Sciweavers

861 search results - page 31 / 173
» Symbolic Program Analysis Using Term Rewriting and Generaliz...
Sort
View
LPAR
2005
Springer
15 years 8 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...
CCS
2006
ACM
15 years 6 months ago
EXE: automatically generating inputs of death
This paper presents EXE, an effective bug-finding tool that automatically generates inputs that crash real code. Instead of running code on manually or randomly constructed input,...
Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, ...
126
Voted
SIGSOFT
2010
ACM
15 years 11 days ago
Scalable SMT-based verification of GPU kernel functions
Interest in Graphical Processing Units (GPUs) is skyrocketing due to their potential to yield spectacular performance on many important computing applications. Unfortunately, writ...
Guodong Li, Ganesh Gopalakrishnan
130
Voted
CAV
2012
Springer
236views Hardware» more  CAV 2012»
13 years 5 months ago
Lock Removal for Concurrent Trace Programs
Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computati...
Vineet Kahlon, Chao Wang
OOPSLA
2009
Springer
15 years 7 months ago
An exploration of program as language
In this paper we explore the idea that the code that constitutes a program actually forms a higher-level, program specific language. The symbols of the language are the abstracti...
Elisa L. A. Baniassad, Clayton G. Myers