Остановите войну!
for scientists:
default search action
David A. Naumann
- > Home > Persons > David A. Naumann
Publications
- 2023
- [j25]Frederico Ramos, Nuno Sabino, Pedro Adão, David A. Naumann, José Fragoso Santos:
Toward Tool-Independent Summaries for Symbolic Execution (Artifact). Dagstuhl Artifacts Ser. 9(2): 07:1-07:4 (2023) - [j23]Timos Antonopoulos, Eric Koskinen, Ton Chanh Le, Ramana Nagasamudram, David A. Naumann, Minh Ngo:
An Algebra of Alignment for Relational Verification. Proc. ACM Program. Lang. 7(POPL): 573-603 (2023) - [c60]Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann:
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications. CCS 2023: 1746-1760 - [c59]Frederico Ramos, Nuno Sabino, Pedro Adão, David A. Naumann, José Fragoso Santos:
Toward Tool-Independent Summaries for Symbolic Execution. ECOOP 2023: 24:1-24:29 - [c58]Ramana Nagasamudram, Anindya Banerjee, David A. Naumann:
The WhyRel Prototype for Modular Relational Verification of Pointer Programs. TACAS (2) 2023: 133-151 - [i19]Ramana Nagasamudram, Anindya Banerjee, David A. Naumann:
The WhyRel Prototype for Relational Verification. CoRR abs/2303.14314 (2023) - [i18]Ramana Nagasamudram, Anindya Banerjee, David A. Naumann:
Alignment complete relational Hoare logics for some and all. CoRR abs/2307.10045 (2023) - [i17]Toby Murray, Mukesh Tiwari, Gidon Ernst, David A. Naumann:
Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version). CoRR abs/2309.03442 (2023) - 2022
- [j22]Anindya Banerjee, Ramana Nagasamudram, David A. Naumann, Mohammad Nikouei:
A Relational Program Logic with Data Abstraction and Dynamic Framing. ACM Trans. Program. Lang. Syst. 44(4): 25:1-25:136 (2022) - [i16]Timos Antonopoulos, Eric Koskinen, Ton Chanh Le, Ramana Nagasamudram, David A. Naumann, Minh Ngo:
An algebra of alignment for relational verification. CoRR abs/2202.04278 (2022) - [i15]Anindya Banerjee, Ramana Nagasamudram, David A. Naumann:
Making Relational Hoare Logic Alignment Complete. CoRR abs/2212.10338 (2022) - 2021
- [c57]Ramana Nagasamudram, David A. Naumann:
Alignment Completeness for Relational Hoare Logics. LICS 2021: 1-13 - [i14]Ramana Nagasamudram, David A. Naumann:
Alignment Completeness for Relational Hoare Logics. CoRR abs/2101.11730 (2021) - 2020
- [c56]Minh Ngo, David A. Naumann, Tamara Rezk:
Type-Based Declassification for Free. ICFEM 2020: 181-197 - 2019
- [c53]David A. Naumann, Minh Ngo:
Whither Specifications as Programs. UTP 2019: 39-61 - [i12]Minh Ngo, David A. Naumann, Tamara Rezk:
Typed-based Relaxed Noninterference for Free. CoRR abs/1905.00922 (2019) - [i10]Anindya Banerjee, Ramana Nagasamudram, David A. Naumann, Mohammad Nikouei:
Data Abstraction and Relational Program Logic. CoRR abs/1910.14560 (2019) - 2018
- [j21]Anindya Banerjee, David A. Naumann, Mohammad Nikouei:
A Logical Analysis of Framing for Specifications with Pure Method Calls. ACM Trans. Program. Lang. Syst. 40(2): 6:1-6:90 (2018) - [c52]Andrey Chudnov, David A. Naumann:
Assuming You Know: Epistemic Semantics of Relational Annotations for Expressive Flow Policies. CSF 2018: 189-203 - 2017
- [c50]Gary T. Leavens, David A. Naumann:
An Illustrated Guide to the Model Theory of Supertype Abstraction and Behavioral Subtyping. SETSS 2017: 39-88 - [c49]Julian Sexton, Andrey Chudnov, David A. Naumann:
