Sciweavers

624 search results - page 98 / 125
» Application of Lightweight Formal Methods to Software Securi...
Sort
View
CAV
2003
Springer
140views Hardware» more  CAV 2003»
15 years 5 months ago
Certifying Optimality of State Estimation Programs
Abstract. The theme of this paper is certifying software for state estimation of dynamic systems, which is an important problem found in spacecraft, aircraft, geophysical, and in m...
Grigore Rosu, Ram Prasad Venkatesan, Jon Whittle, ...
ENTCS
2006
231views more  ENTCS 2006»
14 years 11 months ago
SaveCCM: An Analysable Component Model for Real-Time Systems
Component based development is a promising approach for embedded systems. Typical for embedded software is the presence of resource constraints in multiple dimensions. An essentia...
Jan Carlson, John Håkansson, Paul Pettersson
ICSE
2008
IEEE-ACM
16 years 18 days ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
WADT
1999
Springer
15 years 4 months ago
From States to Histories
Based on the FOCUS theory of distributed systems (see [Broy, Stølen 01]) that are composed of interacting components we introduce a formal model of services and layered architectu...
Manfred Broy
RTCSA
2000
IEEE
15 years 4 months ago
Tracking Real-Time Systems Requirements
One of the hard problems in maintaining real-time systems requirements is to keep track of the impact of resource usage on the applications. Often times, it is not sufficient to ...
Aloysius K. Mok