-
1
-
-
4644269527
-
Verification of object-oriented programs with invariants
-
M. Barnett, R. DeLine, M. Fahndrich, K. R. M. Leino, and W. Schulte. Verification of object-oriented programs with invariants. JOT, 3, 2004.
-
(2004)
JOT
, vol.3
-
-
Barnett, M.1
DeLine, R.2
Fahndrich, K.M.3
Leino, R.M.4
Schulte, W.5
-
2
-
-
78650756907
-
Typechecking higher-order security libraries
-
K. Bhargavan, C. Fournet, and N. Guts. Typechecking higher-order security libraries. In APLAS, pages 47-62, 2010.
-
(2010)
APLAS
, pp. 47-62
-
-
Bhargavan, K.1
Fournet, C.2
Guts, N.3
-
4
-
-
77951292079
-
Roles, stacks, histories: A triple for hoare
-
Microsoft Research
-
J. Borgström, A. Gordon, and R. Pucella. Roles, stacks, histories: A triple for Hoare. Technical Report TR-2009-97, Microsoft Research, 2009.
-
(2009)
Technical Report TR-2009-97
-
-
Borgström, J.1
Gordon, A.2
Pucella, R.3
-
5
-
-
79952125780
-
Verifying stateful programs with substructural state and hoare types
-
Jan.
-
J. Borgstrom, J. Chen, and N. Swamy. Verifying stateful programs with substructural state and hoare types. In PLPV, Jan. 2011.
-
(2011)
PLPV
-
-
Borgstrom, J.1
Chen, J.2
Swamy, N.3
-
8
-
-
80054081712
-
Characteristic formulae for the verification of imperative programs
-
A. Charguéraud. Characteristic formulae for the verification of imperative programs. In ICFP, 2011.
-
(2011)
ICFP
-
-
Charguéraud, A.1
-
9
-
-
77954735651
-
Type-preserving compilation of end-to-end verification of security enforcement
-
J. Chen, R. Chugh, and N. Swamy. Type-preserving compilation of end-to-end verification of security enforcement. In PLDI, 2010.
-
(2010)
PLDI
-
-
Chen, J.1
Chugh, R.2
Swamy, N.3
-
11
-
-
84857856318
-
Nested refinements: A logic for duck typing
-
R. Chugh, P. M. Rondon, and R. Jhala. Nested refinements: a logic for duck typing. In POPL, 2012b.
-
(2012)
POPL
-
-
Chugh, R.1
Rondon, P.M.2
Jhala, R.3
-
13
-
-
47249164288
-
Z3: An efficient SMT solver
-
L. de Moura and N. Bjørner. Z3: An efficient SMT solver. In TACAS, 2008.
-
(2008)
TACAS
-
-
De Moura, L.1
Bjørner, N.2
-
14
-
-
0016543936
-
Guarded commands, nondeterminacy and formal derivation of programs
-
August
-
E. W. Dijkstra. Guarded commands, nondeterminacy and formal derivation of programs. Commun. ACM, 18:453-457, August 1975.
-
(1975)
Commun. ACM
, vol.18
, pp. 453-457
-
-
Dijkstra, E.W.1
-
15
-
-
36049022245
-
The why/krakatoa/caduceus platform for deductive program verification
-
J.-C. Filliâtre and C. Marché. The why/krakatoa/caduceus platform for deductive program verification. In CAV, pages 173-177, 2007.
-
(2007)
CAV
, pp. 173-177
-
-
Filliâtre, J.-C.1
Marché, C.2
-
16
-
-
84874150343
-
Fully abstract compilation to JavaScript
-
C. Fournet, N. Swamy, J. Chen, P. Evariste-Dagand, P.-Y. Strub, and B. Livshits. Fully abstract compilation to JavaScript. In POPL, 2013.
-
(2013)
POPL
-
-
Fournet, C.1
Swamy, N.2
Chen, J.3
Evariste-Dagand, P.4
Strub, P.-Y.5
Livshits, B.6
-
19
-
-
84890883068
-
Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code
-
S. Guarnieri and B. Livshits. Gatekeeper: Mostly static enforcement of security and reliability policies for JavaScript code. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Guarnieri, S.1
Livshits, B.2
-
22
-
-
0028448324
-
Dynamic typing: Syntax and proof theory
-
F. Henglein. Dynamic typing: syntax and proof theory. Science of Computer Programming, 22:197-230, 1994.
-
(1994)
Science of Computer Programming
, vol.22
, pp. 197-230
-
-
Henglein, F.1
-
23
-
-
0029193888
-
Safe polymorphic type inference for scheme: Translating scheme to ML
-
F. Henglein and J. Rehof. Safe polymorphic type inference for Scheme: Translating Scheme to ML. In FPCA, pages 192-203, 1995.
