Sciweavers

52 search results - page 4 / 11
» compsac 2009
Sort
View
COMPSAC
2009
IEEE
14 years 5 months ago
On Information Flow Forensics in Business Application Scenarios
To-date, security analysis techniques focus on the explicit access to data, thereby neglecting information flows happening over covert channels. As a result, critical business so...
Claus Wonnemann, Rafael Accorsi, Günter M&uum...
COMPSAC
2009
IEEE
14 years 5 months ago
Penetration Testing for Spam Filters
Despite all the advances on techniques to block spam e-mail messages we still receive them on a frequent basis. This is due mainly to the ability of the spammers to modify the mes...
Yugesh Madhavan, João W. Cangussu, Ram Dant...
COMPSAC
2009
IEEE
14 years 3 months ago
Towards a Theory for Testing Non-terminating Programs
Non-terminating programs are programs that legally perform unbounded computations. Though they are ubiquitous in real-world applications, testing these programs requires new theor...
Arnaud Gotlieb, Matthieu Petit
COMPSAC
2009
IEEE
14 years 2 months ago
On a Classification Approach for SOA Vulnerabilities
Abstract--Vulnerabilities in operating systems and web applications have been and are being put into various classifications, leading to a better understanding of their causes and ...
Lutz Lowis, Rafael Accorsi
COMPSAC
2009
IEEE
14 years 1 months ago
Practical Extensions of a Randomized Testing Tool
—Many efficient random testing algorithms for object-oriented software have been proposed due to their simplicity and reasonable code coverage; however, even the stateof-the-art...
Hojun Jaygarl, Carl K. Chang, Sunghun Kim