ARMor: fully verified software fault isolation

L Zhao, G Li, B De Sutter, J Regehr - Proceedings of the ninth ACM …, 2011 - dl.acm.org
We have designed and implemented ARMor, a system that uses software fault isolation (SFI)
to sandbox application code running on small embedded processors. Sandboxing can be …

Cooperative verifier-based testing with CoVeriTest

D Beyer, MC Jakobs - International Journal on Software Tools for …, 2021 - Springer
Testing is a widely applied technique to evaluate software quality, and coverage criteria are
often used to assess the adequacy of a generated test suite. However, manually …

Certificate translation for optimizing compilers

G Barthe, B Grégoire, C Kunz, T Rezk - International Static Analysis …, 2006 - Springer
Certifying compilation provides a means to ensure that untrusted mobile code satisfies its
functional specification. A certifying compiler generates code as well as a machine …

Path-sensitive backward slicing

J Jaffar, V Murali, JA Navas, AE Santosa - Static Analysis: 19th …, 2012 - Springer
Backward slicers are typically path-insensitive (ie, they ignore the evaluation of predicates at
conditional branches) often producing too big slices. Though the effect of path-sensitivity is …

Reusing predicate precision in value analysis

MC Jakobs - International Conference on Integrated Formal …, 2022 - Springer
Software verification allows one to examine the reliability of software. Thereby, analyses
exchange information to become more effective, more efficient, or to eliminate false results …

Proof-producing program analysis

A Chaieb - International Colloquium on Theoretical Aspects of …, 2006 - Springer
Proof-producing program analysis augments the invariants inferred by an abstract
interpreter with their correctness proofs. If these invariants are precise enough to guarantee …

The open verifier framework for foundational verifiers

BYE Chang, A Chlipala, GC Necula… - Proceedings of the 2005 …, 2005 - dl.acm.org
We present the Open Verifier approach for verifying untrusted code using customized
verifiers. This approach can be viewed as an instance of foundational proof-carrying code …

Certificate translation in abstract interpretation

G Barthe, C Kunz - European Symposium on Programming, 2008 - Springer
A certificate is a mathematical object that can be used to establish that a piece of mobile
code satisfies some security policy. Since in general certificates cannot be generated …

From reengineering to process management-a longitudinal study of BPR in a Danish manufacturing company

MH Larsen, N Bjorn-Andersen - Proceedings of the 34th …, 2001 - ieeexplore.ieee.org
This paper is a longitudinal study of BPR initiatives at Enzyme Business carried out between
January 1994 and March 1998 in Novo Nordisk A/S, one of the largest companies in …

Certificate translation for optimizing compilers

G Barthe, B Grégoire, C Kunz, T Rezk - ACM Transactions on …, 2009 - dl.acm.org
Proof Carrying Code provides trust in mobile code by requiring certificates that ensure the
code adherence to specific conditions. The prominent approach to generate certificates for …