Sciweavers

822 search results - page 108 / 165
» Debugging Aspect-Enabled Programs
Sort
View
CCS
2008
ACM
13 years 10 months ago
Minimal backups of cryptographic protocol runs
As cryptographic protocols execute they accumulate information such as values and keys, and evidence of properties about this information. As execution proceeds, new information b...
Jay A. McCarthy, Shriram Krishnamurthi
NSDI
2010
13 years 10 months ago
Mugshot: Deterministic Capture and Replay for JavaScript Applications
Mugshot is a system that captures every event in an executing JavaScript program, allowing developers to deterministically replay past executions of web applications. Replay is us...
James Mickens, Jeremy Elson, Jon Howell
USS
2004
13 years 10 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
VEE
2012
ACM
269views Virtualization» more  VEE 2012»
12 years 4 months ago
SimTester: a controllable and observable testing framework for embedded systems
In software for embedded systems, the frequent use of interrupts for timing, sensing, and I/O processing can cause concurrency faults to occur due to interactions between applicat...
Tingting Yu, Witawas Srisa-an, Gregg Rothermel
AUIC
2006
IEEE
14 years 2 months ago
Visualisations of execution traces (VET): an interactive plugin-based visualisation tool
An execution trace contains a description of everything that happened during an execution of a program. Execution traces are useful, because they can help software engineers under...
Mike McGavin, Tim Wright, Stuart Marshall