Symposium on Security and Privacy.
[31] Thomas A. Henzinger,et al. Lazy abstraction , 2002, POPL '02.
[32] Andrew C. Myers,et al. Language-based information-flow security , 2003, IEEE J. Sel. Areas Commun..
[33] David Sands,et al. Declassification: Dimensions and principles , 2009, J. Comput. Secur..
[34] Gilles Barthe,et al. Verifying Constant-Time Implementations , 2016, USENIX Security Symposium.
[35] Frederic T. Chong,et al. Minos: Control Data Attack Prevention Orthogonal to Memory Model , 2004, 37th International Symposium on Microarchitecture (MICRO-37'04).
[36] Miguel Castro,et al. Vigilante: end-to-end containment of internet worms , 2005, SOSP '05.
[37] Zhenkai Liang,et al. BitBlaze: A New Approach to Computer Security via Binary Analysis , 2008, ICISS.