Sciweavers

1304 search results - page 140 / 261
» Model Checking C Programs Using F-SOFT
Sort
View
CAV
2004
Springer
77views Hardware» more  CAV 2004»
15 years 8 months ago
Understanding Counterexamples with explain
The counterexamples produced by model checkers are often lengthy and difficult to understand. In practical verification, showing the existence of a (potential) bug is not enough: ...
Alex Groce, Daniel Kroening, Flavio Lerda
QSIC
2008
IEEE
15 years 9 months ago
Path and Context Sensitive Inter-procedural Memory Leak Detection
This paper presents a practical path and context sensitive inter-procedural analysis method for detecting memory leaks in C programs. A novel memory object model and function summ...
Zhongxing Xu, Jian Zhang
IWIA
2005
IEEE
15 years 8 months ago
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks
This paper proposes a methodology to develop countermeasures against code injection attacks, and validates the methodology by working out a specific countermeasure. This methodol...
Yves Younan, Wouter Joosen, Frank Piessens
EPIA
1999
Springer
15 years 7 months ago
Combinatorial Optimization in OPL Studio
OPL is a modeling language for mathematical programming and combinatorial optimization problems. It is the first modeling language to combine high-level algebraic and set notation...
Pascal Van Hentenryck, Laurent Michel, Philippe La...
SBMF
2009
Springer
105views Formal Methods» more  SBMF 2009»
15 years 9 months ago
Verifying Compiled File System Code
Abstract. This paper presents a case study on retrospective verication of the Linux Virtual File System (VFS), which is aimed at checking for violations of API usage rules and mem...
Jan Tobias Mühlberg, Gerald Lüttgen