Zobrazeno 1 - 10
of 41
pro vyhledávání: '"Michael Emmi"'
Autor:
Gabriela F. Ciocarlie, Michael Emmi, Michael E. Locasto, Tancrède Lepoint, Ulf Lindqvist, Prashant Anantharaman, Bogdan Copos, Ioannis Agadakos, Liwei Song
Publikováno v:
Modeling and Design of Secure Internet of Things
Autor:
Lee Pike, Aritra Sengupta, Martin Schäf, Michael Emmi, Willem Visser, Nicolás Rosner, Ranjit Jhala, Liana Hadarean
Publikováno v:
ESEC/SIGSOFT FSE
We present RAPID, an industrial-strength analysis developed at AWS that aims to help developers by providing automatic, fast and actionable feedback about correct usage of cloud-service APIs. RAPID’s design is based on the insight that cloud servic
This book constitutes the proceedings of the 24th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2023, which took place in Boston, USA, in January 2023. The 17 full papers presented in this book were car
Publikováno v:
ICST
Testing-based methodologies like fuzzing are able to analyze complex software which is not amenable to traditional formal approaches like verification, model checking, and abstract interpretation. Despite enormous success at exposing countless securi
Publikováno v:
Programming Languages and Systems ISBN: 9783030449131
ESOP
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Programming Languages and Systems
Programming Languages and Systems-29th European Symposium on Programming, {ESOP} 2020
ESOP
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Programming Languages and Systems
Programming Languages and Systems-29th European Symposium on Programming, {ESOP} 2020
Multithreaded programs generally leverage efficient and thread-safe concurrent objects like sets, key-value maps, and queues. While some concurrent-object operations are designed to behave atomically, each witnessing the atomic effects of predecessor
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::88d673589176ecb54866acbd0cb59be7
https://doi.org/10.1007/978-3-030-44914-8_11
https://doi.org/10.1007/978-3-030-44914-8_11
Autor:
Michael Emmi, Ioannis Agadakos, Nandi O. Leslie, Jemin George, Bogdan Copos, James Michaelis, Gabriela F. Ciocarlie
Publikováno v:
MILCOM
Continued advances in IoT technology have prompted new investigation into its usage for military operations, both to augment and complement existing military sensing assets and support next-generation artificial intelligence and machine learning syst
Autor:
Constantin Enea, Michael Emmi
Publikováno v:
Proc. {ACM} Program. Lang.
Effective software specifications enable modular reasoning, allowing clients to establish program properties without knowing the details of module implementations. While some modules’ operations behave atomically, others admit weaker consistencies
Autor:
Michael Emmi, Constantin Enea
Publikováno v:
POPL
Formal specification is a vital ingredient to scalable verification of software systems. In the case of efficient implementations of concurrent objects like atomic registers, queues, and locks, symbolic formal representations of their abstract data t
Autor:
Konstantinos Athanasiou, Byron Cook, Michael Emmi, Daniel Schwartz-Narbonne, Colm MacCarthaigh, Serdar Tasiran
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030035914
VSTTE
VSTTE
Timing-based side-channel attacks are a serious security risk for modern cryptosystems. The time-balancing countermeasure used by several TLS implementations (e.g. s2n, GnuTLS) ensures that execution timing is negligibly influenced by secrets, and he
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::57ab164971e342ccb625e8de92db47b7
https://doi.org/10.1007/978-3-030-03592-1_12
https://doi.org/10.1007/978-3-030-03592-1_12
Autor:
Michael Emmi, Constantin Enea
Publikováno v:
Proceedings of the ACM on Programming Languages
Proceedings of the ACM on Programming Languages, ACM, 2017
Proceedings of the ACM on Programming Languages, ACM, 2017
While many program properties like the validity of assertions and in-bounds array accesses admit nearly-trivial monitoring algorithms, the standard correctness criterion for concurrent data structures does not. Given an implementation of an arbitrary
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::6be1fd7cc8b6cef24559cce754a96dd1
https://hal.archives-ouvertes.fr/hal-01943932/document
https://hal.archives-ouvertes.fr/hal-01943932/document