Sciweavers

624 search results - page 56 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
SEFM
2009
IEEE
15 years 6 months ago
Implementation Correctness of a Real-Time Operating System
—In the modern car, electronic devices are even employed for safety-critical missions like brake control, where failures might cost human lives. Among various approaches to incre...
Matthias Daum, Norbert Schirmer, Mareike Schmidt
IEEEARES
2008
IEEE
15 years 6 months ago
Intensive Programme on Information and Communication Security
IT Security is a problem that can only be addressed and taught holistically. Just as broad as the field of ICT itself, IT Security is an integral part of all network and software ...
Christian Schläger, Ludwig Fuchs, Günthe...
CAV
2009
Springer
150views Hardware» more  CAV 2009»
16 years 12 days ago
Automated Analysis of Java Methods for Confidentiality
We address the problem of analyzing programs such as J2ME midlets for mobile devices, where a central correctness requirement concerns confidentiality of data that the user wants t...
Pavol Cerný, Rajeev Alur
ISSTA
2010
ACM
15 years 3 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder
86
Voted
SIGSOFT
2008
ACM
16 years 18 days ago
Requirements engineering: from craft to discipline
Getting the right software requirements under the right environment assumptions is a critical precondition for developing the right software. This task is intrinsically difficult....
Axel van Lamsweerde