seL4

From MaRDI portal
Revision as of 20:24, 5 March 2024 by Import240305080343 (talk | contribs) (Created automatically from import240305080343)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Software:27113



swMATH15222MaRDI QIDQ27113


No author found.





Related Items (86)

A Synthesis of the Procedural and Declarative Styles of Interactive Theorem ProvingHow Hard Is Positive Quantification?Higher-order logic formalization of conformal geometric algebra and its application in verifying a robotic manipulation algorithmA FORMAL PROOF OF THE KEPLER CONJECTUREA formalisation in HOL of the fundamental theorem of linear algebra and its application to the solution of the least squares problemConnecting Higher-Order Separation Logic to a First-Order Outside Worldversat: A Verified Modern SAT SolverEisbach: a proof method language for IsabelleDeductive synthesis of programs with pointers: techniques, challenges, opportunities (invited paper)Verified Analysis of List Update Algorithms.Unnamed ItemProof checking and logic programmingChallenges and Experiences in Managing Large-Scale ProofsAUSPICE-R: Automatic Safety-Property Proofs for Realistic Features in Machine CodeUnifying Heterogeneous State-Spaces with LensesChecking the Conformance of a Promela Design to its Formal Specification in Event-BMechanised Separation AlgebraMore SPASS with IsabelleA learning-based fact selector for Isabelle/HOLFormalisation of the computation of the echelon form of a matrix in Isabelle/HOLPrincipled Software DevelopmentComputational logic: its origins and applicationsUnnamed ItemFeatherweight VeriFastTrusting computations: a mechanized proof from partial differential equations to actual programIntroduction to ``Milestones in interactive theorem provingThe role of the Mizar mathematical library for interactive proof development in MizarCoSMed: a confidentiality-verified social media platformToward compositional verification of interruptible OS kernels and device driversMachine Assisted Proof of ARMv7 Instruction Level Isolation PropertiesSystem-level non-interference of constant-time cryptography. I: ModelFormalization of Abstract State Transition Systems for SATTrace-based verification of imperative programs with I/OProof tactics for assertions in separation logicUnnamed ItemUsing formal reasoning on a model of tasks for FreeRTOSATP and presentation service for Mizar formalizationsFault-tolerant functional reactive programming (extended version)Mtac: A monad for typed tactic programming in CoqFormal reasoning under cached address translationSMT proof checking using a logical frameworkEstablishing flight software reliability: testing, model checking, constraint-solving, monitoring and learningRefinement through restraint: bringing down the cost of verificationVerified Characteristic Formulae for CakeMLComprehending Isabelle/HOL’s ConsistencyUnnamed ItemPredicate extension of symbolic memory graphs for the analysis of memory safety correctnessCharacteristic formulae for liveness properties of non-terminating CakeML programsCSimpl: A Rely-Guarantee-Based Framework for Verifying Concurrent ProgramsDeep Network Guided Proof SearchReasoning about Translation Lookaside BuffersNoninterference for Operating System KernelsPollack-inconsistencyHow to make ad hoc proof automation less ad hocOne Logic to Use Them AllProof Checking and Logic ProgrammingForeword to the special focus on formal proofs for mathematics and computer scienceFrom LCF to Isabelle/HOLCoCon: a conference management system with formally verified document confidentialityAutomated proof of Bell-LaPadula security propertiesTowards Formal Proof Script RefactoringPhysical addressing on real hardware in Isabelle/HOLProgram verification in the presence of cached address translationFrom a Proven Correct Microkernel to Trustworthy Large SystemsThe problem of proof identity, and why computer scientists should care about Hilbert's 24th problemHoare-style logic for unstructured programsExtensible and Efficient Automation Through Reflective TacticsConcerned with the unprivileged: user programs in kernel refinementBeyond Provable Security Verifiable IND-CCA Security of OAEPModel checking boot code from AWS data centersPriority inheritance protocol proved correctseL4 Enforces IntegrityIntegration of formal proof into unified assurance cases with Isabelle/SACMHOL Zero’s Solutions for Pollack-InconsistencyCoSMed: A Confidentiality-Verified Social Media PlatformA Framework for the Automatic Formal Verification of Refinement from Cogent to CAutomated Certification of Implicit Induction ProofsAn automatically verified prototype of the Tokeneer ID station specificationExperiences from exporting major proof assistant librariesMechanized metatheory revisitedFormal verification of integrity-preserving countermeasures against cache storage side-channelsBar Induction is Compatible with Constructive Type TheoryUnnamed ItemQED Reloaded: Towards a Pluralistic Formal Library of Mathematical KnowledgeA framework for the verification of certifying computationsThe future of logic: foundation-independence


This page was built for software: seL4