Sciweavers

4079 search results - page 656 / 816
» Differential Testing for Software
Sort
View
COMPSAC
2007
IEEE
15 years 7 months ago
Conformance Checking of Access Control Policies Specified in XACML
Access control is one of the most fundamental and widely used security mechanisms. Access control mechanisms control which principals such as users or processes have access to whi...
Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie
ECLIPSE
2007
ACM
15 years 7 months ago
Declarative and visual debugging in Eclipse
We present a declarative and visual debugging environment for Eclipse called JIVE.1 Traditional debugging is procedural in that a programmer must proceed step-by-step and objectby...
Jeffrey K. Czyz, Bharat Jayaraman
FPGA
2007
ACM
124views FPGA» more  FPGA 2007»
15 years 7 months ago
Efficient hardware checkpointing: concepts, overhead analysis, and implementation
Progress in reconfigurable hardware technology allows the implementation of complete SoCs in today's FPGAs. In the context design for reliability, software checkpointing is a...
Dirk Koch, Christian Haubelt, Jürgen Teich
ASWEC
2004
IEEE
15 years 7 months ago
ASPIRE: Automated Systematic Protocol Implementation Robustness Evaluation
Network protocol implementations are susceptible to problems caused by their lack of ability to handle invalid inputs. We present ASPIRE: Automated Systematic Protocol Implementat...
Arunchandar Vasan, Atif M. Memon
ECOOPW
2006
Springer
15 years 7 months ago
Program Analysis for Security and Privacy
Abstract. Software security has become more important than ever. Unfortunately, still now, the security of a software system is almost always retrofitted to an afterthought. When s...
Marco Pistoia, Francesco Logozzo