Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Xu Q, Sanan D, Hou Z, Luan X, Watt C and Liu Y. (2025). Generically Automating Separation Logic by Functors, Homomorphisms, and Modules. Proceedings of the ACM on Programming Languages. 9:POPL. (1992-2024). Online publication date: 7-Jan-2025.

    https://doi.org/10.1145/3704903

  • Lawall J, Nishimura K and Lozi J. (2025). Should We Balance? Towards Formal Verification of the Linux Kernel Scheduler. Static Analysis. 10.1007/978-3-031-74776-2_8. (194-215).

    https://link.springer.com/10.1007/978-3-031-74776-2_8

  • Nagasamudram R, Beringer L, Birman K, Milano M and Naumann D. (2024). Verifying a C Implementation of Derecho’s Coordination Mechanism Using VST and Coq. NASA Formal Methods. 10.1007/978-3-031-60698-4_6. (99-117).

    https://link.springer.com/10.1007/978-3-031-60698-4_6

  • Blanchard A, Marché C and Prevosto V. (2024). Formally Expressing What a Program Should Do: The ACSL Language. Guide to Software Verification with Frama-C. 10.1007/978-3-031-55608-1_1. (3-80).

    https://link.springer.com/10.1007/978-3-031-55608-1_1

  • Nicolae A, Irofti P and Leuştean I. (2024). OpenBSD Formal Driver Verification with SeL4. Innovative Security Solutions for Information Technology and Communications. 10.1007/978-3-031-52947-4_11. (144-156).

    https://link.springer.com/10.1007/978-3-031-52947-4_11

  • Crisafulli P, Taha S and Wolff B. (2023). Modeling and analysing Cyber–Physical Systems in HOL-CSP. Robotics and Autonomous Systems. 170:C. Online publication date: 1-Dec-2023.

    https://doi.org/10.1016/j.robot.2023.104549

  • Yuan S, Lion B, Besson F and Talpin J. Making an eBPF Virtual Machine Faster on Microcontrollers: Verified Optimization and Proof Simplification. Dependable Software Engineering. Theories, Tools, and Applications. (385-401).

    https://doi.org/10.1007/978-981-99-8664-4_22

  • Pohjola J, Syeda H, Tanaka M, Winter K, Sau T, Nott B, Ung T, McLaughlin C, Seassau R, Myreen M, Norrish M and Heiser G. Pancake. Proceedings of the 12th Workshop on Programming Languages and Operating Systems. (1-9).

    https://doi.org/10.1145/3623759.3624544

  • Chen Z, Lafont A, O'Connor L, Keller G, McLaughlin C, Jackson V and Rizkallah C. (2023). Dargent: A Silver Bullet for Verified Data Layout Refinement. Proceedings of the ACM on Programming Languages. 7:POPL. (1369-1395). Online publication date: 9-Jan-2023.

    https://doi.org/10.1145/3571240

  • Cheung L, O'Connor L and Rizkallah C. Overcoming restraint: composing verification of foreign functions with cogent. Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs. (13-26).

    https://doi.org/10.1145/3497775.3503686

  • Lepigre R, Sammler M, Memarian K, Krebbers R, Dreyer D and Sewell P. (2022). VIP: verifying real-world C idioms with integer-pointer casts. Proceedings of the ACM on Programming Languages. 6:POPL. (1-32). Online publication date: 16-Jan-2022.

    https://doi.org/10.1145/3498681

  • Boender J and Badevic G. (2022). Formal Verification of a Keystore. Theoretical Aspects of Software Engineering. 10.1007/978-3-031-10363-6_4. (49-64).

    https://link.springer.com/10.1007/978-3-031-10363-6_4

  • Garchery Q. (2021). A Framework for Proof-carrying Logical Transformations. Electronic Proceedings in Theoretical Computer Science. 10.4204/EPTCS.336.2. 336. (5-23).

    http://arxiv.org/abs/2107.02352v1

  • Sammler M, Lepigre R, Krebbers R, Memarian K, Dreyer D and Garg D. RefinedC: automating the foundational verification of C code with refined ownership types. Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation. (158-174).

    https://doi.org/10.1145/3453483.3454036

  • Hardin D and Slind K. (2021). Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations 2021 IEEE Security and Privacy Workshops (SPW). 10.1109/SPW53761.2021.00024. 978-1-6654-3732-5. (111-120).

