Deductive software verification-the key book

W Ahrendt, B Beckert, R Bubel, R Hähnle… - Lecture notes in …, 2016 - Springer
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …

Hyperproperties

MR Clarkson, FB Schneider - Journal of Computer Security, 2010 - content.iospress.com
Trace properties, which have long been used for reasoning about systems, are sets of
execution traces. Hyperproperties, introduced here, are sets of trace properties …

Secure information flow by self-composition

G Barthe, PR D'argenio, T Rezk - Mathematical Structures in …, 2011 - cambridge.org
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …

Securing web application code by static analysis and runtime protection

YW Huang, F Yu, C Hang, CH Tsai, DT Lee… - Proceedings of the 13th …, 2004 - dl.acm.org
Security remains a major roadblock to universal acceptance of the Web for many kinds of
transactions, especially since the recent sharp increase in remotely exploitable …

[图书][B] Secure systems development with UML

J Jürjens - 2005 - books.google.com
Attacks against computer systems can cause considerable economic or physical damage.
High-quality development of security-critical systems is difficult, mainly because of the …

[图书][B] Verification of Object-Oriented Software. The KeY Approach: Foreword by K. Rustan M. Leino

B Beckert, R Hähnle, PH Schmitt - 2007 - books.google.com
Long gone are the days when program veri? cation was a task carried out merely by hand
with paper and pen. For one, we are increasingly interested in proving actual program …

Learning to prove theorems via interacting with proof assistants

K Yang, J Deng - International Conference on Machine …, 2019 - proceedings.mlr.press
Humans prove theorems by relying on substantial high-level reasoning and problem-
specific insights. Proof assistants offer a formalism that resembles human mathematical …

Relational verification using product programs

G Barthe, JM Crespo, C Kunz - International Symposium on Formal …, 2011 - Springer
Relational program logics are formalisms for specifying and verifying properties about two
programs or two runs of the same program. These properties range from correctness of …

Secure information flow as a safety problem

T Terauchi, A Aiken - International Static Analysis Symposium, 2005 - Springer
The termination insensitive secure information flow problem can be reduced to solving a
safety problem via a simple program transformation. Barthe, D'Argenio, and Rezk coined the …

Declassification: Dimensions and principles

A Sabelfeld, D Sands - Journal of Computer Security, 2009 - content.iospress.com
Computing systems often deliberately release (or declassify) sensitive information. A
principal security concern for systems permitting information release is whether this release …