-
1
-
-
33749853720
-
-
Beyond reachability: Shape abstraction in the presence of pointer arithmetic. In 13th International Symposium on Static Analysis (SAS 2006), 4134 of Lecture Notes in Computer Science, pages 182-203. Springer, 2006.
-
Beyond reachability: Shape abstraction in the presence of pointer arithmetic. In 13th International Symposium on Static Analysis (SAS 2006), volume 4134 of Lecture Notes in Computer Science, pages 182-203. Springer, 2006.
-
-
-
-
2
-
-
84894630000
-
Automatically validating temporal safety properties of interfaces
-
SPIN'01, Workshop on Model Checking of Software, of
-
T. Ball and S. K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN'01, Workshop on Model Checking of Software, volume 2057 of Lecture Notes in Computer Science, pages 103-122, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2057
, pp. 103-122
-
-
Ball, T.1
Rajamani, S.K.2
-
3
-
-
26944492838
-
A decidable fragment of separation logic
-
J. Berdine, C. Calcagno, and P. O'Hearn. A decidable fragment of separation logic. In FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science, 24th International Conference, Chennai, India, December 16-18, 2004, 2004.
-
(2004)
FSTTCS 2004: Foundations of Software Technology and Theoretical Computer Science, 24th International Conference, Chennai, India, December 16-18, 2004
-
-
Berdine, J.1
Calcagno, C.2
O'Hearn, P.3
-
4
-
-
0024772234
-
Kit: A study in operating system verification
-
W. R. Bevier. Kit: A study in operating system verification. IEEE Transactions on Software Engineering, 15(11):1382-1396, 1989.
-
(1989)
IEEE Transactions on Software Engineering
, vol.15
, Issue.11
, pp. 1382-1396
-
-
Bevier, W.R.1
-
5
-
-
24644436530
-
Checking memory safety with Blast
-
Proceedings of the International Conference on Fundamental Approaches to Software Engineering FASE, of, Springer
-
D. Beyer, T. A. Henzinger, R. Jhala, and R. Majumdar. Checking memory safety with Blast. In Proceedings of the International Conference on Fundamental Approaches to Software Engineering (FASE), volume 3442 of Lecture Notes in Computer Science, pages 2-18. Springer, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3442
, pp. 2-18
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
7
-
-
0012523220
-
No-longer-foreign: Teaching an ML compiler to speak C "natively
-
M. Blume. No-longer-foreign: Teaching an ML compiler to speak C "natively". Electronic Notes in Theoretical Computer Science, 59(1), 2001.
-
(2001)
Electronic Notes in Theoretical Computer Science
, vol.59
, Issue.1
-
-
Blume, M.1
-
8
-
-
84976473150
-
Proving pointer programs in Hoare Logic
-
R. Backhouse and J. Oliveira, editors, Mathematics of Program Construction MPC 2000, of, Springer
-
R. Bornat. Proving pointer programs in Hoare Logic. In R. Backhouse and J. Oliveira, editors, Mathematics of Program Construction (MPC 2000), volume 1837 of LNCS, pages 102-126. Springer, 2000.
-
(2000)
LNCS
, vol.1837
, pp. 102-126
-
-
Bornat, R.1
-
9
-
-
0002738295
-
Some techniques for proving correctness of programs which alter data structures
-
B. Meltzer and D. Michie, editors, Edinburgh University Press
-
R. Bur stall. Some techniques for proving correctness of programs which alter data structures. In B. Meltzer and D. Michie, editors, Machine Intelligence 7, pages 23-50. Edinburgh University Press, 1972.
-
(1972)
Machine Intelligence 7
, pp. 23-50
-
-
Bur stall, R.1
-
10
-
-
26444588032
-
Cogent: Accurate theorem proving for program verification
-
K. Etessami and S. K. Rajamani, editors, Proceedings of CAV 2005, of, Springer Verlag
-
B. Cook, D. Kroening, and N. Sharygina. Cogent: Accurate theorem proving for program verification. In K. Etessami and S. K. Rajamani, editors, Proceedings of CAV 2005, volume 3576 of Lecture Notes in Computer Science, pages 296-300. Springer Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3576
, pp. 296-300
-
-
Cook, B.1
Kroening, D.2
Sharygina, N.3
-
11
-
-
33745446386
-
Integration of a Software model checker into Isabelle
-
G. Sutcliffe and A. Voronkov, editors, Logic for Programming, Artificial Intelligence, and Reasoning: 12th International Conference, LPAR 2005, of, Montego Bay, Jamaica, October, Springer
-
M. Daum, S. Maus, N. Schirmer, and M. N. Seghir. Integration of a Software model checker into Isabelle. In G. Sutcliffe and A. Voronkov, editors, Logic for Programming, Artificial Intelligence, and Reasoning: 12th International Conference, LPAR 2005, volume 3835 of Lecture Notes in Artificial Intelligence, pages 381-395, Montego Bay, Jamaica, October 2005. Springer.
