Sciweavers

752 search results - page 14 / 151
» Finite-State Modeling, Analysis and Testing of System Vulner...
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
14 years 9 days ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
MSO
2003
13 years 9 months ago
Control System Design of the CERN/CMS Tracker Thermal Screen
The Tracker is one of the CMS (Compact Muon Solenoid experiment) detectors to be installed at the LHC (Large Hadron Collider) accelerator, scheduled to start data taking in 2007. ...
Enzo Carrone, Andromachi Tsirou
IANDC
2008
112views more  IANDC 2008»
13 years 8 months ago
Inclusion dynamics hybrid automata
Hybrid systems are dynamical systems with the ability to describe mixed discretecontinuous evolution of a wide range of systems. Consequently, at first glance, hybrid systems appe...
Alberto Casagrande, Carla Piazza, Alberto Policrit...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 20 days ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
CRV
2005
IEEE
198views Robotics» more  CRV 2005»
14 years 2 months ago
Analysis of Player Actions in Selected Hockey Game Situations
We present a proof of concept system to represent and reason about hockey play. The system takes as input player motion trajectory data tracked from game video and supported by kn...
Fahong Li, Robert J. Woodham