Sciweavers

1541 search results - page 25 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
EMSOFT
2011
Springer
14 years 6 days ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...
105
Voted
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 6 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
CSREASAM
2010
14 years 9 months ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
ICSE
2010
IEEE-ACM
15 years 4 months ago
STORM: static unit checking of concurrent programs
Concurrency is inherent in today’s software. Unexpected interactions between concurrently executing threads often cause subtle bugs in concurrent programs. Such bugs are hard to...
Zvonimir Rakamaric
95
Voted
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
15 years 9 months ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke