Verifying Extended Criteria for the Interoperability of Security Devices
暂无分享,去创建一个
Maurizio Talamo | Benedetto Intrigila | Daniele Magazzeni | Giuseppe Della Penna | Franco Arcieri | Andrea Dimitri
[1] Thomas A. Henzinger,et al. Hybrid Systems: Computation and Control , 1998, Lecture Notes in Computer Science.
[2] Brian Campbell,et al. Amortised Memory Analysis Using the Depth of Data Structures , 2009, ESOP.
[3] George J. Milne,et al. Correct Hardware Design and Verification Methods , 2003, Lecture Notes in Computer Science.
[4] Alan J. Hu,et al. Protocol verification as a hardware design aid , 1992, Proceedings 1992 IEEE International Conference on Computer Design: VLSI in Computers & Processors.
[5] Xavier Leroy,et al. Computer Security from a Programming Language and Static Analysis Perspective , 2003, ESOP.
[6] Yu Yang,et al. Parallel and distributed model checking in Eddy , 2006, International Journal on Software Tools for Technology Transfer.
[7] Dawson R. Engler,et al. Execution Generated Test Cases: How to Make Systems Code Crash Itself , 2005, SPIN.
[8] Stephan Merz,et al. Model Checking , 2000 .
[9] M. Croxford. Correctness by Construction : A Manifesto for High-Integrity Software , 2006 .
[10] Andreas Podelski,et al. ACSAR: Software Model Checking with Transfinite Refinement , 2007, SPIN.
[11] Enrico Tronci,et al. Automatic Verification of a Turbogas Control System with the Mur varphi Verifier , 2003, HSCC.
[12] Enrico Tronci,et al. Integrating RAM and Disk Based Verification within the Mur-phi Verifier , 2003, CHARME.