共 39 条
[31]
Tuch H, 2009, J AUTOM REASONING, V42, P125, DOI 10.1007/s10817-009-9120-2
[32]
Vanspauwen Gijs, 2017, CW Reports, V2017
[33]
Wang Shengyi, 2019, P ACM PROGR LANG OOP
[34]
Towards Optimization-Safe Systems: Analyzing the Impact of Undefined Behavior
[J].
SOSP'13: PROCEEDINGS OF THE TWENTY-FOURTH ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES,
2013,
:260-275
[35]
Weinstock Charles B., 1976, Ph.D. Dissertation
[36]
Wickerson J, 2010, LECT NOTES COMPUT SC, V6012, P610, DOI 10.1007/978-3-642-11957-6_32
[37]
Verified Correctness and Security of mbedTLS HMAC-DRBG
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:2007-2020
[38]
Yu Zhang, 2019, Dependable Software Engineering. Theories, Tools, and Applications. 5th International Symposium, SETTA 2019. Proceedings. Lecture Notes in Computer Science (LNCS 11951), P122, DOI 10.1007/978-3-030-35540-1_8
[39]
A Formally Verified NAT
[J].
SIGCOMM '17: PROCEEDINGS OF THE 2017 CONFERENCE OF THE ACM SPECIAL INTEREST GROUP ON DATA COMMUNICATION,
2017,
:141-154