[책][B] Verification of Object-Oriented Software. The KeY Approach: Foreword by K. Rustan M. Leino

B Beckert, R Hähnle, PH Schmitt - 2007 - books.google.com
Long gone are the days when program veri? cation was a task carried out merely by hand
with paper and pen. For one, we are increasingly interested in proving actual program …

A program logic for resources

D Aspinall, L Beringer, M Hofmann, HW Loidl… - Theoretical Computer …, 2007 - Elsevier
We introduce a reasoning infrastructure for proving statements about resource consumption
in a fragment of the Java Virtual Machine Language (JVML). The infrastructure is based on a …

Secure information flow and program logics

L Beringer, M Hofmann - 20th IEEE Computer Security …, 2007 - ieeexplore.ieee.org
We present interpretations of type systems for secure information flow in Hoare logic,
complementing previous encodings in binary (eg relational) program logics. Treating base …

A unified framework for verification techniques for object invariants

S Drossopoulou, A Francalanza, P Müller… - ECOOP 2008–Object …, 2008 - Springer
Object invariants define the consistency of objects. They have subtle semantics because of
call-backs, multi-object invariants and subclassing. Several visible-state verification …

Hoare-style logic for unstructured programs

D Lundberg, R Guanciale, A Lindner… - … Conference on Software …, 2020 - Springer
Enabling Hoare-style reasoning for low-level code is attractive since it opens the way to
regain structure and modularity in a domain where structure is essentially absent. The field …

A dynamic logic with traces and coinduction

R Bubel, CC Din, R Hähnle, K Nakata - Automated Reasoning with …, 2015 - Springer
Abstract Dynamic Logic with Traces and Coinduction is a new program logic that has an
explicit syntactic representation of both programs and their traces. This allows to prove …

Formalisation and Verification of Java Card Security Properties in Dynamic Logic

W Mostowski - … Conference on Fundamental Approaches to Software …, 2005 - Springer
We present how common Java Card security properties can be formalised in Dynamic Logic
and verified, mostly automatically, with the KeY system. The properties we consider, are a …

Mobius: Mobility, ubiquity, security: Objectives and progress report

G Barthe, L Beringer, P Crégut, B Grégoire… - … Symposium, TGC 2006 …, 2007 - Springer
Through their global, uniform provision of services and their distributed nature, global
computers have the potential to profoundly enhance our daily life. However, they will not …

Verification of Java Card applets behavior with respect to transactions and card tears

C Marché, N Rousset - Fourth IEEE International Conference on …, 2006 - ieeexplore.ieee.org
The JAVA CARD transaction mechanism allows to protect sensitive operations on smart
cards against problems due to card tears or power losses. Statements within a transaction …

[PDF][PDF] Language Based Security for Java and JML

ME Warnier - 2006 - repository.ubn.ru.nl
Programs contain bugs. Finding program bugs is important, especially in situations where
safety and security of a program is required. This thesis proposes a number of analysis …