Sciweavers

55 search results - page 8 / 11
» Addressing State Explosion in Behavior Protocol Verification
Sort
View
ITNG
2007
IEEE
14 years 1 months ago
Human Computer Interaction Based Intrusion Detection
—In this paper we survey the state of the art in direct and indirect human computer interaction based biometrics. Direct HCI biometrics are based on abilities, style, preference,...
Roman V. Yampolskiy
CCS
2006
ACM
13 years 11 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
POPL
2002
ACM
14 years 7 months ago
Mining specifications
Program verification is a promising approach to improving program quality, because it can search all possible program executions for specific errors. However, the need to formally...
Glenn Ammons, James R. Larus, Rastislav Bodí...
ENTCS
2008
118views more  ENTCS 2008»
13 years 7 months ago
The STSLib Project: Towards a Formal Component Model Based on STS
We present the current state of our STSLib project. This project aims at defining an environment to formally specify and execute software components. One important feature is that...
Fabrício Fernandes, Jean-Claude Royer
CAV
2000
Springer
197views Hardware» more  CAV 2000»
13 years 11 months ago
Bounded Model Construction for Monadic Second-Order Logics
Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion . . . . . . . . . . . . . . . . . . . . . . . . . . 1 A. Pnueli Invited Address...
Abdelwaheb Ayari, David A. Basin