kth.sePublications
Change search
Link to record
Permanent link

Direct link
Publications (10 of 11) Show all publications
Gomis-Fons, J., Schwarz, O., Zhang, L., Andersson, N., Nilsson, B., Castan, A., . . . Chotteau, V. (2020). Model-based design and control of a small-scale integrated continuous end-to-end mAb platform. Biotechnology progress (Print), 36(4), Article ID e2995.
Open this publication in new window or tab >>Model-based design and control of a small-scale integrated continuous end-to-end mAb platform
Show others...
2020 (English)In: Biotechnology progress (Print), ISSN 8756-7938, E-ISSN 1520-6033, Vol. 36, no 4, article id e2995Article in journal (Refereed) Published
Abstract [en]

A continuous integrated bioprocess available from the earliest stages of process development allows for an easier, more efficient and faster development and characterization of an integrated process as well as production of small-scale drug candidates. The process presented in this article is a proof-of-concept of a continuous end-to-end monoclonal antibody production platform at a very small scale based on a 200 ml alternating tangential flow filtration perfusion bioreactor, integrated with the purification process with a model-based design and control. The downstream process, consisting of a periodic twin-column protein A capture, a virus inactivation, a CEX column and an AEX column, was compactly implemented in a single chromatography system, with a purification time of less than 4 hr. Monoclonal antibodies were produced for 17 days in a high cell density perfusion culture of CHO cells with titers up to 1.0 mg/ml. A digital twin of the downstream process was created by modelling all the chromatography steps. These models were used for real-time decision making by the implementation of control strategies to automatize and optimize the operation of the process. A consistent glycosylation pattern of the purified product was ensured by the steady state operation of the process. Regarding the removal of impurities, at least a 4-log reduction in the HCP levels was achieved. The recovery yield was up to 60%, and a maximum productivity of 0.8 mg/ml/day of purified product was obtained. 

Place, publisher, year, edition, pages
Wiley, 2020
Keywords
end-to-end continuous bioprocessing, monoclonal antibody, perfusion bioreactor, process integration, process modelling, Bioreactors, Column chromatography, Controlled drug delivery, Decision making, Digital twin, Monoclonal antibodies, Purification, Removal, Viruses, Continuous bioprocessing, Monoclonal antibody production, Real time decision-making, Steady-state operation, Tangential flow filtrations, Process control
National Category
Bioprocess Technology
Identifiers
urn:nbn:se:kth:diva-274022 (URN)10.1002/btpr.2995 (DOI)000559591300001 ()32233078 (PubMedID)2-s2.0-85082930241 (Scopus ID)
Note

QC 20250304

Available from: 2020-06-29 Created: 2020-06-29 Last updated: 2025-03-04Bibliographically approved
Baumann, C., Schwarz, O. & Dam, M. (2019). On the verification of system-level information flow properties for virtualized execution platforms. Journal of Cryptographic Engineering, 9(3), 243-261
Open this publication in new window or tab >>On the verification of system-level information flow properties for virtualized execution platforms
2019 (English)In: Journal of Cryptographic Engineering, ISSN 2190-8508, Vol. 9, no 3, p. 243-261Article in journal (Refereed) Published
Abstract [en]

The security of embedded systems can be dramatically improved through the use of formally verified isolation mechanisms such as separation kernels, hypervisors, or microkernels. For trustworthiness, particularly for system-level behavior, the verifications need precise models of the underlying hardware. Such models are hard to attain, highly complex, and proofs of their security properties may not easily apply to similar but different platforms. This may render verification economically infeasible. To address these issues, we propose a compositional top-down approach to embedded system specification and verification, where the system-on-chip is modeled as a network of distributed automata communicating via paired synchronous message passing. Using abstract specifications for each component allows to delay the development of detailed models for cores, devices, etc., while still being able to verify high-level security properties like integrity and confidentiality, and soundly refine the result for different instantiations of the abstract components at a later stage. As a case study, we apply this methodology to the verification of information flow security for an industry-scale security-oriented hypervisor on the ARMv8-A platform and report on the complete verification of guest mode security properties in the HOL4 theorem prover.

