Formal synthesis of filter components for use in security-enhancing architectural transformations

DS Hardin, KL Slind - 2021 IEEE Security and Privacy …, 2021 - ieeexplore.ieee.org
Safety-and security-critical developers have long recognized the importance of applying a
high degree of scrutiny to a system's (or subsystem's) I/O messages. However, lack of care in …

Curbing the Vulnerable Parser: Graded Modal Guardrails for Secure Input Handling

E Bond, M Heimerdinger - 2023 IEEE Secure Development …, 2023 - ieeexplore.ieee.org
Parsers written in an ad hoc manner are vulnerable to exploitation, but writing a secure
parser in a general purpose language often requires blending custom data validation with …

[PDF][PDF] Formal Methods for Security Functionality and for Secure Functionality

E Poll - cs.ru.nl
Erik Poll Radboud Universiteit Nijmegen Page 1 Formal Methods for Security Functionality
and for Secure Functionality Erik Poll Digital Security Radboud University Nijmegen Page 2 …

[PDF][PDF] Formal Methods–The Next 30 Years LNCS 11800

We are grateful to all involved in FM 2019. In particular the PC members and subreviewers
for their accurate and timely reviewing, all authors for their submissions, and all attendees of …

[图书][B] Formal Methods–The Next 30 Years: Third World Congress, FM 2019, Porto, Portugal, October 7–11, 2019, Proceedings

MH Ter Beek, A McIver, JN Oliveira - 2019 - books.google.com
We are grateful to all involved in FM 2019. In particular the PC members and subreviewers
for their accurate and timely reviewing, all authors for their submissions, and all attendees of …