Sciweavers

256 search results - page 17 / 52
» On the Placement of Software Mechanisms for Detection of Dat...
Sort
View
OSDI
2006
ACM
14 years 7 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
ISCA
2009
IEEE
199views Hardware» more  ISCA 2009»
14 years 2 months ago
SigRace: signature-based data race detection
Detecting data races in parallel programs is important for both software development and production-run diagnosis. Recently, there have been several proposals for hardware-assiste...
Abdullah Muzahid, Darío Suárez Graci...
SEKE
2004
Springer
14 years 27 days ago
Automated Assistance for Eliciting User Expectations
People often use software for mundane tasks and expect it to be dependable enough for their needs. Unfortunately, the incomplete and imprecise specifications of such everyday sof...
Orna Raz, Rebecca B. Buchheit, Mary Shaw, Philip K...
VL
2000
IEEE
120views Visual Languages» more  VL 2000»
13 years 12 months ago
Visualizing the Synchronization of Java-Threads with UML
Concurrent programming is a complex task, even with modern languages such as Java who provide languagebased support for multithreading and synchronization. In addition to typical ...
Katharina Mehner, Annika Wagner
MSR
2009
ACM
14 years 2 months ago
A platform for software engineering research
Research in the fields of software quality, maintainability and evolution requires the analysis of large quantities of data, which often originate from open source software proje...
Georgios Gousios, Diomidis Spinellis