Static analysis [NNH99] is technique used to compute information about the run-time behaviour of a program prior to execution. Traditionally, it has been used in the context of optimizing compilers, but it has recently been applied to more formalized languages in order to develop provable policies that can be used to verify the security of networks. Best results are naturally achieved with the most precise information flow techniques, though complex systems impose feasibility constraints. Accuracy of results, particularly with respect to relative cost of computation is thus an important quality.This thesis presents a series of dataflow analyses of the pi-calculus, an extensively studied concurrent language that has been used to mode...
textabstractProcess calculi are expressive specification languages for concurrency. They have been v...
We design a core language of principals running distributed programs over a public network. Our lang...
Unwinding conditions provide a general framework for the definition of security properties. They bas...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
) Lalita Jategaonkar Jagadeesan Software Production Research Dept. AT&T Bell Laboratories Naperv...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
Detecting bugs plays a significant role in software development. Bugs may lead to unexpected behavio...
International audienceProcess calculi are expressive specification languages for concurrency. They h...
We propose a methodology for the formal analysis of security protocols. This originates from the obs...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
Abstract—Message passing is a very popular style of parallel programming, used in a wide variety of ...
Recently there has been much interest towards using formal methods in the analysis of security proto...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We present in this technical report a non-uniform static analysis for detecting the term-substitutio...
textabstractProcess calculi are expressive specification languages for concurrency. They have been v...
We design a core language of principals running distributed programs over a public network. Our lang...
Unwinding conditions provide a general framework for the definition of security properties. They bas...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
AbstractControl Flow Analysis is a static technique for predicting safe and computable approximation...
) Lalita Jategaonkar Jagadeesan Software Production Research Dept. AT&T Bell Laboratories Naperv...
Control Flow Analysis is a static technique for predicting safe and computable approximations to the...
Detecting bugs plays a significant role in software development. Bugs may lead to unexpected behavio...
International audienceProcess calculi are expressive specification languages for concurrency. They h...
We propose a methodology for the formal analysis of security protocols. This originates from the obs...
We introduce a Control Flow Analysis that statically approximates the dynamic behaviour of mobile pr...
Abstract—Message passing is a very popular style of parallel programming, used in a wide variety of ...
Recently there has been much interest towards using formal methods in the analysis of security proto...
Abstract. We introduce the νSPI-calculus that strengthens the notion of “perfect symmetric cryptogra...
We present in this technical report a non-uniform static analysis for detecting the term-substitutio...
textabstractProcess calculi are expressive specification languages for concurrency. They have been v...
We design a core language of principals running distributed programs over a public network. Our lang...
Unwinding conditions provide a general framework for the definition of security properties. They bas...