Sciweavers

1406 search results - page 227 / 282
» Software trace cache
Sort
View
TSE
2012
11 years 10 months ago
Automated Abstractions for Contract Validation
d Abstractions for Contract Validation Guido de Caso, Víctor Braberman, Diego Garbervetsky and Sebastián Uchitel —Pre/post condition-based specifications are common-place in a...
Guido de Caso, Víctor A. Braberman, Diego G...
MOBISYS
2007
ACM
14 years 7 months ago
NodeMD: diagnosing node-level faults in remote wireless sensor systems
Software failures in wireless sensor systems are notoriously difficult to debug. Resource constraints in wireless deployments substantially restrict visibility into the root cause...
Veljko Krunic, Eric Trumpler, Richard Han
ISSTA
2009
ACM
14 years 2 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
14 years 2 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
CONEXT
2009
ACM
13 years 8 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...