Low-overhead software transformation to enforce information security policies

Naumann David , Chudnov Andrey , Sylla Pape , Nogin Aleksey

2021
Stack-based access control and secure information flow

ANINDYA BANERJEE , DAVID A. NAUMANN
Journal of Functional Programming 15 ( 2) 131 -177

205
2005
A categorical model for higher order imperative programming

DAVID A. NAUMANN
Mathematical Structures in Computer Science 8 ( 4) 351 -399

19
1998
Towards squiggly refinement algebra

D. A. Naumann
ifip international conference on programming concepts and methods 346 -365

8
1998
Predicate Transformer Semantics of an Oberon-Like Language

David A. Naumann
ifip international conference on programming concepts and methods 467 -487

24
1994
State based ownership, reentrance, and encapsulation

Anindya Banerjee , David A. Naumann
Lecture Notes in Computer Science 387 -411

2
2005
Relational Logic with Framing and Hypotheses

Mohammad Nikouei , Anindya Banerjee , David A. Naumann
foundations of software technology and theoretical computer science 65 16

28
2016
Type-based Declassification for Free

Tamara Rezk , David A. Naumann , Minh Ngo
ICFEM'20 181 -197

2020
Alignment Completeness for Relational Hoare Logics.

David A. Naumann , Ramana Nagasamudram
arXiv: Logic in Computer Science

2021
Modular and Constraint-Based Information Flow Inference for an Object-Oriented Language

Qi Sun , Anindya Banerjee , David A. Naumann
Static Analysis 84 -99

24
2004
Local Reasoning for Global Invariants, Part II: Dynamic Boundaries

Anindya Banerjee , David A. Naumann
Journal of the ACM 60 ( 3) 19

15
2013
Local Reasoning for Global Invariants, Part I: Region Logic

Anindya Banerjee , David A. Naumann , Stan Rosenberg
Journal of the ACM 60 ( 3) 18

28
2013
Beyond Fun: Order and Membership in Polytypic Imperative Programming

David A. Naumann
mathematics of program construction 286 -314

6
1998
Analysis of Authentication and Key Establishment in Inter-generational Mobile Telephony

Chunyu Tang , David A. Naumann , Susanne Wetzel
high performance computing and communications 1605 -1614

13
2013
Spartan Jester: End-to-End Information Flow Control for Hybrid Android Applications

Julian Sexton , Andrey Chudnov , David A. Naumann
ieee symposium on security and privacy 157 -162

3
2017
Predicate transformers and higher-order programs

David A. Naumann
Theoretical Computer Science 150 ( 1) 111 -159

16
1995
Verified sequential Malloc/Free

Andrew W. Appel , David A. Naumann
international symposium on memory management 48 -59

2
2020