Semi-automatic ladderisation: improving code security through rewriting and dependent types
Cyber attacks become more and more prevalent every day. One type of cyber attack is
known as a side channel attack, where attackers exploit information leakage from the …
known as a side channel attack, where attackers exploit information leakage from the …
The teamplay project: Analysing and optimising time, energy, and security for cyber-physical systems
Non-functional properties, such as energy, time, and security (ETS) are becoming
increasingly important in Cyber-Physical Systems (CPS) programming. This article …
increasingly important in Cyber-Physical Systems (CPS) programming. This article …
Towards Specification-Guarded Refactoring
Refactoring is a common task in writing and maintaining software. Refactoring tools are
available for a wide variety of programming languages, and they are intended to transform …
available for a wide variety of programming languages, and they are intended to transform …
Towards Specification-Guarded
AD Barwell, C Brown, S Sarkar - Logic-Based Program Synthesis …, 2024 - books.google.com
Refactoring is a common task in writing and maintaining software. Refactoring tools are
available for a wide variety of program-ming languages, and they are intended to transform …
available for a wide variety of program-ming languages, and they are intended to transform …