Sciweavers

852 search results - page 83 / 171
» Understanding How the Requirements Are Implemented in Source...
Sort
View
ISSRE
2010
IEEE
15 years 2 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
ICSE
2008
IEEE-ACM
16 years 5 months ago
Granularity in software product lines
Building software product lines (SPLs) with features is a challenging task. Many SPL implementations support features with coarse granularity ? e.g., the ability to add and wrap e...
Christian Kästner, Martin Kuhlemann, Sven Ape...
CCS
2008
ACM
15 years 6 months ago
Code injection attacks on harvard-architecture devices
Harvard architecture CPU design is common in the embedded world. Examples of Harvard-based architecture devices are the Mica family of wireless sensors. Mica motes have limited me...
Aurélien Francillon, Claude Castelluccia
AAAI
2000
15 years 5 months ago
The Systems Engineering Process Activities (SEPA) Methodology and Tool Suite
or cone, abstraction is chosen to represent a spectrum of user inputs/requirements that are narrowed, refined, and structured into a system design. User inputs require refinement f...
K. Suzanne Barber, Thomas J. Graser, Paul Grisham,...
IPCCC
2007
IEEE
15 years 10 months ago
Application Insight Through Performance Modeling
Tuning the performance of applications requires understanding the interactions between code and target architecture. This paper describes a performance modeling approach that not ...
Gabriel Marin, John M. Mellor-Crummey