Place, publisher, year, edition, pages
Springer, 2019
Keywords
Decomposition, SoC, information flow security, formal verification, hypervisor, ARMv8
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-263686 (URN)10.1007/s13389-019-00216-4 (DOI)000514851500004 ()2-s2.0-85067694646 (Scopus ID)
Projects
CERCES
Funder
Swedish Foundation for Strategic Research
Note

QC 20191111

Available from: 2019-11-08 Created: 2019-11-08 Last updated: 2024-03-18Bibliographically approved
Baumann, C., Schwarz, O. & Dam, M. (2017). Compositional Verification of Security Properties for Embedded Execution Platforms. In: Ulrich Kühne and Jean-Luc Danger and Sylvain Guilley (Ed.), PROOFS 2017: 6th International Workshop on Security Proofs for Embedded Systems. Paper presented at PROOFS 2017. 6th International Workshop on Security Proofs for Embedded Systems (pp. 1-16). , 49
Open this publication in new window or tab >>Compositional Verification of Security Properties for Embedded Execution Platforms
2017 (English)In: PROOFS 2017: 6th International Workshop on Security Proofs for Embedded Systems / [ed] Ulrich Kühne and Jean-Luc Danger and Sylvain Guilley, 2017, Vol. 49, p. 1-16Conference paper, Published paper (Refereed)
Abstract [en]

The security of embedded systems can be dramatically improved through the use of formally verified isolation mechanisms such as separation kernels, hypervisors, or microkernels. For trustworthiness, particularly for system level behaviour, the verifications need precise models of the underlying hardware. Such models are hard to attain, highly complex, and proofs of their security properties may not easily apply to similar but different platforms. This may render verification economically infeasible. To address these issues, we propose a compositional top-down approach to embedded system specification and verification, where the system-on-chip is modeled as a network of distributed automata communicating via paired synchronous message passing. Using abstract specifications for each component allows to delay the development of detailed models for cores, devices, etc., while still being able to verify high level security properties like integrity and confidentiality, and soundly refine the result for different instantiations of the abstract components at a later stage. As a case study, we apply this methodology to the verification of information flow security for an industry scale security-oriented hypervisor on the ARMv8-A platform. The hypervisor statically assigns (multiple) cores to each guest system and implements a rudimentary, but usable, inter guest communication discipline. We have completed a pen-and-paper security proof for the hypervisor down to state transition level and report on a partially completed verification of guest mode security in the HOL4 theorem prover.

Series
EPiC Series in Computing, ISSN 2398-7340
Keywords
ARMv8, hardware platform, formal verification, hypervisor, decomposition, SoC, system security
National Category
Computer Systems Embedded Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-215208 (URN)
Conference
PROOFS 2017. 6th International Workshop on Security Proofs for Embedded Systems
Projects
HASPOCPROSPERCERCES
Funder
Swedish Civil Contingencies AgencyVINNOVASwedish Foundation for Strategic Research
Note

QC 20171009

Available from: 2017-10-04 Created: 2017-10-04 Last updated: 2024-03-18Bibliographically approved
Baumann, C., Näslund, M., Gehrmann, C., Schwarz, O. & Thorsen, H. (2016). A High Assurance Virtualization Platform for ARMv8. In: Networks and Communications (EuCNC), 2016 European Conference on: . Paper presented at European Conference on Networks and Communications (EuCNC), 27-30 June 2016. IEEE conference proceedings
Open this publication in new window or tab >>A High Assurance Virtualization Platform for ARMv8
Show others...
2016 (English)In: Networks and Communications (EuCNC), 2016 European Conference on, IEEE conference proceedings, 2016Conference paper, Published paper (Refereed)
Abstract [en]

This paper presents the first results from the ongoing research project HASPOC, developing a high assurance virtualization platform for the ARMv8 CPU architecture. Formal verification at machine code level guarantees information isolation between different guest systems (e.g. OSs) running on the platform. To use the platform in networking scenarios, we allow guest systems to securely communicate with each other via platform-provided communication channels and to take exclusive control of peripherals for communication with the outside world.

The isolation is shown to be formally equivalent to that of guests executing on physically separate platforms with dedicated communication channels crossing the air-gap. Common Criteria (CC) assurance methodology is applied by preparing the CC documentation required for an EAL6 evaluation of products using the platform. Besides the hypervisor, a secure boot component is included and verified to ensure system integrity.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2016
Keywords
hypervisor, isolation, assurance, formal verification, Common Criteria, ARMv8
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-192598 (URN)10.1109/EuCNC.2016.7561034 (DOI)000387091300042 ()2-s2.0-84988950416 (Scopus ID)978-1-5090-2893-1 (ISBN)978-1-5090-2894-8 (ISBN)
Conference
European Conference on Networks and Communications (EuCNC), 27-30 June 2016
Projects
HASPOC
Funder
VINNOVA
Note

QC 20160920

Available from: 2016-09-15 Created: 2016-09-15 Last updated: 2024-03-18Bibliographically approved
Schwarz, O. & Dam, M. (2016). Automatic Derivation of Platform Noninterference Properties. In: Rocco De Nicola, Eva Kühn (Ed.), Software Engineering and Formal Methods, Springer LNCS 9763: . Paper presented at 14th International Conference on Software Engineering and Formal Methods, SEFM 2016 Held as Part of Conference on Software Technologies: Applications and Foundations, STAF 2016, Vienna, Austria, 4 July 2016 through 8 July 2016 (pp. 27-44). Springer, 9763
Open this publication in new window or tab >>Automatic Derivation of Platform Noninterference Properties
2016 (English)In: Software Engineering and Formal Methods, Springer LNCS 9763 / [ed] Rocco De Nicola, Eva Kühn, Springer, 2016, Vol. 9763, p. 27-44Conference paper, Published paper (Refereed)
Abstract [en]

For the verification of system software, information flow properties of the instruction set architecture (ISA) are essential.They show how information propagates through the processor, including sometimes opaque control registers.Thus, they can be used to guarantee that user processes cannot infer the state of privileged system components, such as secure partitions.Formal ISA models - for example for the HOL4 theorem prover - have been available for a number of years. However, little work has been published on the formal analysis of these models.In this paper, we present a general framework for proving information flow properties of a number of ISAs automatically, for example for ARM.The analysis is represented in HOL4 using a direct semantical embedding of noninterference, and does not use an explicit type system, in order to (i) minimize the trusted computingbase, and to (ii) support a large degree of context-sensitivity, which is needed for the analysis.The framework determines automatically which system components are accessible at a given privilege level, guaranteeing both soundness and accuracy.

Place, publisher, year, edition, pages
Springer, 2016
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 9763
Keywords
Instruction set architectures, ARM, MIPS, noninterference, information flow, theorem proving, HOL4
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-192451 (URN)10.1007/978-3-319-41591-8_3 (DOI)000386263500003 ()2-s2.0-84977574405 (Scopus ID)978-3-319-41590-1 (ISBN)978-3-319-41591-8 (ISBN)
Conference
14th International Conference on Software Engineering and Formal Methods, SEFM 2016 Held as Part of Conference on Software Technologies: Applications and Foundations, STAF 2016, Vienna, Austria, 4 July 2016 through 8 July 2016
Projects
PROSPERHASPOCCERCES
Funder
VINNOVASwedish Foundation for Strategic Research Swedish Civil Contingencies Agency
Note

QC 20161121

Available from: 2016-09-12 Created: 2016-09-12 Last updated: 2022-06-22Bibliographically approved
Schwarz, O. (2016). No Hypervisor Is an Island: System-wide Isolation Guarantees for Low Level Code. (Doctoral dissertation). Stockholm: KTH Royal Institute of Technology
Open this publication in new window or tab >>No Hypervisor Is an Island: System-wide Isolation Guarantees for Low Level Code
2016 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The times when malware was mostly written by curious teenagers are long gone. Nowadays, threats come from criminals, competitors, and government agencies. Some of them are very skilled and very targeted in their attacks. At the same time, our devices – for instance mobile phones and TVs – have become more complex, connected, and open for the execution of third-party software. Operating systems should separate untrusted software from confidential data and critical services. But their vulnerabilities often allow malware to break the separation and isolation they are designed to provide. To strengthen protection of select assets, security research has started to create complementary machinery such as security hypervisors and separation kernels, whose sole task is separation and isolation. The reduced size of these solutions allows for thorough inspection, both manual and automated. In some cases, formal methods are applied to create mathematical proofs on the security of these systems.

The actual isolation solutions themselves are carefully analyzed and included software is often even verified on binary level. The role of other software and hardware for the overall system security has received less attention so far. The subject of this thesis is to shed light on these aspects, mainly on (i) unprivileged third-party code and its ability to influence security, (ii) peripheral devices with direct access to memory, and (iii) boot code and how we can selectively enable and disable isolation services without compromising security.

The papers included in this thesis are both design and verification oriented, however, with an emphasis on the analysis of instruction set architectures. With the help of a theorem prover, we implemented various types of machinery for the automated information flow analysis of several processor architectures. The analysis is guaranteed to be both sound and accurate.

Abstract [sv]

Förr skrevs skadlig mjukvara mest av nyfikna tonåringar. Idag är våra datorer under ständig hot från statliga organisationer, kriminella grupper, och kanske till och med våra affärskonkurrenter. Vissa besitter stor kompetens och kan utföra fokuserade attacker. Samtidigt har tekniken runtomkring oss (såsom mobiltelefoner och tv-apparater) blivit mer komplex, uppkopplad och öppen för att exekvera mjukvara från tredje part.

Operativsystem borde egentligen isolera känslig data och kritiska tjänster från mjukvara som inte är trovärdig. Men deras sårbarheter gör det oftast möjligt för skadlig mjukvara att ta sig förbi operativsystemens säkerhetsmekanismer. Detta har lett till utveckling av kompletterande verktyg vars enda funktion är att förbättra isolering av utvalda känsliga resurser. Speciella virtualiseringsmjukvaror och separationskärnor är exempel på sådana verktyg. Eftersom sådana lösningar kan utvecklas med relativt liten källkod, är det möjligt att analysera dem noggrant, både manuellt och automatiskt. I några fall används formella metoder för att generera matematiska bevis på att systemet är säkert.

Själva isoleringsmjukvaran är oftast utförligt verifierad, ibland till och med på assemblernivå. Dock så har andra komponenters påverkan på systemets säkerhet hittills fått mindre uppmärksamhet, både när det gäller hårdvara och annan mjukvara. Den här avhandlingen försöker belysa dessa aspekter, huvudsakligen (i) oprivilegierad kod från tredje part och hur den kan påverka säkerheten, (ii) periferienheter med direkt tillgång till minnet och (iii) startkoden, samt hur man kan aktivera och deaktivera isolationstjänster på ett säkert sätt utan att starta om systemet.

Avhandlingen är baserad på sex tidigare publikationer som handlar om både design- och verifikationsaspekter, men mest om säkerhetsanalys av instruktionsuppsättningar. Baserat på en teorembevisare har vi utvecklat olika verktyg för den automatiska informationsflödesanalysen av processorer. Vi har använt dessa verktyg för att tydliggöra vilka register oprivilegierad mjukvara har tillgång till på ARM- och MIPS-maskiner. Denna analys är garanterad att vara både korrekt och precis. Så vitt vi vet är vi de första som har publicerat en lösning för automatisk analys och bevis av informationsflödesegenskaper i standardinstruktionsuppsättningar.

Place, publisher, year, edition, pages
Stockholm: KTH Royal Institute of Technology, 2016. p. 180
Series
TRITA-CSC-A, ISSN 1653-5723 ; 2016:22
Series
SICS Dissertation Series ; 75
Keywords
Platform Security, Hypervisor, Formal Verification, Theorem Proving, HOL4, DMA, Peripheral Devices, Instruction Set Architectures, ISA, Information Flow, Boot
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-192466 (URN)978-91-7729-104-6 (ISBN)
Public defence
2016-10-10, F3, Lindstedtsvägen 26, Stockholm, 14:00 (English)
Opponent
Supervisors
Projects
PROSPERHASPOC
Funder
Swedish Foundation for Strategic Research Vinnova
Note

QC 20160919

Available from: 2016-09-19 Created: 2016-09-12 Last updated: 2022-06-22Bibliographically approved
Schwarz, O., Gehrmann, C. & Do, V. (2014). Affordable Separation on Embedded Platforms: Soft Reboot Enabled Virtualization on a Dual Mode System. In: Thorsten Holz, Sotiris Ioannidis (Ed.), : . Paper presented at TRUST. Springer
Open this publication in new window or tab >>Affordable Separation on Embedded Platforms: Soft Reboot Enabled Virtualization on a Dual Mode System
2014 (English)In: / [ed] Thorsten Holz, Sotiris Ioannidis, Springer, 2014, p. -54Conference paper, Published paper (Refereed)
Abstract [en]

