Members
Overall Objectives
New Software and Platforms
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
G. Barthe, D. Demange, D. Pichardie.
Formal Verification of an SSA-based Middle-end for CompCert, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2014, 35 p.
https://hal.inria.fr/hal-01097677
[2]
F. Besson, N. Bielova, T. Jensen.
Hybrid Information Flow Monitoring Against Web Tracking, in: CSF - 2013 IEEE 26th Computer Security Foundations Symposium, New Orleans, United States, 2013. [ DOI : 10.1109/CSF.2013.23 ]
http://hal.inria.fr/hal-00924138
[3]
F. Besson, T. Jensen, D. Pichardie.
Proof-Carrying Code from Certified Abstract Interpretation to Fixpoint Compression, in: Theoretical Computer Science, 2006, vol. 364, no 3, pp. 273–291.
[4]
M. Bodin, A. Charguéraud, D. Filaretti, P. Gardner, S. Maffeis, D. Naudziuniene, A. Schmitt, G. Smith.
A Trusted Mechanised JavaScript Specification, in: POPL 2014 - 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, San Diego, United States, November 2013.
http://hal.inria.fr/hal-00910135
[5]
B. Boyer, T. Genet, T. Jensen.
Certifying a Tree Automata Completion Checker, in: 4th International Joint Conference, IJCAR 2008, Lectures Notes in Computer Science, Springer-Verlag, 2008, vol. 5195, pp. 347–362.
[6]
D. Cachera, T. Jensen, A. Jobin, F. Kirchner.
Inference of polynomial invariants for imperative programs: a farewell to Gröbner bases, in: Science of Computer Programming, 2014, vol. 93, 21 p. [ DOI : 10.1016/j.scico.2014.02.028 ]
https://hal.inria.fr/hal-00932351
[7]
D. Cachera, T. Jensen, D. Pichardie, V. Rusu.
Extracting a Data Flow Analyser in Constructive Logic, in: Theoretical Computer Science, 2005, vol. 342, no 1, pp. 56–78.
[8]
D. Demange, V. Laporte, L. Zhao, D. Pichardie, S. Jagannathan, J. Vitek.
Plan B: A Buffered Memory Model for Java, in: Proc. of the 40th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2013, Rome, Italy, ACM, 2013.
http://hal.inria.fr/hal-00924716
[9]
T. Genet, V. Rusu.
Equational Approximations for Tree Automata Completion, in: Journal of Symbolic Computation, 2010, vol. 45(5):574-597, May 2010, no 5, pp. 574-597.
[10]
L. Hubert, T. Jensen, V. Monfort, D. Pichardie.
Enforcing Secure Object Initialization in Java, in: 15th European Symposium on Research in Computer Security (ESORICS), Lecture Notes in Computer Science, Springer, 2010, vol. 6345, pp. 101-115.
[11]
J.-H. Jourdan, V. Laporte, S. Blazy, X. Leroy, D. Pichardie.
A formally-verified C static analyzer, in: POPL 2015: 42nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Mumbai, India, ACM, January 2015, pp. 247-259. [ DOI : 10.1145/2676726.2676966 ]
https://hal.inria.fr/hal-01078386
Publications of the year

