Sciweavers

480 search results - page 48 / 96
» On the verification of automotive protocols
Sort
View
CAV
2004
Springer
140views Hardware» more  CAV 2004»
15 years 1 months ago
Indexed Predicate Discovery for Unbounded System Verification
Predicate abstraction has been proved effective for verifying several infinite-state systems. In predicate abstraction, an abstract system is automatinstructed given a set of predi...
Shuvendu K. Lahiri, Randal E. Bryant
DALT
2004
Springer
15 years 1 months ago
Norm Verification and Analysis of Electronic Institutions
Electronic institutions are a formalism to define and analyse protocols among agents with a view to achieving global and individual goals. In this paper we propose a definition of ...
Wamberto Weber Vasconcelos
PLDI
2010
ACM
15 years 1 months ago
Parameterized Verification of Transactional Memories
We describe an automatic verification method to check whether transactional memories ensure strict serializability--a key property assumed of the transactional interface. Our main...
Michael Emmi, Rupak Majumdar, Roman Manevich
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 2 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
CCS
2008
ACM
14 years 11 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers