Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Chappe N, Henrio L and Zakowski Y. Monadic Interpreters for Concurrent Memory Models. Proceedings of the 14th ACM SIGPLAN International Conference on Certified Programs and Proofs. (283-298).

    https://doi.org/10.1145/3703595.3705890

  • Zaliva V, Memarian K, Campbell B, Almeida R, Filardo N, Stark I and Sewell P. A CHERI C Memory Model for Verified Temporal Safety. Proceedings of the 14th ACM SIGPLAN International Conference on Certified Programs and Proofs. (112-126).

    https://doi.org/10.1145/3703595.3705878

  • Kim Y, Cho M, Lee J, Kim J, Yoon T, Song Y and Hur C. (2025). Archmage and CompCertCast: End-to-End Verification Supporting Integer-Pointer Casting. Proceedings of the ACM on Programming Languages. 9:POPL. (1326-1354). Online publication date: 7-Jan-2025.

    https://doi.org/10.1145/3704881

  • Beck C, Yoon I, Chen H, Zakowski Y and Zdancewic S. (2024). A Two-Phase Infinite/Finite Low-Level Memory Model: Reconciling Integer–Pointer Casts, Finite Space, and undef at the LLVM IR Level of Abstraction. Proceedings of the ACM on Programming Languages. 8:ICFP. (789-817). Online publication date: 15-Aug-2024.

    https://doi.org/10.1145/3674652

  • Zhang L, Wang Y, Wu J, Koenig J and Shao Z. (2024). Fully Composable and Adequate Verified Compilation with Direct Refinements between Open Modules. Proceedings of the ACM on Programming Languages. 8:POPL. (2160-2190). Online publication date: 5-Jan-2024.

    https://doi.org/10.1145/3632914

  • Wu J, Wang Y, Sun M, Xu X and Song Y. Towards a Framework for Developing Verified Assemblers for the ELF Format. Programming Languages and Systems. (205-224).

    https://doi.org/10.1007/978-981-99-8311-7_10

  • Gäher L, Sammler M, Spies S, Jung R, Dang H, Krebbers R, Kang J and Dreyer D. (2022). Simuliris: a separation logic framework for verifying concurrent program optimizations. Proceedings of the ACM on Programming Languages. 6:POPL. (1-31). Online publication date: 16-Jan-2022.

    https://doi.org/10.1145/3498689

  • Lepigre R, Sammler M, Memarian K, Krebbers R, Dreyer D and Sewell P. (2022). VIP: verifying real-world C idioms with integer-pointer casts. Proceedings of the ACM on Programming Languages. 6:POPL. (1-32). Online publication date: 16-Jan-2022.

    https://doi.org/10.1145/3498681

  • Abate C, Blanco R, Ciobâcă Ş, Durier A, Garg D, Hriţcu C, Patrignani M, Tanter É and Thibault J. (2021). An Extended Account of Trace-relating Compiler Correctness and Secure Compilation. ACM Transactions on Programming Languages and Systems. 43:4. (1-48). Online publication date: 31-Dec-2022.

    https://doi.org/10.1145/3460860

  • Zakowski Y, Beck C, Yoon I, Zaichuk I, Zaliva V and Zdancewic S. (2021). Modular, compositional, and executable formal semantics for LLVM IR. Proceedings of the ACM on Programming Languages. 5:ICFP. (1-30). Online publication date: 22-Aug-2021.

    https://doi.org/10.1145/3473572

  • Sammler M, Lepigre R, Krebbers R, Memarian K, Dreyer D and Garg D. RefinedC: automating the foundational verification of C code with refined ownership types. Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation. (158-174).

    https://doi.org/10.1145/3453483.3454036

  • Lee J, Kim D, Hur C and Lopes N. (2021). An SMT Encoding of LLVM’s Memory Model for Bounded Translation Validation. Computer Aided Verification. 10.1007/978-3-030-81688-9_35. (752-776).

    https://link.springer.com/10.1007/978-3-030-81688-9_35

  • Abate C, Blanco R, Ciobâcă Ș, Durier A, Garg D, Hrițcu C, Patrignani M, Tanter É and Thibault J. Trace-Relating Compiler Correctness and Secure Compilation. Programming Languages and Systems. (1-28).

    https://doi.org/10.1007/978-3-030-44914-8_1

  • Greenberg M and Blatt A. (2019). Executable formal semantics for the POSIX shell. Proceedings of the ACM on Programming Languages. 4:POPL. (1-30). Online publication date: 1-Jan-2020.

