Sciweavers

1414 search results - page 44 / 283
» Automated Metamorphic Testing
Sort
View
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
SE
2007
13 years 9 months ago
Requirements traceability in the model-based testing process
: Automated test case and test driver generation from a precise behaviour UML model is an emerging approach for software functional validation. This innovative approach for validat...
Eddy Bernard, Bruno Legeard
DATE
2009
IEEE
115views Hardware» more  DATE 2009»
14 years 2 months ago
Automated data analysis solutions to silicon debug
Since pre-silicon functional verification is insufficient to detect all design errors, re-spins are often needed due to malfunctions that escape into the silicon. This paper pre...
Yu-Shen Yang, Nicola Nicolici, Andreas G. Veneris
ACSAC
2007
IEEE
14 years 2 months ago
Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting
We present an extension of traditional "black box" fuzz testing using a genetic algorithm based upon a Dynamic Markov Model fitness heuristic. This heuristic allows us t...
Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cl...
SIGCSE
2008
ACM
169views Education» more  SIGCSE 2008»
13 years 7 months ago
APOGEE: automated project grading and instant feedback system for web based computing
Providing consistent, instant, and detailed feedback to students has been a big challenge in teaching Web based computing, given the complexity of project assignments and the comp...
Xiang Fu, Boris Peltsverger, Kai Qian, Lixin Tao, ...