A Formal Foundation for Symbolic Evaluation with Merging | 0 | 0.34 | 2022 |
Noninterference specifications for secure systems | 0 | 0.34 | 2020 |
Specification And Verification In The Field: Applying Formal Methods To Bpf, Just-In-Time Compilers In The Linux Kernel | 0 | 0.34 | 2020 |
Scaling symbolic evaluation for automated verification of systems code with Serval | 2 | 0.37 | 2019 |
Nickel: A Framework for Design and Verification of Information Flow Control Systems. | 0 | 0.34 | 2018 |
MultiNyx: a multi-level abstraction framework for systematic analysis of hypervisors. | 0 | 0.34 | 2018 |
Customizing Progressive JPEG for Efficient Image Storage. | 0 | 0.34 | 2017 |
Push-Button Verification of File Systems via Crash Refinement. | 4 | 0.40 | 2017 |
An Empirical Study on the Correctness of Formally Verified Distributed Systems. | 12 | 0.60 | 2017 |
Hyperkernel: Push-Button Verification of an OS Kernel. | 4 | 0.42 | 2017 |
Investigating Safety Of A Radiotherapy Machine Using System Models With Pluggable Checkers | 1 | 0.40 | 2016 |
A Differential Approach to Undefined Behavior Detection | 10 | 0.51 | 2015 |
Toward a Dependability Case Language and Workflow for a Radiation Therapy System. | 2 | 0.36 | 2015 |
Verdi: a framework for implementing and formally verifying distributed systems | 58 | 1.42 | 2015 |
Jitk: a trustworthy in-kernel interpreter infrastructure | 18 | 0.74 | 2014 |
Why does cryptographic software fail?: a case study and open problems | 14 | 0.77 | 2014 |
Identifying information disclosure in web applications with retroactive auditing | 4 | 0.39 | 2014 |
Cybertron: pushing the limit on I/O reduction in data-parallel programs | 2 | 0.36 | 2014 |
Towards optimization-safe systems: analyzing the impact of undefined behavior | 44 | 1.77 | 2013 |
Security bugs in embedded interpreters | 1 | 0.36 | 2013 |
Improving integer security for systems with KINT | 31 | 1.11 | 2012 |
Undefined behavior: what happened to my code? | 12 | 0.76 | 2012 |
Software fault isolation with API integrity and multi-principal modules | 37 | 1.07 | 2011 |
Retroactive auditing | 3 | 0.46 | 2011 |
Linux kernel vulnerabilities: state-of-the-art defenses and open problems | 42 | 1.61 | 2011 |
Language-based replay via data flow cut | 6 | 0.47 | 2010 |
Intrusion recovery using selective re-execution | 26 | 1.03 | 2010 |
Api hyperlinking via structural overlap | 25 | 1.28 | 2009 |
Improving application security with data flow assertions | 64 | 2.86 | 2009 |
R2: an application-level kernel for record and replay | 74 | 4.50 | 2008 |
D3S: debugging deployed distributed systems | 34 | 1.73 | 2008 |
Towards automatic inference of task hierarchies in complex systems | 1 | 0.50 | 2008 |
Hang analysis: fighting responsiveness bugs | 9 | 0.76 | 2008 |