Author of the publication

End-to-end verification of information-flow security for C and assembly programs.

, , and . PLDI, page 648-664. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Callee-Save Registers in Continuation-Passing Style., and . LISP Symb. Comput., 5 (3): 191-221 (1992)Typed common intermediate format.. ACM SIGSOFT Softw. Eng. Notes, 25 (1): 82 (2000)Building certified concurrent OS kernels., , , , , , , and . Commun. ACM, 62 (10): 89-99 (2019)Combining Domain-Specific and Foundational Logics to Verify Complete Software Systems., , , and . VSTTE, volume 5295 of Lecture Notes in Computer Science, page 54-69. Springer, (2008)TimeDice: Schedulability-Preserving Priority Inversion for Mitigating Covert Timing Channels Between Real-time Partitions., , , and . DSN, page 453-465. IEEE, (2022)Ou: Automating the Parallelization of Zero-Knowledge Protocols., , , , , , , and . CCS, page 534-548. ACM, (2023)Space-Efficient Closure Representations., and . LISP and Functional Programming, page 150-161. ACM, (1994)Flexible Representation Analysis.. ICFP, page 85-98. ACM, (1997)SIGPLAN Notices 32(8), August 1997.Representing Java Classes in a Typed Intermediate Language., , and . ICFP, page 183-196. ACM, (1999)SIGPLAN Notices 34(9), September 1999.Certified self-modifying code., , and . PLDI, page 66-77. ACM, (2007)