Remote attestation to dynamic system properties: Towards providing complete system integrity evidence

C Kil, EC Sezer, AM Azab, P Ning… - 2009 IEEE/IFIP …, 2009 - ieeexplore.ieee.org
Remote attestation of system integrity is an essential part of trusted computing. However,
current remote attestation techniques only provide integrity proofs of static properties of the …

Alloy*: A general-purpose higher-order relational constraint solver

A Milicevic, JP Near, E Kang, D Jackson - Formal Methods in System …, 2019 - Springer
The last decade has seen a dramatic growth in the use of constraint solvers as a
computational mechanism, not only for analysis of software, but also at runtime. Solvers are …

Using B and ProB for data validation projects

D Hansen, D Schneider, M Leuschel - … State Machines, Alloy, B, TLA, VDM …, 2016 - Springer
Constraint satisfaction and data validation problems can be expressed very elegantly in
state-based formal methods such as B. However, is B suited for developing larger …

A comparison of three solver-aided programming languages: αRby, ProB, and Rosette

R St-Denis - Journal of Computer Languages, 2023 - Elsevier
The premise of this paper asserts that the source code of software programs must preserve
the underlying domain knowledge in the form of declarative domain models and fully exploit …

B2SAT: A bare-metal reduction of B to SAT

M Leuschel - International Symposium on Formal Methods, 2024 - Springer
We present a new SAT backend for the B-Method to enable new applications of formal
methods. The new backend interleaves low-level SAT solving with high-level constraint …

Unifying execution of imperative generators and declarative specifications

P Nie, M Parovic, Z Zang, S Khurshid… - Proceedings of the …, 2020 - dl.acm.org
We present Deuterium---a framework for implementing Java methods as executable
contracts. Deuterium introduces a novel, type-safe way to write method contracts entirely in …

Multi-representational security analysis

E Kang, A Milicevic, D Jackson - Proceedings of the 2016 24th ACM …, 2016 - dl.acm.org
Security attacks often exploit flaws that are not anticipated in an abstract design, but are
introduced inadvertently when high-level interactions in the design are mapped to low-level …

An embedding of B in Clojure

P Körner, F Mager - Proceedings of the 25th International Conference on …, 2022 - dl.acm.org
Considering programs as data enables powerful meta-programming. One example is Lisp's
macro system, which gives rise to powerful transformations of programs and allows easy …

[HTML][HTML] Formal methods and finite element analysis of hurricane storm surge: A case study in software verification

J Baugh, A Altuntas - Science of Computer Programming, 2018 - Elsevier
Used to predict the effects of hurricane storm surge, ocean circulation models are essential
tools for evacuation planning, vulnerability assessment, and infrastructure design …

Checks and balances: constraint solving without surprises in object-constraint programming languages

T Felgentreff, T Millstein, A Borning… - Proceedings of the 2015 …, 2015 - dl.acm.org
Object-constraint programming systems integrate declarative constraint solving with
imperative, object-oriented languages, seamlessly providing the power of both paradigms …