-
(2005)
Lecture Notes in Artificial Intelligence
, vol.3835
, pp. 381-395
-
-
Daum, M.1
Maus, S.2
Schirmer, N.3
Seghir, M.N.4
-
12
-
-
35048862900
-
Multi-prover verification of C programs
-
Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004, Seattle, USA, of, Springer
-
J.-C. Filliâtre and C. Marché. Multi-prover verification of C programs. In Formal Methods and Software Engineering, 6th International Conference on Formal Engineering Methods, ICFEM 2004, Seattle, USA, volume 3308 of LNCS, pages 15-29. Springer, 2004.
-
(2004)
LNCS
, vol.3308
, pp. 15-29
-
-
Filliâtre, J.-C.1
Marché, C.2
-
13
-
-
26844453360
-
On the correctness of operating system kernels
-
Oxford, UK
-
M. Gargano, M. Hillebrand, D. Leinenbach, and W. Paul. On the correctness of operating system kernels. In Proc. 18th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'05), pages 1-16, Oxford, UK, 2005.
-
(2005)
Proc. 18th International Conference on Theorem Proving in Higher Order Logics (TPHOLs'05)
, pp. 1-16
-
-
Gargano, M.1
Hillebrand, M.2
Leinenbach, D.3
Paul, W.4
-
14
-
-
33846506004
-
Software verification with Blast
-
T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Software verification with Blast. In SPIN'03, Workshop on Model Checking Software, 2003.
-
(2003)
SPIN'03, Workshop on Model Checking Software
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
15
-
-
34548233199
-
-
Applying source-code verification to a microkernel, the VFiasco project. Technical Report TUD-FI02-03-März, TU Dresden
-
M. Hohmuth, H. Tews, and S. G. Stephens. Applying source-code verification to a microkernel - the VFiasco project. Technical Report TUD-FI02-03-März, TU Dresden, 2002.
-
(2002)
-
-
Hohmuth, M.1
Tews, H.2
Stephens, S.G.3
-
16
-
-
17644404794
-
BI as an assertion language for mutable data structures
-
New York, NY, USA, ACM Press
-
S. S. Ishtiaq and P. W. O'Hearn. BI as an assertion language for mutable data structures. In POPZ '01: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 14-26, New York, NY, USA, 2001. ACM Press.
-
(2001)
POPZ '01: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
, pp. 14-26
-
-
Ishtiaq, S.S.1
O'Hearn, P.W.2
-
17
-
-
34548215102
-
L4 eXperimental
-
L4Ka Team, University of Karlsruhe, Oct
-
L4Ka Team. L4 eXperimental Kernel Reference Manual Version X.2. University of Karlsruhe, Oct. 2001. http://14ka.org/projects/version4/ 14-x2.pdf.
-
(2001)
Kernel Reference Manual Version X.2
-
-
-
18
-
-
33846467122
-
Verification of the heap manager of an operating system using separation logic
-
Jan
-
N. Marti, R. Affeldt, and A. Yonezawa. Verification of the heap manager of an operating system using separation logic. In Third workshop on Semantics, Program Analysis, and Computing Environments For Memory Management (SPACE 2006), pages 61-72, Jan. 2006.
-
(2006)
Third workshop on Semantics, Program Analysis, and Computing Environments For Memory Management (SPACE 2006)
, pp. 61-72
-
-
Marti, N.1
Affeldt, R.2
Yonezawa, A.3
-
19
-
-
20144375380
-
Proving pointer programs in higher-order logic
-
To appear
-
F. Mehta and T. Nipkow. Proving pointer programs in higher-order logic. Information and Computation, 2005. To appear.
-
(2005)
Information and Computation
-
-
Mehta, F.1
Nipkow, T.2
-
21
-
-
33646032658
-
CCured: Type-safe retrofitting of legacy software
-
G. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer. CCured: type-safe retrofitting of legacy software. ACM Trans. Prog. Lang. Syst., 27(3):477-526, 2005.
