default search action
June Andronick
Person information
- affiliation: NICTA, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c28]June Andronick:
The sel4 verification: the art and craft of proof and the reality of commercial support (invited talk). CPP 2022: 1 - [c27]June Andronick:
The seL4 Verification Journey: How Have the Challenges and Opportunities Evolved. FMCAD 2022: 1 - [e2]June Andronick, Leonardo de Moura:
13th International Conference on Interactive Theorem Proving, ITP 2022, August 7-10, 2022, Haifa, Israel. LIPIcs 237, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2022, ISBN 978-3-95977-252-5 [contents] - 2020
- [j7]Gernot Heiser, Gerwin Klein, June Andronick:
seL4 in Australia: from research to real-world trustworthy systems. Commun. ACM 63(4): 72-75 (2020)
2010 – 2019
- 2019
- [c26]June Andronick:
Successes in Deployed Verified Software (and Insights on Key Social Factors). FM 2019: 11-17 - [c25]June Andronick:
A Million Lines of Proof About a Moving Target (Invited Talk). ITP 2019: 1:1-1:1 - 2018
- [j6]Gerwin Klein, June Andronick, Matthew Fernandez, Ihor Kuz, Toby C. Murray, Gernot Heiser:
Formally verified software in the real world. Commun. ACM 61(10): 68-77 (2018) - [j5]Darren D. Cofer, Andrew Gacek, John Backes, Michael W. Whalen, Lee Pike, Adam Foltzer, Michal Podhradsky, Gerwin Klein, Ihor Kuz, June Andronick, Gernot Heiser, Douglas Stuart:
A Formal Approach to Constructing Secure Air Vehicle Software. Computer 51(11): 14-23 (2018) - [e1]June Andronick, Amy P. Felty:
Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, CPP 2018, Los Angeles, CA, USA, January 8-9, 2018. ACM 2018, ISBN 978-1-4503-5586-5 [contents] - 2017
- [c24]June Andronick:
Reasoning About Concurrency in High-Assurance, High-Performance Software Systems. CADE 2017: 1-7 - [c23]Sidney Amani, June Andronick, Maksym Bortin, Corey Lewis, Christine Rizkallah, Joseph Tuong:
Complx: a verification framework for concurrent imperative programs. CPP 2017: 138-150 - 2016
- [j4]Sidney Amani, June Andronick, Maksym Bortin, Corey Lewis, Christine Rizkallah, Joseph Tuong:
COMPLX: A Verification Framework for Concurrent Imperative Programs. Arch. Formal Proofs 2016 (2016) - [c22]June Andronick, Corey Lewis, Daniel Matichuk, Carroll Morgan, Christine Rizkallah:
Proof of OS Scheduling Behavior in the Presence of Interrupt-Induced Concurrency. ITP 2016: 52-68 - 2015
- [j3]D. Ross Jeffery, Mark Staples, June Andronick, Gerwin Klein, Toby C. Murray:
An empirical research agenda for understanding formal methods productivity. Inf. Softw. Technol. 60: 102-112 (2015) - [c21]Matthew Fernandez, June Andronick, Gerwin Klein, Ihor Kuz:
Automated Verification of RPC Stub Code. FM 2015: 273-290 - [c20]Daniel Matichuk, Toby C. Murray, June Andronick, D. Ross Jeffery, Gerwin Klein, Mark Staples:
Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification. ICSE (1) 2015: 722-732 - [c19]June Andronick, Corey Lewis, Carroll Morgan:
Controlled Owicki-Gries Concurrency: Reasoning about the Preemptible eChronos Embedded Operating System. MARS 2015: 10-24 - 2014
- [j2]Gerwin Klein, June Andronick, Kevin Elphinstone, Toby C. Murray, Thomas Sewell, Rafal Kolanski, Gernot Heiser:
