Sciweavers

1356 search results - page 97 / 272
» The ideal of verified software
Sort
View
EUROMICRO
2000
IEEE
15 years 4 months ago
Formal Coverification of Embedded Systems Using Model Checking
The complexity of embedded systems is increasing rapidly. In consequence, new verification techniques that overcome the limitations of traditional methods and are suitable for har...
Luis Alejandro Cortés, Petru Eles, Zebo Pen...
CBSE
2008
Springer
15 years 1 months ago
State Space Reduction Techniques for Component Interfaces
Abstract. Automata-based interface and protocol specifications provide an elegant framework to capture and automatically verify the interactive behavior of component-based software...
Markus Lumpe, Lars Grunske, Jean-Guy Schneider
SIGSOFT
2010
ACM
14 years 9 months ago
Phantm: PHP analyzer for type mismatch
We present Phantm, a static analyzer that uses a flowsensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runti...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
15 years 3 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
SIGSOFT
1996
ACM
15 years 4 months ago
Using Object-Oriented Typing to Support Architectural Design in the C2 Style
Abstract -- Software architectures enable large-scale software development. Component reuse and substitutability, two key aspects of large-scale development, must be planned for du...
Nenad Medvidovic, Peyman Oreizy, Jason E. Robbins,...