Sciweavers

759 search results - page 57 / 152
» Identifying Modeling Errors in Signatures by Model Checking
Sort
View
IPCCC
2006
IEEE
14 years 3 months ago
Automatically deducing propagation sequences that circumvent a collaborative worm defense
We present an approach to the question of evaluating worm defenses against future, yet unseen and possibly defense-aware worm behavior. Our scheme employs model checking to produc...
Linda Briesemeister, Phillip A. Porras
ACSC
2007
IEEE
14 years 1 months ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
HPCA
2007
IEEE
14 years 9 months ago
Illustrative Design Space Studies with Microarchitectural Regression Models
We apply a scalable approach for practical, comprehensive design space evaluation and optimization. This approach combines design space sampling and statistical inference to ident...
Benjamin C. Lee, David M. Brooks
CAV
2008
Springer
113views Hardware» more  CAV 2008»
13 years 11 months ago
Producing Short Counterexamples Using "Crucial Events"
Ideally, a model checking tool should successfully tackle state space explosion for complete system validation, while providing short counterexamples when an error exists. Techniqu...
Sujatha Kashyap, Vijay K. Garg
CHARME
2005
Springer
120views Hardware» more  CHARME 2005»
14 years 2 months ago
How Thorough Is Thorough Enough?
Abstraction is the key for effectively dealing with the state explosion in model-checking. Unfortunately, finding abstractions which are small and yet enable us to get conclusive ...
Arie Gurfinkel, Marsha Chechik