메뉴 건너뛰기




Volumn , Issue , 2007, Pages 97-108

Types, bytes, and separation logic

Author keywords

C; Interactive theorem proving; Separation logic

Indexed keywords

ABSTRACTING; C (PROGRAMMING LANGUAGE); CODES (SYMBOLS); MATHEMATICAL MODELS; SECURITY OF DATA; THEOREM PROVING;

EID: 34548205807     PISSN: 07308566     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1190216.1190234     Document Type: Conference Paper
Times cited : (59)

References (35)
  • 1
    • 33749853720 scopus 로고    scopus 로고
    • Beyond reachability: Shape abstraction in the presence of pointer arithmetic. In 13th International Symposium on Static Analysis (SAS 2006), 4134 of Lecture Notes in Computer Science, pages 182-203. Springer, 2006.
    • Beyond reachability: Shape abstraction in the presence of pointer arithmetic. In 13th International Symposium on Static Analysis (SAS 2006), volume 4134 of Lecture Notes in Computer Science, pages 182-203. Springer, 2006.
  • 2
    • 84894630000 scopus 로고    scopus 로고
    • Automatically validating temporal safety properties of interfaces
    • SPIN'01, Workshop on Model Checking of Software, of
    • T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN'01, Workshop on Model Checking of Software, volume 2057 of Lecture Notes in Computer Science, pages 103-122, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2057 , pp. 103-122
    • Ball, T.1    Rajamani, S.K.2
  • 4
    • 0024772234 scopus 로고
    • Kit: A study in operating system verification
    • W. R. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15(11):1382-1396, 1989.
    • (1989) IEEE Transactions on Software Engineering , vol.15 , Issue.11 , pp. 1382-1396
    • Bevier, W.R.1
  • 5
    • 24644436530 scopus 로고    scopus 로고
    • Checking memory safety with Blast
    • Proceedings of the International Conference on Fundamental Approaches to Software Engineering FASE, of, Springer
    • D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. Checking memory safety with Blast. In Proceedings of the International Conference on Fundamental Approaches to Software Engineering (FASE), volume 3442 of Lecture Notes in Computer Science, pages 2-18. Springer, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3442 , pp. 2-18
    • Beyer, D.1    Henzinger, T.A.2    Jhala, R.3    Majumdar, R.4
  • 7
    • 0012523220 scopus 로고    scopus 로고
    • No-longer-foreign: Teaching an ML compiler to speak C "natively
    • M. Blume. No-longer-foreign: Teaching an ML compiler to speak C "natively". Electronic Notes in Theoretical Computer Science, 59(1), 2001.
    • (2001) Electronic Notes in Theoretical Computer Science , vol.59 , Issue.1
    • Blume, M.1
  • 8
    • 84976473150 scopus 로고    scopus 로고
    • Proving pointer programs in Hoare Logic
    • R. Backhouse and J. Oliveira, editors, Mathematics of Program Construction MPC 2000, of, Springer
    • R. Bornat. Proving pointer programs in Hoare Logic. In R. Backhouse and J. Oliveira, editors, Mathematics of Program Construction (MPC 2000), volume 1837 of LNCS, pages 102-126. Springer, 2000.
    • (2000) LNCS , vol.1837 , pp. 102-126
    • Bornat, R.1
  • 9
    • 0002738295 scopus 로고
    • Some techniques for proving correctness of programs which alter data structures
    • B. Meltzer and D. Michie, editors, Edinburgh University Press
    • R. Bur stall. Some techniques for proving correctness of programs which alter data structures. In B. Meltzer and D. Michie, editors, Machine Intelligence 7, pages 23-50. Edinburgh University Press, 1972.
    • (1972) Machine Intelligence 7 , pp. 23-50
    • Bur stall, R.1
  • 10
    • 26444588032 scopus 로고    scopus 로고
    • Cogent: Accurate theorem proving for program verification
    • K. Etessami and S. K. Rajamani, editors, Proceedings of CAV 2005, of, Springer Verlag
    • B. Cook, D. Kroening, and N. Sharygina. Cogent: Accurate theorem proving for program verification. In K. Etessami and S. K. Rajamani, editors, Proceedings of CAV 2005, volume 3576 of Lecture Notes in Computer Science, pages 296-300. Springer Verlag, 2005.
    • (2005) Lecture Notes in Computer Science , vol.3576 , pp. 296-300
    • Cook, B.1    Kroening, D.2    Sharygina, N.3
  • 11
    • 33745446386 scopus 로고    scopus 로고
    • Integration of a Software model checker into Isabelle
    • G. Sutcliffe and A. Voronkov, editors, Logic for Programming, Artificial Intelligence, and Reasoning: 12th International Conference, LPAR 2005, of, Montego Bay, Jamaica, October, Springer
    • M. Daum, S. Maus, N. Schirmer, and M. N. Seghir. Integration of a Software model checker into Isabelle. In G. Sutcliffe and A. Voronkov, editors, Logic for Programming, Artificial Intelligence, and Reasoning: 12th International Conference, LPAR 2005, volume 3835 of Lecture Notes in Artificial Intelligence, pages 381-395, Montego Bay, Jamaica, October 2005. Springer.
    • (2005) Lecture Notes in Artificial Intelligence , vol.3835 , pp. 381-395
    • Daum, M.1    Maus, S.2    Schirmer, N.3    Seghir, M.N.4
  • 12
    • 35048862900 scopus 로고    scopus 로고
    • Multi-prover verification of C programs
    • Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004, Seattle, USA, of, Springer