    https://ieeexplore.ieee.org/document/9474316/

  • Hardin D. (2020). Verified Hardware/Software Co-Assurance: Enhancing Safety and Security for Critical Systems 2020 IEEE International Systems Conference (SysCon). 10.1109/SysCon47679.2020.9381831. 978-1-7281-5365-0. (1-6).

    https://ieeexplore.ieee.org/document/9381831/

  • Foster S and Baxter J. (2020). Automated Algebraic Reasoning for Collections and Local Variables with Lenses. Relational and Algebraic Methods in Computer Science. 10.1007/978-3-030-43520-2_7. (100-116).

    http://link.springer.com/10.1007/978-3-030-43520-2_7

  • Tuong F and Wolff B. (2019). Deeply Integrating C11 Code Support into Isabelle/PIDE. Electronic Proceedings in Theoretical Computer Science. 10.4204/EPTCS.310.3. 310. (13-28).

    http://eptcs.web.cse.unsw.edu.au/paper.cgi?FIDE2019.3

  • Sjöberg V, Sang Y, Weng S and Shao Z. (2019). DeepSEA: a language for certified system software. Proceedings of the ACM on Programming Languages. 3:OOPSLA. (1-27). Online publication date: 10-Oct-2019.

    https://doi.org/10.1145/3360562

  • O'Connor L. Deferring the details and deriving programs. Proceedings of the 4th ACM SIGPLAN International Workshop on Type-Driven Development. (27-39).

    https://doi.org/10.1145/3331554.3342605

  • Besson F, Blazy S and Wilke P. (2019). A Verified CompCert Front-End for a Memory Model Supporting Pointer Arithmetic and Uninitialised Data. Journal of Automated Reasoning. 62:4. (433-480). Online publication date: 1-Apr-2019.

    https://doi.org/10.1007/s10817-017-9439-z

  • Hardin D and Slind K. (2018). Using ACL2 in the Design of Efficient, Verifiable Data Structures for High-Assurance Systems. Electronic Proceedings in Theoretical Computer Science. 10.4204/EPTCS.280.5. 280. (61-76).

    http://arxiv.org/abs/1810.04312v1

  • Klein G, Andronick J, Keller G, Matichuk D, Murray T and O'Connor L. (2017). Provably trustworthy systems. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 10.1098/rsta.2015.0404. 375:2104. (20150404). Online publication date: 13-Oct-2017.

    http://rsta.royalsocietypublishing.org/lookup/doi/10.1098/rsta.2015.0404

  • Guéneau A, Myreen M, Kumar R and Norrish M. Verified Characteristic Formulae for CakeML. Programming Languages and Systems. (584-610).

    https://doi.org/10.1007/978-3-662-54434-1_22

  • O'Connor L, Chen Z, Rizkallah C, Amani S, Lim J, Murray T, Nagashima Y, Sewell T and Klein G. (2016). Refinement through restraint: bringing down the cost of verification. ACM SIGPLAN Notices. 51:9. (89-102). Online publication date: 5-Dec-2016.

    https://doi.org/10.1145/3022670.2951940

  • O'Connor L, Chen Z, Rizkallah C, Amani S, Lim J, Murray T, Nagashima Y, Sewell T and Klein G. Refinement through restraint: bringing down the cost of verification. Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming. (89-102).

    https://doi.org/10.1145/2951913.2951940

  • Kang J, Hur C, Mansky W, Garbuzov D, Zdancewic S and Vafeiadis V. (2015). A formal C memory model supporting integer-pointer casts. ACM SIGPLAN Notices. 50:6. (326-335). Online publication date: 7-Aug-2015.

    https://doi.org/10.1145/2813885.2738005

  • Kang J, Hur C, Mansky W, Garbuzov D, Zdancewic S and Vafeiadis V. A formal C memory model supporting integer-pointer casts. Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. (326-335).

    https://doi.org/10.1145/2737924.2738005

  • Besson F, Blazy S and Wilke P. (2015). A Concrete Memory Model for CompCert. Interactive Theorem Proving. 10.1007/978-3-319-22102-1_5. (67-83).

    https://link.springer.com/10.1007/978-3-319-22102-1_5

  • Fernandez M, Andronick J, Klein G and Kuz I. (2015). Automated Verification of RPC Stub Code. FM 2015: Formal Methods. 10.1007/978-3-319-19249-9_18. (273-290).

