| High-Performance Regular Expression Processing for Cross-Domain Systems with High Assurance Requirements |
|
| Programmable Hardware Support for Ubiquitous Micro-Policy Enforcement |
|
| Generating Proof-Carrying Code for the UDP protocol |
|
| Mining and Understanding Software Enclaves (MUSE) |
|
| Local Temporal Reasoning |
|
| Through the Lens of Abstraction |
|
| Multi-App Security Analysis: Looking for Android App Collusion |
|
| Triceratops: Privacy-protecting Mobile Apps |
|
| An Aircraft Electric Power System Domain-Specific Language for Reactive Control Protocols |
|
| ArmoredSoftware: Trust in the cloud |
|
| SpeAR: Specification and Analysis of Requirements |
|
| Cryptol version 2: An Open Source Cryptol |
|
| The Cyber-Physical Limits of Control |
|
| Keynote Presentation: Neal Ziring |
|
| Survey on the Barriers to the Industrial Adoption of Formal Methods |
|
| ARE: A System for Automated Reverse Engineering |
|
| ARSENAL: Automatic Requirements Specification Extraction from Natural Language |
|
| Access Control Policy Tool (ACPT), an assurance tool that combines symbolic model checking with combinatorial coverage |
|
| A High-Confidence Broker of Security Services |
|
| High-Assurance Java Card |
|
| Synthesis of a Complex Software Vulnerability Analyzer (SVA) |
|
| The SLAM Project: Debugging System Software via Static Analysis |
|
| Practical Model Checking |
|
| High Confidence Software and Systems |
|
| Programatica: The Early Years — A Personal Recollection |
|