Sciweavers

1077 search results - page 92 / 216
» Hardware code generation from dataflow programs
Sort
View
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 1 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
TFM
2009
Springer
136views Formal Methods» more  TFM 2009»
15 years 8 months ago
On Teaching Formal Methods: Behavior Models and Code Analysis
Abstract. Teaching formal methods is a challenging task for several reasons. First, both the state-of-the-art knowledge and the tools are rapidly evolving. Second, there are no com...
Jan Kofron, Pavel Parizek, Ondrej Sery
ACL2
2006
ACM
15 years 7 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
CASSIS
2004
Springer
15 years 7 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...
CAV
2003
Springer
108views Hardware» more  CAV 2003»
15 years 7 months ago
Linear Invariant Generation Using Non-linear Constraint Solving
Abstract. We present a new method for the generation of linear invariants which reduces the problem to a non-linear constraint solving problem. Our method, based on Farkas’ Lemma...
Michael Colón, Sriram Sankaranarayanan, Hen...