Sciweavers

1446 search results - page 76 / 290
» Formal analysis of hardware requirements
Sort
View
CAV
2011
Springer
216views Hardware» more  CAV 2011»
13 years 25 days ago
Malware Analysis with Tree Automata Inference
Abstract. The underground malware-based economy is flourishing and it is evident that the classical ad-hoc signature detection methods are becoming insufficient. Malware authors ...
Domagoj Babic, Daniel Reynaud, Dawn Song
SIGCOMM
1995
ACM
14 years 23 days ago
Performance Analysis of MD5
MD5 is an authentication algorithm proposed as the required implementation of the authentication option in IPv6. This paper presents an analysis of the speed at which MD5 can be i...
Joseph D. Touch
DATE
2005
IEEE
164views Hardware» more  DATE 2005»
14 years 2 months ago
Automated Synthesis of Assertion Monitors using Visual Specifications
Automated synthesis of monitors from high-level properties plays a significant role in assertion-based verification. We present here a methodology to synthesize assertion monitors...
Ambar A. Gadkari, S. Ramesh
ACSD
2001
IEEE
134views Hardware» more  ACSD 2001»
14 years 27 days ago
Embedding Imperative Synchronous Languages in Interactive Theorem Provers
We present a new way to define the semantics of imperative synchronous languages by means of separating the control and the data flow. The control flow is defined by predicates th...
Klaus Schneider
SAS
2007
Springer
112views Formal Methods» more  SAS 2007»
14 years 3 months ago
Taming the Wrapping of Integer Arithmetic
Variables in programs are usually confined to a fixed number of bits and results that require more bits are truncated. Due to the use of 32-bit and 64-bit variables, inadvertent ...
Axel Simon, Andy King