Sciweavers

2523 search results - page 397 / 505
» Correct Development of Embedded Systems
Sort
View
CADE
2008
Springer
14 years 9 months ago
Certifying a Tree Automata Completion Checker
Tree automata completion is a technique for the verification of infinite state systems. It has already been used for the verification of cryptographic protocols and the prototyping...
Benoît Boyer, Thomas Genet, Thomas P. Jensen
HICSS
2009
IEEE
151views Biometrics» more  HICSS 2009»
14 years 4 months ago
Integrating Formal Analysis and Design to Preserve Security Properties
The use of formal methods has long been advocated in the development of secure systems. Yet, methods for deriving design from requirements that guarantee retention of the intended...
Riham Hassan, Shawn A. Bohner, Sherif El-Kassas, M...
SPIN
2009
Springer
14 years 3 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
WCRE
2008
IEEE
14 years 3 months ago
PREREQIR: Recovering Pre-Requirements via Cluster Analysis
High-level software artifacts, such as requirements, domain-specific requirements, and so on, are an important source of information that is often neglected during the reverse- an...
Jane Huffman Hayes, Giuliano Antoniol, Yann-Ga&eum...
IPPS
2005
IEEE
14 years 2 months ago
Dynamic Delay-Fault Injection for Reconfigurable Hardware
Modern internet and telephone switches consist of numerous VLSI-circuits operating at high frequencies to handle high bandwidths. It is beyond question that such systems must cont...
Bernhard Fechner