    https://link.springer.com/10.1007/978-3-319-19249-9_18

  • Noschinski L, Rizkallah C and Mehlhorn K. Verification of Certifying Computations through AutoCorres and Simpl. Proceedings of the 6th International Symposium on NASA Formal Methods - Volume 8430. (46-61).

    https://doi.org/10.1007/978-3-319-06200-6_4

  • Besson F, Blazy S and Wilke P. (2014). A Precise and Abstract Memory Model for C Using Symbolic Values. Programming Languages and Systems. 10.1007/978-3-319-12736-1_24. (449-468).

    http://link.springer.com/10.1007/978-3-319-12736-1_24

  • Fiedler B, Liu Z, Cock D and Roscoe T. Verified Fault Handling for Modern Board Management Controllers. Formal Aspects of Component Software. (21-38).

    https://doi.org/10.1007/978-3-031-71261-6_2

  • Yu Y, Liu J and Mu D. A Points-to-Sensitive Model Checker for C Programs in IoT Firmware. IEEE Internet of Things Journal. 10.1109/JIOT.2022.3163383. 9:19. (18998-19011).

    https://ieeexplore.ieee.org/document/9745051/

  • O’CONNOR L, CHEN Z, RIZKALLAH C, JACKSON V, AMANI S, KLEIN G, MURRAY T, SEWELL T and KELLER G. (2021). Cogent: uniqueness types and certifying compilation. Journal of Functional Programming. 10.1017/S095679682100023X. 31.

    https://www.cambridge.org/core/product/identifier/S095679682100023X/type/journal_article

  • Asvija B, Eswari R and Bijoy M. (2019). Security in hardware assisted virtualization for cloud computing—State of the art issues and challenges. Computer Networks. 10.1016/j.comnet.2019.01.013. 151. (68-92). Online publication date: 1-Mar-2019.

    https://linkinghub.elsevier.com/retrieve/pii/S1389128618302998

  • Frumin D, Gondelman L and Krebbers R. (2019). Semi-automated Reasoning About Non-determinism in C Expressions. Programming Languages and Systems. 10.1007/978-3-030-17184-1_3. (60-87).

    http://link.springer.com/10.1007/978-3-030-17184-1_3

  • Keller C. (2018). Tactic Program-Based Testing and Bounded Verification in Isabelle/HOL. Tests and Proofs. 10.1007/978-3-319-92994-1_6. (103-119).

    http://link.springer.com/10.1007/978-3-319-92994-1_6

  • Klein G, Andronick J, Keller G, Matichuk D, Murray T and O'Connor L. (2017). Provably trustworthy systems. Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences. 10.1098/rsta.2015.0404. 375:2104. (20150404). Online publication date: 13-Oct-2017.

    http://rsta.royalsocietypublishing.org/lookup/doi/10.1098/rsta.2015.0404

  • Protzenko J, Zinzindohoué J, Rastogi A, Ramananandro T, Wang P, Zanella-Béguelin S, Delignat-Lavaud A, Hriţcu C, Bhargavan K, Fournet C and Swamy N. (2017). Verified low-level programming embedded in F*. Proceedings of the ACM on Programming Languages. 1:ICFP. (1-29). Online publication date: 29-Aug-2017.

    https://doi.org/10.1145/3110261

  • Krebbers R. (2016). A Formal C Memory Model for Separation Logic. Journal of Automated Reasoning. 57:4. (319-387). Online publication date: 1-Dec-2016.

    https://doi.org/10.1007/s10817-016-9369-1

  • O'Connor L, Chen Z, Rizkallah C, Amani S, Lim J, Murray T, Nagashima Y, Sewell T and Klein G. Refinement through restraint: bringing down the cost of verification. Proceedings of the 21st ACM SIGPLAN International Conference on Functional Programming. (89-102).

    https://doi.org/10.1145/2951913.2951940

  • Rizkallah C, Lim J, Nagashima Y, Sewell T, Chen Z, O’Connor L, Murray T, Keller G and Klein G. (2016). A Framework for the Automatic Formal Verification of Refinement from Cogent to C. Interactive Theorem Proving. 10.1007/978-3-319-43144-4_20. (323-340).

    http://link.springer.com/10.1007/978-3-319-43144-4_20

  • Fernandez M, Andronick J, Klein G and Kuz I. (2015). Automated Verification of RPC Stub Code. FM 2015: Formal Methods. 10.1007/978-3-319-19249-9_18. (273-290).

    http://link.springer.com/10.1007/978-3-319-19249-9_18