Sciweavers

106 search results - page 8 / 22
» Tools for Traceable Security Verification
Sort
View
WWW
2007
ACM
14 years 8 months ago
Analyzing web access control policies
XACML has emerged as a popular access control language on the Web, but because of its rich expressiveness, it has proved difficult to analyze in an automated fashion. In this pape...
Vladimir Kolovski, James A. Hendler, Bijan Parsia
SIGSOFT
2004
ACM
14 years 8 months ago
Testing static analysis tools using exploitable buffer overflows from open source code
Five modern static analysis tools (ARCHER, BOON, PolySpace C Verifier, Splint, and UNO) were evaluated using source code examples containing 14 exploitable buffer overflow vulnera...
Misha Zitser, Richard Lippmann, Tim Leek
RE
2004
Springer
14 years 26 days ago
From Aspectual Requirements to Proof Obligations for Aspect-Oriented Systems
Aspect-oriented software development (AOSD) techniques support systematic modularization and composition of crosscutting concerns. Though AOSD techniques have been proposed to han...
Shmuel Katz, Awais Rashid
FOSAD
2009
Springer
13 years 11 months ago
Verification of Concurrent Programs with Chalice
A program verifier is a tool that allows developers to prove that their code satisfies its specification for every possible input and every thread schedule. These lecture notes des...
K. Rustan M. Leino, Peter Müller, Jan Smans
ICUMT
2009
13 years 5 months ago
A syntactic approach for identifying multi-protocol attacks
In the context of multiple security protocols running in the same environment, we propose a syntactical approach for identifying multi-protocol attacks. The proposed approach uses ...
Béla Genge, Piroska Haller