Sciweavers

981 search results - page 83 / 197
» Symbolic pointer analysis
Sort
View
VMCAI
2005
Springer
14 years 3 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
KBSE
2008
IEEE
14 years 4 months ago
Automatic Inference of Frame Axioms Using Static Analysis
Many approaches to software verification are currently semi-automatic: a human must provide key logical insights — e.g., loop invariants, class invariants, and frame axioms tha...
Zvonimir Rakamaric, Alan J. Hu
TC
2002
13 years 9 months ago
General Modeling and Performance Analysis for Location Management in Wireless Mobile Networks
Location management plays a significant role in current and future wireless mobile networks in effectively delivering services to the mobile users on the move. Many schemes have be...
Yuguang Fang
ATVA
2009
Springer
125views Hardware» more  ATVA 2009»
14 years 4 months ago
Automated Analysis of Data-Dependent Programs with Dynamic Memory
We present a new approach for automatic verification of data-dependent programs manipulating dynamic heaps. A heap is encoded by a graph where the nodes represent the cells, and t...
Parosh Aziz Abdulla, Muhsin Atto, Jonathan Cederbe...
SAS
2007
Springer
128views Formal Methods» more  SAS 2007»
14 years 4 months ago
Magic-Sets Transformation for the Analysis of Java Bytecode
Denotational static analysis of Java bytecode has a nice and clean compositional definition and an efficient implementation with binary decision diagrams. But it models only the f...
Étienne Payet, Fausto Spoto