共 31 条
[1]
Allamigeon X., Blanchet B., Reconstruction of attacks against cryptographic protocols, 18th IEEE Workshop on Computer Security Foundations, 2005 (CSFW-18, (2005)
[2]
Apvrille L., Roudier Y., SysML-Sec: A SysML environment for the design and development of secure embedded systems, APCOSEC, (2013)
[3]
Arias O., Davi L., Hanreich M., Jin Y., Koeberl P., Paul D., Sadeghi A.R., Sullivan D., HAFIX: hardware-assisted flow integrity extension, 52nd Design Automation Conference (DAC), (2015)
[4]
Armstrong R.C., Punnoose R.J., Wong M.H., Mayo J.R., Survey of existing tools for formal verification, (2014)
[5]
Biere A., Cimatti A., Clarke E., Zhu Y., Symbolic model checking without BDDs, Tools and Algorithms for the Construction and Analysis of Systems, (1999)
[6]
Blanchet B., An efficient cryptographic protocol verifier based on prolog rules, Proceedings 14th IEEE Computer Security Foundations Workshop, (2001)
[7]
Blanchet B., Smyth B., Cheval V., Automatic Cryptographic Protocol Verifier, User Manual and Tutorial. CNRS, Departement dInformatique, (2015)
[8]
Brumley D., Jager I., Avgerinos T., Schwartz E., BAP: a binary analysis platform, Proceedings of the 23rd International Conference on Computer Aided Verification, (2011)
[9]
Camurati P., Prinetto P., Formal verification of hardware correctness: introduction and survey of current research, Computer, 21, 7, pp. 8-19, (1988)
[10]
Clarke E., Grumberg O., Jha S., Lu Y., Veith H., Counterexample-guided abstraction refinement, Computer Aided Verification, (2000)