Sciweavers

41 search results - page 4 / 9
» Testing static analysis tools using exploitable buffer overf...
Sort
View
MSR
2005
ACM
13 years 11 months ago
Recovering system specific rules from software repositories
One of the most successful applications of static analysis based bug finding tools is to search the source code for violations of system-specific rules. These rules may describe h...
Chadd C. Williams, Jeffrey K. Hollingsworth
SIGSOFT
2003
ACM
14 years 6 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
SAC
2004
ACM
13 years 11 months ago
WebUml: reverse engineering of web applications
Web applications have become complex and crucial for many firms, especially when combined with areas such as CRM (Customer Relationship Management) and BPR (Business Process Reen...
Carlo Bellettini, Alessandro Marchetto, Andrea Tre...
INFOCOM
2006
IEEE
13 years 12 months ago
Looking at Large Networks: Coding vs. Queueing
— Traditionally, network buffer resources have been used at routers to queue transient packets to prevent packet drops. In contrast, we propose a scheme for large multi-hop netwo...
Sandeep Bhadra, Sanjay Shakkottai
PASTE
2005
ACM
13 years 11 months ago
Static control-flow analysis for reverse engineering of UML sequence diagrams
UML sequence diagrams are commonly used to represent the interactions among collaborating objects. Reverse-engineered sequence diagrams are constructed from existing code, and hav...
Atanas Rountev, Olga Volgin, Miriam Reddoch