Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
A Coq formalization of normalization by evaluation for Martin-Löf type theory
CPP 2018: Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and ProofsPages 266–279https://doi.org/10.1145/3167091We present a Coq formalization of the normalization-by-evaluation algorithm for Martin-Löf dependent type theory with one universe and judgmental equality. The end results of the formalization are certified implementations of a reduction-free ...
- research-articleMarch 2017
Programs from Proofs: A Framework for the Safe Execution of Untrusted Software
ACM Transactions on Programming Languages and Systems (TOPLAS), Volume 39, Issue 2Article No.: 7, Pages 1–56https://doi.org/10.1145/3014427Today, software is traded worldwide on global markets, with apps being downloaded to smartphones within minutes or seconds. This poses, more than ever, the challenge of ensuring safety of software in the face of (1) unknown or untrusted software ...
- research-articleNovember 2015
Dominator Tree Certification and Divergent Spanning Trees
ACM Transactions on Algorithms (TALG), Volume 12, Issue 1Article No.: 11, Pages 1–42https://doi.org/10.1145/2764913How does one verify that the output of a complicated program is correct? One can formally prove that the program is correct, but this may be beyond the power of existing methods. Alternatively, one can check that the output produced for a particular ...
- articleJuly 1977
Certification of programs for secure information flow
Communications of the ACM (CACM), Volume 20, Issue 7Pages 504–513https://doi.org/10.1145/359636.359712ertification mechanism for verifying the secure flow of information through a program. Because it exploits the properties of a lattice structure among security classes, the procedure is sufficiently simple that it can easily be included in the analysis ...
- articleMay 1976
A lattice model of secure information flow
Communications of the ACM (CACM), Volume 19, Issue 5Pages 236–243https://doi.org/10.1145/360051.360056This paper investigates mechanisms that guarantee secure information flow in a computer system. These mechanisms are examined within a mathematical framework suitable for formulating the requirements of secure information flow among security classes. ...