Author:
Chong Stephen,Myers Andrew C.
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Vulnerability Flow Type Systems;2024 IEEE Security and Privacy Workshops (SPW);2024-05-23
2. Security Verification of the OpenTitan Hardware Root of Trust;IEEE Security & Privacy;2023-05
3. ANOSY: approximated knowledge synthesis with refinement types for declassification;Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation;2022-06-09
4. A Case Study in Information Flow Refinement for Low Level Systems;The Logic of Software. A Tasting Menu of Formal Methods;2022
5. Interpretable noninterference measurement and its application to processor designs;Proceedings of the ACM on Programming Languages;2021-10-20