2020
DOI: 10.34727/2020/isbn.978-3-85448-042-6_23
|View full text |Cite
|
Sign up to set email alerts
|

Automating Modular Verification of Secure Information Flow

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 51 publications
0
3
0
Order By: Relevance
“…To do this we must efficiently combine subverifications for level components into a verification for the entire game. The idea of modular verification is well known in the formal methods literature [19], but it must be adapted to the distinct kind of modules relevant to level designers. It is not yet clear how to retrofit methods that combine proofs for local functions in software source code to combine proofs for local regions in a game world.…”
Section: Discussionmentioning
confidence: 99%
“…To do this we must efficiently combine subverifications for level components into a verification for the entire game. The idea of modular verification is well known in the formal methods literature [19], but it must be adapted to the distinct kind of modules relevant to level designers. It is not yet clear how to retrofit methods that combine proofs for local functions in software source code to combine proofs for local regions in a game world.…”
Section: Discussionmentioning
confidence: 99%
“…Not only is induction a very interesting theoretical concept, it is also of high practical importance, since it is required to reason about software reliability, safety and security, see e.g. [13,7,10,22,11]. Such and similar software requirement typically involve properties over natural numbers, recursion, unbounded loop iterations, or recursive data structures like lists, and trees.…”
Section: Introductionmentioning
confidence: 99%
“…Not only is induction a very interesting theoretical concept, it is also of high practical importance, since it is required to reason about software reliability, safety and security, see e.g. [13,7,10,22,11]. Such and similar sofwtare requirememt typically involve properties over natural numbers, recursion, unbounded loop iterations, or recursive data structures like lists, and trees.…”
Section: Introductionmentioning
confidence: 99%