Sciweavers

944 search results - page 99 / 189
» Software model checking without source code
Sort
View
ICSE
2011
IEEE-ACM
13 years 1 months ago
Miler: a toolset for exploring email data
Source code is the target and final outcome of software development. By focusing our research and analysis on source code only, we risk forgetting that software is the product of...
Alberto Bacchelli, Michele Lanza, Marco D'Ambros
SCAM
2008
IEEE
14 years 4 months ago
Using Program Transformations to Add Structure to a Legacy Data Model
An appropriate translation of the data model is central to any language migration effort. Finding a mapping between original and target data models may be challenging for legacy l...
Mariano Ceccato, Thomas Roy Dean, Paolo Tonella
IWPSE
2007
IEEE
14 years 4 months ago
Modification analysis support at the requirements level
Modification analysis is part of most maintenance processes and includes among other activities, early prediction of potential change impacts, feasibility studies, cost estimation...
Maryam Shiri, Jameleddine Hassine, Juergen Rilling
DRM
2007
Springer
14 years 4 months ago
Mechanism for software tamper resistance: an application of white-box cryptography
In software protection we typically have to deal with the white-box attack model. In this model an attacker is assumed to have full access to the software and full control over it...
Wil Michiels, Paul Gorissen
WCRE
2005
IEEE
14 years 3 months ago
Enhancing Security Using Legality Assertions
Buffer overflows have been the most common form of security vulnerability in the past decade. A number of techniques have been proposed to address such attacks. Some are limited t...
Lei Wang, James R. Cordy, Thomas R. Dean