Securing Verified IO Programs Against Unverified Code in F.
Cezar-Constantin AndriciStefan CiobacaCatalin HritcuGuido MartínezExequiel RivasÉric TanterThéo WinterhalterPublished in: Proc. ACM Program. Lang. (2024)
Keyphrases
- error handling
- java programs
- source code
- program code
- computer programs
- concurrent programs
- highly efficient
- legacy software
- java bytecode
- programs written
- control flow
- control structures
- programming environment
- symbolic execution
- real time
- data flow
- operating system
- software engineering
- relational databases
- information technology
- real world