ARMor: fully verified software fault isolation
We have designed and implemented ARMor, a system that uses software fault isolation (SFI)
to sandbox application code running on small embedded processors. Sandboxing can be …
to sandbox application code running on small embedded processors. Sandboxing can be …
Cooperative verifier-based testing with CoVeriTest
Testing is a widely applied technique to evaluate software quality, and coverage criteria are
often used to assess the adequacy of a generated test suite. However, manually …
often used to assess the adequacy of a generated test suite. However, manually …
Certificate translation for optimizing compilers
Certifying compilation provides a means to ensure that untrusted mobile code satisfies its
functional specification. A certifying compiler generates code as well as a machine …
functional specification. A certifying compiler generates code as well as a machine …
Path-sensitive backward slicing
Backward slicers are typically path-insensitive (ie, they ignore the evaluation of predicates at
conditional branches) often producing too big slices. Though the effect of path-sensitivity is …
conditional branches) often producing too big slices. Though the effect of path-sensitivity is …
Reusing predicate precision in value analysis
MC Jakobs - International Conference on Integrated Formal …, 2022 - Springer
Software verification allows one to examine the reliability of software. Thereby, analyses
exchange information to become more effective, more efficient, or to eliminate false results …
exchange information to become more effective, more efficient, or to eliminate false results …
Proof-producing program analysis
A Chaieb - International Colloquium on Theoretical Aspects of …, 2006 - Springer
Proof-producing program analysis augments the invariants inferred by an abstract
interpreter with their correctness proofs. If these invariants are precise enough to guarantee …
interpreter with their correctness proofs. If these invariants are precise enough to guarantee …
The open verifier framework for foundational verifiers
We present the Open Verifier approach for verifying untrusted code using customized
verifiers. This approach can be viewed as an instance of foundational proof-carrying code …
verifiers. This approach can be viewed as an instance of foundational proof-carrying code …
Certificate translation in abstract interpretation
G Barthe, C Kunz - European Symposium on Programming, 2008 - Springer
A certificate is a mathematical object that can be used to establish that a piece of mobile
code satisfies some security policy. Since in general certificates cannot be generated …
code satisfies some security policy. Since in general certificates cannot be generated …
From reengineering to process management-a longitudinal study of BPR in a Danish manufacturing company
MH Larsen, N Bjorn-Andersen - Proceedings of the 34th …, 2001 - ieeexplore.ieee.org
This paper is a longitudinal study of BPR initiatives at Enzyme Business carried out between
January 1994 and March 1998 in Novo Nordisk A/S, one of the largest companies in …
January 1994 and March 1998 in Novo Nordisk A/S, one of the largest companies in …
Certificate translation for optimizing compilers
Proof Carrying Code provides trust in mobile code by requiring certificates that ensure the
code adherence to specific conditions. The prominent approach to generate certificates for …
code adherence to specific conditions. The prominent approach to generate certificates for …