-
8
-
-
84937570704
-
Modeling and verifying systems using a logic of counter arithmetic with lambda expressions and uninterpreted functions
-
LNCS 2404. Springer
-
th CAV, LNCS 2404. Springer, 2002.
-
(2002)
th CAV
-
-
Bryant, R.E.1
Lahiri, S.K.2
Seshia, S.A.3
-
9
-
-
0012085727
-
Model-checking concurrent systems with unbounded integer variables: Symbolic representations, approximations, and experimental results
-
T. Bultan, R. Gerber, and W. Pugh. Model-checking concurrent systems with unbounded integer variables: Symbolic representations, approximations, and experimental results. ACM TOPLAS, 21(4):747-789, 1999.
-
(1999)
ACM TOPLAS
, vol.21
, Issue.4
, pp. 747-789
-
-
Bultan, T.1
Gerber, R.2
Pugh, W.3
-
10
-
-
0038349200
-
MOPS: An infrastructure for examining security properties of software
-
ACM
-
th CCS. ACM, 2002.
-
(2002)
th CCS
-
-
Chen, H.1
Wagner, D.2
-
14
-
-
84948958346
-
Lazy theorem proving for bounded model checking over infinite domains
-
LNCS 2392. Springer
-
L. de Moura, H. Rueß, and M. Sorea. Lazy theorem proving for bounded model checking over infinite domains. In Proc. CADE, LNCS 2392. Springer, 2002.
-
(2002)
Proc. CADE
-
-
De Moura, L.1
Rueß, H.2
Sorea, M.3
-
19
-
-
33744754602
-
-
Technical Report 1512, CS Dept.
-
V. Ganapathy, S. A. Seshia, S. Jha, T. W. Reps, and R. E. Bryant. Automatic discovery of API-level vulnerabilities. Technical Report 1512, CS Dept., Univ. of Wisconsin, 2004. http://www.cs.wisc.edu/wisa/papers/tr1512/ tr1512.pdf.
-
(2004)
Automatic Discovery of API-level Vulnerabilities
-
-
Ganapathy, V.1
Seshia, S.A.2
Jha, S.3
Reps, T.W.4
Bryant, R.E.5
-
23
-
-
33244457266
-
Automating first-order relational logic
-
ACM
-
D. Jackson. Automating first-order relational logic. In Proc. FSE. ACM, 2000.
-
(2000)
Proc. FSE
-
-
Jackson, D.1
-
24
-
-
33244490325
-
Common cryptographic architecture cryptographic application programming interface
-
D. B. Johnson, G. M. Dolan, M. J. Kelly, A. V. Le, and S. M. Matyas. Common cryptographic architecture cryptographic application programming interface. IBM Systems Journal, 30(2):130-150, 1991.
-
(1991)
IBM Systems Journal
, vol.30
, Issue.2
, pp. 130-150
-
-
Johnson, D.B.1
Dolan, G.M.2
Kelly, M.J.3
Le, A.V.4
Matyas, S.M.5
-
26
-
-
0023592629
-
Superoptimizer - A look at the smallest program
-
ACM
-
nd ASPLOS. ACM, 1987.
-
(1987)
nd ASPLOS
-
-
Massalin, H.1
-
27
-
-
0002951877
-
A key management scheme based on control vectors
-
S. M. Matyas, A. V. Le, and D. G. Abraham. A key management scheme based on control vectors. IBM Systems Journal, 30(2):175-191, 1991.
-
(1991)
IBM Systems Journal
, vol.30
, Issue.2
, pp. 175-191
-
-
Matyas, S.M.1
Le, A.V.2
Abraham, D.G.3
-
28
-
-
0030084918
-
The NRL protocol analyzer: An overview
-
C. Meadows. The NRL Protocol Analyzer: An overview. Journal of Logic Programming, 26(2):113-131, 1996.
-
(1996)
Journal of Logic Programming
, vol.26
, Issue.2
, pp. 113-131
-
-
Meadows, C.1
-
34
-
-
2942671018
-
-
Siege SAT solver, http://www.cs.sfu.ca/~loryan/personal.
-
Siege SAT Solver
-
-
-
36
-
-
22944482001
-
Software assurance by bounded exhaustive testing
-
ACM
-
K. Sullivan, J. Yang, D. Coppit, S. Khurshid, and D. Jackson. Software assurance by bounded exhaustive testing. In Proc. ISSTA. ACM, 2004.
-
(2004)
Proc. ISSTA
-
-
Sullivan, K.1
Yang, J.2
Coppit, D.3
Khurshid, S.4
Jackson, D.5
-
39
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
ISOC
-
D. Wagner, J. S. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proc. NDSS. ISOC, 2000.
-
(2000)
Proc. NDSS
-
-
Wagner, D.1
Foster, J.S.2
Brewer, E.3
Aiken, A.4
|