Sciweavers

752 search results - page 28 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
PET
2005
Springer
14 years 1 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
HICSS
2003
IEEE
179views Biometrics» more  HICSS 2003»
14 years 1 months ago
JUMBL: A Tool for Model-Based Statistical Testing
Statistical testing of software based on a usage model is a cost-effective and efficient means to make inferences about software quality. In order to apply this method, a usage m...
Stacy J. Prowell
ASE
2005
137views more  ASE 2005»
13 years 8 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
14 years 1 months ago
Verifying Trustworthiness Requirements in Distributed Systems with Formal Log-file Analysis
The paper reports on an analysis technology based on the tracing approach to test trustworthy requirements of a distributed system. The system under test is instrumented such that...
Andreas Ulrich, Hesham Hallal, Alexandre Petrenko,...
INFSOF
2002
85views more  INFSOF 2002»
13 years 8 months ago
A methodology of testing high-level Petri nets
Petri nets have been extensively used in the modelling and analysis of concurrent and distributed systems. The veri
Hong Zhu, Xudong He