Sciweavers

1541 search results - page 46 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
133
Voted
CORR
2010
Springer
225views Education» more  CORR 2010»
15 years 3 days ago
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that allows the secure distribution of a bit string, used as key in cryptographic protocols. When it was note...
Mohamed Elboukhari, Mostafa Azizi, Abdelmalek Aziz...
SP
2010
IEEE
194views Security Privacy» more  SP 2010»
15 years 4 months ago
Identifying Dormant Functionality in Malware Programs
—To handle the growing flood of malware, security vendors and analysts rely on tools that automatically identify and analyze malicious code. Current systems for automated malwar...
Paolo Milani Comparetti, Guido Salvaneschi, Engin ...
88
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Model Checking An Entire Linux Distribution for Security Violations
Software model checking has become a popular tool for verifying programs’ behavior. Recent results suggest that it is viable for finding and eradicating security bugs quickly. ...
Benjamin Schwarz, Hao Chen, David Wagner, Jeremy L...
127
Voted
ACMICEC
2007
ACM
127views ECommerce» more  ACMICEC 2007»
15 years 4 months ago
Symbolic model checking of institutions
Norms defined by institutions and enforced by organizations have been put forward as a mechanism to increase the efficiency and reliability of electronic transactions carried out ...
Francesco Viganò, Marco Colombetti
CORR
2010
Springer
208views Education» more  CORR 2010»
15 years 19 days ago
Bounded Model Checking of Multi-threaded Software using SMT solvers
The transition from single-core to multi-core processors has made multi-threaded software an important subject in computer aided verification. Here, we describe and evaluate an ex...
Lucas Cordeiro, Bernd Fischer 0002