Sciweavers

ISSRE
2010
IEEE
13 years 8 months ago
Preventing Overflow Attacks by Memory Randomization
Buffer overflow is known to be a common memory vulnerability affecting software. It is exploited to gain various kinds of privilege escalation. C and C++ are very commonly used to ...
Vivek Iyer, Amit Kanitkar, Partha Dasgupta, Raghun...
ISSRE
2010
IEEE
13 years 9 months ago
As-If Infinitely Ranged Integer Model
Roger B. Dannenberg, Will Dormann, David Keaton, R...
ISSRE
2010
IEEE
13 years 9 months ago
Calibrating Probabilistic GUI Testing Models Based on Experiments and Survival Analysis
—Models abstract reality. Although abstract, such models can capture the essence of real world phenomena as long as they are sufficiently accurate. The development of new techni...
Cristiano Bertolini, Alexandre Mota, Eduardo Aranh...
ISSRE
2010
IEEE
13 years 9 months ago
Security Trend Analysis with CVE Topic Models
—We study the vulnerability reports in the Common Vulnerability and Exposures (CVE) database by using topic models on their description texts to find prevalent vulnerability typ...
Stephan Neuhaus, Thomas Zimmermann
ISSRE
2010
IEEE
13 years 9 months ago
Detecting Dependences and Interactions in Feature-Oriented Design
—Feature-oriented software development (FOSD) aims at the construction, customization, and synthesis of large-scale software systems. We propose a novel software design paradigm,...
Sven Apel, Wolfgang Scholz, Christian Lengauer, Ch...
ISSRE
2010
IEEE
13 years 9 months ago
DoDOM: Leveraging DOM Invariants for Web 2.0 Application Robustness Testing
—Web 2.0 applications are increasing in popularity. However, they are also prone to errors because of their dynamic nature. This paper presents DoDOM, an automated system for tes...
Karthik Pattabiraman, Benjamin G. Zorn
ISSRE
2010
IEEE
13 years 9 months ago
A Large-Scale Industrial Case Study on Architecture-Based Software Reliability Analysis
—Architecture-based software reliability analysis methods shall help software architects to identify critical software components and to quantify their influence on the system r...
Heiko Koziolek, Bastian Schlich, Carlos G. Bilich
ISSRE
2010
IEEE
13 years 9 months ago
Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian
Abstract—As smart phones grow in popularity, manufacturers are in a race to pack an increasingly rich set of features into these tiny devices. This brings additional complexity i...
Amiya Kumar Maji, Kangli Hao, Salmin Sultana, Saur...
ISSRE
2010
IEEE
13 years 9 months ago
Is Data Privacy Always Good for Software Testing?
—Database-centric applications (DCAs) are common in enterprise computing, and they use nontrivial databases. Testing of DCAs is increasingly outsourced to test centers in order t...
Mark Grechanik, Christoph Csallner, Chen Fu, Qing ...
ISSRE
2010
IEEE
13 years 9 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra