Check out the new USENIX Web site. next up previous
Next: About this document ... Up: CMC: A Pragmatic Approach Previous: Acknowledgments

Bibliography

1
Thomas Ball, Rupak Majumdar, Todd Millstein, and Sriram K. Rajamani.
Automatic predicate abstraction of C programs.
In Proceedings of the SIGPLAN '01 Conference on Programming Language Design and Implementation, 2001.

2
K. Bhargavan, D. Obradovic, and C. Gunter.
Formal verification of standards for distance vector routing protocols, 1999.

3
G. Brat, K. Havelund, S. Park, and W. Visser.
Model checking programs.
In IEEE International Conference on Automated Software Engineering (ASE), 2000.

4
E.M. Clarke, O. Grumberg, and D. Peled.
Model Checking.
MIT Press, 1999.

5
J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S. Pasareanu, Robby, and H. Zheng.
Bandera: Extracting finite-state models from java source code.
In ICSE 2000, 2000.

6
Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton.
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks.
In Proc. 7th USENIX Security Conference, pages 63-78, San Antonio, Texas, jan 1998.

7
C.Perkins, E. Royer, and S. Das.
Ad Hoc On Demand Distance Vector (AODV) Routing.
IETF Draft, https://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-10.txt, January 2002.

8
Manuvir Das, Sorin Lerner, and Mark Seigle.
Esp: Path-sensitive program verification in polynomial time.
In Conference on Programming Language Design and Implementation, 2002.

9
David L. Detlefs, K. Rustan M. Leino, Greg Nelson, and James B. Saxe.
Extended static checking, 1998.

10
David L. Dill, Andreas J. Drexler, Alan J. Hu, and C. Han Yang.
Protocol verification as a hardware design aid.
In IEEE International Conference on Computer Design: VLSI in Computers and Processors, pages 522-525, 1992.

11
D.R. Engler, B. Chelf, A. Chou, and S. Hallem.
Checking system rules using system-specific, programmer-written compiler extensions.
In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation, October 2000.

12
Erik Nordstrom et al.
Ad hoc protocol evaluation testbed.
https://apetestbed.sourceforge.net/.

13
Erik Nordstrom et al.
AODV-UU Implementation.
https://user.it.uu.se/ henrikl/aodv/.

14
David Evans, John Guttag, James Horning, and Yang Meng Tan.
LCLint: A tool for using specifications to check code.
In Proceedings of the ACM SIGSOFT '94 Symposium on the Foundations of Software Engineering, pages 87-96, 1994.

15
P. Godefroid.
Model Checking for Programming Languages using VeriSoft.
In Proceedings of the 24th ACM Symposium on Principles of Programming Languages, 1997.

16
J. Hajek.
Automatically verified data transfer protocols.
In Proceedings of the 4th ICCC, pages 749-756, 1978.

17
Sudheendra Hangal and Monica S. Lam.
Tracking down software bugs using automatic anomaly detection.
In Proceedings of the International Conference on Software Engineering, May 2002.

18
Gerard J. Holzmann.
The model checker SPIN.
Software Engineering, 23(5):279-295, 1997.

19
McMillan K.
Symbolic Model Checking.
Kluwer Academic Publishers, 1993.

20
Luke Klein-Berndt and et.al.
Kernel AODV Implementation.
https://w3.antd.nist.gov/wctg/aodv_kernel/.

21
F. Lilieblad and et.al.
Mad-hoc AODV Implementation.
https://mad-hoc.flyinglinux.net/.

22
S. McCanne and S. Floyd.
UCB/LBNL/VINT network simulator - ns (version 2), April 1999.
https://www.isi.edu/nsnam/ns/.

23
K.L. McMillan and J. Schwalbe.
Formal verification of the gigamax cache consistency protocol.
In Proceedings of the International Symposium on Shared Memory Multiprocessing, pages 242-51. Tokyo, Japan Inf. Process. Soc., 1991.

24
G. Nelson.
Techniques for program verification.
Available as Xerox PARC Research Report CSL-81-10, June, 1981, Stanford University, 1981.

25
D. Park, U. Stern, J. Skakkebaek, and D. L. Dill.
Java model checking.
In IEEE International Conference on Automated Software Engineering (ASE), 2000.

26
Charles E. Perkins, Elizabeth M. Royer, and Samir R. Das.
Private Email Communication.

27
Rational Software.
Purify: Advanced runtime error checking for C/C++ developers.
https://www.rational.com/products/purify_unix/.

28
U. Stern and D. L. Dill.
A New Scheme for Memory-Efficient Probabilistic Verification.
In IFIP TC6/WG6.1 Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols, and Protocol Specification, Testing, and Verification, 1996.

29
U. Stern and D.L. Dill.
Automatic verification of the SCI cache coherence protocol.
In Correct Hardware Design and Verification Methods: IFIP WG10.5 Advanced Research Working Conference Proceedings, 1995.

30
C.H. West.
General technique for communications protocol validation.
IBM Journal of Research and Development, 22(4), 1978.



Madanlal Musuvathi 2002-10-08