In the past, formal verification of security properties of distributed applications has been mostly targeted to security protocols and generic security properties, like confidentiality and authenticity. At ESSOS 2010, Moebius et. al. presented an approach for developing Java applications with formally verified application-specific security properties. That method, however, is based on an interactive theorem prover, which is not automatic and requires considerable expertise. This paper shows that a similar result can be achieved in a fully automated way, using a different model-driven approach and state-of-the-art automated verification tools. The proposed method splits the verification problem into two independent sub-problems using compos...
Formal verification is usually taught with a focus on functional languages, such as Agda, or special...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
International audienceThis paper presents an experiment in which an implementation of the client sid...
This project develops a uniform verification framework for the protection of data. Key innovation on...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Abstract. In our previous work, we have proposed a framework which allows tools that can check stand...
We present a refinement method for Java programs which is motivated by the challenge of verifying se...
Java development kit 1.2 provides a runtime access control mechanism which inspects a control stack ...
Nowadays, verification of programs is gaining increased importance. The software industry appears ...
Designing and coding security protocols is an error prone task. Several flaws are found in protocol ...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
Abstract—We consider the problem of establishing cryp-tographic guarantees—in particular, computatio...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
Abstract. We present a case study in the formal verification of an open source Java implementation o...
This paper describes ProMoVer, a tool for fully automated procedure–modular verification of Java pro...
Formal verification is usually taught with a focus on functional languages, such as Agda, or special...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
International audienceThis paper presents an experiment in which an implementation of the client sid...
This project develops a uniform verification framework for the protection of data. Key innovation on...
Today, nearly all personal computer systems are multiprocessor sys-tems, allowing multiple programs ...
Abstract. In our previous work, we have proposed a framework which allows tools that can check stand...
We present a refinement method for Java programs which is motivated by the challenge of verifying se...
Java development kit 1.2 provides a runtime access control mechanism which inspects a control stack ...
Nowadays, verification of programs is gaining increased importance. The software industry appears ...
Designing and coding security protocols is an error prone task. Several flaws are found in protocol ...
We present how common Java Card security properties can be formalised in Dynamic Logic and verified,...
Abstract—We consider the problem of establishing cryp-tographic guarantees—in particular, computatio...
Software are increasingly complex and are unavoidably subject toprogramming errors (a.k.a. bugs). Th...
Abstract. We present a case study in the formal verification of an open source Java implementation o...
This paper describes ProMoVer, a tool for fully automated procedure–modular verification of Java pro...
Formal verification is usually taught with a focus on functional languages, such as Agda, or special...
This thesis is concerned with formal development of Java Card applets. Java Card is a technology tha...
International audienceThis paper presents an experiment in which an implementation of the client sid...