Zobrazeno 1 - 10
of 76
pro vyhledávání: '"Constance L. Heitmeyer"'
Publikováno v:
MEMOCODE
This paper describes a method for using property definition templates to support automatic analysis of source code for application-specific security properties. The method is illustrated on an example data flow property of a C program.
Autor:
David W. Aha, Elizabeth I. Leonard, Myla Archer, Indrakshi Ray, Marc Pickett, J. Gregory Trafton, Constance L. Heitmeyer
Publikováno v:
Automated Software Engineering. 22:159-197
Many future decision support systems will be human-centric, i.e., require substantial human oversight and control. Because these systems often provide critical services, high assurance is needed that they satisfy their requirements. This paper, the p
Publikováno v:
Formal Methods in System Design. 37:265-294
This article introduces a new model-based method for incrementally constructing critical systems and illustrates its application to the development of fault-tolerant systems. The method relies on a special form of composition to combine software comp
Autor:
Constance L. Heitmeyer, Tevfik Bultan
Publikováno v:
Design Automation for Embedded Systems. 12:97-137
Although it is most often applied to finite state models, in recent years, symbolic model checking has been extended to infinite state models using symbolic representations that encode infinite sets. This paper investigates the application of an infi
Publikováno v:
IEEE Transactions on Software Engineering. 34:82-98
A major problem in verifying the security of code is that the code's large size makes it much too costly to verify in its entirety. This paper describes a novel and practical approach to verifying the security of code which substantially reduces the
Publikováno v:
2015 IEEE/ACM 3rd FME Workshop on Formal Methods in Software Engineering.
Autor:
Constance L. Heitmeyer
Publikováno v:
Electronic Notes in Theoretical Computer Science. 108:11-19
Over the past two decades, formal methods researchers have produced a number of powerful software tools designed to detect errors in, and to verify properties of, hardware designs, software systems, and software system artifacts. Mostly used in the p
Publikováno v:
ESEC / SIGSOFT FSE
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker or a theorem prover, uses known state invariants to prove state and tra
Publikováno v:
Higher-Order and Symbolic Computation. 16:63-92
Formal specifications of software systems are extremely useful because they can be rigorously analyzed, verified, and validated, giving high confidence that the specification captures the desired behavior. To transfer this confidence to the actual so
Autor:
Sjaak Brinkkemper, Janis A. Bubenko, Barbara Farbey, Constance L. Heitmeyer, Jawed I. A. Siddiqi, Sol J. Greenspan, Nancy R. Mead, Hermann Kaindl, John Mylopoulos, Julio Cesar Sampaio do Prado Leite
Publikováno v:
Requirements Engineering. 7:113-123
For many years, research results in requirements engineering (RE) have been developed without much interaction with, or impact on, industrial practice. Why is it so difficult to introduce RE research results into mainstream RE practice? This paper at