Cited By
View all- Pottier FBertot YVafeiadis V(2017)Verifying a hash table and its iterators in higher-order separation logicProceedings of the 6th ACM SIGPLAN Conference on Certified Programs and Proofs10.1145/3018610.3018624(3-16)Online publication date: 16-Jan-2017
- Kulenovic MDonko D(2014)A survey of static code analysis methods for security vulnerabilities detection2014 37th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO)10.1109/MIPRO.2014.6859783(1381-1386)Online publication date: May-2014
- Arnold MVechev MYahav E(2011)QVMACM Transactions on Software Engineering and Methodology10.1145/2063239.206324121:1(1-35)Online publication date: 1-Dec-2011
- Show More Cited By