Latest Additions to the Library
Trusted Computing in Embedded Systems Workshop
This report describes the November 2010 Trusted Computing in Embedded Systems Workshop held at Carnegie Mellon University.
COVERT: A Framework for Finding Buffer Overflows in C Programs via Software Verification
This report presents COVERT, an automated framework aimed at finding buffer overflows in C programs using state-of-the-art software verification tools and techniques.
We Have All Been Here Before: Recurring Patterns Across 12 U.S. Air Force Acquisition Programs
presentation given by William Novak and Ray Williams at the 2010 Systems and Software Technology Conference (SSTC) on April 29, 2010
System Architecture Virtual Integration: An Industrial Case Study
This report introduces key concepts of the SAVI paradigm, describe the POC scope, and discusses the series of development scenarios used in a POC demonstration to illustrate the feasibility of...
Towards an Assurance Case Practice for Medical Devices
This report explores how the assurance case promises a technology answer for the challenge that manufacturers and federal regulators face in gaining confidence about the performance of software-dominated medical devices.