Comprehensive formal verification of an OS microkernel. ACM Trans. Comput. Syst. 32(1): 2:1-2:70 (2014) - [c18]Mark Staples, D. Ross Jeffery, June Andronick, Toby C. Murray, Gerwin Klein, Rafal Kolanski:
Productivity for proof engineering. ESEM 2014: 15:1-15:4 - [c17]David Greenaway, Japheth Lim, June Andronick, Gerwin Klein:
Don't sweat the small stuff: formal verification of C code without the pain. PLDI 2014: 429-439 - 2013
- [c16]Andrew Boyton, June Andronick, Callum Bannister, Matthew Fernandez, Xin Gao, David Greenaway, Gerwin Klein, Corey Lewis, Thomas Sewell:
Formally Verified System Initialisation. ICFEM 2013: 70-85 - [c15]Mark Staples, Rafal Kolanski, Gerwin Klein, Corey Lewis, June Andronick, Toby C. Murray, D. Ross Jeffery, Len Bass:
Formal specifications better than function points for code sizing. ICSE 2013: 1257-1260 - [c14]Matthew Fernandez, Ihor Kuz, Gerwin Klein, June Andronick:
Towards a verified component platform. PLOS@SOSP 2013: 2:1-2:7 - 2012
- [c13]June Andronick, D. Ross Jeffery, Gerwin Klein, Rafal Kolanski, Mark Staples, He Zhang, Liming Zhu:
Large-scale formal verification in practice: A process perspective. ICSE 2012: 1002-1011 - [c12]He Zhang, Gerwin Klein, Mark Staples, June Andronick, Liming Zhu, Rafal Kolanski:
Simulation modeling of a large-scale formal verification process. ICSSP 2012: 3-12 - [c11]David Greenaway, June Andronick, Gerwin Klein:
Bridging the Gap: Automatic Verified Abstraction of C. ITP 2012: 99-115 - 2011
- [c10]Thomas Sewell, Simon Winwood, Peter Gammie, Toby C. Murray, June Andronick, Gerwin Klein:
seL4 Enforces Integrity. ITP 2011: 325-340 - 2010
- [j1]Gerwin Klein, June Andronick, Kevin Elphinstone, Gernot Heiser, David A. Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood:
seL4: formal verification of an operating-system kernel. Commun. ACM 53(6): 107-115 (2010) - [c9]Gernot Heiser, June Andronick, Kevin Elphinstone, Gerwin Klein, Ihor Kuz, Leonid Ryzhyk:
The road to trustworthy systems. STC@CCS 2010: 3-10 - [c8]June Andronick:
From a Proven Correct Microkernel to Trustworthy Large Systems. FoVeOOS 2010: 1-9 - [c7]June Andronick, David Greenaway, Kevin Elphinstone:
Towards Proving Security in the Presence of Large Untrusted Components. SSV 2010
2000 – 2009
- 2009
- [c6]Gerwin Klein, Kevin Elphinstone, Gernot Heiser, June Andronick, David A. Cock, Philip Derrin, Dhammika Elkaduwe, Kai Engelhardt, Rafal Kolanski, Michael Norrish, Thomas Sewell, Harvey Tuch, Simon Winwood:
seL4: formal verification of an OS kernel. SOSP 2009: 207-220 - [c5]Simon Winwood, Gerwin Klein, Thomas Sewell, June Andronick, David A. Cock, Michael Norrish:
Mind the Gap. TPHOLs 2009: 500-515 - 2008
- [c4]June Andronick, Quang Huy Nguyen:
Certifying an embedded remote method invocation protocol. SAC 2008: 352-359 - 2006
- [c3]June Andronick:
Formally Proved Anti-tearing Properties of Embedded C Code. ISoLA 2006: 129-136 - 2005
- [c2]June Andronick, Boutheina Chetali, Christine Paulin-Mohring:
Formal Verification of Security Properties of Smart Card Embedded Source Code. FM 2005: 302-317 - 2003
- [c1]June Andronick, Boutheina Chetali, Olivier Ly:
Using Coq to Verify Java Card Applet Isolation Properties. TPHOLs 2003: 335-351
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-22 20:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint