Sciweavers

4377 search results - page 663 / 876
» Application Driven Software Development
Sort
View
119
Voted
MICRO
2008
IEEE
124views Hardware» more  MICRO 2008»
15 years 8 months ago
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits
Rootkits have become a growing concern in cyber-security. Typically, they exploit kernel vulnerabilities to gain root privileges of a system and conceal malware’s activities fro...
Vikas R. Vasisht, Hsien-Hsin S. Lee
CCS
2007
ACM
15 years 8 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
ISESE
2006
IEEE
15 years 7 months ago
A goal question metric based approach for efficient measurement framework definition
In software engineering, measurements can be used to monitor, understand and improve software processes as well as products and resource utilization. Commonly, measurement framewo...
Patrik Berander, Per Jönsson
IFL
2005
Springer
207views Formal Methods» more  IFL 2005»
15 years 7 months ago
A Dependently Typed Framework for Static Analysis of Program Execution Costs
Abstract. This paper considers the use of dependent types to capture information about dynamic resource usage in a static type system. Dependent types allow us to give (explicit) p...
Edwin Brady, Kevin Hammond
132
Voted
FASE
2006
Springer
15 years 5 months ago
Trace-Based Memory Aliasing Across Program Versions
One of the major costs of software development is associated with testing and validation of successive versions of software systems. An important problem encountered in testing and...
Murali Krishna Ramanathan, Suresh Jagannathan, Ana...