Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Fady Copty"'
Autor:
Jordi Cucurull, Manos Athanatos, Fady Copty, Sotiris Ioannidis, Pablo Barrientos, Antonios Krithinakis, Noemi Folch, Carolina Rueda, Reda Igbaria, Christos Tselios, Jose Francisco Ruiz
Publikováno v:
SysCon
Summarization: SMESEC is an H2020 project that designed and implemented a lightweight cybersecurity framework for protecting small and medium-sized enterprises against cyber threats. The framework integrates a large variety of contemporary cybersecur
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030120849
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
IOSec@RAID
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Information and Operational Technology Security Systems
Information and Operational Technology Security Systems-First International Workshop, IOSec 2018, CIPSEC Project, Heraklion, Crete, Greece, September 13, 2018, Revised Selected Papers
Many applications have security vulnerabilities that can be exploited. It is practically impossible to find all of them due to the NP-complete nature of the testing problem. Security solutions provide defenses against these attacks through continuous
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b2eaf6b600213904dcab8eddff09f7b5
https://doi.org/10.1007/978-3-030-12085-6_9
https://doi.org/10.1007/978-3-030-12085-6_9
Publikováno v:
ACSAC
Modern malware applies a rich arsenal of evasion techniques to render dynamic analysis ineffective. In turn, dynamic analysis tools take great pains to hide themselves from malware; typically this entails trying to be as faithful as possible to the b
Publikováno v:
Formal Methods in System Design. 46:81-104
Different definitions of vacuity in temporal logic model checking have been suggested along the years. Examining them closely, however, reveals an interesting phenomenon. On the one hand, some of the definitions require high-complexity vacuity detect
Publikováno v:
International Journal on Software Tools for Technology Transfer (STTT). 4:335-348
In this paper, we emphasize the importance of efficient debugging in formal verification and present capabilities that we have developed in order to aid debugging in Intel’s Formal Verification Environment. We have given the name “Counter-Example
Autor:
Leitner Lawrence, S. M. German, Jackson Jonathan, Fady Copty, Richard D. Peterson, Schumann John A, Randall R. Pratt, Michal Rimon, Johannes Koesters, Amir Nahir, Klaus-Dieter Schubert, Holger Horbach, Bishop Brock, Oz Hershkovitz, Jörg Behrend, John M. Ludden, G. B. Meil, Charles Meissner, S. Ayub, Ronny Morad, Klaus Keuerleber, Viresh Paruthi
Publikováno v:
IBM Journal of Research and Development. 59:11:1-11:17
This paper describes methods and techniques used to verify the POWER8™ microprocessor. The base concepts for the functional verification are those that have been already used in POWER7® processor verification. However, the POWER8 design point prov
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783540425410
CHARME
CHARME
In this paper, we emphasize the importance of efficient debugging in formal verification and present capabilities that we have developed in order to augment debugging in Intel's Formal Verification Environment. We have given the name the "counter-exa
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::bfca6dd609495f8cbb4fb687c05201bd
https://doi.org/10.1007/3-540-44798-9_23
https://doi.org/10.1007/3-540-44798-9_23
Autor:
Limor Fix, Ranan Fraer, Gila Kamhi, Fady Copty, Enrico Giunchiglia, Moshe Y. Vardi, Armando Tacchella
Publikováno v:
Computer Aided Verification ISBN: 9783540423454
CAV
CAV
The usefulness of Bounded Model Checking (BMC) based on propositional satisfiability (SAT) methods for bug hunting has already been proven in several recent work. In this paper, we present two industrial strength systems performing BMC for both verif
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3d8330cae69a6f585d21d02d4a7ee296
http://hdl.handle.net/11567/250397
http://hdl.handle.net/11567/250397
Publikováno v:
International Journal on Software Tools for Technology Transfer; Aug2004, Vol. 6 Issue 2, p174-182, 9p
Autor:
Kurogome, Yuma, Otsuki, Yuto, Kawakoya, Yuhei, Iwamura, Makoto, Hayashi, Syogo, Mori, Tatsuya, Sen, Koushik
Publikováno v:
ACM International Conference Proceeding Series; 12/9/2019, p687-701, 15p