Crossref Citations
This article has been cited by the following publications. This list is generated based on data provided by
Crossref.
Balliu, Musard
Dam, Mads
and
Guanciale, Roberto
2014.
Automating Information Flow Analysis of Low Level Code.
p.
1080.
Karimpour, Jaber
Isazadeh, Ayaz
and
Noroozi, Ali A.
2015.
ICT Systems Security and Privacy Protection.
Vol. 455,
Issue. ,
p.
82.
Barthe, Gilles
Espitau, Thomas
Grégoire, Benjamin
Hsu, Justin
Stefanesco, Léo
and
Strub, Pierre-Yves
2015.
Logic for Programming, Artificial Intelligence, and Reasoning.
Vol. 9450,
Issue. ,
p.
387.
Koskinen, Eric
and
Yang, Junfeng
2016.
Reducing crash recoverability to reachability.
ACM SIGPLAN Notices,
Vol. 51,
Issue. 1,
p.
97.
Schoepe, Daniel
Balliu, Musard
Pierce, Benjamin C.
and
Sabelfeld, Andrei
2016.
Explicit Secrecy: A Policy for Taint Tracking.
p.
15.
HRIŢCU, CĂTĂLIN
LAMPROPOULOS, LEONIDAS
SPECTOR-ZABUSKY, ANTAL
AZEVEDO DE AMORIM, ARTHUR
DÉNÈS, MAXIME
HUGHES, JOHN
PIERCE, BENJAMIN C.
and
VYTINIOTIS, DIMITRIOS
2016.
Testing noninterference, quickly.
Journal of Functional Programming,
Vol. 26,
Issue. ,
Koskinen, Eric
and
Yang, Junfeng
2016.
Reducing crash recoverability to reachability.
p.
97.
Gruetter, Samuel
and
Murray, Toby
2017.
Short Paper.
p.
43.
Rajani, Vineet
Bastys, Iulia
Rafnsson, Willard
and
Garg, Deepak
2017.
Type systems for information flow control.
ACM SIGLOG News,
Vol. 4,
Issue. 1,
p.
6.
Cabon, Gurvan
and
Schmitt, Alan
2017.
Annotated Multisemantics To Prove Non-Interference Analyses.
p.
49.
Blatter, Lionel
Kosmatov, Nikolai
Le Gall, Pascale
and
Prevosto, Virgile
2017.
Tools and Algorithms for the Construction and Analysis of Systems.
Vol. 10205,
Issue. ,
p.
391.
D’Argenio, Pedro R.
Barthe, Gilles
Biewer, Sebastian
Finkbeiner, Bernd
and
Hermanns, Holger
2017.
Programming Languages and Systems.
Vol. 10201,
Issue. ,
p.
83.
Fuhs, Carsten
Kop, Cynthia
and
Nishida, Naoki
2017.
Verifying Procedural Programs via Constrained Rewriting Induction.
ACM Transactions on Computational Logic,
Vol. 18,
Issue. 2,
p.
1.
Subramanyan, Pramod
Sinha, Rohit
Lebedev, Ilia
Devadas, Srinivas
and
Seshia, Sanjit A.
2017.
A Formal Foundation for Secure Remote Execution of Enclaves.
p.
2435.
Grimm, Niklas
Zanella-Béguelin, Santiago
Maillard, Kenji
Fournet, Cédric
Hriţcu, Cătălin
Maffei, Matteo
Protzenko, Jonathan
Ramananandro, Tahina
Rastogi, Aseem
and
Swamy, Nikhil
2018.
A monadic framework for relational verification: applied to information security, program equivalence, and optimizations.
p.
130.
Bohrer, Rose
and
Platzer, André
2018.
A Hybrid, Dynamic Logic for Hybrid-Dynamic Information Flow.
p.
115.
Gerking, Christopher
Schubert, David
and
Bodden, Eric
2018.
Engineering Secure Software and Systems.
Vol. 10953,
Issue. ,
p.
27.
Athanasiou, Konstantinos
Cook, Byron
Emmi, Michael
MacCarthaigh, Colm
Schwartz-Narbonne, Daniel
and
Tasiran, Serdar
2018.
Verified Software. Theories, Tools, and Experiments.
Vol. 11294,
Issue. ,
p.
215.
Ngo, Minh
Piessens, Frank
and
Rezk, Tamara
2018.
Impossibility of Precise and Sound Termination-Sensitive Security Enforcements.
p.
496.
Karbyshev, Aleksandr
Svendsen, Kasper
Askarov, Aslan
and
Birkedal, Lars
2018.
Principles of Security and Trust.
Vol. 10804,
Issue. ,
p.
53.