Next: About this document ...
Up: CMC: A Pragmatic Approach
Previous: Acknowledgments
- 1
-
Thomas Ball, Rupak Majumdar, Todd Millstein, and Sriram K. Rajamani.
Automatic predicate abstraction of C programs.
In Proceedings of the SIGPLAN '01 Conference on Programming
Language Design and Implementation, 2001.
- 2
-
K. Bhargavan, D. Obradovic, and C. Gunter.
Formal verification of standards for distance vector routing
protocols, 1999.
- 3
-
G. Brat, K. Havelund, S. Park, and W. Visser.
Model checking programs.
In IEEE International Conference on Automated Software
Engineering (ASE), 2000.
- 4
-
E.M. Clarke, O. Grumberg, and D. Peled.
Model Checking.
MIT Press, 1999.
- 5
-
J.C. Corbett, M.B. Dwyer, J. Hatcliff, S. Laubach, C.S. Pasareanu, Robby, and
H. Zheng.
Bandera: Extracting finite-state models from java source code.
In ICSE 2000, 2000.
- 6
-
Crispan Cowan, Calton Pu, Dave Maier, Jonathan Walpole, Peat Bakke, Steve
Beattie, Aaron Grier, Perry Wagle, Qian Zhang, and Heather Hinton.
StackGuard: Automatic adaptive detection and prevention of
buffer-overflow attacks.
In Proc. 7th USENIX Security Conference, pages 63-78, San
Antonio, Texas, jan 1998.
- 7
-
C.Perkins, E. Royer, and S. Das.
Ad Hoc On Demand Distance Vector (AODV) Routing.
IETF Draft,
https://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-10.txt, January
2002.
- 8
-
Manuvir Das, Sorin Lerner, and Mark Seigle.
Esp: Path-sensitive program verification in polynomial time.
In Conference on Programming Language Design and
Implementation, 2002.
- 9
-
David L. Detlefs, K. Rustan M. Leino, Greg Nelson, and James B. Saxe.
Extended static checking, 1998.
- 10
-
David L. Dill, Andreas J. Drexler, Alan J. Hu, and C. Han Yang.
Protocol verification as a hardware design aid.
In IEEE International Conference on Computer Design: VLSI in
Computers and Processors, pages 522-525, 1992.
- 11
-
D.R. Engler, B. Chelf, A. Chou, and S. Hallem.
Checking system rules using system-specific, programmer-written
compiler extensions.
In Proceedings of the Fourth Symposium on Operating Systems
Design and Implementation, October 2000.
- 12
-
Erik Nordstrom et al.
Ad hoc protocol evaluation testbed.
https://apetestbed.sourceforge.net/.
- 13
-
Erik Nordstrom et al.
AODV-UU Implementation.
https://user.it.uu.se/ henrikl/aodv/.
- 14
-
David Evans, John Guttag, James Horning, and Yang Meng Tan.
LCLint: A tool for using specifications to check code.
In Proceedings of the ACM SIGSOFT '94 Symposium on the
Foundations of Software Engineering, pages 87-96, 1994.
- 15
-
P. Godefroid.
Model Checking for Programming Languages using VeriSoft.
In Proceedings of the 24th ACM Symposium on Principles of
Programming Languages, 1997.
- 16
-
J. Hajek.
Automatically verified data transfer protocols.
In Proceedings of the 4th ICCC, pages 749-756, 1978.
- 17
-
Sudheendra Hangal and Monica S. Lam.
Tracking down software bugs using automatic anomaly detection.
In Proceedings of the International Conference on Software
Engineering, May 2002.
- 18
-
Gerard J. Holzmann.
The model checker SPIN.
Software Engineering, 23(5):279-295, 1997.
- 19
-
McMillan K.
Symbolic Model Checking.
Kluwer Academic Publishers, 1993.
- 20
-
Luke Klein-Berndt and et.al.
Kernel AODV Implementation.
https://w3.antd.nist.gov/wctg/aodv_kernel/.
- 21
-
F. Lilieblad and et.al.
Mad-hoc AODV Implementation.
https://mad-hoc.flyinglinux.net/.
- 22
-
S. McCanne and S. Floyd.
UCB/LBNL/VINT network simulator - ns (version 2), April 1999.
https://www.isi.edu/nsnam/ns/.
- 23
-
K.L. McMillan and J. Schwalbe.
Formal verification of the gigamax cache consistency protocol.
In Proceedings of the International Symposium on Shared Memory
Multiprocessing, pages 242-51. Tokyo, Japan Inf. Process. Soc., 1991.
- 24
-
G. Nelson.
Techniques for program verification.
Available as Xerox PARC Research Report CSL-81-10, June, 1981,
Stanford University, 1981.
- 25
-
D. Park, U. Stern, J. Skakkebaek, and D. L. Dill.
Java model checking.
In IEEE International Conference on Automated Software
Engineering (ASE), 2000.
- 26
-
Charles E. Perkins, Elizabeth M. Royer, and Samir R. Das.
Private Email Communication.
- 27
-
Rational Software.
Purify: Advanced runtime error checking for C/C++ developers.
https://www.rational.com/products/purify_unix/.
- 28
-
U. Stern and D. L. Dill.
A New Scheme for Memory-Efficient Probabilistic Verification.
In IFIP TC6/WG6.1 Joint International Conference on Formal
Description Techniques for Distributed Systems and Communication Protocols,
and Protocol Specification, Testing, and Verification, 1996.
- 29
-
U. Stern and D.L. Dill.
Automatic verification of the SCI cache coherence protocol.
In Correct Hardware Design and Verification Methods: IFIP WG10.5
Advanced Research Working Conference Proceedings, 1995.
- 30
-
C.H. West.
General technique for communications protocol validation.
IBM Journal of Research and Development, 22(4), 1978.
Madanlal Musuvathi
2002-10-08