Publications
Export 92 results: 
 Author  Title  Type  [ Year ]
] Filters: Braghin-sharygina-barone-adesi-2010-model-checking-based-approach-security-policy-verification.html is   [Clear All Filters]
Function Summaries in Software Upgrade Checking, 
 
, Haifa Verification Conference (HVC), Haifa Verification Conference (HVC), (2011)
Interpolation-based Function Summaries in Bounded Model Checking, 
 
, Haifa Verification Conference (HVC), Haifa, Israel, (2011)
Loop Summarization and Termination Analysis, 
 
, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 6605, Saarbrü Germany, p.81-95, (2011)
Scalable Abstractions for Efficient Security Checks, 
 
, Lugano, p.164, (2011)
An Efficient and Flexible Approach to Resolution Proof Reduction, 
 
, Haifa Verification Conference (HVC), Haifa, Israel, (2010)
Flexible Interpolation with Local Proof Transformations, 
 
, International Conference of Computer Aided Design (ICCAD), San Jose, USA, (2010)
A Flexible Schema for Generating Explanations in Lazy Theory Propagation, 
 
, International Conference on Formal Methods and Models for Codesign (MEMOCODE), Grenoble, France, (2010)
A Model Checking-based Approach for Security Policy Verification of Mobile Systems, 
 
, Formal Aspects of Computing Journal, (2010)
The OpenSMT Solver, 
 
, International Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS), Volume 6015, Paphos, Cyprus, p.150-153, (2010)
Termination Analysis with Compositional Transition Invariants, 
 
, International Conference on Computer-Aided Verification (CAV), Edinburgh, UK, (2010)
An Extension of the Davis-Putnam Procedure and its Application to Preprocessing in SMT, 
 
, 7th International Workshop on Satisfiability Modulo Theories (SMT), Montreal, Canada, (2009)
Loopfrog: A Static Analyzer for ANSI-C Programs, 
 
, The 24th IEEE/ACM International Conference on Automated Software Engineering, Auckland, New Zealand, (2009)
A Scalable Decision Procedure for Fixed-Width Bit-Vectors, 
 
, International Conference of Computer Aided Design (ICCAD), San Jose (CA), (2009)
The Synergy of Precise and Fast Abstractions for Program Verification, 
 
, 24th Annual ACM Symposium on Applied Computing (SAC), Honolulu, USA, (2009)
Detection of Security Vulnerabilities Using Guided Model Checking, 
 
, 24th International Conference on Logic Programming (ICLP), Udine, Italy, (2008)
Loop Summarization using Abstract Transformers, 
 
, 6th International Symposium on Automated Technology for Verification and Analysis (ATVA), Seoul, South Korea, (2008)
Automated Verification of Security Policies in Mobile Code., 
 
, Integrated Formal Methods (IFM), (2007)
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4





