Sciweavers

246 search results - page 4 / 50
» Sampling-based program execution monitoring
Sort
View
NDSS
2008
IEEE
14 years 1 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
13 years 11 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
SOFTVIS
2003
ACM
14 years 21 days ago
Visualization of Program-Execution Data for Deployed Software
Software products are often released with missing functionality, errors, or incompatibilities that may result in failures in the field, inferior performances, or, more generally,...
Alessandro Orso, James A. Jones, Mary Jean Harrold
SEW
2003
IEEE
14 years 22 days ago
Applying Run-Time Monitoring to the Deep-Impact Fault Protection Engine
Run-time monitoring is a lightweight verification method whereby the correctness of a programs’ execution is verified at run-time using executable specifications. This paper des...
Doron Drusinsky, Garth Watney
APSEC
1996
IEEE
13 years 11 months ago
A Prototype of a Concurrent Behavior Monitoring Tool for Testing of Concurrent Programs
Testing of concurrent programs is much more difficult than that of sequential programs. A concurrent program behaves nondeterministically, that is, the program may produce differe...
Eisuke Itoh, Zengo Furukawa, Kazuo Ushijima