Sciweavers

419 search results - page 10 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
COMPSAC
2005
IEEE
14 years 3 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
KBSE
2010
IEEE
13 years 8 months ago
An automated approach for finding variable-constant pairing bugs
Named constants are used heavily in operating systems code, both as internal flags and in interactions with devices. Decision making within an operating system thus critically de...
Julia L. Lawall, David Lo
SIGMOD
2008
ACM
120views Database» more  SIGMOD 2008»
14 years 10 months ago
Focused iterative testing: a test automation case study
Timing-related defects are among the most difficult types of defects to catch while testing software. They are by definition difficult to reproduce and hence they are difficult to...
Mechelle Gittens, Pramod Gupta, David Godwin, Hebe...
ICSE
2007
IEEE-ACM
14 years 10 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
DRR
2008
13 years 11 months ago
Hybrid approach combining contextual and statistical information for identifying MEDLINE citation terms
There is a strong demand for developing automated tools for extracting pertinent information from the biomedical literature that is a rich, complex, and dramatically growing resou...
In-Cheol Kim, Daniel X. Le, George R. Thoma