共 49 条
[2]
Automating Information Flow Analysis of Low Level Code
[J].
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2014,
:1080-1091
[3]
Barrett Clark, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P171, DOI 10.1007/978-3-642-22110-1_14
[4]
Barrett C., 2017, TECH REP
[5]
Secure information flow by self-composition
[J].
17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2004,
:100-114
[6]
Barthe G., 2019, ABS190609899 CORR
[8]
Barthe Gilles, 2013, LNCS, V7734, P29, DOI [10.1007/978--3-642--35722--0_3, DOI 10.1007/978-3-642-35722-03]
[9]
Beckert B., 2001, Automated Reasoning. First International Joint Conference, IJCAR 2001. Proceedings (Lecture Notes in Artificial Intelligence Vol.2083), P626
[10]
Beckert Bernhard., 2018, Principled Software Development - Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday, P41, DOI DOI 10.1007/978-3-319-98047-83