    • J.-C. Filliâtre and C. Marché. Multi-prover verification of C programs. In Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004, Seattle, USA, volume 3308 of LNCS, pages 15-29. Springer, 2004.
    • (2004) LNCS , vol.3308 , pp. 15-29
    • Filliâtre, J.-C.1    Marché, C.2
  • 15
    • 34548233199 scopus 로고    scopus 로고
    • Applying source-code verification to a microkernel, the VFiasco project. Technical Report TUD-FI02-03-März, TU Dresden
    • M. Hohmuth, H. Tews, and S. G. Stephens. Applying source-code verification to a microkernel - the VFiasco project. Technical Report TUD-FI02-03-März, TU Dresden, 2002.
    • (2002)
    • Hohmuth, M.1    Tews, H.2    Stephens, S.G.3
  • 17
    • 34548215102 scopus 로고    scopus 로고
    • L4 eXperimental
    • L4Ka Team, University of Karlsruhe, Oct
    • L4Ka Team. L4 eXperimental Kernel Reference Manual Version X.2. University of Karlsruhe, Oct. 2001. http://14ka.org/projects/version4/ 14-x2.pdf.
    • (2001) Kernel Reference Manual Version X.2
  • 19
    • 20144375380 scopus 로고    scopus 로고
    • Proving pointer programs in higher-order logic
    • To appear
    • F. Mehta and T. Nipkow. Proving pointer programs in higher-order logic. Information and Computation, 2005. To appear.
    • (2005) Information and Computation
    • Mehta, F.1    Nipkow, T.2
  • 22
    • 0347229432 scopus 로고    scopus 로고
    • A provably secure operating system: The system, its applications, and proofs
    • Technical Report CSL-116, SRI International, 1980
    • P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson. A provably secure operating system: The system, its applications, and proofs. Technical Report CSL-116, SRI International, 1980.
    • Neumann, P.G.1    Boyer, R.S.2    Feiertag, R.J.3    Levitt, K.N.4    Robinson, L.5
  • 23
    • 0348126394 scopus 로고    scopus 로고
    • Isabelle/HOL - A Proof Assistant for Higher-Order Logic
    • of, Springer
    • T. Nipkow, L. Paulson, and M. Wenzel. Isabelle/HOL - A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer, 2002.
    • (2002) LNCS , vol.2283
    • Nipkow, T.1    Paulson, L.2    Wenzel, M.3
  • 24
    • 0003613448 scopus 로고    scopus 로고
    • PhD thesis, Computer Laboratory, University of Cambridge
    • M. Norrish. C formalised in HOL. PhD thesis, Computer Laboratory, University of Cambridge, 1998.
    • (1998) C formalised in HOL
    • Norrish, M.1
  • 28
    • 33745447351 scopus 로고    scopus 로고
    • A unified memory model for pointers
    • G. Sutcliffe and A. Voronkov, editors, 12th International Conference on Logic for Programming Artificial Intelligence and Reasoning LPAR-12, of
    • H. Tuch and G. Klein. A unified memory model for pointers. In G. Sutcliffe and A. Voronkov, editors, 12th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR-12), volume 3835 of LNCS, pages 474-488, 2005.
    • (2005) LNCS , vol.3835 , pp. 474-488
    • Tuch, H.1    Klein, G.2
  • 29
    • 33846502084 scopus 로고    scopus 로고
    • Verification of the L4 kernel memory allocator
    • July
    • H. Tuch, G. Klein, and M. Norrish. Verification of the L4 kernel memory allocator. Formal proof document. http://www.cse.unsw.edu.au/~kleing/papers/ kmalloc.html, July 2006.
    • (2006) Formal proof document
    • Tuch, H.1    Klein, G.2    Norrish, M.3
  • 30
    • 0018983212 scopus 로고
    • Specification and verification of the UCLA Unix security kernel
    • B. Walker, R. Kemmerer, and G. Popek. Specification and verification of the UCLA Unix security kernel. CACM, 23(2):118-131, 1980.
    • (1980) CACM , vol.23 , Issue.2 , pp. 118-131
    • Walker, B.1    Kemmerer, R.2    Popek, G.3
  • 31
    • 26844582848 scopus 로고    scopus 로고
    • Towards mechanized program verification with separation logic
    • J. Marcinkowski and A. Tarlecki, editors, Computer Science Logic, 18th International Workshop, CSL 2004, of, Springer
    • T. Weber. Towards mechanized program verification with separation logic. In J. Marcinkowski and A. Tarlecki, editors, Computer Science Logic - 18th International Workshop, CSL 2004, volume 3210 of Lecture Notes in Computer Science, pages 250-264. Springer, 2004.
    • (2004) Lecture Notes in Computer Science , vol.3210 , pp. 250-264
    • Weber, T.1
  • 32
    • 84949648890 scopus 로고    scopus 로고
    • M. Wenzel. Type classes and overloading in. higher-order logic. In E. L. Gunter and A. Felty, editors, Theorem Proving in Higher Order Logics'97, 1275 of LNCS, pages 307-322. Springer, 1997.
    • M. Wenzel. Type classes and overloading in. higher-order logic. In E. L. Gunter and A. Felty, editors, Theorem Proving in Higher Order Logics'97, volume 1275 of LNCS, pages 307-322. Springer, 1997.
  • 33
    • 35048877560 scopus 로고    scopus 로고
    • Certifying machine code safety: Shallow versus deep embedding
    • K. Slind, A. Bunker, and G. Gopalakrishnan, editors, Theorem. Proving in Higher Order Logics 2004, of, Springer
    • M. Wildmoser and T. Nipkow. Certifying machine code safety: Shallow versus deep embedding. In. K. Slind, A. Bunker, and G. Gopalakrishnan, editors, Theorem. Proving in Higher Order Logics 2004, volume 3223 of LNCS, pages 305-320. Springer, 2004.
    • (2004) LNCS , vol.3223 , pp. 305-320
    • Wildmoser, M.1    Nipkow, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.