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications. IEEE Symposium on Security and Privacy Workshops 2017: 157-162 - 2016
- [c47]Anindya Banerjee, David A. Naumann, Mohammad Nikouei:
Relational Logic with Framing and Hypotheses. FSTTCS 2016: 11:1-11:16 - [c46]Gary T. Leavens, David A. Naumann, Hridesh Rajan, Tomoyuki Aotani:
Specifying and Verifying Advanced Control Features. ISoLA (2) 2016: 80-96 - [i7]Anindya Banerjee, David A. Naumann, Mohammad Nikouei:
Relational Logic with Framing and Hypotheses: Technical Report. CoRR abs/1611.08992 (2016) - 2015
- [j19]Gary T. Leavens, David A. Naumann:
Behavioral Subtyping, Specification Inheritance, and Modular Reasoning. ACM Trans. Program. Lang. Syst. 37(4): 13:1-13:88 (2015) - [c45]Andrey Chudnov, David A. Naumann:
Inlined Information Flow Monitoring for JavaScript. CCS 2015: 629-643 - 2014
- [j18]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a general-purpose C verifier to prove cryptographic protocols. J. Comput. Secur. 22(5): 823-866 (2014) - [c44]Andrey Chudnov, George Kuan, David A. Naumann:
Information Flow Monitoring as Abstract Interpretation for Relational Logic. CSF 2014: 48-62 - [c43]Anindya Banerjee, David A. Naumann:
A Logical Analysis of Framing for Specifications with Pure Method Calls. VSTTE 2014: 3-20 - 2013
- [j17]Anindya Banerjee, David A. Naumann, Stan Rosenberg:
Local Reasoning for Global Invariants, Part I: Region Logic. J. ACM 60(3): 18:1-18:56 (2013) - [j16]Anindya Banerjee, David A. Naumann:
Local Reasoning for Global Invariants, Part II: Dynamic Boundaries. J. ACM 60(3): 19:1-19:73 (2013) - [c40]Anindya Banerjee, David A. Naumann:
A Simple Semantics and Static Analysis for Stack Inspection. Festschrift for Dave Schmidt 2013: 284-308 - [p1]Anindya Banerjee, David A. Naumann:
State Based Encapsulation for Modular Reasoning about Behavior-Preserving Refactorings. Aliasing in Object-Oriented Programming 2013: 319-365 - [i5]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CoRR abs/1312.6532 (2013) - 2012
- [c39]Stan Rosenberg, Anindya Banerjee, David A. Naumann:
Decision Procedures for Region Logic. VMCAI 2012: 379-395 - 2011
- [c38]François Dupressoir, Andrew D. Gordon, Jan Jürjens, David A. Naumann:
Guiding a General-Purpose C Verifier to Prove Cryptographic Protocols. CSF 2011: 3-17 - 2010
- [c36]Andrey Chudnov, David A. Naumann:
Information Flow Monitor Inlining. CSF 2010: 200-214 - [c34]David A. Naumann, Anindya Banerjee:
Dynamic Boundaries: Information Hiding by Second Order Framing with First Order Assertions. ESOP 2010: 2-22 - [c33]Stan Rosenberg, Anindya Banerjee, David A. Naumann:
Local Reasoning and Dynamic Framing for the Composite Pattern and Its Clients. VSTTE 2010: 183-198 - 2009
- [e2]Stephen Chong, David A. Naumann:
Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009. ACM 2009, ISBN 978-1-60558-645-8 [contents] - 2008
- [c32]Anindya Banerjee, David A. Naumann, Stan Rosenberg:
Regional Logic for Local Reasoning about Global Invariants. ECOOP 2008: 387-411 - [c31]Anindya Banerjee, David A. Naumann, Stan Rosenberg:
Expressive Declassification Policies and Modular Static Enforcement. SP 2008: 339-353 - [c30]Anindya Banerjee, Michael Barnett, David A. Naumann:
