Sciweavers

111 search results - page 19 / 23
» icse 2008
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
ICSE
2008
IEEE-ACM
14 years 8 months ago
On the automation of fixing software bugs
Software Testing can take up to half of the resources of the development of new software. Although there has been a lot of work on automating the testing phase, fixing a bug after...
Andrea Arcuri
ICSE
2008
IEEE-ACM
14 years 9 months ago
Developing a security protocol for a distributed decision support system in a healthcare environment
In this paper, we describe the unique security issues involved in healthcare domains. These have been addressed to the needs of the HealthAgents project. In the proposed approach,...
Liang Xiao 0002, Paul H. Lewis, Alex Gibb
ICSE
2008
IEEE-ACM
14 years 9 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev
ICSE
2008
IEEE-ACM
14 years 9 months ago
Answering conceptual queries with Ferret
Programmers seek to answer questions as they investigate the functioning of a software system, such as "which execution path is being taken in this case?" Programmers at...
Brian de Alwis, Gail C. Murphy