Sciweavers

2 search results - page 1 / 1
» Weak links in e-commerce security: examples from the field
Sort
View
POPL
2006
ACM
14 years 5 months ago
Verifying properties of well-founded linked lists
We describe a novel method for verifying programs that manipulate linked lists, based on two new predicates that characterize reachability of heap cells. These predicates allow re...
Shuvendu K. Lahiri, Shaz Qadeer