An axiomatic basis for computer programming, Comm. ACM, vol.12, issue.10, p.576580, 1969. ,
DOI : 10.1145/357980.358001
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.116.2392
Pnueli The temporal logic of reactive and concurrent systems specification, 1992. ,
Towards a unified theory of operational and axiomatic semantics, ICALP 2012, Springer LNCS 7392, pp.351-363 ,
Checking reachability using matching logic, OOPSLA 2012, pp.555-574 ,
One-path reachability logic, LICS 2013, pp.358-367 ,
All-path reachability logic, RTA 2014, pp.425-440 ,
A Certified Procedure for RLVerification, 19th International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNACS'17), 2017. ,
Semantics-based program verifiers for all languages, OOPSLA'16, pp.74-91 ,
Achieving virtualization trustworthiness using software mechanisms The Tenth, International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016. ,
DOI : 10.1109/imis.2016.126
Verifying Reachability-Logic Properties on Rewriting-Logic Specifications, Logic, Rewriting, and Concurrency - Essays dedicated to José Meseguer, Springer LNCS 9200, pp.451-474 ,
DOI : 10.1007/978-3-319-12904-4_5
URL : https://hal.archives-ouvertes.fr/hal-01158941
A constructor-based reachability logic for rewrite theories, 2017. ,
Matching logic, RTA 2015, pp.5-21 ,
Symbolic execution and program testing, Communications of the ACM, vol.19, issue.7, pp.385-394, 1976. ,
DOI : 10.1145/360248.360252
TRACER: A Symbolic Execution Tool for Verification, CAV, 2012, Springer LNCS 7358, pp.758-766 ,
DOI : 10.1007/978-3-642-31424-7_61
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.221.2475
Using symbolic execution for verifying safety-critical systems, ACM SIGSOFT Software Engineering Notes, vol.26, issue.5, pp.142-151, 2001. ,
DOI : 10.1145/503271.503230
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.9662
EXE: automatically generating inputs of death, ACM Conference on Computer and Communications Security, pp.322-335, 2006. ,
CUTE: a concolic unit testing engine for C, ESEC/FSE 2005, ACM, pp.263-272 ,
DOI : 10.21236/ada482657
Symbolic PathFinder: symbolic execution of Java bytecode, ASE 2010, pp.179-180 ,
A generic framework for symbolic execution: A coinductive approach, Journal of Symbolic Computation, vol.80, pp.125-163, 2017. ,
DOI : 10.1016/j.jsc.2016.07.012
URL : https://hal.archives-ouvertes.fr/hal-01238696
Rewriting modulo SMT and open system analysis, Journal of Logical and Algebraic Methods in Programming, vol.86, issue.1, pp.269-297, 2017. ,
DOI : 10.1016/j.jlamp.2016.10.001
Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Higher-Order and Symbolic Computation, pp.23-160, 2007. ,
Abstract Logical Model Checking of Infinite- State Systems Using Narrowing, LIPICS, vol.21, pp.81-96, 2013. ,
A construction of distributed reference counting, Acta Informatica, vol.37, issue.8, 1999. ,
DOI : 10.1007/PL00013315
The Mechanized Verification of Garbage Collector Implementations, 2008. ,
The bedrock structured programming system, ACM SIGPLAN Notices, vol.48, issue.9, pp.391-402, 2013. ,
DOI : 10.1145/2544174.2500592
Software Foundations ,
Formal Reasoning About Programs ,
Program Verification by Coinduction, 2015. ,
Pratt and A. Warfield Xen and the art of virtualization, SOSP 2003, pp.164-177 ,
Disco: running commodity operating systems on scalable multiprocessors, ACM Transactions on Computer Systems, vol.15, issue.4, pp.412-447, 1997. ,
DOI : 10.1145/265924.265930
Abstract interpretation, Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages , POPL '77, pp.238-252 ,
DOI : 10.1145/512950.512973
URL : https://hal.archives-ouvertes.fr/inria-00528590