Sciweavers

3667 search results - page 511 / 734
» Software Rejuvenation - Modeling and Analysis
Sort
View
ICSE
2009
IEEE-ACM
15 years 10 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
143
Voted
CODES
2009
IEEE
15 years 10 months ago
FlexRay schedule optimization of the static segment
The FlexRay bus is the prospective automotive standard communication system. For the sake of a high flexibility, the protocol includes a static time-triggered and a dynamic event...
Martin Lukasiewycz, Michael Glaß, Jürge...
WCRE
2009
IEEE
15 years 10 months ago
NTrace: Function Boundary Tracing for Windows on IA-32
—For a long time, dynamic tracing has been an enabling technique for reverse engineering tools. Tracing can not only be used to record the control flow of a particular component...
Johannes Passing, Alexander Schmidt, Martin von L&...
116
Voted
IWPC
2009
IEEE
15 years 10 months ago
Reading the documentation of invoked API functions in program comprehension
Comprehending an unfamiliar code fragment requires an awareness of explicit usage directives that may be present in the documentation of some invoked functions. Since it is not pr...
Uri Dekel, James D. Herbsleb
KI
2009
Springer
15 years 10 months ago
SceneMaker: Automatic Visualisation of Screenplays
Abstract. Our proposed software system, SceneMaker, aims to facilitate the production of plays, films or animations by automatically interpreting natural language film scripts an...
Eva Hanser, Paul McKevitt, Tom Lunney, Joan Condel...