Sciweavers

1489 search results - page 23 / 298
» The First Bug Report
Sort
View
128
Voted
CCS
2010
ACM
15 years 2 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
109
Voted
ICSE
2007
IEEE-ACM
16 years 2 months ago
Bug Hunt: Making Early Software Testing Lessons Engaging and Affordable
Software testing efforts account for a large part of the software development costs. We still struggle, however, to properly prepare students to perform software testing activitie...
Sebastian G. Elbaum, Suzette Person, Jonathan Doku...
133
Voted
SIGSOFT
2010
ACM
15 years 15 days ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
139
Voted
CONEXT
2009
ACM
15 years 3 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
147
Voted
SIGMOD
2011
ACM
249views Database» more  SIGMOD 2011»
14 years 5 months ago
FlexMin: a flexible tool for automatic bug isolation in DBMS software
Debugging a database engine is an arduous task due to the complexity of the query workloads and systems. The first step in isolating a bug involves identifying a sequence of step...
Kristi Morton, Nicolas Bruno