Search

Your search keyword '"Proof-carrying code"' showing total 191 results

Search Constraints

Start Over You searched for: Descriptor "Proof-carrying code" Remove constraint Descriptor: "Proof-carrying code"
191 results on '"Proof-carrying code"'

Search Results

3. Stopping Injection Attacks with Code and Structured Data

4. A Proof-Carrying Code Approach to Certificate Auction Mechanisms

6. Certifying delta-oriented programs.

7. Proof-Carrying Code in a Session-Typed Process Calculus

8. An Extended Proof-Carrying Code Framework for Security Enforcement

9. Proof-Transforming Compilation of Eiffel Programs

10. On Formal Certification of AD Transformations

11. Light Functional Interpretation : An Optimization of Gödel’s Technique Towards the Extraction of (More) Efficient Programs from (Classical) Proofs

14. Synthesizing Certified Code

16. Programs from Proofs: A Framework for the Safe Execution of Untrusted Software.

17. Eliminating the Hardware-Software Boundary: A Proof-Carrying Approach for Trust Evaluation on Computer Systems.

18. Proving renaming for Haskell via dependent types : a case-study in refactoring soundness

19. Practical and Efficient in-Enclave Verification of Privacy Compliance

20. A trustworthy framework for resource-aware embedded programming

21. Research on Remote Attestation Technology Based on Formal Software Behavior Measurement

22. Certifying delta-oriented programs

23. Certificate size reduction in abstraction-carrying code.

24. Relational bytecode correlations

25. Certification of Thread Context Switching.

26. Semantic Foundations for Typed Assembly Languages.

27. Proof optimization for partial redundancy elimination

28. Provably correct runtime monitoring

29. A pointer logic and certifying compiler.

30. Programs from Proofs

31. A portable virtual machine target for proof-carrying code

32. A complexity analysis of functional interpretations

33. Building certified libraries for PCC: dynamic storage allocation

34. Automated techniques for provably safe mobile code

35. Effective Bridging Between Ecore and Coq: Case of a Type-Checker with Proof-Carrying Code

36. A trustworthy framework for resource-aware embedded programming

37. Effective Bridging Between Ecore and Coq: Case of a Type-Checker with Proof-Carrying Code

38. Effective Bridging Between Ecore and Coq: Case of a Type-Checker with Proof-Carrying Code

40. Stopping injection attacks with code and structured data

41. Information Flow Certificates

42. An Abstract Interpretation-based Approach to Mobile Code Safety.

43. A resource semantics and abstract machine for Safe : A functional language with regions and explicit deallocation

44. Practical and Efficient in-Enclave Verification of Privacy Compliance.

45. Defending Against the Buffer Overflows: A Static Approach Using Proof-Carrying Code

46. Detection of Non-Size Increasing Programs in Compilers

47. An Abstract Model of Certificate Translation

48. Semantic foundations for typed assembly languages

49. Certificate translation for optimizing compilers

50. Provably correct runtime monitoring

Catalog

Books, media, physical & digital resources