Sciweavers

84 search results - page 3 / 17
» Improvements to the Implementation of Interpolant-Based Mode...
Sort
View
SCAM
2008
IEEE
14 years 4 days ago
Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
Ensuring the correctness and reliability of software systems is one of the main problems in software development. Model checking, a static analysis method, is preponderant in impr...
Lei Wang, Qiang Zhang, PengChao Zhao
CAV
2005
Springer
127views Hardware» more  CAV 2005»
13 years 11 months ago
Incremental and Complete Bounded Model Checking for Full PLTL
Bounded model checking is an efficient method for finding bugs in system designs. The major drawback of the basic method is that it cannot prove properties, only disprove them. R...
Keijo Heljanko, Tommi A. Junttila, Timo Latvala
PAPM
2001
Springer
128views Mathematics» more  PAPM 2001»
13 years 10 months ago
Faster and Symbolic CTMC Model Checking
Abstract. This paper reports on the implementation and the experiments with symbolic model checking of continuous-time Markov chains using multi-terminal binary decision diagrams (...
Joost-Pieter Katoen, Marta Z. Kwiatkowska, Gethin ...
SIGSOFT
2007
ACM
14 years 6 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna
TACAS
2005
Springer
112views Algorithms» more  TACAS 2005»
13 years 11 months ago
Truly On-the-Fly LTL Model Checking
Abstract. We propose a novel algorithm for automata-based LTL model checking that interleaves the construction of the generalized B¨uchi automaton for the negation of the formula ...
Moritz Hammer, Alexander Knapp, Stephan Merz