    https://doi.org/10.1145/3371111

  • Jung R, Dang H, Kang J and Dreyer D. (2019). Stacked borrows: an aliasing model for Rust. Proceedings of the ACM on Programming Languages. 4:POPL. (1-32). Online publication date: 1-Jan-2020.

    https://doi.org/10.1145/3371109

  • Song Y, Cho M, Kim D, Kim Y, Kang J and Hur C. (2019). CompCertM: CompCert with C-assembly linking and lightweight modular verification. Proceedings of the ACM on Programming Languages. 4:POPL. (1-31). Online publication date: 1-Jan-2020.

    https://doi.org/10.1145/3371091

  • Besson F, Blazy S and Wilke P. (2019). CompCertS. Journal of Automated Reasoning. 63:2. (369-392). Online publication date: 1-Aug-2019.

    https://doi.org/10.1007/s10817-018-9496-y

  • Besson F, Blazy S and Wilke P. (2019). A Verified CompCert Front-End for a Memory Model Supporting Pointer Arithmetic and Uninitialised Data. Journal of Automated Reasoning. 62:4. (433-480). Online publication date: 1-Apr-2019.

    https://doi.org/10.1007/s10817-017-9439-z

  • Memarian K, Gomes V, Davis B, Kell S, Richardson A, Watson R and Sewell P. (2019). Exploring C semantics and pointer provenance. Proceedings of the ACM on Programming Languages. 3:POPL. (1-32). Online publication date: 2-Jan-2019.

    https://doi.org/10.1145/3290380

  • Li W, Sun J and Chen H. Detecting Undefined Behaviors in CUDA C. IEEE Access. 10.1109/ACCESS.2019.2954143. 7. (182559-182572).

    https://ieeexplore.ieee.org/document/8905996/

  • Kang J, Kim Y, Song Y, Lee J, Park S, Shin M, Kim Y, Cho S, Choi J, Hur C and Yi K. (2018). Crellvm: verified credible compilation for LLVM. ACM SIGPLAN Notices. 53:4. (631-645). Online publication date: 2-Dec-2018.

    https://doi.org/10.1145/3296979.3192377

  • Lee J, Hur C, Jung R, Liu Z, Regehr J and Lopes N. (2018). Reconciling high-level optimizations and low-level code in LLVM. Proceedings of the ACM on Programming Languages. 2:OOPSLA. (1-28). Online publication date: 24-Oct-2018.

    https://doi.org/10.1145/3276495

  • Kang J, Kim Y, Song Y, Lee J, Park S, Shin M, Kim Y, Cho S, Choi J, Hur C and Yi K. Crellvm: verified credible compilation for LLVM. Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation. (631-645).

    https://doi.org/10.1145/3192366.3192377

  • Zhang S, Vijayaraghavan M, Wright A, Alipour M and Arvind . Constructing a weak memory model. Proceedings of the 45th Annual International Symposium on Computer Architecture. (124-137).

    https://doi.org/10.1109/ISCA.2018.00021

  • Rigger M, Schatz R, Grimmer M and Mössenböck H. Lenient Execution of C on a Java Virtual Machine. Proceedings of the 14th International Conference on Managed Languages and Runtimes. (35-47).

    https://doi.org/10.1145/3132190.3132204

  • Lee J, Kim Y, Song Y, Hur C, Das S, Majnemer D, Regehr J and Lopes N. (2017). Taming undefined behavior in LLVM. ACM SIGPLAN Notices. 52:6. (633-647). Online publication date: 14-Sep-2017.

    https://doi.org/10.1145/3140587.3062343

  • Lee J, Kim Y, Song Y, Hur C, Das S, Majnemer D, Regehr J and Lopes N. Taming undefined behavior in LLVM. Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation. (633-647).

    https://doi.org/10.1145/3062341.3062343

  • Besson F, Blazy S and Wilke P. (2017). CompCertS: A Memory-Aware Verified C Compiler Using Pointer as Integer Semantics. Interactive Theorem Proving. 10.1007/978-3-319-66107-0_6. (81-97).

    https://link.springer.com/10.1007/978-3-319-66107-0_6

  • Krebbers R. (2016). A Formal C Memory Model for Separation Logic. Journal of Automated Reasoning. 57:4. (319-387). Online publication date: 1-Dec-2016.

