Sciweavers

1548 search results - page 119 / 310
» Estimating Software Vulnerabilities
Sort
View
CCS
2005
ACM
15 years 4 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
ISSTA
2010
ACM
15 years 3 months ago
Proving memory safety of floating-point computations by combining static and dynamic program analysis
Whitebox fuzzing is a novel form of security testing based on dynamic symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found many ne...
Patrice Godefroid, Johannes Kinder
ISSRE
2000
IEEE
15 years 3 months ago
Assessing the Cost-Effectiveness of Inspections by Combining Project Data and Expert Opinion
There is a general agreement among software engineering practitioners that software inspections are an important technique to achieve high software quality at a reasonable cost. H...
Lionel C. Briand, Bernd G. Freimut, Ferdinand Voll...
ISSRE
2007
IEEE
15 years 27 days ago
Predicting Subsystem Failures using Dependency Graph Complexities
In any software project, developers need to be aware of existing dependencies and how they affect their system. We investigated the architecture and dependencies of Windows Server...
Thomas Zimmermann, Nachiappan Nagappan
ICSE
2010
IEEE-ACM
15 years 4 months ago
Advanced hands-on training for distributed and outsourced software engineering
Today’s software projects are often distributed across multiple locations. This distribution poses new challenges produced by the cooperation across different countries, times z...
Martin Nordio, Roman Mitin, Bertrand Meyer