Sciweavers

2881 search results - page 80 / 577
» Model Checking for Programming Languages using Verisoft
Sort
View
98
Voted
FM
2009
Springer
104views Formal Methods» more  FM 2009»
15 years 9 months ago
A Metric Encoding for Bounded Model Checking
In Bounded Model Checking both the system model and the checked property are translated into a Boolean formula to be analyzed by a SAT-solver. We introduce a new encoding technique...
Matteo Pradella, Angelo Morzenti, Pierluigi San Pi...
PLDI
2009
ACM
15 years 9 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
POPL
2008
ACM
16 years 2 months ago
Relevance heuristics for program analysis
Relevance heuristics allow us to tailor a program analysis to a particular property to be verified. This in turn makes it possible to improve the precision of the analysis where n...
Kenneth L. McMillan
ENTCS
2006
151views more  ENTCS 2006»
15 years 2 months ago
Extending C for Checking Shape Safety
The project Safe Pointers by Graph Transformation at the University of York has developed a method for specifying the shape of pointer-data structures by graph reduction, and a st...
Mike Dodds, Detlef Plump
WOA
2000
15 years 3 months ago
Calculi for Network Aware Programming
ogramming are evaluated along three different guidelines: the programming abstractions the calculus suggests; the underlying programming model; the security mechanisms provided. Th...
Gian Luigi Ferrari, Rosario Pugliese, Emilio Tuost...