Sciweavers

36 search results - page 1 / 8
» Heuristics for Safety and Security Constraints
Sort
View
ENTCS
2007
199views more  ENTCS 2007»
13 years 4 months ago
Heuristics for Safety and Security Constraints
The flow logic approach to static analysis amounts to specifying the admissibility of solutions to analysis problems; when specified using formulae in stratified alternation-fr...
Flemming Nielson, Hanne Riis Nielson
COMPSAC
2006
IEEE
13 years 11 months ago
Preventing Feature Interactions by Constraints
As software systems evolve by adding new extensions some unexpected conflicts may occur, which is known as the Feature Interaction Problem (FIP). FIP is a threat to the dependabil...
Jihong Zuo, Qianxiang Wang, Hong Mei
ISI
2006
Springer
13 years 4 months ago
Suspect Vehicle Identification for Border Safety with Modified Mutual Information
The Department of Homeland Security monitors vehicles entering and leaving the country at land ports of entry. Some vehicles are targeted to search for drugs and other contraband. ...
Siddharth Kaza, Yuan Wang, Hsinchun Chen
ISSTA
2010
ACM
13 years 8 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder
CONCUR
2010
Springer
13 years 5 months ago
Session Types for Access and Information Flow Control
We consider a calculus for multiparty sessions with delegation, enriched with security levels for session participants and data. We propose a type system that guarantees both sessi...
Sara Capecchi, Ilaria Castellani, Mariangiola Deza...