Sciweavers

1715 search results - page 87 / 343
» Domain-Specific Program Checking
Sort
View
CCS
2001
ACM
15 years 6 months ago
Dynamic Self-Checking Techniques for Improved Tamper Resistance
We describe a software self-checking mechanism designed to improve the tamper resistance of large programs. The mechanism consists of a number of testers that redundantly test for ...
Bill G. Horne, Lesley R. Matheson, Casey Sheehan, ...
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 2 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
97
Voted
ICFP
2008
ACM
16 years 2 months ago
Efficient nondestructive equality checking for trees and graphs
The Revised6 Report on Scheme requires its generic equivalence predicate, equal?, to terminate even on cyclic inputs. While the terminating equal? can be implemented via a DFA-equ...
Michael D. Adams, R. Kent Dybvig
SIGADA
1994
Springer
15 years 6 months ago
Always One More Bug: Applying AdaWise to Improve Ada Code
AdaWise, a set of tools currently under development at ORA, performs automatic checks to verify the absence of common run-time errors affecting the correctness or portability of A...
Cheryl Barbasch, Dan Egnor
PLDI
2003
ACM
15 years 7 months ago
Ownership types for safe region-based memory management in real-time Java
The Real-Time Specification for Java (RTSJ) allows a program to create real-time threads with hard real-time constraints. Real-time threads use region-based memory management to ...
Chandrasekhar Boyapati, Alexandru Salcianu, Willia...