Law - Google Patents
by Yee Wei Law-Sunday, 14 May 2023, 5: 01 PMLaw
View HTML- Document ID
- 17975247725914279752
- Author
- Law Y
External Links
Snippet
Developed by UC Berkeley, MOdelchecking Programs for Security properties (MOPS) is a static (compile-time) analysis tool, which given a program and a security property (expressed as a finite-state automaton), checks whether the program can violate the security …
- 238000004458 analytical method 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3612—Software analysis for verifying properties of programs by runtime analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3495—Performance evaluation by tracing or monitoring for systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
- G06F21/563—Static detection by source code analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/362—Software debugging
- G06F11/3636—Software debugging by tracing the execution of the program
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3604—Software analysis for verifying properties of programs
- G06F11/3608—Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/86—Event-based monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/875—Monitoring of systems including the internet
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Dieber et al. | Security for the robot operating system | |
Shirey | RFC 4949: Internet Security Glossary, Version 2 | |
Paulson | Inductive analysis of the internet protocol TLS | |
US9571285B2 (en) | Identity assertion framework | |
Wilhelm et al. | Introducing trusted third parties to the mobile agent paradigm | |
US8259947B2 (en) | Recreating a cryptographic key in a replacement device | |
Backes et al. | Cryptographically sound security proofs for basic and public-key kerberos | |
US10263782B2 (en) | Soft-token authentication system | |
KR100850506B1 (en) | System and method for secure web service using double enforcement of user authentication | |
Staudemeyer et al. | Security and Privacy for the Internet of Things Communication in the SmartCity | |
CN107566393A (en) | A kind of dynamic rights checking system and method based on trust certificate | |
Bartlett et al. | IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS | |
Zafir et al. | Enhancing security of internet of robotic things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques | |
Joshi | Network security: know it all | |
Ozaif et al. | Exploration of Secured Data Transmission in Internet of Things: A Survey | |
Brooks et al. | Conceptualizing a secure wireless cloud | |
Ahmed et al. | Transparency of SIM profiles for the consumer remote SIM provisioning protocol | |
Law | by Yee Wei Law-Sunday, 14 May 2023, 5: 01 PM | |
Ulybyshev | Data Protection in Transit and at Rest with Leakage Detection | |
Chauhan et al. | Computer Security and Encryption: An Introduction | |
JP2005065004A (en) | Method, device and program for inspecting encrypted communication data | |
Cinque et al. | Secure crisis information sharing through an interoperability framework among first responders: The SECTOR practical experience | |
Li et al. | “Fair” authentication in pervasive computing | |
Benson | Portable security transaction protocol | |
Garrie et al. | Encryption |