Sciweavers

2269 search results - page 312 / 454
» Behavioral Intrusion Detection
Sort
View
USS
2010
13 years 8 months ago
Toward Automated Detection of Logic Vulnerabilities in Web Applications
Web applications are the most common way to make services and data available on the Internet. Unfortunately, with the increase in the number and complexity of these applications, ...
Viktoria Felmetsger, Ludovico Cavedon, Christopher...
CODASPY
2012
12 years 6 months ago
Detecting repackaged smartphone applications in third-party android marketplaces
Recent years have witnessed incredible popularity and adoption of smartphones and mobile devices, which is accompanied by large amount and wide variety of feature-rich smartphone ...
Wu Zhou, Yajin Zhou, Xuxian Jiang, Peng Ning
KBSE
2006
IEEE
14 years 4 months ago
Reverse Engineering of Design Patterns from Java Source Code
Recovering design patterns can enhance existing source code analysis tools by bringing program understanding to the design level. This paper presents a new, fully automated patter...
Nija Shi, Ronald A. Olsson
EDCC
1994
Springer
14 years 2 months ago
RIFLE: A General Purpose Pin-level Fault Injector
This paper discusses the problems of pin-level fault injection for dependability validation and presents the architecture of a pin-level fault injector called RIFLE. This system ca...
Henrique Madeira, Mário Zenha Rela, Francis...
PLDI
2010
ACM
14 years 7 months ago
Breadcrumbs: Efficient Context Sensitivity for Dynamic Bug Detection Analyses
Calling context--the set of active methods on the stack--is critical for understanding the dynamic behavior of large programs. Dynamic program analysis tools, however, are almost ...
Michael D. Bond, Graham Z. Baker, Samuel Z. Guyer