When creating mission-critical distributed systems using off-the-shelf components, it is important to assess the dependability of not only the hardware, but the software as well. ...
Philip J. Koopman Jr., John Sung, Christopher P. D...
A software product line can be used to implement a software product family that is a set of software products sharing common features. A natural implementation strategy for a softw...
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Timing-related defects are among the most difficult types of defects to catch while testing software. They are by definition difficult to reproduce and hence they are difficult to...
Mechelle Gittens, Pramod Gupta, David Godwin, Hebe...
We present the design and implementation of RICH (Run-time Integer CHecking), a tool for efficiently detecting integer-based attacks against C programs at run time. C integer bug...
David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh...