### Table 3.2: The Mapping from Insecure Functions to Secure Functions

### Table 3.3: The Mapping from Insecure Operators to Secure Functions

### Table 3.2: The Mapping from Insecure Functions to Secure Functions

### Table 3.3: The Mapping from Insecure Operators to Secure Functions

### Table 4.1 Estimates of food security and insecurity, by country

### Table 2. Open goals for insecure programs.

2005

"... In PAGE 6: ... Furthermore, if we switch o the metavariable mechanism the prover stops at goals that remain open in an attempt to prove security. Table2 contains these goals (in this case one for each program) and it is easy to observe that these formulas are indeed unprovable. In fact, the open goals give a direct hint to the source of the security breach.... In PAGE 7: ...Proving Insecurity To prove that the programs in Table2 are insecure, the property of insecurity has to be formalized. This can be done by simply taking the negation of formula (2).... ..."

Cited by 47

### Table 2. Open goals for insecure programs.

2005

"... In PAGE 5: ... Among our examples there are two insecure programs. Table2 contains the goals (in this case one for each program) that remain open in an attempt to prove security of these programs in KeY. It is easy to observe that these formulas are not provable.... In PAGE 5: ... 3.2 Proving Insecurity To prove that the programs in Table2 are insecure, the insecurity property has... ..."

Cited by 47

### Table 2. Open goals for insecure programs.

2005

"... In PAGE 5: ... Among our examples there are two insecure programs. Table2 contains the goals (in this case one for each program) that remain open in an attempt to prove security of these programs in KeY. It is easy to observe that these formulas are not provable.... In PAGE 5: ... 3.2 Proving Insecurity To prove that the programs in Table2 are insecure, the insecurity property has... ..."

Cited by 47