Sciweavers

5 search results - page 1 / 1
» ExPert: Dynamic Analysis Based Fault Location via Execution ...
Sort
View
IPPS
2007
IEEE
13 years 11 months ago
ExPert: Dynamic Analysis Based Fault Location via Execution Perturbations
We are designing dynamic analysis techniques to identify executed program statements where a fault lies, i.e. the fault candidate set. To narrow the set of statements in the fault...
Neelam Gupta, Rajiv Gupta
KBSE
2007
IEEE
13 years 11 months ago
Feature location via information retrieval based filtering of a single scenario execution trace
The paper presents a semi-automated technique for feature location in source code. The technique is based on combining information from two different sources: an execution trace, ...
Dapeng Liu, Andrian Marcus, Denys Poshyvanyk, Vacl...
AAAI
2010
13 years 6 months ago
Automated Program Debugging Via Multiple Predicate Switching
In a previous paper, Liu argued for the importance of establishing a precise theoretical foundation for program debugging from first principles. In this paper, we present a first ...
Yongmei Liu, Bing Li
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
13 years 8 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou