Nothing Special   »   [go: up one dir, main page]

Law - Google Patents

by Yee Wei Law-Sunday, 14 May 2023, 5: 01 PM

Law

View HTML
Document ID
17975247725914279752
Author
Law Y

External Links

Snippet

Developed by UC Berkeley, MOdelchecking Programs for Security properties (MOPS) is a static (compile-time) analysis tool, which given a program and a security property (expressed as a finite-state automaton), checks whether the program can violate the security …
Continue reading at lo.unisa.edu.au (HTML) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3409Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3636Software debugging by tracing the execution of the program
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3608Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/86Event-based monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/875Monitoring of systems including the internet

Similar Documents

Publication Publication Date Title
Dieber et al. Security for the robot operating system
Shirey RFC 4949: Internet Security Glossary, Version 2
Paulson Inductive analysis of the internet protocol TLS
US9571285B2 (en) Identity assertion framework
Wilhelm et al. Introducing trusted third parties to the mobile agent paradigm
US8259947B2 (en) Recreating a cryptographic key in a replacement device
Backes et al. Cryptographically sound security proofs for basic and public-key kerberos
US10263782B2 (en) Soft-token authentication system
KR100850506B1 (en) System and method for secure web service using double enforcement of user authentication
Staudemeyer et al. Security and Privacy for the Internet of Things Communication in the SmartCity
CN107566393A (en) A kind of dynamic rights checking system and method based on trust certificate
Bartlett et al. IKEv2 IPsec Virtual Private Networks: Understanding and Deploying IKEv2, IPsec VPNs, and FlexVPN in Cisco IOS
Zafir et al. Enhancing security of internet of robotic things: A review of recent trends, practices, and recommendations with encryption and blockchain techniques
Joshi Network security: know it all
Ozaif et al. Exploration of Secured Data Transmission in Internet of Things: A Survey
Brooks et al. Conceptualizing a secure wireless cloud
Ahmed et al. Transparency of SIM profiles for the consumer remote SIM provisioning protocol
Law by Yee Wei Law-Sunday, 14 May 2023, 5: 01 PM
Ulybyshev Data Protection in Transit and at Rest with Leakage Detection
Chauhan et al. Computer Security and Encryption: An Introduction
JP2005065004A (en) Method, device and program for inspecting encrypted communication data
Cinque et al. Secure crisis information sharing through an interoperability framework among first responders: The SECTOR practical experience
Li et al. “Fair” authentication in pervasive computing
Benson Portable security transaction protocol
Garrie et al. Encryption