{"user_id":"477","citation":{"apa":"Wonisch, D., Schremmer, A., & Wehrheim, H. (2014). Programs from Proofs -- Approach and Applications. In Proceedings of the Software Engineering Conference (SE) (pp. 67–68).","ieee":"D. Wonisch, A. Schremmer, and H. Wehrheim, “Programs from Proofs -- Approach and Applications,” in Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68.","mla":"Wonisch, Daniel, et al. “Programs from Proofs -- Approach and Applications.” Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68.","bibtex":"@inproceedings{Wonisch_Schremmer_Wehrheim_2014, series={Lecture Notes in Informatics (LNI)}, title={Programs from Proofs -- Approach and Applications}, booktitle={Proceedings of the Software Engineering Conference (SE)}, author={Wonisch, Daniel and Schremmer, Alexander and Wehrheim, Heike}, year={2014}, pages={67–68}, collection={Lecture Notes in Informatics (LNI)} }","ama":"Wonisch D, Schremmer A, Wehrheim H. Programs from Proofs -- Approach and Applications. In: Proceedings of the Software Engineering Conference (SE). Lecture Notes in Informatics (LNI). ; 2014:67-68.","chicago":"Wonisch, Daniel, Alexander Schremmer, and Heike Wehrheim. “Programs from Proofs -- Approach and Applications.” In Proceedings of the Software Engineering Conference (SE), 67–68. Lecture Notes in Informatics (LNI), 2014.","short":"D. Wonisch, A. Schremmer, H. Wehrheim, in: Proceedings of the Software Engineering Conference (SE), 2014, pp. 67–68."},"department":[{"_id":"77"}],"file":[{"file_name":"383-programmsFromProofsSE.pdf","creator":"florida","date_updated":"2018-03-20T07:04:52Z","file_size":66474,"access_level":"closed","file_id":"1392","success":1,"date_created":"2018-03-20T07:04:52Z","content_type":"application/pdf","relation":"main_file"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"12","name":"SFB 901 - Subprojekt B4"},{"_id":"3","name":"SFB 901 - Project Area B"}],"series_title":"Lecture Notes in Informatics (LNI)","main_file_link":[{"url":"http://eprints.uni-kiel.de/23752/"}],"abstract":[{"lang":"eng","text":"Proof-carrying code approaches aim at safe execution of untrusted code by having the code producer attach a safety proof to the code which the code consumer only has to validate. Depending on the type of safety property, proofs can however become quite large and their validation - though faster than their construction - still time consuming. In this paper we introduce a new concept for safe execution of untrusted code. It keeps the idea of putting the time consuming part of proving on the side of the code producer, however, attaches no proofs to code anymore but instead uses the proof to transform the program into an equivalent but more efficiently verifiable program. Code consumers thus still do proving themselves, however, on a computationally inexpensive level only. Experimental results show that the proof effort can be reduced by several orders of magnitude, both with respect to time and space."}],"ddc":["040"],"year":"2014","_id":"383","language":[{"iso":"eng"}],"status":"public","has_accepted_license":"1","author":[{"first_name":"Daniel","full_name":"Wonisch, Daniel","last_name":"Wonisch"},{"first_name":"Alexander","full_name":"Schremmer, Alexander","last_name":"Schremmer"},{"first_name":"Heike","id":"573","last_name":"Wehrheim","full_name":"Wehrheim, Heike"}],"date_updated":"2022-01-06T06:59:38Z","date_created":"2017-10-17T12:42:06Z","title":"Programs from Proofs -- Approach and Applications","publication":"Proceedings of the Software Engineering Conference (SE)","file_date_updated":"2018-03-20T07:04:52Z","type":"conference","page":"67-68"}