Proceedings of the 5th Workshop on MechAnisms for SPEcialization, Generalization and inHerItance 2013
DOI: 10.1145/2489828.2489830
|View full text |Cite
|
Sign up to set email alerts
|

Wyvern

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 16 publications
(5 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…However, VST's partial-correctness interpretation of triples limits the end-to-end usefulness of coinductive reasoning. A recent proposal for integrating statically typed Smalltalk-inspired objects into a functional calculus is Wyvern [52].…”
Section: Discussionmentioning
confidence: 99%
“…However, VST's partial-correctness interpretation of triples limits the end-to-end usefulness of coinductive reasoning. A recent proposal for integrating statically typed Smalltalk-inspired objects into a functional calculus is Wyvern [52].…”
Section: Discussionmentioning
confidence: 99%
“…Some software producers consider security as a first-class citizen while others do not. As mentioned in previous work, security is critical and should be considered as a default feature (Nistor et al 2013;Kurilova et al 2014;McGraw 2004). However, the lack of experts and awareness of developers for security while producing/patching software leads companies to ship low-quality software.…”
Section: Prioritize High and Medium Severitymentioning
confidence: 99%
“…In addition, programming languages should provide new design patterns to easily patch security weaknesses without endangering maintainability. Ultimately, new programming languages, both secure and maintainable by design, such as Wyvern (Nistor et al 2013;Kurilova et al 2014), should be designed to help developers be less vulnerability prone when writing and maintaining secure applications. One example is the need for designing new authorization mechanisms since these are one of the most complex security features to implement.…”
Section: Secure Programming Languages By Designmentioning
confidence: 99%
See 1 more Smart Citation
“…SugarJ [11] provides a method for extending Java syntax. ProteaJ [19], Wyvern [24], and Honu [26] are programming languages that natively support syntax extension. Using these syntax extension mechanisms, domain-specific notation can be embedded as is.…”
Section: Domain-specific Languagementioning
confidence: 99%