Articles in International Peer-Reviewed Journals

[12]
A. Azevedo De Amorim, N. Collins, A. DeHon, D. Demange, C. Hriţcu, D. Pichardie, B. C. Pierce, R. Pollack, A. Tolmach.
A Verified Information-Flow Architecture, in: Journal of Computer Security (JCS); Special Issue on Verified Information Flow Security, December 2016, vol. 24, no 6, pp. 689–734.
https://hal.archives-ouvertes.fr/hal-01424797
[13]
N. Bielova, F. Besson, T. Jensen.
Using JavaScript Monitoring to Prevent Device Fingerprinting, in: ERCIM News, July 2016.
https://hal.inria.fr/hal-01353997
[14]
S. Blazy, D. Bühler, B. Yakobowski.
Improving static analyses of C programs with conditional predicates, in: Science of Computer Programming, March 2016, vol. 118, Extended version of the FMICS 2014 paper. [ DOI : 10.1145/2854065.2854082 ]
https://hal.inria.fr/hal-01242077
[15]
S. Blazy, V. Laporte, D. Pichardie.
Verified Abstract Interpretation Techniques for Disassembling Low-level Self-modifying Code, in: Journal of Automated Reasoning, 2016, vol. 56, no 3, 26 p, Version étendue de l'article de la conférence ITP 2014. [ DOI : 10.1007/s10817-015-9359-8 ]
https://hal.inria.fr/hal-01243700
[16]
T. Genet.
Termination criteria for tree automata completion, in: Journal of Logic and Algebraic Methods in Programming, 2016, vol. 85, Issue 1, part 1, pp. 3-33. [ DOI : 10.1016/j.jlamp.2015.05.003 ]
https://hal.inria.fr/hal-01194533
[17]
F. Honsell, L. Liquori, P. Maksimovic, I. Scagnetto.
LLFP : A Logical Framework for modeling External Evidence, Side Conditions, and Proof Irrelevance using Monads, in: Logical Methods in Computer Science, February 2016.
https://hal.inria.fr/hal-01146059

International Conferences with Proceedings

[18]
F. Besson, N. Bielova, T. Jensen.
Hybrid Monitoring of Attacker Knowledge, in: 29th IEEE Computer Security Foundations Symposium, Lisboa, Portugal, 2016.
https://hal.inria.fr/hal-01310572
[19]
S. Blazy, V. Laporte, D. Pichardie.
An Abstract Memory Functor for Verified C Static Analyzers, in: ACM SIGPLAN International Conference on Functional Programming (ICFP 2016), Nara, Japan, ACM, September 2016, 14 p. [ DOI : 10.1145/2951913.2951937 ]
https://hal.inria.fr/hal-01339969
[20]
S. Blazy, A. Trieu.
Formal Verification of Control-flow Graph Flattening, in: Certified Proofs and Programs (CPP 2016), Saint-Petersburg, United States, ACM (editor), Certified Proofs and Programs (CPP 2016), January 2016, 12 p, forthcoming. [ DOI : 10.1145/2854065.2854082 ]
https://hal.inria.fr/hal-01242063
[21]
M. Bodin, T. Jensen, A. Schmitt.
An Abstract Separation Logic for Interlinked Extensible Records, in: Vingt-septièmes Journées Francophones des Langages Applicatifs (JFLA 2016), Saint-Malo, France, J. Signoles (editor), January 2016.
https://hal.archives-ouvertes.fr/hal-01333600
[22]
P. Bolignano, T. Jensen, V. Siles.
Modeling and Abstraction of Memory Management in a Hypervisor, in: Fundamental Approaches to Software Engineering (FASE’16), Eindhoven, Netherlands, Proc. of Fundamental Approaches to Software Engineering (FASE’16), Springer, April 2016, vol. 9633, pp. 214 - 230. [ DOI : 10.1007/978-3-662-49665-7_13 ]
https://hal.inria.fr/hal-01394174
[23]
G. Cabon, D. Cachera, D. Pichardie.
An Extended Buffered Memory Model With Full Reorderings, in: FtFjp - Ecoop workshop, Rome, Italy, July 2016, pp. 1 - 6. [ DOI : 10.1145/2955811.2955816 ]
https://hal.inria.fr/hal-01379514
[24]
D. Demange, Y. Fernandez De Retana.
Mechanizing conventional SSA for a verified destruction with coalescing, in: 25th International Conference on Compiler Construction, Barcelona, Spain, March 2016.
https://hal.archives-ouvertes.fr/hal-01378393
[25]
C. Fournet, C. Keller, V. Laporte.
A Certified Compiler for Verifiable Computing, in: IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbonne, Portugal, June 2016.
https://hal.inria.fr/hal-01397680
[26]
D. Kästner, X. Leroy, S. Blazy, B. Schommer, M. Schmidt, C. Ferdinand.
Closing the Gap – The Formally Verified Optimizing Compiler CompCert, in: SSS'17: Safety-critical Systems Symposium 2017, Bristol, United Kingdom, Proceedings of the Twenty-fifth Safety-Critical Systems Symposium, February 2017.
https://hal.inria.fr/hal-01399482
[27]
A. Oana, T. Jensen, S. Lescuyer.
Correlating Structured Inputs and Outputs in Functional Specifications, in: Software Engineering and Formal Methods, Vienna, Austria, 14th Int. Software Engineering and Formal Methods conference, Springer, July 2016, vol. 9763, 19 p. [ DOI : 10.1007/978-3-319-41591-8_7 ]
https://hal.inria.fr/hal-01394178

