Sciweavers

419 search results - page 6 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
MSR
2009
ACM
14 years 1 months ago
On mining data across software repositories
Software repositories provide abundance of valuable information about open source projects. With the increase in the size of the data maintained by the repositories, automated ext...
Prasanth Anbalagan, Mladen A. Vouk
CCS
2007
ACM
14 years 2 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
COMPSAC
2007
IEEE
14 years 2 months ago
A Static Analysis Framework For Detecting SQL Injection Vulnerabilities
Recently SQL Injection Attack (SIA) has become a major threat to Web applications. Via carefully crafted user input, attackers can expose or manipulate the back-end database of a ...
Xiang Fu, Xin Lu, Boris Peltsverger, Shijun Chen, ...
CISIS
2008
IEEE
13 years 10 months ago
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
While memory-safe and type-safe languages have been available for many years, the vast majority of software is still implemented in type-unsafe languages such as C/C++. Despite ma...
Babak Salamat, Andreas Gal, Todd Jackson, Karthike...
ICST
2010
IEEE
13 years 7 months ago
Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes
—Although many static-analysis techniques have been developed for automatically detecting bugs, such as null dereferences, fewer automated approaches have been presented for anal...
Mijung Kim, Saurabh Sinha, Carsten Görg, Hina...