Sciweavers

419 search results - page 30 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
RE
2008
Springer
13 years 7 months ago
Requirements for tools for ambiguity identification and measurement in natural language requirements specifications
This paper proposes a two-step approach to identifying ambiguities in natural language (NL) requirements specifications (RSs). In the first step, a tool would apply a set of ambig...
Nadzeya Kiyavitskaya, Nicola Zeni, Luisa Mich, Dan...
SCAM
2008
IEEE
14 years 3 months ago
User-Input Dependence Analysis via Graph Reachability
Bug-checking tools have been used with some success in recent years to find bugs in software. For finding bugs that can cause security vulnerabilities, bug checking tools requir...
Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
CN
2007
137views more  CN 2007»
13 years 8 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
DATE
2008
IEEE
122views Hardware» more  DATE 2008»
14 years 3 months ago
Simulation-Directed Invariant Mining for Software Verification
With the advance of SAT solvers, transforming a software program to a propositional formula has generated much interest for bounded model checking of software in recent years. How...
Xueqi Cheng, Michael S. Hsiao
CBSE
2010
Springer
14 years 1 months ago
Restructuring Object-Oriented Applications into Component-Oriented Applications by Using Consistency with Execution Traces
Abstract. Software systems should evolve in order to respond to changing client requirements and their evolving environments. But unfortunately, the evolution of legacy application...
Simon Allier, Houari A. Sahraoui, Salah Sadou, St&...