Program logics for certified compilers AW Appel, R Dockins, L Beringer, A Hobor, J Dodds, S Blazy, X Leroy, ... Cambridge University Press, 2014 | 275 | 2014 |
Verified Correctness and Security of OpenSSL {HMAC} L Beringer, A Petcher, QY Katherine, AW Appel 24th {USENIX} Security Symposium ({USENIX} Security 15), 207-221, 2015 | 162 | 2015 |
Compositional compcert G Stewart, L Beringer, S Cuellar, AW Appel ACM SIGPLAN Notices 50 (1), 275-287, 2015 | 135 | 2015 |
VST-Floyd: A separation logic tool to verify correctness of C programs Q Cao, L Beringer, S Gruetter, J Dodds, AW Appel Journal of Automated Reasoning 61 (1), 367-422, 2018 | 127 | 2018 |
A program logic for resources D Aspinall, L Beringer, M Hofmann, HW Loidl, A Momigliano Theoretical Computer Science 389 (3), 411-445, 2007 | 88 | 2007 |
Verified correctness and security of mbedTLS HMAC-DRBG KQ Ye, M Green, N Sanguansin, L Beringer, A Petcher, AW Appel Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017 | 80 | 2017 |
Secure information flow and program logics L Beringer, M Hofmann 20th IEEE Computer Security Foundations Symposium (CSF'07), 233-248, 2007 | 67 | 2007 |
From C to interaction trees: specifying, verifying, and testing a networked server N Koh, Y Li, Y Li, L Xia, L Beringer, W Honoré, W Mansky, BC Pierce, ... Proceedings of the 8th ACM SIGPLAN International Conference on Certified …, 2019 | 66 | 2019 |
Position paper: the science of deep specification AW Appel, L Beringer, A Chlipala, BC Pierce, Z Shao, S Weirich, ... Philosophical Transactions of the Royal Society A: Mathematical, Physical …, 2017 | 62 | 2017 |
Verified compilation for shared-memory C L Beringer, G Stewart, R Dockins, AW Appel Programming Languages and Systems: 23rd European Symposium on Programming …, 2014 | 62 | 2014 |
Automatic certification of heap consumption L Beringer, M Hofmann, A Momigliano, O Shkaravska International Conference on Logic for Programming Artificial Intelligence …, 2005 | 60 | 2005 |
Relational semantics for effect-based program transformations with dynamic allocation N Benton, A Kennedy, L Beringer, M Hofmann Proceedings of the 9th ACM SIGPLAN international conference on Principles …, 2007 | 51 | 2007 |
Reading, writing and relations: Towards extensional semantics for effect analyses N Benton, A Kennedy, M Hofmann, L Beringer Programming Languages and Systems: 4th Asian Symposium, APLAS 2006, Sydney …, 2006 | 50 | 2006 |
Relational semantics for effect-based program transformations: higher-order store N Benton, A Kennedy, L Beringer, M Hofmann Proceedings of the 11th ACM SIGPLAN conference on Principles and practice of …, 2009 | 46 | 2009 |
A program logic for resource verification D Aspinall, L Beringer, M Hofmann, HW Loidl, A Momigliano Theorem Proving in Higher Order Logics: 17th International Conference …, 2004 | 46 | 2004 |
Grail: a functional form for imperative mobile code L Beringer, K MacKenzie, I Stark Electronic Notes in Theoretical Computer Science 85 (1), 3-23, 2003 | 45 | 2003 |
Mobius: Mobility, ubiquity, security: Objectives and progress report G Barthe, L Beringer, P Crégut, B Grégoire, M Hofmann, P Müller, E Poll, ... Trustworthy Global Computing: Second Symposium, TGC 2006, Lucca, Italy …, 2007 | 44 | 2007 |
Verifying an HTTP key-value server with Interaction Trees and VST H Zhang, W Honoré, N Koh, Y Li, Y Li, LY Xia, L Beringer, W Mansky, ... 12th International Conference on Interactive Theorem Proving (ITP 2021), 2021 | 34 | 2021 |
Relational decomposition L Beringer International Conference on Interactive Theorem Proving, 39-54, 2011 | 34 | 2011 |
A certificate infrastructure for machine-checked proofs of conditional information flow T Amtoft, J Dodds, Z Zhang, A Appel, L Beringer, J Hatcliff, X Ou, ... Principles of Security and Trust: First International Conference, POST 2012 …, 2012 | 29 | 2012 |