Zobrazeno 1 - 10
of 101
pro vyhledávání: '"Chaki, Sagar"'
Network operators today spend significant manual effort in ensuring and checking that the network meets their intended policies. While recent work in network verification has made giant strides to reduce this effort, they focus on simple reachability
Externí odkaz:
http://arxiv.org/abs/1505.03356
Autor:
Chaki, Sagar.
Thesis (Ph. D.)--Carnegie Mellon University, 2005.
"May 24, 2005." Includes bibliographical references.
"May 24, 2005." Includes bibliographical references.
We present an SMT-based symbolic model checking algorithm for safety verification of recursive programs. The algorithm is modular and analyzes procedures individually. Unlike other SMT-based approaches, it maintains both "over-" and "under-approximat
Externí odkaz:
http://arxiv.org/abs/1405.4028
Software model checkers based on under-approximations and SMT solvers are very successful at verifying safety (i.e. reachability) properties. They combine two key ideas -- (a) "concreteness": a counterexample in an under-approximation is a counterexa
Externí odkaz:
http://arxiv.org/abs/1306.1945
In many industries, the importance of software components provided by third-party suppliers is steadily increasing. As the suppliers seek to secure their intellectual property (IP) rights, the customer usually has no direct access to the suppliers' s
Externí odkaz:
http://arxiv.org/abs/cs/0701187
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Roy, Pritam, Chaki, Sagar
Publikováno v:
Formal Methods in System Design; Jun2022, Vol. 60 Issue 3, p329-349, 21p
Publikováno v:
In Electronic Notes in Theoretical Computer Science 16 May 2006 157(1):77-94
Publikováno v:
In Electronic Notes in Theoretical Computer Science September 2003 89(3):417-432
Autor:
Chaki, Sagar, Hissam, Scott
Despite increased awareness and efforts to reduce buffer overflows, they continue to be the cause of most software vulnerabilities. In large part, these problems are due to the widespread use of unsafe library routines among programmers. For reasons
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b2a3a37a825f31c7dcc81a032954e7a5