While security has become important in embedded systems, commodity operating systems often fail in effectively separating processes, mainly due to a too large trusted computing base. System virtualization can establish isolation already with a small code base, but many existing embedded CPU architectures have very limited virtualization hardware support, so that the performance impact is often non-negligible. Targeting both security and performance, we investigate an approach in which a few minor hardware additions together with virtualization offer protected execution in embedded systems while still allowing non-virtualized execution when secure services are not needed. Benchmarks of a prototype implementation on an emulated ARM Cortex A8 platform confirm that switching between those two execution forms can be done efficiently.

Place, publisher, year, edition, pages
Springer, 2014
Keywords
Dual Mode, Separation, Soft Reboot, Virtualization, Hypervisor, Embedded Systems, Security
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-147612 (URN)10.1007/978-3-319-08593-7_3 (DOI)2-s2.0-84904168680 (Scopus ID)978-3-319-08592-0 (ISBN)978-3-319-08593-7 (ISBN)
Conference
TRUST
Funder
Swedish Foundation for Strategic Research
Note

QC 20140708. QC 20200710

Available from: 2014-06-30 Created: 2014-06-30 Last updated: 2022-06-23Bibliographically approved
Schwarz, O. & Dam, M. (2014). Formal Verification of Secure User Mode Device Execution with DMA. In: Eran Yahav (Ed.), Hardware and Software: Verification and Testing. Paper presented at 10th International Haifa Verification Conference, HVC 2014 (pp. 236-251). Springer Publishing Company
Open this publication in new window or tab >>Formal Verification of Secure User Mode Device Execution with DMA
2014 (English)In: Hardware and Software: Verification and Testing / [ed] Eran Yahav, Springer Publishing Company, 2014, p. 236-251Conference paper, Published paper (Refereed)
Abstract [en]

Separation between processes on top of an operating systemor between guests in a virtualized environment is essential for establish-ing security on modern platforms. A key requirement of the underlyinghardware is the ability to support multiple partitions executing on theshared hardware without undue interference. For modern processor archi-tectures - with hardware support for memory management, several modesof operation and I/O interfaces - this is a delicate issue requiring deepanalysis at both instruction set and processor implementation level. In afirst attempt to rigorously answer this type of questions we introducedin previous work an information flow analysis of user program executionon an ARMv7 platform with hardware supported memory protection,but without I/O. The analysis was performed as a semi-automatic proofsearch procedure on top of an ARMv7 ISA model implemented in theCambridge HOL4 theorem prover by Fox et al. The restricted platformfunctionality, however, makes the analysis of limited practical value. Inthis paper we add support for devices, including DMA, to the analy-sis. To this end, we propose an approach to device modeling based onthe idea of executing devices nondeterministically in parallel with the(single-core) deterministic processor, covering a fine granularity of inter-actions between the model components. Based on this model and tak-ing the ARMv7 ISA as an example, we provide HOL4 proofs of severalnoninterference-oriented isolation properties for a partition executing inthe presence of devices which potentially use DMA or interrupts.

Place, publisher, year, edition, pages
Springer Publishing Company, 2014
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 8855
Keywords
peripheral devices, DMA, separation, isolation, user mode execu- tion, ARM, formal hardware/software co-verification, theorem proving, HOL4
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-155718 (URN)10.1007/978-3-319-13338-6_18 (DOI)2-s2.0-84921419001 (Scopus ID)978-3-319-13337-9 (ISBN)978-3-319-13338-6 (ISBN)
Conference
10th International Haifa Verification Conference, HVC 2014
Projects
PROSPER
Funder
Swedish Foundation for Strategic Research
Note

