Sciweavers

203 search results - page 14 / 41
» Static Program Analysis via 3-Valued Logic
Sort
View
DAC
1997
ACM
13 years 12 months ago
Static Timing Analysis of Embedded Software
This paper examines the problem of statically analyzing the performance of embedded software. This problem is motivated by the increasing growth of embedded systems and a lack of ...
Sharad Malik, Margaret Martonosi, Yau-Tsun Steven ...
SIGSOFT
2002
ACM
14 years 8 months ago
Invariant inference for static checking
Static checking can verify the absence of errors in a program, but often requires written annotations or specifications. As a result, static checking can be difficult to use effec...
Jeremy W. Nimmer, Michael D. Ernst
SCAM
2008
IEEE
14 years 2 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
CADE
2008
Springer
14 years 8 months ago
Precise Dynamic Verification of Confidentiality
Confidentiality is maybe the most popular security property to be formally or informally verified. Noninterference is a baseline security policy to formalize confidentiality of sec...
Gurvan Le Guernic
ECR
2006
107views more  ECR 2006»
13 years 7 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg