Sciweavers

2560 search results - page 440 / 512
» Analysis Tool for Honeypot Systems
Sort
View
CCS
2007
ACM
14 years 4 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
BIRTHDAY
2003
Springer
14 years 3 months ago
Extreme Model Checking
One of the central axioms of extreme programming is the disciplined use of regression testing during stepwise software development. Due to recent progress in software model checkin...
Thomas A. Henzinger, Ranjit Jhala, Rupak Majumdar,...
TOOLS
1999
IEEE
14 years 2 months ago
Employing Object Technology to Expose Fundamental Object Concepts
This paper reports on the utilisation of object technology in a university-level course on software development, specifically designed for distance learning, and now enrolling ove...
Mark Woodman, Robert Griffiths, Simon Holland, Hug...
ISSTA
2010
ACM
14 years 1 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
CC
2006
Springer
124views System Software» more  CC 2006»
14 years 1 months ago
Polyhedral Code Generation in the Real World
The polyhedral model is known to be a powerful framework to reason about high level loop transformations. Recent developments in optimizing compilers broke some generally accepted ...
Nicolas Vasilache, Cédric Bastoul, Albert C...