QC 20141117

Available from: 2014-11-10 Created: 2014-11-10 Last updated: 2022-06-23Bibliographically approved
Dam, M., Guanciale, R., Khakpour, N., Nemati, H. & Schwarz, O. (2013). Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel. In: : . Paper presented at 2013 ACM SIGSAC Conference on Computer & Communications Security (CCS'13),November 4 - 8, 2013 Berlin, Germany. ACM Press
Open this publication in new window or tab >>Formal Verification of Information Flow Security for a Simple ARM-Based Separation Kernel
Show others...
2013 (English)Conference paper, Published paper (Refereed)
Abstract [en]

A separation kernel simulates a distributed environment us-ing a single physical machine by executing partitions in iso-lation and appropriately controlling communication amongthem. We present a formal verication of information owsecurity for a simple separation kernel for ARMv7. Previouswork on information ow kernel security leaves communica-tion to be handled by model-external means, and cannot beused to draw conclusions when there is explicit interactionbetween partitions. We propose a dierent approach wherecommunication between partitions is made explicit and theinformation ow is analyzed in the presence of such a chan-nel. Limiting the kernel functionality as much as meaning-fully possible, we accomplish a detailed analysis and veri-cation of the system, proving its correctness at the levelof the ARMv7 assembly. As a sanity check we show howthe security condition is reduced to noninterference in thespecial case where no communication takes place. The ver-ication is done in HOL4 taking the Cambridge model ofARM as basis, transferring verication tasks on the actualassembly code to an adaptation of the BAP binary analysistool developed at CMU.

Place, publisher, year, edition, pages
ACM Press, 2013
Keywords
Formal verication; Information Flow Security; Separation Kernel; Hypervisor
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-136348 (URN)10.1145/2508859.2516702 (DOI)2-s2.0-84889040001 (Scopus ID)
External cooperation:
Conference
2013 ACM SIGSAC Conference on Computer & Communications Security (CCS'13),November 4 - 8, 2013 Berlin, Germany
Note

Qc 20131218

Available from: 2013-12-04 Created: 2013-12-04 Last updated: 2024-03-18Bibliographically approved
Khakpour, N., Schwarz, O. & Dam, M. (2013). Machine Assisted Proof of ARMv7 Instruction Level Isolation Properties. In: Certified Programs and Proofs: Third International Conference, CPP 2013, Melbourne, VIC, Australia, December 11-13, 2013, Proceedings. Paper presented at Certified Programs and Proofs (CPP) (pp. 276-291). Springer
Open this publication in new window or tab >>Machine Assisted Proof of ARMv7 Instruction Level Isolation Properties
2013 (English)In: Certified Programs and Proofs: Third International Conference, CPP 2013, Melbourne, VIC, Australia, December 11-13, 2013, Proceedings, Springer, 2013, p. 276-291Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we formally verify security properties of the ARMv7 Instruction Set Architecture (ISA) for user mode executions. To obtain guarantees that arbitrary (and unknown) user processes are able to run isolated from privileged software and other user processes, instruction level noninterference and integrity properties are provided, along with proofs that transitions to privileged modes can only occur in a controlled manner. This work establishes a main requirement for operating system and hypervisor verification, as demonstrated for the PROSPER separation kernel. The proof is performed in the HOL4 theorem prover, taking the Cambridge model of ARM as basis. To this end, a proof tool has been developed, which assists the verification of relational state predicates semi-automatically.

Place, publisher, year, edition, pages
Springer, 2013
Series
Lecture Notes in Computer Science, ISSN 0302-9743 ; 8307
Keywords
ARM instruction set, noninterference, user mode execution, kernel security, theorem proving
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-136354 (URN)10.1007/978-3-319-03545-1_18 (DOI)000440498800018 ()2-s2.0-84893128835 (Scopus ID)978-3-319-03544-4 (ISBN)978-3-319-03545-1 (ISBN)
Conference
Certified Programs and Proofs (CPP)
Projects
PROSPER
Funder
Swedish Foundation for Strategic Research
Note

The provided file is the author version of the correspondent paper published in the proceedings of Certified Programs and Proofs 2013 (CPP; editors: G. Gonthier and M. Norrish), Springer LNCS 8307. The publisher and copyright holder is Springer International Publishing Switzerland. The final publication is available at http://link.springer.com/10.1007/978-3-319-03545-1_18. QC 20140624

Available from: 2013-12-04 Created: 2013-12-04 Last updated: 2022-06-23Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-3434-5640

Search in DiVA

Show all publications