-
5
-
-
0033697422
-
Bandera: Extracting finite-state models from Java source code
-
J.C. Corbett, M.B. Dwyer, J. Hateliff, S. Laubach, C.S. Pasareanu, Robby, and H. Zheng. Bandera: Extracting finite-state models from java source code. In ICSE , 2000.
-
(2000)
ICSE
-
-
Corbett, J.C.1
Dwyer, M.B.2
Hateliff, J.3
Laubach, S.4
Pasareanu, C.S.5
Robby6
Zheng, H.7
-
6
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of bufferoverflow attacks
-
San Antonio, Texas, jan
-
Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Crier, Perry Wagle, Qian Zhang, and Heather Hinton. StackGuard: Automatic adaptive detection and prevention of bufferoverflow attacks. In Proc. 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, jan 1998.
-
(1998)
th USENIX Security Conference
, pp. 63-78
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Crier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
7
-
-
1542325548
-
Ad Hoc On Demand Distance Vector (AODV) Routing
-
January
-
C.Perkins, E. Royer, and S. Das. Ad Hoc On Demand Distance Vector (AODV) Routing. IETF Draft, http://www.ietf.org/internet-drafts/draftietLmanet-aodv-10.txt, January 2002.
-
(2002)
IETF Draft
-
-
Perkins, C.1
Royer, E.2
Das, S.3
-
10
-
-
0001801746
-
Protocol verification as a hardware design aid
-
David L. Dill, Andreas J. Drexler, Alan J. Hu, and C. Han Yang. Protocol verification as a hardware design aid. In IEEE International Conference on Computer Design: VLSI in Computers and Processors, pages 522-525, 1992.
-
(1992)
IEEE International Conference On Computer Design: VLSI in Computers and Processors
, pp. 522-525
-
-
Dill, D.L.1
Drexler, A.J.2
Hu, A.J.3
Han Yang, C.4
-
11
-
-
84975277890
-
Checking system rules using system-specific, programmerwritten compiler extensions
-
October
-
D.R. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmerwritten compiler extensions. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, October 2000.
-
(2000)
Proceedings of the Fourth Symposium On Operating Systems Design and Implementation
-
-
Engler, D.R.1
Chelf, B.2
Chou, A.3
Hallem, S.4
-
14
-
-
85011293817
-
LCLint: A tool for using specifications to check code
-
David Evans, John Guttag, James Horning, and Yang Meng Tan. LCLint: A tool for using specifications to check code. In Proceedings of the ACM SIG-SOFT '94 Symposium on the Foundations of Software Engineering, pages 87-96, 1994.
-
(1994)
Proceedings of the ACM SIG-SOFT '94 Symposium On the Foundations of Software Engineering
, pp. 87-96
-
-
Evans, D.1
Guttag, J.2
Horning, J.3
Yang, M.T.4
-
16
-
-
5544283799
-
Automatically verified data transfer protocols
-
J. Hajek. Automatically verified data transfer protocols. In Prvceedings of the dth ICCC, pages 749-756, 1978.
-
(1978)
Proceedings of the 4th ICCC
, pp. 749-756
-
-
Hajek, J.1
-
18
-
-
18944390941
-
The model checker SPIN
-
Gerard J. Holzmann. The model checker SPIN. Software Engineering, 23(5):279-295, 1997.
-
(1997)
Software Engineering
, vol.23
, Issue.5
, pp. 279-295
-
-
Gerard, J.H.1
-
24
-
-
0004173988
-
-
Available as Xerox PARC Research Report CSL-81-10 June, Stanford University, 1981
-
G. Nelson. Techniques for program verification. Available as Xerox PARC Research Report CSL-81-10, June, 1981, Stanford University, 1981.
-
(1981)
Techniques for Program Verification
-
-
Nelson, G.1
-
30
-
-
0017985798
-
General technique for communications protocol validation
-
C.H. West. General technique for communications protocol validation. IBM Journal of Research and Development, 22(4), 1978.
-
(1978)
IBM Journal of Research and Development
, vol.22
, Issue.4
-
-
West, C.H.1
|