Secure slices of insecure programs
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Static path conditions for Java
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Automated Analysis of Java Methods for Confidentiality
CAV '09 Proceedings of the 21st International Conference on Computer Aided Verification
Towards fully automatic placement of security sanitizers and declassifiers
POPL '13 Proceedings of the 40th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Automatic mediation of privacy-sensitive resource access in smartphone applications
SEC'13 Proceedings of the 22nd USENIX conference on Security
Hi-index | 0.00 |
When developing products or solutions in industry and assessing their quality, formal methods provide the most rigorous tools for checking for safety and security flaws. In this talk we share our first-hand general experience in this area, and furthermore ...