Sciweavers

12981 search results - page 196 / 2597
» Model Checking (Abstract)
Sort
View
KBSE
2007
IEEE
15 years 9 months ago
Checking threat modeling data flow diagrams for implementation conformance and security
Threat modeling analyzes how an adversary might attack a system by supplying it with malicious data or interacting with it. The analysis uses a Data Flow Diagram (DFD) to describe...
Marwan Abi-Antoun, Daniel Wang, Peter Torr
ICSE
2001
IEEE-ACM
15 years 7 months ago
JMOCHA: A Model Checking Tool that Exploits Design Structure
Mocha is a model checker based on the theme of exploiting design modularity: instead of manipulating unstructured state-transition graphs, it supports the hierarchical modeling fra...
Rajeev Alur, Luca de Alfaro, Radu Grosu, Thomas A....
ECBS
2010
IEEE
209views Hardware» more  ECBS 2010»
15 years 7 months ago
Continuous Verification of Large Embedded Software Using SMT-Based Bounded Model Checking
The complexity of software in embedded systems has increased significantly over the last years so that software verification now plays an important role in ensuring the overall pr...
Lucas Cordeiro, Bernd Fischer 0002, João Ma...
ACSD
2007
IEEE
93views Hardware» more  ACSD 2007»
15 years 5 months ago
SAT-based Unbounded Model Checking of Timed Automata
We present an improvement of the SAT-based Unbounded Model Checking (UMC) algorithm. UMC, a symbolic approach introduced in [7], uses propositional formulas in conjunctive normal ...
Wojciech Penczek, Maciej Szreter
ENTCS
2006
133views more  ENTCS 2006»
15 years 3 months ago
Linking Semantic Models to Support CSP || B Consistency Checking
Consistency checking in the CSP B approach verifies that an individual controller process, defined using a sequential non-divergent subset of CSP, never calls a B operation outsid...
Neil Evans, Helen Treharne