Sciweavers

794 search results - page 26 / 159
» Automatically Analyzing Software Processes: Experience Repor...
Sort
View
ECSA
2008
Springer
13 years 8 months ago
Towards a Method for the Evaluation of Reference Architectures: Experiences from a Case
Reference architectures provide major guidelines for the structure of a class of information systems. Because of their fundamental role, reference architectures have to be of high ...
Samuil Angelov, Jos J. M. Trienekens, Paul W. P. J...
CCS
2005
ACM
14 years 9 days ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
CAV
2007
Springer
114views Hardware» more  CAV 2007»
13 years 10 months ago
Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis
In automatic software verification, we have observed a theoretical convergence of model checking and program analysis. In practice, however, model checkers are still mostly concern...
Dirk Beyer, Thomas A. Henzinger, Grégory Th...
IEEEARES
2008
IEEE
14 years 1 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
SIGSOFT
1996
ACM
13 years 11 months ago
Model Checking Large Software Specifications
In this paper we present our experiences in using symbolic model checking to analyze a specification of a software system for aircraft collision avoidance. Symbolic model checking ...
Richard J. Anderson, Paul Beame, Steve Burns, Will...