Arable 发表于 2025-3-26 21:18:56
http://reply.papertrans.cn/88/8709/870821/870821_31.png翻动 发表于 2025-3-27 04:31:50
http://reply.papertrans.cn/88/8709/870821/870821_32.png禁令 发表于 2025-3-27 05:49:39
Verifying Protocol Implementations by Augmenting Existing Cryptographic Libraries with Specificationmalized in VeriFast, a separation logic-based verifier for C programs. By giving formal contracts to the primitives of an existing cryptographic library (i.e. PolarSSL), we were able to prove, besides memory safety, interesting security properties of a small protocol suite thatdemonstrates the usage of those primitives.Memorial 发表于 2025-3-27 10:22:46
Speed Up Configurable Certificate Validation by Certificate Reduction and Partitioningnformation only if it cannot easily be recomputed. The second approach partitions the certificate into independently checkable parts. The trick is to read parts of the certificate while already checking read parts. Our experiments show that validation highly benefits from our improvements.Humble 发表于 2025-3-27 14:08:22
http://reply.papertrans.cn/88/8709/870821/870821_35.pngDeduct 发表于 2025-3-27 17:56:17
http://reply.papertrans.cn/88/8709/870821/870821_36.pngTHE 发表于 2025-3-27 22:48:58
An Interface Theory for the Internet of Things, it examines an architecture for IoT applications where so-called “accessors” provide an actor-oriented proxy for devices (“things”) and services. Following the principles of actor models, an accessor reacts to input stimuli and produces outputs that can stimulate reactions in other accessors or ac抗体 发表于 2025-3-28 05:14:27
Learning Assertions to Verify Linked-List Programs analysis of dsOli to locate and identify data structure operations in a program, and then use this information to automatically annotate that program with assertions in separation logic. These annotations comprise candidate pre/post-conditions and loop invariants suitable to statically verify memorHyperplasia 发表于 2025-3-28 06:30:20
http://reply.papertrans.cn/88/8709/870821/870821_39.png表状态 发表于 2025-3-28 11:03:56
Specification and Verification of Atomic Operations in GPGPU Programsrnels that use . as synchronisation mechanism. Our approach exploits the notion of . from Concurrent Separation Logic (CSL) to capture the behaviour of atomic operations. However, because of the different memory levels in the GPU architecture, we adapt this notion of resource invariant to these memo