The Spec# programming system: An overview

M Barnett, KRM Leino, W Schulte - … on Construction and Analysis of Safe …, 2004 - Springer
The Spec# programming system is a new attempt at a more cost effective way to develop
and maintain high-quality software. This paper describes the goals and architecture of the …

An overview of JML tools and applications

L Burdy, Y Cheon, DR Cok, MD Ernst, JR Kiniry… - International journal on …, 2005 - Springer
Abstract The Java Modeling Language (JML) can be used to specify the detailed design of
Java classes and interfaces by adding annotations to Java source files. The aim of JML is to …

Deductive software verification-the key book

W Ahrendt, B Beckert, R Bubel, R Hähnle… - Lecture notes in …, 2016 - Springer
• There are IDEs for KeY, including an Eclipse extension, that make it easy to keep track of
proof obligations in larger projects [Hentschel et al., 2014c].• A stripped down version of …

Dafny: An automatic program verifier for functional correctness

KRM Leino - International conference on logic for programming …, 2010 - Springer
Traditionally, the full verification of a program's functional correctness has been obtained
with pen and paper or with interactive proof assistants, whereas only reduced verification …

Boogie: A modular reusable verifier for object-oriented programs

M Barnett, BYE Chang, R DeLine, B Jacobs… - Formal Methods for …, 2006 - Springer
A program verifier is a complex system that uses compiler technology, program semantics,
property inference, verification-condition generation, automatic decision procedures, and a …

Extended static checking for Java

C Flanagan, KRM Leino, M Lillibridge… - Proceedings of the …, 2002 - dl.acm.org
Software development and maintenance are costly endeavors. The cost can be reduced if
more software defects are detected earlier in the development cycle. This paper introduces …

Secure information flow by self-composition

G Barthe, PR D'argenio, T Rezk - Mathematical Structures in …, 2011 - cambridge.org
Information flow policies are confidentiality policies that control information leakage through
program execution. A common way to enforce secure information flow is through information …

Korat: Automated testing based on Java predicates

C Boyapati, S Khurshid, D Marinov - ACM SIGSOFT Software …, 2002 - dl.acm.org
This paper presents Korat, a novel framework for automated testing of Java programs. Given
a formal specification for a method, Korat uses the method precondition to automatically …

[图书][B] Verification of Object-Oriented Software. The KeY Approach: Foreword by K. Rustan M. Leino

B Beckert, R Hähnle, PH Schmitt - 2007 - books.google.com
Long gone are the days when program veri? cation was a task carried out merely by hand
with paper and pen. For one, we are increasingly interested in proving actual program …

Deductive software verification: from pen-and-paper proofs to industrial tools

R Hähnle, M Huisman - Computing and Software Science: State of the Art …, 2019 - Springer
Deductive software verification aims at formally verifying that all possible behaviors of a
given program satisfy formally defined, possibly complex properties, where the verification …