-
1
-
-
77956441951
-
Deductive verification of cryptographic software
-
Minho, Available from
-
Almeida JB, Barbosa M, Pinto JS, Vieira B (2009) Deductive verification of cryptographic software. Technical Report DI-CCTC-09-03, CCTC, Univ. Minho, Available from http://cctc. uminho. pt/publications?year=2009.
-
(2009)
Technical Report DI-CCTC-09-03, CCTC, Univ
-
-
Almeida, J.B.1
Barbosa, M.2
Pinto, J.S.3
Vieira, B.4
-
2
-
-
0036039066
-
-
Ball T, Rajamani SK (2002) The SLAM project: debugging system software via static analysis. In: POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on principles of programming languages. ACM, New York, pp 1-3.
-
-
-
-
3
-
-
17044429386
-
Stack-based access control and secure information flow
-
Banerjee A, Naumann DA (2005) Stack-based access control and secure information flow. J Funct Program 15(2): 131-177.
-
(2005)
J Funct Program
, vol.15
, Issue.2
, pp. 131-177
-
-
Banerjee, A.1
Naumann, D.A.2
-
4
-
-
77956451621
-
-
Barnett M, Rustan K, Leino M, Schulte W (2004) The Spec# programming system: an overview. In: Construction and analysis of safe, secure, and interoperable smart devices. Springer, Berlin, pp 49-69.
-
-
-
-
5
-
-
4944265699
-
-
Barthe G, D'Argenio PR, Rezk T (2004) Secure information flow by self-composition. In: CSFW. IEEE Computer Society, USA, pp 100-114.
-
-
-
-
6
-
-
77956426727
-
-
Baudin P, Filliâtre J-C, Marché C, Monate B, Moy Y, Prevosto V (2008) ACSL: ANSI/ISO C Specfication Language. CEA LIST and INRIA, Preliminary design (version 1. 4, December 12, 2008).
-
-
-
-
7
-
-
1442263162
-
Simple relational correctness proofs for static analyses and program transformations
-
N. D. Jones and X. Leroy (Eds.), New York: ACM
-
Benton N (2004) Simple relational correctness proofs for static analyses and program transformations. In: Jones ND, Leroy X (eds) POPL. ACM, New York, pp 14-25.
-
(2004)
Popl
, pp. 14-25
-
-
Benton, N.1
-
8
-
-
77956433673
-
-
Computer Aided Cryptography Engineering. EU FP7
-
Computer Aided Cryptography Engineering. EU FP7. http://www. cace-project. eu/.
-
-
-
-
9
-
-
35248831239
-
-
Chrzaszcz J (2003) Implementation of modules in the Coq system. In: Basin D, Wolff B (eds) Proceedings of the theorem proving in higher order logics 16th international conference. LNCS, vol 2758. Rome, Italy, September 2003. Springer, Berlin, pp 270-286.
-
-
-
-
10
-
-
51749086409
-
-
Clarkson MR, Schneider FB (2008) Hyperproperties. In: CSF. IEEE Computer Society, USA, pp 51-65.
-
-
-
-
12
-
-
0002896911
-
Soundness and completeness of an axiom system for program verification
-
Cook SA (1978) Soundness and completeness of an axiom system for program verification. SIAM J Comput 7(1): 70-90.
-
(1978)
SIAM J Comput
, vol.7
, Issue.1
, pp. 70-90
-
-
Cook, S.A.1
-
13
-
-
45749085681
-
-
de Moura L, Bjørner N (2008) Z3: an efficient SMT solver. Lecture Notes in Computer Science, vol 4963/2008. Springer, Berlin, pp 337-340.
-
-
-
-
14
-
-
0017517624
-
Certification of programs for secure information flow
-
Denning DE, Denning PJ (1977) Certification of programs for secure information flow. Commun ACM 20(7): 504-513.
-
(1977)
Commun ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
15
-
-
24944448541
-
Simplify: A theorem prover for program checking
-
Detlefs D, Nelson G, Saxe JB (2005) Simplify: a theorem prover for program checking. J ACM 52(3): 365-473.
-
(2005)
J ACM
, vol.52
, Issue.3
, pp. 365-473
-
-
Detlefs, D.1
Nelson, G.2
Saxe, J.B.3
-
16
-
-
26944484793
-
-
Dufay G, Felty A, Matwin S (2005) Privacy-sensitive information flow with JML. In: Automated deduction-CADE-20. Springer, Berlin, pp 116-130.
