Sciweavers

19 search results - page 2 / 4
» Model-Checking TRIO Specifications in SPIN
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
12 years 11 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
AC
2005
Springer
13 years 4 months ago
Software model checking with SPIN
The aim of this chapter is to give an overview of the theoretical foundation and the practical application of logic model checking techniques for the verification of multi-threade...
Gerard J. Holzmann
SPIN
2009
Springer
13 years 11 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
SPIN
1999
Springer
13 years 9 months ago
Model Checking for Managers
Model checking is traditionally applied to computer system design. It has proven to be a valuable technique. However, it requires detailed specifications of systems and requirement...
Wil Janssen, Radu Mateescu, Sjouke Mauw, Peter Fen...
ASM
2008
ASM
13 years 6 months ago
The High Road to Formal Validation:
Abstract. In this paper we examine the difference between model checking high-level and low-level models. In particular, we compare the ProB model checker for the B-method and the ...
Michael Leuschel