Sciweavers

ICSE
2005
IEEE-ACM
14 years 11 months ago
Automatic discovery of API-level exploits
We argue that finding vulnerabilities in software components is different from finding exploits against them. Exploits that compromise security often use several low-level details...
Vinod Ganapathy, Sanjit A. Seshia, Somesh Jha, Tho...
ICSE
2005
IEEE-ACM
14 years 11 months ago
DynAlloy: upgrading alloy with actions
Carlos López Pombo, Juan P. Galeotti, Marce...
ICSE
2005
IEEE-ACM
14 years 11 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ICSE
2005
IEEE-ACM
14 years 11 months ago
Process issues in course projects
Defined software engineering process help teaching and guiding software engineering courses projects. However, using them raises several issues related to process and course featu...
Wilson P. Paula Filho
ICSE
2005
IEEE-ACM
14 years 11 months ago
Clinical requirements engineering
In this paper, I make a case for integration of requirements engineering (RE) with clinical disciplines. To back my case, I look at two examples that employ a clinical RE approach...
Stephen Fickas
ICSE
2005
IEEE-ACM
14 years 11 months ago
Automatic generation and maintenance of correct spreadsheets
Existing spreadsheet systems allow users to change cells arbitrarily, which is a major source of spreadsheet errors. We propose a system that prevents errors in spreadsheets by re...
Martin Erwig, Robin Abraham, Irene Cooperstein, St...
ICSE
2005
IEEE-ACM
14 years 11 months ago
The groupthink specification exercise
Michael D. Ernst, John Chapin