Verified resource guarantees using COSTA and KeY, Proceedings of the 20th ACM SIGPLAN workshop on Partial evaluation and program manipulation, PERM '11, pp.73-76, 2011. ,
DOI : 10.1145/1929501.1929513
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.186.2576
Amortised resource analysis with separation logic, Logical Methods in Computer Science, vol.7, issue.2, 2011. ,
Certifying and Reasoning on Cost Annotations in C Programs, Proc. of FMICS, pp.32-46, 2012. ,
DOI : 10.1007/978-3-642-32469-7_3
URL : https://hal.archives-ouvertes.fr/hal-00702665
A formally verified SSA-based middleend -Static Single Assignment meets CompCert, Proc. of ESOP, pp.47-66, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-01110783
Formally verified optimizing compilation in ACG-based flight control software, ERTS, 2012. ,
Improving interrupt response time in a verifiable protected microkernel, Proceedings of the 7th ACM european conference on Computer Systems, EuroSys '12, pp.323-336, 2012. ,
DOI : 10.1145/2168836.2168869
Formal Verification of a C Value Analysis Based on Abstract Interpretation, Proc. of Static Analysis Symposium (SAS), 2013. ,
DOI : 10.1007/978-3-642-38856-9_18
URL : https://hal.archives-ouvertes.fr/hal-00812515
Termination proofs for systems code, PLDI 2006, pp.415-426, 2006. ,
DOI : 10.1145/1133255.1134029
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.166.164
Loop bound analysis based on a combination of program slicing, abstract interpretation, and invariant analysis, Workshop on WCET Analysis, 2007. ,
Efficient chaotic iteration strategies with widenings, Proc. of FMPA 1993, pp.128-141, 1993. ,
DOI : 10.1007/BFb0039704
SPEED: Symbolic Complexity Bound Analysis, Proc. of CAV, pp.51-62, 2009. ,
DOI : 10.1007/978-3-642-02658-4_7
The Mälardalen WCET benchmarks: Past, present and future, Proc. WCET 2010, pp.137-147, 2010. ,
Automatic derivation of path and loop annotations in object-oriented real-time programs. Scalable Computing: Practice and Experience, 1998. ,
When the Decreasing Sequence Fails, Proc. of Static Analysis Symposium (SAS), pp.198-213, 2012. ,
DOI : 10.1007/978-3-642-33125-1_15
URL : https://hal.archives-ouvertes.fr/hal-00734340
It's Time for Trustworthy Systems, IEEE Security & Privacy Magazine, vol.10, issue.2, pp.67-70, 2012. ,
DOI : 10.1109/MSP.2012.41
Formal verification of a realistic compiler, Communications of the ACM, vol.52, issue.7, pp.107-115, 2009. ,
DOI : 10.1145/1538788.1538814
URL : https://hal.archives-ouvertes.fr/inria-00415861
On loops, dominators, and dominance frontiers, ACM Transactions on Programming Languages and Systems, vol.24, issue.5, pp.455-490, 2002. ,
DOI : 10.1145/570886.570887
A new foundation for control dependence and slicing for modern program structures, ACM Transactions on Programming Languages and Systems, vol.29, issue.5, p.29, 2007. ,
DOI : 10.1145/1275497.1275502
Software considerations in airborne systems and equipment certification. Radio Technical Commission for Aeronautics Std, 2012. ,
Slicing for modern program structures: a theory for eliminating irrelevant loops, Information Processing Letters, vol.106, issue.2, pp.45-51, 2008. ,
DOI : 10.1016/j.ipl.2007.10.002
A simple, verified validator for software pipelining, Proc. of POPL, pp.83-92, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00529836
Formalizing a Framework for Dynamic Slicing of Program Dependence Graphs in Isabelle/HOL, Proc. of TPHOL, pp.294-309, 2008. ,
DOI : 10.1145/1216374.1216375
The worst-case execution-time problem???overview of methods and survey of tools, ACM Transactions on Embedded Computing Systems, vol.7, issue.3, pp.1-36, 2008. ,
DOI : 10.1145/1347375.1347389
Bound Analysis of Imperative Programs with the Size-Change Abstraction, Proc. of Static Analysis Symposium (SAS), pp.280-297, 2011. ,
DOI : 10.1007/978-3-642-19835-9_9