We present an advanced modeling and verification toolbox for functional programs with state and exceptions. The toolbox integrates an extensible, monad-based, component model, a monad-based Hoare logic and weakest prcondition calculus, and proof systems for temporal logic and bisimilarity. It is im-plemented in Isabelle/HOL using shallow embeddings and incorporates as much modeling and reasoning power as possible from Isabelle/HOL. We have validated the toolbox’s usefulness in a substantial security protocol verification project
We present a logic-based verification framework for multilevel security and transactional correctnes...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
Abstract. We present a scalable, practical Hoare Logic and refinement calculus for the nondeterminis...
This pearl examines how to verify functional programs written using the state monad. It uses Coq\u27...
Large software systems are usually divided into multiple components that interact with each other. H...
The growing complexity and diversity of models used for engineering dependable systems implies that ...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
We report on a case-study in using the data-oriented modeling language Z to formalize a security arc...
Abstract. This pearl introduces the Hoare state monad, a variant of the state monad that facilitates...
International audienceProgram-based test-generation methods (also called "white-box" tests) are conv...
International audienceThis paper proposes a general semantic framework for verifying programs with a...
We describe a verification framework for I/O automata in Isabelle. It includes a temporal logic, pro...
We report on a case-study in using the data-oriented modeling language Z to formalize a security arc...
The date of receipt and acceptance will be inserted by the editor Abstract. We present a method for ...
We present a logic-based verification framework for multilevel security and transactional correctnes...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...
Abstract. We present a scalable, practical Hoare Logic and refinement calculus for the nondeterminis...
This pearl examines how to verify functional programs written using the state monad. It uses Coq\u27...
Large software systems are usually divided into multiple components that interact with each other. H...
The growing complexity and diversity of models used for engineering dependable systems implies that ...
Security modeling is the foundation to formal verification which is a core requirement for high ass...
We report on a case-study in using the data-oriented modeling language Z to formalize a security arc...
Abstract. This pearl introduces the Hoare state monad, a variant of the state monad that facilitates...
International audienceProgram-based test-generation methods (also called "white-box" tests) are conv...
International audienceThis paper proposes a general semantic framework for verifying programs with a...
We describe a verification framework for I/O automata in Isabelle. It includes a temporal logic, pro...
We report on a case-study in using the data-oriented modeling language Z to formalize a security arc...
The date of receipt and acceptance will be inserted by the editor Abstract. We present a method for ...
We present a logic-based verification framework for multilevel security and transactional correctnes...
We embed an untyped security protocol model in the interactive the-orem prover Isabelle/HOL and deri...
We embed an untyped security protocol model in the interactive theorem prover Isabelle/HOL and deriv...