Export 4 results:
Author Title Type [ Year(Desc)]
Filters: Author is Gilles Barthe  [Clear All Filters]
G. Barthe, D'Argenio, P. R., and Rezk, T., Secure Information Flow by Self-Composition, in 17th IEEE Computer Security Foundations Workshop, (CSFW-17 2004), 2004, pp. 100-114.PDF icon paper-27.pdf (1.18 MB)
G. Barthe, D'Argenio, P. R., and Rezk, T., Secure information flow by self-composition, Mathematical Structures in Computer Science, vol. 21, no. 6, pp. 1207-1252, 2011.PDF icon paper-9.pdf (411.05 KB)
G. Barthe, D'Argenio, P. R., Finkbeiner, B., and Hermanns, H., Facets of Software Doping, in Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications - 7th International Symposium, (ISoLA 2016), Part II, vol. 9953, T. Margaria and Steffen, B. Springer, 2016, pp. 601-607.PDF icon paper-668.pdf (416.75 KB)
P. R. D'Argenio, Barthe, G., Biewer, S., Finkbeiner, B., and Hermanns, H., Is Your Software on Dope? - Formal Analysis of Surreptitiously "enhanced" Programs, in Programming Languages and Systems - 26th European Symposium on Programming, {ESOP} 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings, vol. 10201, H. Yang Springer, 2017, pp. 83–110.PDF icon paper-714.pdf (429.13 KB)
Powered by Drupal