共 29 条
[1]
A Flashback on Control Logic Injection Attacks against Programmable Logic Controllers
[J].
AUTOMATION,
2022, 3 (04)
:596-621
[2]
FuSeBMC: An Energy-Efficient Test Generator for Finding Security Vulnerabilities in C Programs
[J].
TESTS AND PROOFS (TAP 2021),
2021, 12740
:85-105
[3]
Althoff Matthias, 2022, P 9 INT WORKSH APPL
[4]
Barnat Jiri, 2010, Proceedings 2010 9th International Workshop on Parallel & Distributed Methods in Verification and 2nd International Workshop on High Performance Computational Systems Biology (PDMC-HiBi 2010), P4, DOI 10.1109/PDMC-HiBi.2010.9
[5]
Beyer Dirk, 2011, Computer Aided Verification. Proceedings 23rd International Conference, CAV 2011, P184, DOI 10.1007/978-3-642-22110-1_16
[6]
Decomposing Software Verification into Off-the-Shelf Components: An Application to CEGAR
[J].
2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2022),
2022,
:536-548
[7]
CoVeriTeam: On-Demand Composition of Cooperative Verification Systems
[J].
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS, TACAS 2022, PT I,
2022, 13243
:561-579
[8]
Verification Artifacts in Cooperative Verification: Survey and Unifying Component Framework
[J].
LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: VERIFICATION PRINCIPLES, ISOLA 2020, PT I,
2020, 12476
:143-167
[10]
Reliable and Reproducible Competition Results with BenchExec and Witnesses (Report on SV-COMP 2016)
[J].
TOOLS AND ALGORITHMS FOR THE CONSTRUCTION AND ANALYSIS OF SYSTEMS (TACAS 2016),
2016, 9636
:887-904