Component-based distributed software reconfiguration: a verification-oriented survey
Distributed software built from components has become a mainstay of service-oriented
applications, which frequently undergo reconfigurations to adapt to changes in their …
applications, which frequently undergo reconfigurations to adapt to changes in their …
Smart contract security: A software lifecycle perspective
Smart contract security is an emerging research area that deals with security issues arising
from the execution of smart contracts in a blockchain system. Generally, a smart contract is a …
from the execution of smart contracts in a blockchain system. Generally, a smart contract is a …
Improving landmark localization with semi-supervised learning
We present two techniques to improve landmark localization in images from partially
annotated datasets. Our primary goal is to leverage the common situation where precise …
annotated datasets. Our primary goal is to leverage the common situation where precise …
Deductive software verification: from pen-and-paper proofs to industrial tools
Deductive software verification aims at formally verifying that all possible behaviors of a
given program satisfy formally defined, possibly complex properties, where the verification …
given program satisfy formally defined, possibly complex properties, where the verification …
[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …
reputation are potential consequences of not maintaining confidentiality, which is an …
Verified Textbook Algorithms: a Biased Survey
Verified Textbook Algorithms | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover …
Account Menu Find a journal Publish with us Track your research Search Cart Book cover …
Fifty years of Hoare's logic
KR Apt, ER Olderog - Formal Aspects of Computing, 2019 - Springer
Fifty years of Hoare’s logic | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Search Cart 1.Home 2.Formal Aspects of …
Account Menu Find a journal Publish with us Search Cart 1.Home 2.Formal Aspects of …
Verifying an HTTP key-value server with interaction trees and VST
We present a networked key-value server, implemented in C and formally verified in Coq.
The server interacts with clients using a subset of the HTTP/1.1 protocol and is specified and …
The server interacts with clients using a subset of the HTTP/1.1 protocol and is specified and …
Data-driven software architecture for analyzing confidentiality
S Seifermann, R Heinrich… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Preservation of confidentiality has become a crucial quality property of software systems that
software vendors have to consider in each development phase. Especially, neglecting …
software vendors have to consider in each development phase. Especially, neglecting …
[图书][B] Program Proofs
KRM Leino - 2023 - books.google.com
This comprehensive and highly readable textbook teaches how to formally reason about
computer programs using an incremental approach and the verification-aware programming …
computer programs using an incremental approach and the verification-aware programming …