Sciweavers

293 search results - page 40 / 59
» Formal Security Analysis with Interacting State Machines
Sort
View
AGP
1996
IEEE
13 years 11 months ago
Modular Analysis of Suspension Free cc Programs
Compositional semantics allow to reason about programs in an incremental way, thus providing the formal base for the development of modular data-flow analyses. The major drawback ...
Enea Zaffanella
ASPLOS
2006
ACM
14 years 1 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
ATVA
2006
Springer
158views Hardware» more  ATVA 2006»
13 years 11 months ago
Model-Based Tool-Chain Infrastructure for Automated Analysis of Embedded Systems
In many safety-critical applications of embedded systems, the system dynamics exhibits hybrid behaviors. To enable automatic analysis of these embedded systems, many analysis tools...
Hang Su, Graham Hemingway, Kai Chen, T. John Koo
FORTE
2010
13 years 9 months ago
On Efficient Models for Model Checking Message-Passing Distributed Protocols
Abstract. The complexity of distributed algorithms, such as state machine replication, motivates the use of formal methods to assist correctness verification. The design of the for...
Péter Bokor, Marco Serafini, Neeraj Suri
ECEASST
2010
13 years 5 months ago
GUI Inspection from Source Code Analysis
Abstract: Graphical user interfaces (GUIs) are critical components of todays software. Given their increased relevance, correctness and usability of GUIs are becoming essential. Th...
João Carlos Silva 0002, José Creissa...