{"title":"Running on Fumes - Preventing Out-of-Gas Vulnerabilities in Ethereum Smart Contracts Using Static Resource Analysis","authors":"E. Albert, Pablo Gordillo, A. Rubio, Ilya Sergey","doi":"10.1007/978-3-030-35092-5_5","DOIUrl":"https://doi.org/10.1007/978-3-030-35092-5_5","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115503641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling and Verification of Dynamic Role-Based Access Control","authors":"Inna Vistbakka, E. Troubitsyna","doi":"10.1007/978-3-030-00359-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_4","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129303620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Parallel State-Space Exploration Using Genetic Algorithms","authors":"E. Renault","doi":"10.1007/978-3-030-00359-3_9","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_9","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121271780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Roua Ben Hamouda, Sabrine Boussema, Imene Ben Hafaiedh, R. Robbana
{"title":"Performance Evaluation of Dynamic Load Balancing Protocols Based on Formal Models in Cloud Environments","authors":"Roua Ben Hamouda, Sabrine Boussema, Imene Ben Hafaiedh, R. Robbana","doi":"10.1007/978-3-030-00359-3_5","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_5","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122617369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The State of Fault Injection Vulnerability Detection","authors":"Thomas Given-Wilson, Nisrine Jafri, Axel Legay","doi":"10.1007/978-3-030-00359-3_1","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_1","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"376 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122658150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Basile, M. T. Beek, Axel Legay, Louis-Marie Traonouez
{"title":"Orchestration Synthesis for Real-Time Service Contracts","authors":"D. Basile, M. T. Beek, Axel Legay, Louis-Marie Traonouez","doi":"10.1007/978-3-030-00359-3_3","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_3","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115748640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Protocol for Constraint Automata Execution in a Synchronous Network of Processors","authors":"A. Farhadi, M. Izadi, J. Habibi","doi":"10.1007/978-3-030-00359-3_6","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_6","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126842750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward Implicit Learning for the Compositional Verification of Markov Decision Processes","authors":"Redouane Bouchekir, M. C. Boukala","doi":"10.1007/978-3-030-00359-3_13","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_13","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127973218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Replacing Store Buffers by Load Buffers in TSO","authors":"P. Abdulla, M. Atig, A. Bouajjani, Ngo Tuan Phong","doi":"10.1007/978-3-030-00359-3_2","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_2","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132013465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MBT/CPN: A Tool for Model-Based Software Testing of Distributed Systems Protocols Using Coloured Petri Nets","authors":"Rui Wang, L. Kristensen, V. Stolz","doi":"10.1007/978-3-030-00359-3_7","DOIUrl":"https://doi.org/10.1007/978-3-030-00359-3_7","url":null,"abstract":"","PeriodicalId":239102,"journal":{"name":"International Workshop on Verification and Evaluation of Computer and Communication Systems","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124201170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}