Sciweavers

8828 search results - page 118 / 1766
» Formal methods in practice
Sort
View
CTRSA
2012
Springer
229views Cryptology» more  CTRSA 2012»
13 years 12 months ago
Practical Realisation and Elimination of an ECC-Related Software Bug Attack
We analyse and exploit implementation features in OpenSSL version 0.9.8g which permit an attack against ECDH-based functionality. The attack, although more general, can recover the...
Billy Bob Brumley, Manuel Barbosa, Dan Page, Frede...
CSMR
2005
IEEE
15 years 10 months ago
Discovering Unanticipated Dependency Schemas in Class Hierarchies
Object-oriented applications are difficult to extend and maintain, due to the presence of implicit dependencies in the inheritance hierarchy. Although these dependencies often co...
Gabriela Arévalo, Stéphane Ducasse, ...
ERSHOV
2003
Springer
15 years 9 months ago
Integration of Functional and Timed Testing of Real-Time and Concurrent Systems
The article presents an approach to model based testing of complex systems based on a generalization of finite state machines (FSM) and input output state machines (IOSM). The app...
Victor V. Kuliamin, Alexandre Petrenko, Nick V. Pa...
MMSEC
2006
ACM
129views Multimedia» more  MMSEC 2006»
15 years 10 months ago
WLAN steganography: a first practical review
Two different approaches for constructing a steganographic channel in an IEEE 802.11 (WLAN) network are introduced in this paper. First test results on the reliability, undetectab...
Christian Krätzer, Jana Dittmann, Andreas Lan...
WWW
2005
ACM
16 years 5 months ago
Expressiveness of XSDs: from practice to theory, there and back again
On an abstract level, XML Schema increases the limited expressive power of Document Type Definitions (DTDs) by extending them with a recursive typing mechanism. However, an invest...
Geert Jan Bex, Wim Martens, Frank Neven, Thomas Sc...