Software complexity has increased substantially in the last decade. This has made software development teams work faster and under tight budgets. Reusing software can be a way of s...
Paulo Gomes, Francisco C. Pereira, Paulo Paiva, Nu...
Domain-specific modeling (DSM) assists subject matter experts in describing the essential characteristics of a problem in their domain. Various software artifacts can be generated...
Faizan Javed, Marjan Mernik, Jeff Gray, Barrett R....
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Real-time, reactive, and embedded systems are increasingly used throughout society (e.g., flight control, railway signaling, vehicle management, medical devices, and many others)....
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...