Component-based distributed software reconfiguration: a verification-oriented survey

H Coullon, L Henrio, F Loulergue… - ACM Computing Surveys, 2023 - dl.acm.org
Distributed software built from components has become a mainstay of service-oriented
applications, which frequently undergo reconfigurations to adapt to changes in their …

Smart contract security: A software lifecycle perspective

Y Huang, Y Bian, R Li, JL Zhao, P Shi - IEEE Access, 2019 - ieeexplore.ieee.org
Smart contract security is an emerging research area that deals with security issues arising
from the execution of smart contracts in a blockchain system. Generally, a smart contract is a …

Improving landmark localization with semi-supervised learning

S Honari, P Molchanov, S Tyree… - Proceedings of the …, 2018 - openaccess.thecvf.com
We present two techniques to improve landmark localization in images from partially
annotated datasets. Our primary goal is to leverage the common situation where precise …

Deductive software verification: from pen-and-paper proofs to industrial tools

R Hähnle, M Huisman - Computing and Software Science: State of the Art …, 2019 - Springer
Deductive software verification aims at formally verifying that all possible behaviors of a
given program satisfy formally defined, possibly complex properties, where the verification …

[HTML][HTML] Detecting violations of access control and information flow policies in data flow diagrams

S Seifermann, R Heinrich, D Werle… - Journal of Systems and …, 2022 - Elsevier
The security of software-intensive systems is frequently attacked. High fines or loss in
reputation are potential consequences of not maintaining confidentiality, which is an …

Verified Textbook Algorithms: a Biased Survey

T Nipkow, M Eberl, MPL Haslbeck - International Symposium on …, 2020 - Springer
Verified Textbook Algorithms | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Track your research Search Cart Book cover …

Fifty years of Hoare's logic

KR Apt, ER Olderog - Formal Aspects of Computing, 2019 - Springer
Fifty years of Hoare’s logic | SpringerLink Skip to main content Advertisement SpringerLink
Account Menu Find a journal Publish with us Search Cart 1.Home 2.Formal Aspects of …

Verifying an HTTP key-value server with interaction trees and VST

H Zhang, W Honoré, N Koh, Y Li, Y Li… - The 12th Conference …, 2021 - research.ed.ac.uk
We present a networked key-value server, implemented in C and formally verified in Coq.
The server interacts with clients using a subset of the HTTP/1.1 protocol and is specified and …

Data-driven software architecture for analyzing confidentiality

S Seifermann, R Heinrich… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
Preservation of confidentiality has become a crucial quality property of software systems that
software vendors have to consider in each development phase. Especially, neglecting …

[图书][B] Program Proofs

KRM Leino - 2023 - books.google.com
This comprehensive and highly readable textbook teaches how to formally reason about
computer programs using an incremental approach and the verification-aware programming …