Sciweavers

3082 search results - page 11 / 617
» Deviation Analysis: A New Use of Model Checking
Sort
View
FM
2003
Springer
115views Formal Methods» more  FM 2003»
15 years 10 months ago
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis
Alessandro Armando, Luca Compagna, Pierre Ganty
131
Voted
WECWIS
2000
IEEE
113views ECommerce» more  WECWIS 2000»
15 years 9 months ago
Failure Analysis of an E-Commerce Protocol Using Model Checking
Indrakshi Ray, Indrajit Ray
224
Voted
FMSD
2011
236views Formal Methods» more  FMSD 2011»
14 years 8 months ago
Automatic analysis of DMA races using model checking and k-induction
Alastair F. Donaldson, Daniel Kroening, Philipp R&...
CSFW
1999
IEEE
15 years 9 months ago
Athena: A New Efficient Automatic Checker for Security Protocol Analysis
We propose an efficient automatic checking algorithm, Athena, for analyzing security protocols. Athena incorporates a logic that can express security properties including authenti...
Dawn Xiaodong Song
PR
2008
145views more  PR 2008»
15 years 4 months ago
Probabilistic suffix models for API sequence analysis of Windows XP applications
Given the pervasive nature of malicious mobile code (viruses, worms, etc.), developing statistical/structural models of code execution is of considerable importance. We investigat...
Geoffrey Mazeroff, Jens Gregor, Michael G. Thomaso...