Sciweavers

29 search results - page 2 / 6
» Precise Dynamic Verification of Confidentiality
Sort
View
ACSAC
2010
IEEE
13 years 2 months ago
Quantifying information leaks in software
Leakage of confidential information represents a serious security risk. Despite a number of novel, theoretical advances, it has been unclear if and how quantitative approaches to ...
Jonathan Heusser, Pasquale Malacaria
CACM
2010
140views more  CACM 2010»
13 years 2 months ago
FastTrack: efficient and precise dynamic race detection
Multithreaded programs are notoriously prone to race conditions. Prior work on dynamic race detectors includes fast but imprecise race detectors that report false alarms, as well ...
Cormac Flanagan, Stephen N. Freund
ICSE
2008
IEEE-ACM
14 years 5 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
POPL
2006
ACM
14 years 4 months ago
Hybrid type checking
Traditional static type systems are very effective for verifying basic interface specifications, but are somewhat limited in the kinds specificationsthey support. Dynamically-chec...
Cormac Flanagan
CCR
2004
151views more  CCR 2004»
13 years 4 months ago
Practical verification techniques for wide-area routing
Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "cor...
Nick Feamster