A Dynamic Verification Model based on Information Flow Constraint

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

mortality forecasting based on lee-carter model

over the past decades a number of approaches have been applied for forecasting mortality. in 1992, a new method for long-run forecast of the level and age pattern of mortality was published by lee and carter. this method was welcomed by many authors so it was extended through a wider class of generalized, parametric and nonlinear model. this model represents one of the most influential recent d...

15 صفحه اول

A Verification Synergy: Constraint-Based Verification

Functional verification (as opposed to verification for timing, power, manufacturability and so forth) is a bottleneck in design. We know why this is so. IC’s have become so complex that it is very difficult to specify and verify their behaviors. In the last ten years, the semiconductor industry has moved from directed simulation and directed random simulation, based solely on golden models, to...

متن کامل

Intrusion Detection Based On Dynamic Information Flow Analysis

This paper presents a new approach to detecting intrusions against application software, whose primary goal is facilitating identification and repair of security vulnerabilities rather than permitting online response to attacks. The approach employs fine-grained dynamic information flow analysis in conjunction with policy enforcement, signature matching, and anomaly detection. Program execution...

متن کامل

Constraint Propagation And Progressive Verification For Component-Based Process Model

System assembly is one of the major issues in engineering complex component-based systems. This is especially true when heterogeneous, COTS and GOTS distributed systems, typical in industrial applications, are involved. The goal of system assembly is not only to make constituent components work together, but also to ensure that the components as a whole behave consistently and guarantee certain...

متن کامل

Rewriting-based Dynamic Information Flow for JavaScript

JavaScript web applications often dynamically load third-party code, which in some cases can steal or corrupt important client information. In this paper, we present a rewriting-based approach for enforcing confidentiality and integrity policies that respectively specify what information can flow into and from untrusted thirdparty code. We have implemented our approach in the Chrome browser, an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computational Intelligence Systems

سال: 2013

ISSN: 1875-6891,1875-6883

DOI: 10.1080/18756891.2013.802878