{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:30Z","timestamp":1750307010590,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,1,22]],"date-time":"2013-01-22T00:00:00Z","timestamp":1358812800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,1,22]]},"DOI":"10.1145\/2428116.2428124","type":"proceedings-article","created":{"date-parts":[[2013,1,22]],"date-time":"2013-01-22T15:29:29Z","timestamp":1358868569000},"page":"35-46","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards formal verification of TLS network packet processing written in C"],"prefix":"10.1145","author":[{"given":"Reynald","family":"Affeldt","sequence":"first","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tsukuba, Japan"}]},{"given":"Nicolas","family":"Marti","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology, Tsukuba, Japan"}]}],"member":"320","published-online":{"date-parts":[[2013,1,22]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103776.2103781"},{"key":"e_1_3_2_2_2_1","unstructured":"R. Affeldt N. Marti.Towards Formal Verification of TLS Network Packet Processing in C.Coq documentation.http:\/\/staff.aist.go.jp\/reynald.affeldt\/coqdev  R. Affeldt N. Marti.Towards Formal Verification of TLS Network Packet Processing in C.Coq documentation.http:\/\/staff.aist.go.jp\/reynald.affeldt\/coqdev"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2011.07.003"},{"key":"e_1_3_2_2_4_1","unstructured":"A. W. Appel.Tactics for Separation Logic.Early draft.Jan. 13 2006.http:\/\/www.cs.princeton.edu\/~appel\/papers\/septacs.pdf  A. W. Appel.Tactics for Separation Logic.Early draft.Jan. 13 2006.http:\/\/www.cs.princeton.edu\/~appel\/papers\/septacs.pdf"},{"key":"e_1_3_2_2_5_1","first-page":"5","volume-title":"Conf. on Theorem Proving in Higher Order Logics,vol. 4732 of LNCS","author":"Appel A. W.","year":"2007","unstructured":"A. W. Appel , S. Blazy . Separation Logic for Small-Step Cminor.Proc. of the 20th Intl . Conf. on Theorem Proving in Higher Order Logics,vol. 4732 of LNCS , pp. 5 -- 21 . Springer , 2007 A. W. Appel, S. Blazy.Separation Logic for Small-Step Cminor.Proc. of the 20th Intl. Conf. on Theorem Proving in Higher Order Logics,vol. 4732 of LNCS, pp.5--21. Springer, 2007"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133375.2133378"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-011-9219-0"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111043"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-009-9148-3"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-012-9255-4"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1929529.1929536"},{"key":"e_1_3_2_2_12_1","volume-title":"Reference Manual. Ver. 8.4.INRIA","author":"Proof Assistant The Coq","year":"2012","unstructured":"The Coq Proof Assistant : Reference Manual. Ver. 8.4.INRIA , 2012 The Coq Proof Assistant: Reference Manual. Ver. 8.4.INRIA, 2012"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993526"},{"key":"e_1_3_2_2_14_1","volume-title":"IETF","author":"Dierks T.","year":"2008","unstructured":"T. Dierks , E. Rescorla . The Transport Layer Security (TLS).Protocol Version 1.2. RFC 5246 . IETF , 2008 T. Dierks, E. Rescorla.The Transport Layer Security (TLS).Protocol Version 1.2. RFC 5246. IETF, 2008"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103719"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27705-4_8"},{"key":"e_1_3_2_2_17_1","volume-title":"A Reference Manual","author":"S. P.","year":"2002","unstructured":"S. P. Harbison III, G. L. Steele Jr .C : A Reference Manual . 5 th edition. Prentice Hall , 2002 S. P. Harbison III, G. L. Steele Jr.C: A Reference Manual.5th edition. Prentice Hall, 2002","edition":"5"},{"key":"e_1_3_2_2_18_1","unstructured":"X. Leroy.The Compcert verified compiler Commented Coq development.Version 1.11 2012-07--13http:\/\/compcert.inria.fr\/doc\/  X. Leroy.The Compcert verified compiler Commented Coq development.Version 1.11 2012-07--13http:\/\/compcert.inria.fr\/doc\/"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347563"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411204.1411237"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328465"},{"key":"e_1_3_2_2_22_1","unstructured":"OpenSSL. Open Source toolkit for SSL\/TLS. http:\/\/www.openssl.org  OpenSSL. Open Source toolkit for SSL\/TLS. http:\/\/www.openssl.org"},{"key":"e_1_3_2_2_23_1","unstructured":"PolarSSL. Open Source embedded SSL\/TLS cryptographic library. http:\/\/polarssl.org  PolarSSL. Open Source embedded SSL\/TLS cryptographic library. http:\/\/polarssl.org"},{"key":"e_1_3_2_2_24_1","volume-title":"Designing and Building Secure Systems. 11th Printing","author":"Rescorla E.","year":"2000","unstructured":"E. Rescorla . SSL and TLS : Designing and Building Secure Systems. 11th Printing . Addison Wesley , 2000 E. Rescorla.SSL and TLS: Designing and Building Secure Systems. 11th Printing. Addison Wesley, 2000"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/645683.664578"},{"key":"e_1_3_2_2_26_1","unstructured":"J. C. Reynolds.An Introduction to Separation Logic (Preliminary Draft).http:\/\/www.cs.cmu.edu\/~jcr\/copenhagen08.pdf.Oct. 23 2008  J. C. Reynolds.An Introduction to Separation Logic (Preliminary Draft).http:\/\/www.cs.cmu.edu\/~jcr\/copenhagen08.pdf.Oct. 23 2008"},{"key":"e_1_3_2_2_27_1","volume-title":"Secure Coding in C and C++ Addison Wesley","author":"Seacord R. C.","year":"2006","unstructured":"R. C. Seacord . Secure Coding in C and C++ Addison Wesley , 2006 R. C. Seacord. Secure Coding in C and C++ Addison Wesley, 2006"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-009-9120-2"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03359-9_34"}],"event":{"name":"POPL '13: The 40th Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"],"location":"Rome Italy","acronym":"POPL '13"},"container-title":["Proceedings of the 7th workshop on Programming languages meets program verification"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2428116.2428124","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2428116.2428124","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:49:01Z","timestamp":1750236541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2428116.2428124"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,22]]},"references-count":29,"alternative-id":["10.1145\/2428116.2428124","10.1145\/2428116"],"URL":"https:\/\/doi.org\/10.1145\/2428116.2428124","relation":{},"subject":[],"published":{"date-parts":[[2013,1,22]]},"assertion":[{"value":"2013-01-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}