共 50 条
- [1] Model checking large network protocol implementations [J]. USENIX ASSOCIATION PROCEEDINGS OF THE FIRST SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI'04), 2004, : 155 - 168
- [2] Verifying Implementations of Security Protocols by Refinement [J]. VERIFIED SOFTWARE: THEORIES, TOOLS, EXPERIMENTS, 2012, 7152 : 50 - +
- [3] VERIFYING OF A NETWORK CRYPTOGRAPHIC PROTOCOL USING THE MODEL CHECKING TOOLS [J]. 4TH INTERNATIONAL CONFERENCE ON SOFTWARE TECHNOLOGY AND ENGINEERING (ICSTE 2012), 2012, : 541 - 546
- [5] Rule-based Verification of Network Protocol Implementations using Symbolic Execution [J]. 2011 20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2011,
- [7] Applying Symbolic Execution to Test Implementations of a Network Protocol Against its Specification [J]. 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2022), 2022, : 70 - 81
- [8] ASPIER: An Automated Framework for Verifying Security Protocol Implementations [J]. PROCEEDINGS OF THE 22ND IEEE COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, 2009, : 172 - 185
- [10] A Symbolic Model Checking Appproach to Verifying Transact-SQL [J]. PROCEEDINGS 2012 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2012, : 1735 - 1741