Explicating {SDKs}: uncovering assumptions underlying secure authentication and authorization

R Wang, Y Zhou, S Chen, S Qadeer, D Evans… - 22nd USENIX Security …, 2013 - usenix.org
Most modern applications are empowered by online services, so application developers
frequently implement authentication and authorization. Major online providers, such as …

Little tricky logic: misconceptions in the understanding of LTL

B Greenman, S Saarinen, T Nelson… - arXiv preprint arXiv …, 2022 - arxiv.org
Context: Linear Temporal Logic (LTL) has been used widely in verification. Its importance
and popularity have only grown with the revival of temporal logic synthesis, and with new …

Aunit: A test automation tool for alloy

A Sullivan, K Wang, S Khurshid - 2018 IEEE 11th International …, 2018 - ieeexplore.ieee.org
Software models help improve the reliability of software systems: models can convey
requirements, and can analyze design and implementation properties. A key strength of …

CompoSAT: Specification-guided coverage for model finding

S Porncharoenwase, T Nelson… - … , FM 2018, Held as Part of …, 2018 - Springer
Abstract Model-finding tools like the Alloy Analyzer produce concrete examples of how a
declarative specification can be satisfied. These formal tools are useful in a wide range of …

Identifying implicit assumptions associated with a software product

R Wang, Y Zhou, S Chen, S Qadeer… - US Patent …, 2016 - Google Patents
(57) ABSTRACT A framework is described herein for identifying implicit assumptions
associated with an SDK and its accompanying documentation (eg, dev guide). An implicit …

A formal method for assessing architecture model and design maturity using domain-independent patterns

K Giammarco - Procedia Computer Science, 2014 - Elsevier
Abstract Design patterns have been used as a formal or systematic means for extracting and
patterning knowledge about good design choices, as well as capturing lessons learned …

Model checking access control policies: A case study using google cloud iam

A Gouglidis, A Kagia, VC Hu - arXiv preprint arXiv:2303.16688, 2023 - arxiv.org
Authoring access control policies is challenging and prone to misconfigurations. Access
control policies must be conflict-free. Hence, administrators should identify discrepancies …

Guided requirements engineering using feature oriented software modeling

A Sreekumar - 2023 - openaccess.uoc.edu
A well-defined software requirements specification uniquely describes a functionality or part
of a functionality of the software product and is consistent with the definitions and …

VOAuth: A solution to protect OAuth against phishing

M Xie, W Huang, L Yang, Y Yang - Computers in Industry, 2016 - Elsevier
The OAuth protocol is designed for authorization which enables users to grant third-party
applications to access their resources stored at a server. However, OAuth cannot prevent …

[PDF][PDF] Validating the Formalization of Theories and Algorithms of Discrete Mathematics by the Computer-Supported Checking of Finite Models

A Brunhuemer - 2017 - risc.jku.at
The goal of this Bachelor's thesis is the formal specification and implementation of central
theories and algorithms in the field of discrete mathematics by using the RISC Algorithm …