| bRIGHT: From Context to Interest |
|
| AFOSR: Information, Operations, and Security Program Review |
|
| Semi-automated Test Case Generation for ACAS X Implementation Validation |
|
| Combining Property-based Testing and Fuzzing |
|
| Model-Based Grey-Box Fuzzing |
|
| Security Policy and Resiliency Tools and ANalysis (SPARTAN) |
|
| Deriving Formal Specifications from Natural Language Requirements using ARSENAL 2 |
|
| Automated Rapid Certification of Software |
|
| Semantics-Driven Testing of the PKCS11 API |
|
| Automating Avionics Certification activities using Formal Methods |
|
| Understanding Attestation: Analyzing Protocols that Use Quotes |
|
| Checked C: Safe C, Incrementally |
|
| C3E_Fall2019_TravelExpenseWorksheet.xlsx |
|
| Understanding security mistakes developers make: Qualitative analysis from Build It, Break It, Fix It |
|
| Content Moderation and the Problem of Meshed Cognition |
|
| What Blockchain Got Right, No Really |
|
| Hardware/Software Coassurance using Algorithmic C and ACL2 |
|
| End-to-end correctness theorems spanning software and hardware |
|