Sciweavers

1304 search results - page 140 / 261
» Model Checking C Programs Using F-SOFT
Sort
View
CAV
2004
Springer
77views Hardware» more  CAV 2004»
15 years 10 months ago
Understanding Counterexamples with explain
The counterexamples produced by model checkers are often lengthy and difficult to understand. In practical verification, showing the existence of a (potential) bug is not enough: ...
Alex Groce, Daniel Kroening, Flavio Lerda
QSIC
2008
IEEE
15 years 11 months ago
Path and Context Sensitive Inter-procedural Memory Leak Detection
This paper presents a practical path and context sensitive inter-procedural analysis method for detecting memory leaks in C programs. A novel memory object model and function summ...
Zhongxing Xu, Jian Zhang
128
Voted
IWIA
2005
IEEE
15 years 10 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
180
Voted
EPIA
1999
Springer
15 years 9 months ago
Combinatorial Optimization in OPL Studio
OPL is a modeling language for mathematical programming and combinatorial optimization problems. It is the first modeling language to combine high-level algebraic and set notation...
Pascal Van Hentenryck, Laurent Michel, Philippe La...
SBMF
2009
Springer
105views Formal Methods» more  SBMF 2009»
15 years 11 months ago
Verifying Compiled File System Code
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Jan Tobias Mühlberg, Gerald Lüttgen