Sciweavers

752 search results - page 28 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
PET
2005
Springer
15 years 7 months ago
Message Splitting Against the Partial Adversary
We review threat models used in the evaluation of anonymity systems’ vulnerability to traffic analysis. We then suggest that, under the partial adversary model, if multiple packe...
Andrei Serjantov, Steven J. Murdoch
105
Voted
HICSS
2003
IEEE
179views Biometrics» more  HICSS 2003»
15 years 7 months ago
JUMBL: A Tool for Model-Based Statistical Testing
Statistical testing of software based on a usage model is a cost-effective and efficient means to make inferences about software quality. In order to apply this method, a usage m...
Stacy J. Prowell
132
Voted
ASE
2005
137views more  ASE 2005»
15 years 1 months ago
Rewriting-Based Techniques for Runtime Verification
Techniques for efficiently evaluating future time Linear Temporal Logic (abbreviated LTL) formulae on finite execution traces are presented. While the standard models of LTL are i...
Grigore Rosu, Klaus Havelund
113
Voted
HICSS
2003
IEEE
125views Biometrics» more  HICSS 2003»
15 years 7 months ago
Verifying Trustworthiness Requirements in Distributed Systems with Formal Log-file Analysis
The paper reports on an analysis technology based on the tracing approach to test trustworthy requirements of a distributed system. The system under test is instrumented such that...
Andreas Ulrich, Hesham Hallal, Alexandre Petrenko,...
102
Voted
INFSOF
2002
85views more  INFSOF 2002»
15 years 1 months ago
A methodology of testing high-level Petri nets
Petri nets have been extensively used in the modelling and analysis of concurrent and distributed systems. The veri
Hong Zhu, Xudong He