Luth: Composing and Parallelizing Midpoint Inspection Devices, 2010 Fourth International Conference on Network and System Security, pp.9-16, 2010. ,
DOI : 10.1109/NSS.2010.44
Weakest-precondition of unstructured programs Bpf+: exploiting global data-flow optimization in a generalized packet filter architecture, PASTE '05: Proceedings of the 6th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering: SIGCOMM '99: Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, pp.82-87, 1999. ,
Generic application-level protocol analyzer and its language, p.NDSS, 2007. ,
FFPF: Fairly Fast Packet Filters, OSDI'04: Proceedings of the 6th conference on Symposium on Opearting Systems Design and Implementation, 2004. ,
Certified Programming with Dependent Types. Online in-progress textbook, 2009. ,
The design and implementation of a declarative sensor network system, Proceedings of the 5th international conference on Embedded networked sensor systems , SenSys '07, 2007. ,
DOI : 10.1145/1322263.1322281
Lightweight integration of the Ergo theorem prover inside a proof assistant, Proceedings of the second workshop on Automated formal methods , AFM '07, pp.55-59, 2007. ,
DOI : 10.1145/1345169.1345176
Verification of non-functional programs using interpretations in type theory, Journal of functional Programming, vol.13, issue.4, pp.709-745, 2003. ,
DOI : 10.1017/S095679680200446X
Why: A Multi-Language Multi-Prover Verification Tool, Research Report, vol.1366, 2003. ,
A fast Fourier transform compiler, ACM SIGPLAN Notices, vol.34, issue.5, 1999. ,
DOI : 10.1145/301631.301661
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.129.7986
Mechanized semantics In: Logics and languages for reliability and security , NATO Science for Peace and Security Series D: Information and Communication Security, pp.195-224 ,
Formal verification of a realistic compiler, Communications of the ACM, vol.52, issue.7, pp.107-115, 2009. ,
DOI : 10.1145/1538788.1538814
URL : https://hal.archives-ouvertes.fr/inria-00415861
Combining Static Model Checking with Dynamic Enforcement Using the Statecall Policy Language, International Conference on Formal Engineering Methods, 2009. ,
DOI : 10.1007/978-3-642-10373-5_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.157.5372
Melange: Towards a functional Internet, Proceedings of the 2nd ACM SIGOPS/EuroSys European Conference on Computer Systems, 2007. ,
Experience report: using Objective Caml to develop safety-critical embedded tools in a certification framework, ICFP '09: Proceedings of the 14th ACM SIGPLAN international conference on Functional programming, pp.215-220, 2009. ,
binpac, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.289-300, 2006. ,
DOI : 10.1145/1177080.1177119
Top 20 internet security problems, threats and risks. section 5 anti-virus software Snort Team: Snort Users Manual. The official documentation produced by the Snort team at Sourcefire, 2007. ,