Sciweavers

614 search results - page 47 / 123
» LCLint: A Tool for Using Specifications to Check Code
Sort
View
STTT
2008
117views more  STTT 2008»
13 years 8 months ago
An approach to quality engineering of TTCN-3 test specifications
Abstract Experience with the development and maintenance of large test suites specified using the Testing and Test Control Notation (TTCN-3) has shown that it is difficult to const...
Helmut Neukirchen, Benjamin Zeiss, Jens Grabowski
ACSC
2007
IEEE
14 years 27 days ago
Cross-Layer Verification of Type Flaw Attacks on Security Protocols
Security protocols are often specified at the application layer; however, application layer specifications give little detail regarding message data structures at the presentation...
Benjamin W. Long, Colin J. Fidge, David A. Carring...
CORR
2010
Springer
174views Education» more  CORR 2010»
13 years 6 months ago
A Proof Carrying Code Framework for Inlined Reference Monitors in Java Bytecode
We propose a lightweight approach for certification of Java bytecode monitor inlining using proof-carrying code. The main purpose of such a framework is to enable development use ...
Mads Dam, Andreas Lundblad
CODES
2000
IEEE
14 years 15 days ago
On the roles of functions and objects in system specification
We present an analysis of the benefits and drawbacks of function and object based models in system specification. Functional models should be used for functional design space expl...
Axel Jantsch, Ingo Sander
ACSAC
2006
IEEE
14 years 2 months ago
PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware
Modern malware often hide the malicious portion of their program code by making it appear as data at compiletime and transforming it back into executable code at runtime. This obf...
Paul Royal, Mitch Halpin, David Dagon, Robert Edmo...