| C3E Workshop 2011 Final Report |
|
| Z3str3: A DPLL(T) Solver for a Theory of Strings and Integers |
|
| Proving Amazon's s2n Correct |
|
| SunDew: Systematic Automated Security Testing |
|
| Cross-Tool Semantics for Protocol Security Goals |
|
| Certifying SAT Proofs |
|
| Levels of Software Assurance in SPARK |
|
| Identifying Security Critical Properties for the Dynamic Verification of a Processor |
|
| Development of Verified Message Encoder/Decoder for Automotive V2V Communications |
|
| A Translationally Inspired Model for Autonomous Device Self-Regulation |
|
| Jana - Private Data as a Service |
|
| The Semantics of Privacy: From Privacy Policy Analysis to Code-Level Enforcement |
|
| Applying NIST's new Privacy Risk Management Framework |
|
| Keynote Presentation: Differential Privacy and Data Analysis |
|
| Keynote Presentation: Privacy Engineering: Just Another Unicorn? |
|
| A Commitment Logic for Reasoning about Trust in Complex Systems |
|
| Certified Multiplicative Weights Update, or Verified Learning Without Regret |
|
| Verified Data Structures for Trusted Autonomy: A Compilation Approach |
|
| Keynote Presentation - John Launchbury |
|
| Design Studio for Rigorous System Design using Architecture Styles and BIP |
|
| Keynote Presentation: Formal Methods and the Defense Industrial Base |
|
| Keynote Presentation: Symmetries in Software |
|
| VU Travel Reimbursement Worksheet for Workshops |
|