-
(1995)
FPCA
, pp. 192-203
-
-
Henglein, F.1
Rehof, J.2
-
24
-
-
70350302847
-
Type analysis for JavaScript
-
S. H. Jensen, A. Møller, and P. Thiemann. Type analysis for JavaScript. In SAS, pages 238-255, 2009.
-
(2009)
SAS
, pp. 238-255
-
-
Jensen, S.H.1
Møller, A.2
Thiemann, P.3
-
25
-
-
79959909082
-
Predicate abstraction and CEGAR for higher-order model checking
-
N. Kobayashi, R. Sato, and H. Unno. Predicate abstraction and CEGAR for higher-order model checking. In PLDI, pages 222-233, 2011.
-
(2011)
PLDI
, pp. 222-233
-
-
Kobayashi, N.1
Sato, R.2
Unno, H.3
-
26
-
-
78650813780
-
Dafny: An automatic program verifier for functional correctness
-
K. R. M. Leino. Dafny: An automatic program verifier for functional correctness. In LPAR (Dakar), pages 348-370, 2010.
-
(2010)
LPAR (Dakar)
, pp. 348-370
-
-
Leino, K.R.M.1
-
27
-
-
79960849634
-
A polymorphic intermediate verification language: Design and logical encoding
-
K. R. M. Leino and P. Rümmer. A polymorphic intermediate verification language: Design and logical encoding. In TACAS, 2010.
-
(2010)
TACAS
-
-
Leino, K.R.M.1
Rümmer, P.2
-
28
-
-
0002891241
-
Towards a mathematical science of computation
-
J. McCarthy. Towards a mathematical science of computation. In IFIP Congress, pages 21-28, 1962.
-
(1962)
IFIP Congress
, pp. 21-28
-
-
McCarthy, J.1
-
29
-
-
34548105576
-
Abstract predicates and mutable adts in hoare type theory
-
A. Nanevski, A. Ahmed, G. Morrisett, and L. Birkedal. Abstract predicates and mutable adts in hoare type theory. In ESOP, pages 189-204, 2007.
-
(2007)
ESOP
, pp. 189-204
-
-
Nanevski, A.1
Ahmed, A.2
Morrisett, G.3
Birkedal, L.4
-
30
-
-
59249093515
-
Ynot: Dependent types for imperative programs
-
A. Nanevski, G. Morrisett, A. Shinnar, P. Govereau, and L. Birkedal. Ynot: dependent types for imperative programs. In ICFP, 2008a.
-
(2008)
ICFP
-
-
Nanevski, A.1
Morrisett, G.2
Shinnar, A.3
Govereau, P.4
Birkedal, L.5
-
31
-
-
55249085443
-
Hoare type theory, polymorphism and separation
-
A. Nanevski, J. G. Morrisett, and L. Birkedal. Hoare type theory, polymorphism and separation. J. Funct. Program., 18(5-6):865-911, 2008b.
-
(2008)
J. Funct. Program.
, vol.18
, Issue.5-6
, pp. 865-911
-
-
Nanevski, A.1
Morrisett, J.G.2
Birkedal, L.3
-
33
-
-
29144472425
-
Separation logic and abstraction
-
M. Parkinson and G. Bierman. Separation logic and abstraction. In POPL, 2005.
-
(2005)
POPL
-
-
Parkinson, M.1
Bierman, G.2
-
35
-
-
80054054746
-
Secure distributed programming with value-dependent types
-
N. Swamy, J. Chen, C. Fournet, P.-Y. Strub, K. Bhargavan, and J. Yang. Secure distributed programming with value-dependent types. In ICFP, 2011a.
-
(2011)
ICFP
-
-
Swamy, N.1
Chen, J.2
Fournet, C.3
Strub, P.-Y.4
Bhargavan, K.5
Yang, J.6
|