V&V report #1: Security Requirements definition, Target Selection, Methodology Definition, First Security Testing and First For
ثبت نشده
چکیده
Interpretation is a static analysis technique that provide results by executing an abstract version of the analysed program. The operations made in the abstract program reflect those made in the actual program. The abstract program operates on abstract values, which are coarser than the actual values, but on which the computations are simpler. These executions in the abstract world can therefore express results for entire classes of input values at once. One factor in making these abstract executions fast is the approximation that takes place in loops, which allow the analysis in finite time of programs whose execution does not terminate. However, in practice, the abstract executions can still be very costly in time and in space, especially if the chosen abstractions do not fit the analysed program well. This cost can become the limiting factor in the use of abstract interpretation techniques. Several verification tools for C programs based on the techniques of abstract interpretation are available.
منابع مشابه
Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing
Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...
متن کاملComputationally secure multiple secret sharing: models, schemes, and formal security analysis
A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...
متن کاملA survey on digital data hiding schemes: principals, algorithms, and applications
This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria of information hiding. Having knowledge about the host signal, which may be audio, image, ...
متن کاملRequirements Engineering for Survivable Systems
.............................................................................................................vii 1 Background ..................................................................................................1 1.1 Definition of Requirements Engineering.................................................1 1.2 Typical Requirements Engineering Activities..................................
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006