Sciweavers

89 search results - page 13 / 18
» Where the bugs are
Sort
View
ISSTA
2012
ACM
11 years 10 months ago
Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities
Use-after-free vulnerabilities are rapidly growing in popularity, especially for exploiting web browsers. Use-afterfree (and double-free) vulnerabilities are caused by a program o...
Juan Caballero, Gustavo Grieco, Mark Marron, Anton...
ASPLOS
2004
ACM
14 years 1 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
ICFP
2009
ACM
14 years 8 months ago
Identifying query incompatibilities with evolving XML schemas
During the life cycle of an XML application, both schemas and queries may change from one version to another. Schema evolutions may affect query results and potentially the validi...
Nabil Layaïda, Pierre Genevès, Vincent...
KBSE
2006
IEEE
14 years 1 months ago
Sieve: A Tool for Automatically Detecting Variations Across Program Versions
Software systems often undergo many revisions during their lifetime as new features are added, bugs repaired, abstractions simplified and refactored, and performance improved. Wh...
Murali Krishna Ramanathan, Ananth Grama, Suresh Ja...
ACMIDC
2010
13 years 11 months ago
Gifts for intertwining with modern nature
Inspired by Froebel’s Gifts for kindergarten, we propose a new category of gifts for modern preschools. Modern Nature Gifts are meta-manipulatives, inviting deeper exploration o...
Jay S. Silver, Eric Rosenbaum