Sciweavers

160 search results - page 1 / 32
» Structuring the verification of heap-manipulating programs
Sort
View
ATVA
2007
Springer
162views Hardware» more  ATVA 2007»
13 years 10 months ago
Verifying Heap-Manipulating Programs in an SMT Framework
Automated software verification has made great progress recently, and a key enabler of this progress has been the advances in efficient, automated decision procedures suitable fo...
Zvonimir Rakamaric, Roberto Bruttomesso, Alan J. H...
HASE
2007
IEEE
13 years 8 months ago
Multiple Pre/Post Specifications for Heap-Manipulating Methods
Automated verification plays an important role for high assurance software. This typically uses a pair of pre/post conditions as a formal (but possibly partial) specification of e...
Wei-Ngan Chin, Cristina David, Huu Hai Nguyen, She...
ICFEM
2010
Springer
13 years 3 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
JUCS
2010
152views more  JUCS 2010»
12 years 11 months ago
Verification of Structural Pattern Conformance Using Logic Programming
: This paper formalizes UML class diagrams and structural patterns as mathematical objects and provides a precise notion of conformance of a structural model specified as a class d...
Lunjin Lu, Dae-Kyoo Kim, Yuanlin Zhu, Sangsig Kim
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
13 years 2 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...