Sciweavers

261 search results - page 16 / 53
» A New Unfolding Approach to LTL Model Checking
Sort
View
SPIN
2007
Springer
14 years 1 months ago
C.OPEN and ANNOTATOR: Tools for On-the-Fly Model Checking C Programs
This paper describes a set of verification components that open the way to perform on-the-fly software model checking with the Cadp toolbox, originally designed for verifying the...
María-del-Mar Gallardo, Christophe Joubert,...
SPIN
2009
Springer
14 years 2 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 7 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
AC
2003
Springer
14 years 29 days ago
Synthesis of Asynchronous Hardware from Petri Nets
Abstract. As semiconductor technology strides towards billions of transistors on a single die, problems concerned with deep sub-micron process features and design productivity call...
Josep Carmona, Jordi Cortadella, Victor Khomenko, ...
ISORC
2005
IEEE
14 years 1 months ago
Automated Model Checking and Testing for Composite Web Services
Web Services form a new distributed computing paradigm. Collaborative verification and validation are important when Web Services from different vendors are integrated together to...
Hai Huang, Wei-Tek Tsai, Raymond A. Paul, Yinong C...