Author:
Djoudi Adel,Hána Martin,Kosmatov Nikolai
Publisher
Springer International Publishing
Reference27 articles.
1. Common criteria for information technology security evaluation. Part 3: security assurance components (2017). Technical report, CCMB-2017-04-003. https://www.commoncriteriaportal.org/files/ccfiles/CCPART3V3.1R5.pdf
2. Andronick J, Chetali B, Paulin-Mohring C (2005) Formal verification of security properties of smart card embedded source code. In: International symposium of formal methods (FM 2005), LNCS, vol 3582, pp 302–317. Springer. https://doi.org/10.1007/11526841_21
3. Barthe G, Dufay G, Jakubiec L, Serpette BP, de Sousa SM (2001) A formal executable semantics of the JavaCard platform. In: 10th European symposium on programming on programming languages and systems, (ESOP 2001), held as part of the joint European conferences on theory and practice of software (ETAPS 2001), LNCS, vol 2028. Springer, pp 302–319. https://doi.org/10.1007/3-540-45309-1_20
4. Baudin P, Bobot F, Correnson L, Dargaye Z, Blanchard A (2020) WP plug-in manual. https://frama-c.com/download/frama-c-wp-manual.pdf
5. Baudin P, Filliâtre JC, Marché C, Monate B, Moy Y, Prevosto V, ACSL: ANSI/ISO C specification language. http://frama-c.com/acsl.html