Author:
Ball Thomas,Bounimova Ella,Cook Byron,Levin Vladimir,Lichtenberg Jakob,McGarvey Con,Ondrusek Bohus,Rajamani Sriram K.,Ustuner Abdullah
Cited by
107 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Minimizing a Smartphone's TCB for Security-Critical Programs with Exclusively-Used, Physically-Isolated, Statically-Partitioned Hardware;Proceedings of the 21st Annual International Conference on Mobile Systems, Applications and Services;2023-06-18
2. SymFusion: Hybrid Instrumentation for Concolic Execution;Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering;2022-10-10
3. Formal Proof of Node Level Trust Evaluation in Wireless Sensor Network;Proceeding of First Doctoral Symposium on Natural Computing Research;2021
4. Fixing Vulnerabilities Automatically with Linters;Network and System Security;2020
5. Analysis of existing parallel programs verification technologies;Bulletin of V.N. Karazin Kharkiv National University, series «Mathematical modeling. Information technology. Automated control systems»;2020