Detection of Security Vulnerabilities Using Guided Model Checking,
, 24th International Conference on Logic Programming (ICLP), Udine, Italy, (2008)
Loop Summarization using Abstract Transformers,
, 6th International Symposium on Automated Technology for Verification and Analysis (ATVA), Seoul, South Korea, (2008)
Automated Verification of Security Policies in Mobile Code.,
, Integrated Formal Methods (IFM), (2007)
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4