skip to main content
tutorial

Gem #73: tokeneer discovery - lesson 5

Published:15 July 2011Publication History
Skip Abstract Section

Abstract

In the previous Gem in this series, we saw how the SPARK Toolset can verify application-specific safety and security properties, based on source code from Tokeneer. In this Gem, we show how to deal with overflow errors.

Index Terms

  1. Gem #73: tokeneer discovery - lesson 5

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM SIGAda Ada Letters
        ACM SIGAda Ada Letters  Volume 31, Issue 1
        April 2011
        55 pages
        ISSN:1094-3641
        DOI:10.1145/2007461
        Issue’s Table of Contents

        Copyright © 2011 Authors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 15 July 2011

        Check for updates

        Qualifiers

        • tutorial
      • Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0

        Other Metrics

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!