-
-
-
-
17
-
-
36049022245
-
-
Filliâtre J-C, Marché C (2007) The Why/Krakatoa/Caduceus platform for deductive program verification. In: Damm W, Hermanns H (eds) CAV. Lecture notes in computer science, vol 4590. Springer, Berlin, pp 173-177.
-
-
-
-
18
-
-
0036041563
-
-
Henzinger TA, Jhala R, Majumdar R, Sutre G (2002) Lazy abstraction. In: POPL '02: Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on principles of programming languages. ACM, New York, pp 58-70.
-
-
-
-
19
-
-
84945708698
-
An axiomatic basis for computer programming
-
Hoare CAR (1969) An axiomatic basis for computer programming. Commun ACM 12: 576-580.
-
(1969)
Commun ACM
, vol.12
, pp. 576-580
-
-
Hoare, C.A.R.1
-
20
-
-
0142245539
-
-
Jacobs BPF, Kiniry JR, Warnier ME, Jacobs B, Kiniry J, Warnier M (2003) Java program verification challenges. In: Proceedings of the formal methods for component objects, FMCO 2002. Lecture notes in computer science, vol 2852. Springer, Berlin, pp 202-219.
-
-
-
-
21
-
-
70350238531
-
Software model checking
-
Jhala R, Majumdar R (2009) Software model checking. ACM Comput Surv 41(4): 1-54.
-
(2009)
ACM Comput Surv
, vol.41
, Issue.4
, pp. 1-54
-
-
Jhala, R.1
Majumdar, R.2
-
22
-
-
84885236249
-
-
Leavens GT, Ruby C, Leino KRM, Poll E, Jacobs B (2000) JML (poster session): notations and tools supporting detailed design in Java. In OOPSLA '00: Addendum to the 2000 proceedings of the conference on Object-oriented programming, systems, languages, and applications (Addendum). ACM, New York, pp 105-106.
-
-
-
-
23
-
-
84957588448
-
A semantic approach to secure information flow
-
Leino KRM, Joshi R (1998) A semantic approach to secure information flow. Lect Notes Comput Sci 1422: 254-271.
-
(1998)
Lect Notes Comput Sci
, vol.1422
, pp. 254-271
-
-
Leino, K.R.M.1
Joshi, R.2
-
24
-
-
0022184087
-
-
Leivant D (1985) Logical and mathematical reasoning about imperative programs. In: POPL, pp 132-140.
-
-
-
-
25
-
-
0032646625
-
-
Myers AC (1999) Jflow: Practical mostly-static information flow control. In: POPL, pp 228-241.
-
-
-
-
26
-
-
33646177208
-
Enforcing robust declassification and qualified robustness
-
Myers AC, Sabelfeld A, Zdancewic S (2006) Enforcing robust declassification and qualified robustness. J Comput Secur 14(2): 157-196.
-
(2006)
J Comput Secur
, vol.14
, Issue.2
, pp. 157-196
-
-
Myers, A.C.1
Sabelfeld, A.2
Zdancewic, S.3
-
27
-
-
33750232981
-
-
Naumann DA (2006) From coupling relations to mated invariants for checking information flow. In: Computer Security-ESORICS 2006. LNCS, vol 4189, pp 279-296.
-
-
-
-
31
-
-
33646037706
-
-
Terauchi T, Aiken A (2005) Secure information flow as a safety problem. In: Hankin C, Siveroni I (eds) SAS. Lecture notes in computer science, vol 3672. Springer, Berlin, pp 352-367.
-
-
-
-
33
-
-
77956450130
-
-
The OpenSSL Project
-
The OpenSSL Project. http://www. openssl. org.
-
-
-
-
34
-
-
24644494868
-
-
Tse S, Zdancewic S (2005) A design for a security-typed language with certificate-based declassification. In: Sagiv S (ed) ESOP. Lecture notes in computer science, vol 3444. Springer, Berlin, pp 279-294.
-
-
-
-
35
-
-
34548790762
-
-
Vaughan JA, Zdancewic S (2007) A cryptographic decentralized label model. In: IEEE symposium on security and privacy. IEEE Computer Society, USA, pp 192-206.
-
-
-
-
36
-
-
84956989228
-
-
Volpano DM, Smith G (1997) A type-based approach to program security. In: Bidoit M, Dauchet M (eds) TAPSOFT. Lecture notes in computer science, vol 1214. Springer, Berlin, pp 607-621.
-
-
-
-
37
-
-
77956425925
-
-
Warnier M, Oostdijk M (2005) Non-interference in JML. Technical Report ICIS-R05034, Nijmegen Institute for Computing and Information Sciences.
-
-
-
|