Application of model checking technology to automatically vulnerabilities finding in software

被引:0
|
作者
College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Huazhong Ligong Daxue Xuebao | 2008年 / 2卷 / 70-73期
关键词
8;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Model checking security vulnerabilities in software design
    Li Jinhua
    Li Jing
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [2] Automatically checking for session management vulnerabilities in web applications
    Takamatsu, Yusuke
    Kosuga, Yuji
    Kono, Kenji
    IPSJ Online Transactions, 2013, 6 (2013) : 17 - 27
  • [3] Static analysis versus software model checking for bug finding
    Engler, D
    Musuvathi, M
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, PROCEEDINGS, 2004, 2937 : 191 - 210
  • [4] Model-Checking for Software Vulnerabilities Detection With Multi-Language Support
    Hadjidj, Rachid
    Yang, Xiaochun
    Tlili, Syrine
    Debbabi, Mourad
    SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 133 - 142
  • [5] Security vulnerabilities in computer software testing technology and its application
    Lan, Jiang
    INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS 1 & 2, 2014, : 541 - 545
  • [6] Application of model checking in software requirements analysis
    Liu, Yuejun
    Su, Jing
    Metallurgical and Mining Industry, 2015, 7 (08): : 372 - 376
  • [7] Automatically Checking Feature Model Refactorings
    Gheyi, Rohit
    Massoni, Tiago
    Borba, Paulo
    JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2011, 17 (05) : 684 - 711
  • [8] Software Model Checking
    Jhala, Ranjit
    Majumdar, Rupak
    ACM COMPUTING SURVEYS, 2009, 41 (04)
  • [9] Using model checking to analyze network vulnerabilities
    Ritchey, RW
    Ammann, P
    2000 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2000, : 156 - 165
  • [10] Semantic Text Analysis Technology Application in Assessing Current Threats and Software Vulnerabilities
    Vasilyev, V.
    Vulfin, A.
    Gvozdev, V
    Nikonov, A.
    IFAC PAPERSONLINE, 2021, 54 (13): : 599 - 604