Conferences without Proceedings

[28]
X. Leroy, S. Blazy, D. Kästner, B. Schommer, M. Pister, C. Ferdinand.
CompCert - A Formally Verified Optimizing Compiler, in: ERTS 2016: Embedded Real Time Software and Systems, 8th European Congress, Toulouse, France, SEE, January 2016.
https://hal.inria.fr/hal-01238879

Books or Proceedings Editing

[29]
S. Blazy, M. Chéchia (editors)
Verified Software: Theories, Tools, and Experiments - 8th International Conference, VSTTE 2016, Toronto, Canada, July 17-18, 2016. Proceedings, Lecture Notes in Computer Science, Springer, Toronto, Canada, 2016, vol. 9971.
https://hal.inria.fr/hal-01387207
References in notes
[30]
G. Barthe, D. Demange, D. Pichardie.
Formal Verification of an SSA-based Middle-end for CompCert, in: ACM Transactions on Programming Languages and Systems (TOPLAS), 2014, 35 p.
https://hal.inria.fr/hal-01097677
[31]
S. Blazy, D. Demange, D. Pichardie.
Validating Dominator Trees for a Fast, Verified Dominance Test, in: Proc. of the 6th International Conference on Interactive Theorem Proving (ITP 2015), LNCS, Springer, 2015.
[32]
M. Bodin, T. Jensen, A. Schmitt.
Certified Abstract Interpretation with Pretty-Big-Step Semantics, in: Certified Programs and Proofs (CPP 2015), Mumbai, India, Proceedings of the 2015 Conference on Certified Programs and Proofs, January 2015. [ DOI : 10.1145/2676724.2693174 ]
https://hal.inria.fr/hal-01111588
[33]
B. Boissinot, A. Darte, F. Rastello, B. Dupont de Dinechin, C. Guillon.
Revisiting Out-of-SSA Translation for Correctness, Code Quality and Efficiency, in: Proc. of CGO'09, IEEE Computer Society, 2009, pp. 114–125.
[34]
G. Boudol, G. Petri, B. P. Serpette.
Relaxed Operational Semantics of Concurrent Programming Languages, in: EXPRESS/SOS, 2012, vol. 89, pp. 19-33.
[35]
D. Demange, V. Laporte, L. Zhao, D. Pichardie, S. Jagannathan, J. Vitek.
Plan B: A Buffered Memory Model for Java, in: Proc. of the 40th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2013, Rome, Italy, ACM, 2013.
http://hal.inria.fr/hal-00924716
[36]
D. Demange, L. Stefanesco, D. Pichardie.
Verifying Fast and Sparse SSA-based Optimizations in Coq, in: Proc. of CC'15, LNCS, 2015, vol. 9031, pp. 233-252.
[37]
J.-H. Jourdan, V. Laporte, S. Blazy, X. Leroy, D. Pichardie.
A formally-verified C static analyzer, in: POPL 2015: 42nd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, Mumbai, India, ACM, January 2015, pp. 247-259. [ DOI : 10.1145/2676726.2676966 ]
https://hal.inria.fr/hal-01078386
[38]
J. A. Kroll, G. Stewart, A. W. Appel.
Portable Software Fault Isolation, in: CSF 2014, IEEE, 2014, pp. 18–32.
http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6954678
[39]
P. Wilke.
Formally verified compilation of low-level C code, University of Rennes 1, 2016.