Skip to main content

Cross-Cutting Thrusts: Formal Methods

Projects List

Advancing Logic-Based Access Control
Research Area: Secure Home Computing
Cross Cutting Thrusts: Formal Methods | Usable Privacy and Security
Researcher: Lujo Bauer

Compiling Epistemic Specifications to Secure Distributed Code
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: Frank Pfenning

Compositional Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Amit Vasudevan, Sagar Chaki

Design Methodologies for Security Applications
Cross Cutting Thrusts: Formal Methods
Researcher: Roy Maxion

Fault-Tolerant Voting
Cross Cutting Thrusts: Formal Methods
Researcher: Ryan O'Donnell

Formalizing and Enforcing Privacy
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researchers: Anupam Datta, Limin Jia, Jeremiah Blocki, Zeliha Dilsun Kaynar, Divya Sharma, Arunesh Sinha, Michael Tschantz

Logical Reasoning About Obligations
Research Area: Privacy Protection
Cross Cutting Thrusts: Formal Methods
Researcher: Frank Pfenning

Mobile Platform Security
Research Area: Mobility
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Lujo Bauer, Limin Jia

Next-Generation Binary Analysis Techniques and Platform
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: David Brumley

Open Source Evaluation and Assurance
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: William Scherlis

Principled Approach to Web Security
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: Anupam Datta, Limin Jia, Deepak Garg

Secure Concurrent Distributed Programming
Cross Cutting Thrusts: Software Security | Formal Methods
Researcher: Frank Pfenning

Secure Distributed Logic Programming
Cross Cutting Thrusts: Formal Methods | Software Security
Researcher: Frank Pfenning

Secure Software Development and Operation
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: David Brumley, Maverick Woo, Manuel Egele

Security Patterns: Assurance for Secure Concurrent and Distributed Computing
Cross Cutting Thrusts: Software Security | Next Generation Threat Prediction and Response | Formal Methods
Researchers: William Scherlis, Jonathan Aldrich

Security Quality Requirements Engineering (SQUARE) Project
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Nancy Mead, Lorrie Cranor

SQUARE: Requirements Engineering for Improved System Security
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods
Researcher: Nancy Mead

Targeted Software Assurance
Research Area: Survivable Distributed Systems
Cross Cutting Thrusts: Software Security | Formal Methods
Researchers: William Scherlis, Jonathan Aldrich

Techniques for Compositional Security: Foundations, Mechanized Reasoning and Applications
Research Area: Trustworthy Computing Platforms and Devices
Cross Cutting Thrusts: Formal Methods | Software Security
Researchers: Anupam Datta, Limin Jia, Deepak-Garg