Sciweavers

1023 search results - page 39 / 205
» Model Checking: Software and Beyond
Sort
View
KBSE
2007
IEEE
15 years 7 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
EUROMICRO
2007
IEEE
15 years 8 months ago
Partial Verification of Software Components: Heuristics for Environment Construction
Code model checking of software components suffers from the well-known problem of state explosion when applied to highly parallel components, despite the fact that a single compon...
Pavel Parizek, Frantisek Plasil
104
Voted
SPIN
2007
Springer
15 years 7 months ago
C.OPEN and ANNOTATOR: Tools for On-the-Fly Model Checking C Programs
This paper describes a set of verification components that open the way to perform on-the-fly software model checking with the Cadp toolbox, originally designed for verifying the...
María-del-Mar Gallardo, Christophe Joubert,...
KBSE
2005
IEEE
15 years 7 months ago
A context-sensitive structural heuristic for guided search model checking
Software verification using model checking often translates programs into corresponding transition systems that model the program behavior. As software systems continue to grow i...
Neha Rungta, Eric G. Mercer
ENTCS
2007
107views more  ENTCS 2007»
15 years 1 months ago
Modeling Environment for Component Model Checking from Hierarchical Architecture
Application of model checking to isolated software components is not directly possible because a component does not form a complete program - the problem of missing environment oc...
Pavel Parizek, Frantisek Plasil