Sciweavers

1077 search results - page 92 / 216
» Hardware code generation from dataflow programs
Sort
View
SP
2002
IEEE
161views Security Privacy» more  SP 2002»
15 years 4 months ago
Improving Computer Security Using Extended Static Checking
We describe a method for finding security flaws in source code by way of static analysis. The method is notable because it allows a user to specify a wide range of security proper...
Brian Chess
TFM
2009
Springer
136views Formal Methods» more  TFM 2009»
15 years 11 months ago
On Teaching Formal Methods: Behavior Models and Code Analysis
Abstract. Teaching formal methods is a challenging task for several reasons. First, both the state-of-the-art knowledge and the tools are rapidly evolving. Second, there are no com...
Jan Kofron, Pavel Parizek, Ondrej Sery
ACL2
2006
ACM
15 years 10 months ago
A verifying core for a cryptographic language compiler
A verifying compiler is one that emits both object code and a proof of correspondence between object and source code.1 We report the use of ACL2 in building a verifying compiler f...
Lee Pike, Mark Shields, John Matthews
CASSIS
2004
Springer
15 years 10 months ago
Mobile Resource Guarantees for Smart Devices
We present the Mobile Resource Guarantees framework: a system for ensuring that downloaded programs are free from run-time violations of resource bounds. Certificates are attached...
David Aspinall, Stephen Gilmore, Martin Hofmann, D...
CAV
2003
Springer
108views Hardware» more  CAV 2003»
15 years 10 months ago
Linear Invariant Generation Using Non-linear Constraint Solving
Abstract. We present a new method for the generation of linear invariants which reduces the problem to a non-linear constraint solving problem. Our method, based on Farkas’ Lemma...
Michael Colón, Sriram Sankaranarayanan, Hen...