Sciweavers

950 search results - page 22 / 190
» Software model checking with SPIN
Sort
View
SAFECOMP
2007
Springer
14 years 1 months ago
Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees
In existing security model-checkers the intruder’s behavior is defined as a message deducibility rule base governing use of eavesdropped information, with the aim to find out a m...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
JUCS
2007
116views more  JUCS 2007»
13 years 7 months ago
Model Checking: Software and Beyond
: This paper introduces model checking, originally conceived for checking finite state systems. It surveys its evolution to encompass finitely checkable properties of systems wit...
Edmund M. Clarke, Flavio Lerda
ENTCS
2007
99views more  ENTCS 2007»
13 years 7 months ago
Extending Symmetry Reduction Techniques to a Realistic Model of Computation
Much of the literature on symmetry reductions for model checking assumes a simple model of computation where the local state of each component in a concurrent system can be repres...
Alastair F. Donaldson, Alice Miller
CAV
2005
Springer
173views Hardware» more  CAV 2005»
14 years 1 months ago
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework
Model checking has proven to be an effective technology for verification and debugging in hardware and more recently in software domains. We believe that recent trends in both th...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier, ...
ECLIPSE
2004
ACM
14 years 29 days ago
Supporting model checking education using BOGOR/Eclipse
This paper describes our effort on developing educational materials on model checking to help foster the adoption of software model checking. We describe the course materials tha...
Matthew B. Dwyer, John Hatcliff, Matthew Hoosier