Sciweavers

BIRTHDAY
2004
Springer
14 years 4 months ago
Retracing the Semantics of CSP
CSP was originally introduced as a parallel programming language in which sequential imperative processes execute concurrently and communicate by synchronized input and output. The...
Stephen D. Brookes
SAS
2005
Springer
134views Formal Methods» more  SAS 2005»
14 years 5 months ago
Using Dependent Types to Certify the Safety of Assembly Code
There are many source-level analyses or instrumentation tools that enforce various safety properties. In this paper we present an infrastructure that can be used to check independe...
Matthew Harren, George C. Necula
ESORICS
2005
Springer
14 years 5 months ago
Enforcing Non-safety Security Policies with Program Monitors
We consider the enforcement powers of program monitors, which intercept security-sensitive actions of a target application at run time and take remedial steps whenever the target a...
Jay Ligatti, Lujo Bauer, David Walker
MEMOCODE
2005
IEEE
14 years 5 months ago
Three-valued logic in bounded model checking
In principle, bounded model checking (BMC) leads to semidecision procedures that can be used to verify liveness properties and to falsify safety properties. If the procedures fail...
Tobias Schüle, Klaus Schneider
ICDCSW
2005
IEEE
14 years 5 months ago
State Checksum and Its Role in System Stabilization
Although a self-stabilizing system that suffers from a transient fault is guaranteed to converge to a legitimate state after a finite number of steps, the convergence can be slow ...
Chin-Tser Huang, Mohamed G. Gouda
IPPS
2006
IEEE
14 years 5 months ago
Decentralized runtime analysis of multithreaded applications
Violations of a number of common safety properties of multithreaded programs–such as atomicity and absence of dataraces–cannot be observed by looking at the linear execution t...
Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu
FMCAD
2007
Springer
14 years 5 months ago
Induction in CEGAR for Detecting Counterexamples
— Induction has been studied in model checking for proving the validity of safety properties, i.e., showing the absence of counterexamples. To our knowledge, induction has not be...
Chao Wang, Aarti Gupta, Franjo Ivancic
CAV
2007
Springer
110views Hardware» more  CAV 2007»
14 years 5 months ago
Hector: Software Model Checking with Cooperating Analysis Plugins
We present Hector, a software tool for combining different abstraction methods to extract sound models of heap-manipulating imperative programs with recursion. Extracted models ma...
Nathaniel Charlton, Michael Huth
FGCN
2008
IEEE
132views Communications» more  FGCN 2008»
14 years 6 months ago
Deriving Safety Properties for Home Network System Based on Goal-Oriented Hazard Analysis Model
The home network system (HNS, for short) is comprised of networked home appliances, which achieves various value-added services for home users. Assuring safety of the HNS and the ...
Ben Yan, Masahide Nakamura, Ken-ichi Matsumoto
HICSS
2009
IEEE
107views Biometrics» more  HICSS 2009»
14 years 6 months ago
EM Enforcing Information Flow Properties using Compensating Events
Deeply embedded infrastructures are pervasive systems that have significant cyber and physical components, interacting with each other in complex ways. These interactions can vio...
Thoshitha T. Gamage, Bruce M. McMillin