Sciweavers

537 search results - page 37 / 108
» A threat-driven approach to modeling and verifying secure so...
Sort
View
RTCSA
2008
IEEE
14 years 2 months ago
Verification of COMDES-II Systems Using UPPAAL with Model Transformation
COMDES-II is a component-based software framework intended for Model Integrated Computing (MIC) of embedded control systems with hard real-time constraints. We present a transforma...
Xu Ke, Paul Pettersson, Krzysztof Sierszecki, Chri...
ENVSOFT
2006
72views more  ENVSOFT 2006»
13 years 7 months ago
Integrating legacy components into a software system for storm sewer simulation
This paper presents an approach that integrates a legacy component into a software system for storm sewer simulation. The legacy component employed here is the Storm Water Managem...
Shiu-Shin Lin, Shang-Hsien Hsieh, Jan-Tai Kuo, Yin...
DSN
2000
IEEE
14 years 20 hour ago
Testing for Software Vulnerability Using Environment Perturbation
We describe an methodology for testing a software system for possible security flaws. Based on the observation that most security flaws are caused by the program’s inappropria...
Wenliang Du, Aditya P. Mathur
IFIP
2010
Springer
13 years 2 months ago
Model Checking of Concurrent Algorithms: From Java to C
Concurrent software is difficult to verify. Because the thread schedule is not controlled by the application, testing may miss defects that occur under specific thread schedules. T...
Cyrille Artho, Masami Hagiya, Watcharin Leungwatta...
USS
2008
13 years 10 months ago
Experiences with Model Inference Assisted Fuzzing
In this paper we introduce the idea of model inference assisted fuzzing aimed to cost effectively improve software security. We experimented with several model inference technique...
Joachim Viide, Aki Helin, Marko Laakso, Pekka Piet...