-
(2005)
ACM Trans. Prog. Lang. Syst
, vol.27
, Issue.3
, pp. 477-526
-
-
Necula, G.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
22
-
-
0347229432
-
A provably secure operating system: The system, its applications, and proofs
-
Technical Report CSL-116, SRI International, 1980
-
P. G. Neumann, R. S. Boyer, R. J. Feiertag, K. N. Levitt, and L. Robinson. A provably secure operating system: The system, its applications, and proofs. Technical Report CSL-116, SRI International, 1980.
-
-
-
Neumann, P.G.1
Boyer, R.S.2
Feiertag, R.J.3
Levitt, K.N.4
Robinson, L.5
-
23
-
-
0348126394
-
Isabelle/HOL - A Proof Assistant for Higher-Order Logic
-
of, Springer
-
T. Nipkow, L. Paulson, and M. Wenzel. Isabelle/HOL - A Proof Assistant for Higher-Order Logic, volume 2283 of LNCS. Springer, 2002.
-
(2002)
LNCS
, vol.2283
-
-
Nipkow, T.1
Paulson, L.2
Wenzel, M.3
-
24
-
-
0003613448
-
-
PhD thesis, Computer Laboratory, University of Cambridge
-
M. Norrish. C formalised in HOL. PhD thesis, Computer Laboratory, University of Cambridge, 1998.
-
(1998)
C formalised in HOL
-
-
Norrish, M.1
-
28
-
-
33745447351
-
A unified memory model for pointers
-
G. Sutcliffe and A. Voronkov, editors, 12th International Conference on Logic for Programming Artificial Intelligence and Reasoning LPAR-12, of
-
H. Tuch and G. Klein. A unified memory model for pointers. In G. Sutcliffe and A. Voronkov, editors, 12th International Conference on Logic for Programming Artificial Intelligence and Reasoning (LPAR-12), volume 3835 of LNCS, pages 474-488, 2005.
-
(2005)
LNCS
, vol.3835
, pp. 474-488
-
-
Tuch, H.1
Klein, G.2
-
29
-
-
33846502084
-
Verification of the L4 kernel memory allocator
-
July
-
H. Tuch, G. Klein, and M. Norrish. Verification of the L4 kernel memory allocator. Formal proof document. http://www.cse.unsw.edu.au/~kleing/papers/ kmalloc.html, July 2006.
-
(2006)
Formal proof document
-
-
Tuch, H.1
Klein, G.2
Norrish, M.3
-
30
-
-
0018983212
-
Specification and verification of the UCLA Unix security kernel
-
B. Walker, R. Kemmerer, and G. Popek. Specification and verification of the UCLA Unix security kernel. CACM, 23(2):118-131, 1980.
-
(1980)
CACM
, vol.23
, Issue.2
, pp. 118-131
-
-
Walker, B.1
Kemmerer, R.2
Popek, G.3
-
31
-
-
26844582848
-
Towards mechanized program verification with separation logic
-
J. Marcinkowski and A. Tarlecki, editors, Computer Science Logic, 18th International Workshop, CSL 2004, of, Springer
-
T. Weber. Towards mechanized program verification with separation logic. In J. Marcinkowski and A. Tarlecki, editors, Computer Science Logic - 18th International Workshop, CSL 2004, volume 3210 of Lecture Notes in Computer Science, pages 250-264. Springer, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3210
, pp. 250-264
-
-
Weber, T.1
-
32
-
-
84949648890
-
-
M. Wenzel. Type classes and overloading in. higher-order logic. In E. L. Gunter and A. Felty, editors, Theorem Proving in Higher Order Logics'97, 1275 of LNCS, pages 307-322. Springer, 1997.
-
M. Wenzel. Type classes and overloading in. higher-order logic. In E. L. Gunter and A. Felty, editors, Theorem Proving in Higher Order Logics'97, volume 1275 of LNCS, pages 307-322. Springer, 1997.
-
-
-
-
33
-
-
35048877560
-
Certifying machine code safety: Shallow versus deep embedding
-
K. Slind, A. Bunker, and G. Gopalakrishnan, editors, Theorem. Proving in Higher Order Logics 2004, of, Springer
-
M. Wildmoser and T. Nipkow. Certifying machine code safety: Shallow versus deep embedding. In. K. Slind, A. Bunker, and G. Gopalakrishnan, editors, Theorem. Proving in Higher Order Logics 2004, volume 3223 of LNCS, pages 305-320. Springer, 2004.
-
(2004)
LNCS
, vol.3223
, pp. 305-320
-
-
Wildmoser, M.1
Nipkow, T.2
|