Sciweavers

2342 search results - page 380 / 469
» A Methodology for Evaluating Software Engineering Methods an...
Sort
View
ISSTA
2012
ACM
13 years 2 months ago
ViewPoints: differential string analysis for discovering client- and server-side input validation inconsistencies
Since web applications are easily accessible, and often store a large amount of sensitive user information, they are a common target for attackers. In particular, attacks that foc...
Muath Alkhalaf, Shauvik Roy Choudhary, Mattia Fazz...
ACSAC
2007
IEEE
15 years 6 months ago
Toward Realistic and Artifact-Free Insider-Threat Data
Progress in insider-threat detection is currently limited by a lack of realistic, publicly available, real-world data. For reasons of privacy and confidentiality, no one wants to...
Kevin S. Killourhy, Roy A. Maxion
ECLIPSE
2007
ACM
15 years 3 months ago
UnitPlus: assisting developer testing in Eclipse
In the software development life cycle, unit testing is an important phase that helps in early detection of bugs. A unit test case consists of two parts: a test input, which is of...
Yoonki Song, Suresh Thummalapenta, Tao Xie
EMSOFT
2004
Springer
15 years 5 months ago
A model-based approach to integrating security policies for embedded devices
Embedded devices like smart cards can now run multiple interacting applications. A particular challenge in this domain is to dynamically integrate diverse security policies. In th...
Michael McDougall, Rajeev Alur, Carl A. Gunter
KBSE
2010
IEEE
14 years 10 months ago
Test generation to expose changes in evolving programs
Software constantly undergoes changes throughout its life cycle, and thereby it evolves. As changes are introduced into a code base, we need to make sure that the effect of the ch...
Dawei Qi, Abhik Roychoudhury, Zhenkai Liang