Some people are trying to find defects in the code by searching for known patterns and known misuse, documented either as part of the kernel API usage or after bugs being known. At Mandriva, and as foundation of my PhD subject, we want to explore another way which is well-known but complex: Model-Checking. Main goal of this talk will be to introduce the subject and present the state of the art around kernel code checking
Modular software model checking of large real-world systems is known to require extensive manual eff...
NoRecent research in membrane computing examines and confirms the anticipated modelling potential of...
Model-based development is one of the most significant areas in recent research and development acti...
International audienceIn this paper, we will present the current state of the art around the topic o...
Software model checking has become a popular tool for verifying programs ’ behavior. Recent results ...
Software model checking has become a popular tool for verifying programs' behavior. Recent resu...
The proliferation of kernel mode malware and rootkits over the last decade is one of the most critic...
AbstractDespite the growing need for customized operating system kernels for embedded devices, kerne...
Code injection continues to pose a serious threat to com-puter systems. Among existing solutions,W⊕X...
This paper shows how to use model checking to find serious errors in file systems. Model checking is...
Despite the technological advances in languages and tools to support program development, pro-gramme...
A rootkit is a collection of tools used by intruders to keep the legitimate users and administrators...
The term “software model checking” has recently been coined to refer to a flourishing area of resear...
Abstract—Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan hors...
The term “software model checking ” has recently been coined to refer to a flourishing area of resea...
Modular software model checking of large real-world systems is known to require extensive manual eff...
NoRecent research in membrane computing examines and confirms the anticipated modelling potential of...
Model-based development is one of the most significant areas in recent research and development acti...
International audienceIn this paper, we will present the current state of the art around the topic o...
Software model checking has become a popular tool for verifying programs ’ behavior. Recent results ...
Software model checking has become a popular tool for verifying programs' behavior. Recent resu...
The proliferation of kernel mode malware and rootkits over the last decade is one of the most critic...
AbstractDespite the growing need for customized operating system kernels for embedded devices, kerne...
Code injection continues to pose a serious threat to com-puter systems. Among existing solutions,W⊕X...
This paper shows how to use model checking to find serious errors in file systems. Model checking is...
Despite the technological advances in languages and tools to support program development, pro-gramme...
A rootkit is a collection of tools used by intruders to keep the legitimate users and administrators...
The term “software model checking” has recently been coined to refer to a flourishing area of resear...
Abstract—Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan hors...
The term “software model checking ” has recently been coined to refer to a flourishing area of resea...
Modular software model checking of large real-world systems is known to require extensive manual eff...
NoRecent research in membrane computing examines and confirms the anticipated modelling potential of...
Model-based development is one of the most significant areas in recent research and development acti...