    https://doi.org/10.1007/s10817-016-9369-1

  • Mullen E, Zuniga D, Tatlock Z and Grossman D. (2016). Verified peephole optimizations for CompCert. ACM SIGPLAN Notices. 51:6. (448-461). Online publication date: 1-Aug-2016.

    https://doi.org/10.1145/2980983.2908109

  • Memarian K, Matthiesen J, Lingard J, Nienhuis K, Chisnall D, Watson R and Sewell P. (2016). Into the depths of C: elaborating the de facto standards. ACM SIGPLAN Notices. 51:6. (1-15). Online publication date: 1-Aug-2016.

    https://doi.org/10.1145/2980983.2908081

  • Mullen E, Zuniga D, Tatlock Z and Grossman D. Verified peephole optimizations for CompCert. Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. (448-461).

    https://doi.org/10.1145/2908080.2908109

  • Memarian K, Matthiesen J, Lingard J, Nienhuis K, Chisnall D, Watson R and Sewell P. Into the depths of C: elaborating the de facto standards. Proceedings of the 37th ACM SIGPLAN Conference on Programming Language Design and Implementation. (1-15).

    https://doi.org/10.1145/2908080.2908081

  • Besson F, Blazy S and Wilke P. (2015). A Concrete Memory Model for CompCert. Interactive Theorem Proving. 10.1007/978-3-319-22102-1_5. (67-83).

    https://link.springer.com/10.1007/978-3-319-22102-1_5

  • Mansky W, Garbuzov D and Zdancewic S. (2015). An Axiomatic Specification for Sequential Memory Models. Computer Aided Verification. 10.1007/978-3-319-21668-3_24. (413-428).

    http://link.springer.com/10.1007/978-3-319-21668-3_24

  • Zou C, He D, Sui Y and Xue J. (2024). TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers. Proceedings of the ACM on Software Engineering. 1:FSE. (1609-1631). Online publication date: 12-Jul-2024.

    https://doi.org/10.1145/3660779

  • Li L, Liu Y, Postol D, Lampropoulos L, Van Horn D, Hicks M, Calzavara S and Naumann D. A formal model of Checked C1. Journal of Computer Security. 10.3233/JCS-230040. 31:5. (581-614).

    https://www.medra.org/servlet/aliasResolver?alias=iospress&doi=10.3233/JCS-230040

  • Sadykov R and Mandrykin M. (2022). Complete Decision Procedure for the Theory of Bounded Pointer Arithmetic. Programming and Computing Software. 48:8. (770-780). Online publication date: 1-Dec-2022.

    https://doi.org/10.1134/S0361768822080023

  • Li L, Liu Y, Postol D, Lampropoulos L, Van Horn D and Hicks M. (2022). A Formal Model of Checked C 2022 IEEE 35th Computer Security Foundations Symposium (CSF). 10.1109/CSF54842.2022.9919657. 978-1-6654-8417-6. (49-63).

    https://ieeexplore.ieee.org/document/9919657/

  • Rocha R, Sprokholt D, Fink M, Gouicem R, Spink T, Chakraborty S and Bhatotia P. Lasagne: a static binary translator for weak memory model architectures. Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation. (888-902).

    https://doi.org/10.1145/3519939.3523719

  • Abate C, Blanco R, Ciobâcă Ş, Durier A, Garg D, Hriţcu C, Patrignani M, Tanter É and Thibault J. (2021). An Extended Account of Trace-relating Compiler Correctness and Secure Compilation. ACM Transactions on Programming Languages and Systems. 43:4. (1-48). Online publication date: 31-Dec-2022.

    https://doi.org/10.1145/3460860

  • Yodaiken V. How ISO C became unusable for operating systems development. Proceedings of the 11th Workshop on Programming Languages and Operating Systems. (84-90).

    https://doi.org/10.1145/3477113.3487274

  • Jung R, Dang H, Kang J and Dreyer D. (2019). Stacked borrows: an aliasing model for Rust. Proceedings of the ACM on Programming Languages. 4:POPL. (1-32). Online publication date: 1-Jan-2020.

    https://doi.org/10.1145/3371109

  • Frumin D, Gondelman L and Krebbers R. (2019). Semi-automated Reasoning About Non-determinism in C Expressions. Programming Languages and Systems. 10.1007/978-3-030-17184-1_3. (60-87).

    http://link.springer.com/10.1007/978-3-030-17184-1_3