Sciweavers

620 search results - page 8 / 124
» Abstract Analysis of Symbolic Executions
Sort
View
ASPLOS
2011
ACM
12 years 11 months ago
S2E: a platform for in-vivo multi-path analysis of software systems
This paper presents S2E, a platform for analyzing the properties and behavior of software systems. We demonstrate S2E’s use in developing practical tools for comprehensive perfo...
Vitaly Chipounov, Volodymyr Kuznetsov, George Cand...
GLOBECOM
2006
IEEE
14 years 1 months ago
Performance Analysis of Frame Synchronization for Non-Uniformly Distributed Data Symbols
Abstract— Frame synchronization is classically treated in literature for equiprobable data symbols. In this case the optimum metric has been derived both in the case of periodica...
Marco Chiani, Maria G. Martini
DAC
1997
ACM
13 years 11 months ago
Formal Verification of a Superscalar Execution Unit
Abstract. Many modern systems are designed as a set of interconnected reactive subsystems. The subsystem verification task is to verify an implementation of the subsystem against t...
Kyle L. Nelson, Alok Jain, Randal E. Bryant
SP
2006
IEEE
104views Security Privacy» more  SP 2006»
14 years 1 months ago
A Logic for Constraint-based Security Protocol Analysis
We propose PS-LTL, a pure-past security linear temporal logic that allows the specification of a variety of authentication, secrecy and data freshness properties. Furthermore, we...
Ricardo Corin, Sandro Etalle, Ari Saptawijaya
ESORICS
2010
Springer
13 years 8 months ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers