Application of model checking technology to automatically vulnerabilities finding in software

被引:0
|
作者
College of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan 430074, China [1 ]
不详 [2 ]
不详 [3 ]
机构
来源
Huazhong Ligong Daxue Xuebao | 2008年 / 2卷 / 70-73期
关键词
8;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Finding Security Vulnerabilities in Unmanned Aerial Vehicles Using Software Verification
    Alhawi, Omar M.
    Mustafa, Mustafa A.
    Cordiro, Lucas C.
    2019 INTERNATIONAL WORKSHOP ON SECURE INTERNET OF THINGS (SIOT 2019), 2019, : 9 - 17
  • [32] Combining BMC and Fuzzing Techniques for Finding Software Vulnerabilities in Concurrent Programs
    Aljaafari, Fatimah K.
    Menezes, Rafael
    Manino, Edoardo
    Shmarov, Fedor
    Mustafa, Mustafa A.
    Cordeiro, Lucas C.
    IEEE ACCESS, 2022, 10 : 121365 - 121384
  • [34] Using software model checking for software component certification
    Taleghani, Ali
    29TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: ICSE 2007 COMPANION VOLUME, PROCEEDINGS, 2007, : 99 - 100
  • [35] Model checking safety critical software with SPIN: An application to a railway interlocking system
    Cimatti, A
    Giunchiglia, F
    Mongardi, G
    Romano, D
    Torielli, F
    Traverso, P
    COMPUTER SAFETY, RELIABILITY AND SECURITY, 1998, 1516 : 284 - 295
  • [36] Software model checking for resources race
    Hong Wang
    Tao Zhang
    Cluster Computing, 2017, 20 : 179 - 193
  • [37] Software model checking with abstraction refinement
    Podelski, A
    VERIFICATION, MODEL CHECKING, AND ABSTRACT INTERPRETATION, 2003, 2575 : 1 - 3
  • [38] Parallel Assignments in Software Model Checking
    Stokely, Murray
    Chaki, Sagar
    Ouaknine, Joel
    ELECTRONIC NOTES IN THEORETICAL COMPUTER SCIENCE, 2006, 157 (01) : 77 - 94
  • [40] Software Model Checking Takes Off
    Miller, Steven P.
    Whalen, Michael W.
    Cofer, Daren D.
    COMMUNICATIONS OF THE ACM, 2010, 53 (02) : 58 - 64