Sciweavers

787 search results - page 69 / 158
» Source code analysis and manipulation
Sort
View
CAV
2011
Springer
253views Hardware» more  CAV 2011»
13 years 1 months ago
HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection
Abstract. Many automatic testing, analysis, and verification techniques for programs can effectively be reduced to a constraint-generation phase followed by a constraint-solving ...
Vijay Ganesh, Adam Kiezun, Shay Artzi, Philip J. G...
ICST
2009
IEEE
14 years 4 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
KBSE
2007
IEEE
14 years 4 months ago
Finding errors in components that exchange xml data
Two or more components (e.g., objects, modules, or programs) interoperate when they exchange data, such as XML data. Using Application Programming Interface (API) calls exported b...
Mark Grechanik
TASE
2007
IEEE
14 years 4 months ago
Model Checking Software at Compile Time
Software has been under scrutiny by the verification community from various angles in the recent past. There are two major algorithmic approaches to ensure the correctness of and...
Ansgar Fehnker, Ralf Huuck, Patrick Jayet, Michel ...
VLDB
2007
ACM
77views Database» more  VLDB 2007»
14 years 4 months ago
Tracing Lineage Beyond Relational Operators
Tracing the lineage of data is an important requirement for establishing the quality and validity of data. Recently, the problem of data provenance has been increasingly addressed...
Mingwu Zhang, Xiangyu Zhang, Xiang Zhang, Sunil Pr...