Boogie Meets Regions: A Verification Experience Report. VSTTE 2008: 177-191 - 2007
- [c29]Steve M. Shaner, Gary T. Leavens, David A. Naumann:
Modular verification of higher-order methods with mandatory calls specified by model programs. OOPSLA 2007: 351-368 - [c28]Anindya Banerjee, David A. Naumann, Stan Rosenberg:
Towards a logical account of declassification. PLAS 2007: 61-66 - [c27]Marco Pistoia, Anindya Banerjee, David A. Naumann:
Beyond Stack Inspection: A Unified Access-Control and Information-Flow Security Model. S&P 2007: 149-163 - 2006
- [j12]David A. Naumann, Michael Barnett:
Towards imperative modules: Reasoning about invariants and sharing of mutable state. Theor. Comput. Sci. 365(1-2): 143-168 (2006) - [c26]Alejandro Russo, John Hughes, David A. Naumann, Andrei Sabelfeld:
Closing Internal Timing Channels by Transformation. ASIAN 2006: 120-135 - [c24]Michael Barnett, David A. Naumann, Wolfram Schulte, Qi Sun:
Allowing State Changes in Specifications. ETRICS 2006: 321-336 - [c23]Gilles Barthe, Tamara Rezk, David A. Naumann:
Deriving an Information Flow Checker and Certifying Compiler for Java. S&P 2006: 230-242 - 2005
- [j11]Anindya Banerjee, David A. Naumann:
Ownership confinement ensures representation independence for object-oriented programs. J. ACM 52(6): 894-960 (2005) - [j10]Anindya Banerjee, David A. Naumann:
Stack-based access control and secure information flow. J. Funct. Program. 15(2): 131-177 (2005) - [c21]Anindya Banerjee, David A. Naumann:
State Based Ownership, Reentrance, and Encapsulation. ECOOP 2005: 387-411 - [e1]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld:
Language-Based Security, 5.-10. October 2003. Dagstuhl Seminar Proceedings 03411, IBFI, Schloss Dagstuhl, Germany 2005 [contents] - 2004
- [c17]Anindya Banerjee, David A. Naumann:
History-Based Access Control and Secure Information Flow. CASSIS 2004: 27-48 - [c15]David A. Naumann, Michael Barnett:
Towards Imperative Modules: Reasoning about Invariants and Sharing of Mutable State. LICS 2004: 313-323 - [c14]Michael Barnett, David A. Naumann:
Friends Need a Bit More: Maintaining Invariants Over Shared State. MPC 2004: 54-84 - [c13]Qi Sun, Anindya Banerjee, David A. Naumann:
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language. SAS 2004: 84-99 - 2003
- [c12]Anindya Banerjee, David A. Naumann:
Using Access Control for Secure Information Flow in a Java-like Language. CSFW 2003: 155-169 - [i3]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld:
03411 Final Report - Language Based Security. Language Based Security 2003 - [i2]Anindya Banerjee, Heiko Mantel, David A. Naumann, Andrei Sabelfeld:
03411 Abstracts Collection - Language Based Security. Language Based Security 2003 - 2002
- [c10]Anindya Banerjee, David A. Naumann:
Secure Information Flow and Pointer Confinement in a Java-like Language. CSFW 2002: 253- - [c8]Anindya Banerjee, David A. Naumann:
Representation independence, confinement and access control [extended abstract]. POPL 2002: 166-177 - [i1]Anindya Banerjee, David A. Naumann:
Ownership Confinement Ensures Representation Independence for Object-Oriented Programs. CoRR cs.PL/0212003 (2002)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-02-06 23:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint