SOSP '95 Proceedings of the fifteenth ACM symposium on Operating systems principles
A Linear Time Algorithm for Deciding Subject Security
Journal of the ACM (JACM)
Conspiracy and information flow in the Take-Grant protection model
Journal of Computer Security
Protection in operating systems
Communications of the ACM
The transfer of information and authority in a protection system
SOSP '79 Proceedings of the seventh ACM symposium on Operating systems principles
Verifying the EROS Confinement Mechanism
SP '00 Proceedings of the 2000 IEEE Symposium on Security and Privacy
Running the manual: an approach to high-assurance microkernel development
Proceedings of the 2006 ACM SIGPLAN workshop on Haskell
Isabelle/HOL: a proof assistant for higher-order logic
Isabelle/HOL: a proof assistant for higher-order logic
The L4.verified project: next steps
VSTTE'10 Proceedings of the Third international conference on Verified software: theories, tools, experiments
Towards proving security in the presence of large untrusted components
SSV'10 Proceedings of the 5th international conference on Systems software verification
From a verified kernel towards verified systems
APLAS'10 Proceedings of the 8th Asian conference on Programming languages and systems
Provable Security: how feasible is it?
HotOS'13 Proceedings of the 13th USENIX conference on Hot topics in operating systems
ITP'11 Proceedings of the Second international conference on Interactive theorem proving
A formally verified OS kernel. now what?
ITP'10 Proceedings of the First international conference on Interactive Theorem Proving
Hi-index | 0.00 |
This paper presents a methodology for automated modular verification of C programs against specifications written in separation logic. The distinguishing features of the approach are representation of the C memory model in separation logic by means of ...