Verification of the security of software artifacts is a challenging task. An integrated approach that combines verification techniques can increase the confidence in the security of software artifacts. Such an approach has been developed by the Jet Propulsion Laboratory (JPL) and the University of California at Davis (UC Davis). Two security verification instruments were developed and then piloted on PatchLink's UNIX Agent, a Commercial-Off-The-Shelf (COTS) software product, to assess the value of the instruments and the approach. The two instruments are the Flexible Modeling Framework (FMF) -- a model-based verification instrument (JPL), and a Property-Based Tester (UC Davis). Security properties were formally specified for the COTS artifa...
The function of software used to be calculation; mechanising what was previously done by hand. Now i...
Software security is concerned with the protection of data, facilities and applications from harm th...
A modern vehicle is controlled by a distributed network of embedded devices - Electronic Control Uni...
bishop(il),cs.ucdavis.edu Formal specification and verification of security has proven a challenging...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
Evaluating the software assurance of a product as it functions within a specific system context invo...
Monitoring agencies often use computer based equipment to control instruments and to collect data at...
Software attestation has become a popular and challenging research topic at many established securit...
In recent years, the number of exploits targeting software applications has increased dramatically. ...
The quality assurance technique software inspection is often not sufficiently appreciated, especiall...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
The date of receipt and acceptance will be inserted by the editor Abstract. We present a method for ...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
The paper presents a tool for verifying, during the system security design, security properties of d...
Serious information security vulnerabilities are discovered daily and reported from already deployed...
The function of software used to be calculation; mechanising what was previously done by hand. Now i...
Software security is concerned with the protection of data, facilities and applications from harm th...
A modern vehicle is controlled by a distributed network of embedded devices - Electronic Control Uni...
bishop(il),cs.ucdavis.edu Formal specification and verification of security has proven a challenging...
which permits unrestricted use, distribution, and reproduction in any medium, provided the original ...
Evaluating the software assurance of a product as it functions within a specific system context invo...
Monitoring agencies often use computer based equipment to control instruments and to collect data at...
Software attestation has become a popular and challenging research topic at many established securit...
In recent years, the number of exploits targeting software applications has increased dramatically. ...
The quality assurance technique software inspection is often not sufficiently appreciated, especiall...
The wide usage of hardware Intellectual Property (IP) cores and software programs from untrusted ven...
The date of receipt and acceptance will be inserted by the editor Abstract. We present a method for ...
The wide usage of hardware intellectual property (IP) cores and software programs from untrusted thi...
The paper presents a tool for verifying, during the system security design, security properties of d...
Serious information security vulnerabilities are discovered daily and reported from already deployed...
The function of software used to be calculation; mechanising what was previously done by hand. Now i...
Software security is concerned with the protection of data, facilities and applications from harm th...
A modern vehicle is controlled by a distributed network of embedded devices - Electronic Control Uni...