Sciweavers

297 search results - page 4 / 60
» Model Checking Guarded Protocols
Sort
View
SEW
2006
IEEE
14 years 4 months ago
Model Checking of Software Components: Combining Java PathFinder and Behavior Protocol Model Checker
Although there exist several software model checkers that check the code against properties specified e.g. via a temporal logic and assertions, or just verifying low-level propert...
Pavel Parizek, Frantisek Plasil, Jan Kofron
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 11 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
FORTE
2010
14 years 9 days ago
On Efficient Models for Model Checking Message-Passing Distributed Protocols
Abstract. The complexity of distributed algorithms, such as state machine replication, motivates the use of formal methods to assist correctness verification. The design of the for...
Péter Bokor, Marco Serafini, Neeraj Suri
NSDI
2004
14 years 7 days ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler
RP
2009
Springer
110views Control Systems» more  RP 2009»
14 years 5 months ago
Formalisms for Specifying Markovian Population Models
Abstract. We compare several languages for specifying Markovian population models such as queuing networks and chemical reaction networks. These languages —matrix descriptions, s...
Thomas A. Henzinger, Barbara Jobstmann, Verena Wol...