-
1
-
-
33947683919
-
Verified interoperable implementations of security protocols
-
DOI 10.1109/CSFW.2006.32, 1648714, Proceedings - 19th IEEE Computer Security Foundations Workshop, CSFW 2006
-
K. Bhargavan, C. Fournet, A. D. Gordon, and S. Tse. Verified interoperable implementations of security protocols. In CSFW '06, pages 139-152, Washington, DC, USA, 2006. (Pubitemid 46499723)
-
(2006)
Proceedings of the Computer Security Foundations Workshop
, vol.2006
, pp. 139-152
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Tse, S.4
-
2
-
-
0034822279
-
An efficient cryptographic protocol verifier based on prolog rules
-
Cape Breton, Nova Scotia, Canada, June
-
B. Blanchet. An Efficient Cryptographic Protocol Verifier Based on Prolog Rules. In CSFW-14, pages 82-96, Cape Breton, Nova Scotia, Canada, June 2001.
-
(2001)
CSFW-14
, pp. 82-96
-
-
Blanchet, B.1
-
3
-
-
0033697422
-
Bandera: Extracting finitestate models from java source code
-
New York, NY, USA, ACM Press
-
J. C. Corbett, M. B. Dwyer, J. Hatcliff, S. Laubach, C. S. Preanu, Robby, and H. Zheng. Bandera: extracting finitestate models from java source code. In ICSE '00, pages 439-448, New York, NY, USA, 2000. ACM Press.
-
(2000)
ICSE '00
, pp. 439-448
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hatcliff, J.3
Laubach, S.4
Preanu, C.S.5
Robby6
Zheng, H.7
-
4
-
-
24144470036
-
Cryptographic protocol analysis on real C code
-
R. Cousot, editor, Paris, France, Jan. Springer
-
J. Goubault-Larrecq and F. Parrennes. Cryptographic protocol analysis on real C code. In R. Cousot, editor, VMCAI'05, volume 3385 of Lecture Notes in Computer Science, pages 363-379, Paris, France, Jan. 2005. Springer.
-
(2005)
VMCAI'05, Volume 3385 of Lecture Notes in Computer Science
, pp. 363-379
-
-
Goubault-Larrecq, J.1
Parrennes, F.2
-
5
-
-
84869604238
-
-
Slede website
-
Y. Hanna and H. Rajan. Slede website. http://www.cs.iastate.edu/~slede/, 2007.
-
(2007)
-
-
Hanna, Y.1
Rajan, H.2
-
6
-
-
56749092205
-
Slede: A domainspecific verification framework for sensor network security protocol implementations
-
Y. Hanna, H. Rajan, and W. Zhang. Slede: A domainspecific verification framework for sensor network security protocol implementations. In WiSec '08, pages 109-118, 2008.
-
(2008)
WiSec '08
, pp. 109-118
-
-
Hanna, Y.1
Rajan, H.2
Zhang, W.3
-
7
-
-
19144362424
-
Monitoring Java programs with Java PathExplorer
-
K. Havelund and G. Ro̧su, editors, Elsevier, 23July
-
K. Havelund and G. Rosu. Monitoring Java programs with Java PathExplorer. In K. Havelund and G. Ro̧su, editors, Runtime Verification, volume 55 of Electronic Notes in Theoretical Computer Science. Elsevier, 23July 2001.
-
(2001)
Runtime Verification, Volume 55 of Electronic Notes in Theoretical Computer Science
-
-
Havelund, K.1
Rosu, G.2
-
8
-
-
18944390941
-
The model checker SPIN
-
G. J. Holzmann. The model checker SPIN. IEEE Trans. Softw. Eng., 23(5):279-295, 1997.
-
(1997)
IEEE Trans. Softw. Eng.
, vol.23
, Issue.5
, pp. 279-295
-
-
Holzmann, G.J.1
-
9
-
-
84978435516
-
Cmc: A pragmatic approach to model checking real code
-
SI
-
M. Musuvathi, D. Y. W. Park, A. Chou, D. R. Engler, and D. L. Dill. Cmc: a pragmatic approach to model checking real code. SIGOPS Oper. Syst. Rev., 36(SI):75-88, 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, pp. 75-88
-
-
Musuvathi, M.1
Park, D.Y.W.2
Chou, A.3
Engler, D.R.4
Dill, D.L.5
-
10
-
-
84858942001
-
-
nesC Compiler. http://sourceforge.net/projects/nescc.
-
NesC Compiler
-
-
|