Sciweavers

17 search results - page 3 / 4
» Efficient mutation testing by checking invariant violations
Sort
View
ISSRE
2000
IEEE
13 years 10 months ago
Building Trust into OO Components Using a Genetic Analogy
Despite the growing interest for component-based systems, few works tackle the question of the trust we can bring into a component. This paper presents a method and a tool for bui...
Benoit Baudry, Vu Le Hanh, Jean-Marc Jéz&ea...
ISCAS
2008
IEEE
141views Hardware» more  ISCAS 2008»
14 years 19 days ago
AMBA AHB bus potocol checker with efficient debugging mechanism
—Bus-based system-on-chip (SoC) design becomes the major integration methods for shorting design cycle and time-tomarket, thus how to verify IP functionality on bus protocol is a...
Yi-Ting Lin, Chien-Chou Wang, Ing-Jer Huang
OOPSLA
2005
Springer
13 years 11 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 7 days ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
ECOOP
2010
Springer
13 years 9 months ago
Contract-Based Data Structure Repair Using Alloy
Contracts and specifications have long been used in object-oriented design, programming and testing to enhance reliability before software deployment. However, the use of specifica...
Razieh Nokhbeh Zaeem, Sarfraz Khurshid