Sciweavers

1541 search results - page 25 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
EMSOFT
2011
Springer
14 years 3 months ago
Model-checking behavioral programs
System specifications are often structured as collections of scenarios and use-cases that describe desired and forbidden sequences of events. A recently proposed behavioral progr...
David Harel, Robby Lampert, Assaf Marron, Gera Wei...
SP
2006
IEEE
177views Security Privacy» more  SP 2006»
15 years 10 months ago
FIREMAN: A Toolkit for FIREwall Modeling and ANalysis
Security concerns are becoming increasingly critical in networked systems. Firewalls provide important defense for network security. However, misconfigurations in firewalls are ...
Lihua Yuan, Jianning Mai, Zhendong Su, Hao Chen, C...
128
Voted
CSREASAM
2010
15 years 22 days ago
Modeling NIDS Evasion with Genetic Programming
Nowadays, Network Intrusion Detection Systems are quickly updated in order to prevent systems against new attacks. This situation has provoked that attackers focus their efforts on...
Sergio Pastrana, Agustín Orfila, Arturo Rib...
140
Voted
ICSE
2010
IEEE-ACM
15 years 8 months ago
STORM: static unit checking of concurrent programs
Concurrency is inherent in today’s software. Unexpected interactions between concurrently executing threads often cause subtle bugs in concurrent programs. Such bugs are hard to...
Zvonimir Rakamaric
ICCAD
2004
IEEE
191views Hardware» more  ICCAD 2004»
16 years 28 days ago
Checking consistency of C and Verilog using predicate abstraction and induction
edicate Abstraction and Induction Edmund Clarke Daniel Kroening June 25, 2004 CMU-CS-04-131 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 It is common...
Daniel Kroening, Edmund M. Clarke