Tom Melham

Professor Tom Melham FRSE
Selected Publications
-
Verification of Tree−Based Hierarchical Read−Copy Update in the Linux Kernel
Lihao Liang‚ Paul E. McKenney‚ Daniel Kroening and Tom Melham
In Jan Madsen and Ayse K. Coskun, editors, 2018 Design‚ Automation & Test in Europe Conference & Exhibition‚ DATE 2018‚ Dresden‚ Germany‚ March 19–23‚ 2018. Pages 61–66. European Design and Automation Association. 2018.
Details about Verification of Tree−Based Hierarchical Read−Copy Update in the Linux Kernel | BibTeX data for Verification of Tree−Based Hierarchical Read−Copy Update in the Linux Kernel | DOI (10.23919/DATE.2018.8341980) | Download (pdf) of Verification of Tree−Based Hierarchical Read−Copy Update in the Linux Kernel
-
Automatic Heap Layout Manipulation for Exploitation
Sean Heelan‚ Tom Melham and Daniel Kroening
In William Enck and Adrienne Porter Felt, editors, 27th USENIX Security Symposium‚ USENIX Security 18: Baltimore‚ MD‚ USA‚ August 15–17‚ 2018. Pages 763–779. USENIX Association. 2018.
Details about Automatic Heap Layout Manipulation for Exploitation | BibTeX data for Automatic Heap Layout Manipulation for Exploitation | Download (pdf) of Automatic Heap Layout Manipulation for Exploitation
-
Symbolic Trajectory Evaluation
Tom Melham
In Edmund M. Clarke‚ Thomas A. Henzinger‚ Helmut Veith and Roderick Bloem, editors, Handbook of Model Checking. Chapter 25. Pages 831–870. Springer International Publishing. 2018.
Details about Symbolic Trajectory Evaluation | BibTeX data for Symbolic Trajectory Evaluation | DOI (10.1007/978-3-319-10575-8_25)