Sciweavers

1356 search results - page 98 / 272
» The ideal of verified software
Sort
View
WORM
2003
15 years 1 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
TLDI
2009
ACM
140views Formal Methods» more  TLDI 2009»
15 years 8 months ago
Design patterns in separation logic
Object-oriented programs are notable for making use of both rder abstractions and mutable, aliased state. Either feature alone is challenging for formal verification, and the com...
Neelakantan R. Krishnaswami, Jonathan Aldrich, Lar...
SOCO
2007
Springer
15 years 6 months ago
Towards a Unifying Theory for Choreography Conformance and Contract Compliance
In the context of Service Oriented Computing, contracts are descriptions of the externally observable behaviour of services. Given a group of collaborating services, their contract...
Mario Bravetti, Gianluigi Zavattaro
ICDCSW
2006
IEEE
15 years 6 months ago
Concurrency Tradeoffs in Dynamic Adaptation
Software systems need to adapt as requirements change, environment conditions vary, and bugs are discovered and fixed. In context of verification of these adaptive systems, the ...
Karun N. Biyani, Sandeep S. Kulkarni
CBSE
2004
Springer
15 years 5 months ago
Correctness of Component-Based Adaptation
Abstract. Long running applications often need to adapt due to changing requirements or changing environment. Typically, such adaptation is performed by dynamically adding or remov...
Sandeep S. Kulkarni, Karun N. Biyani