Sciweavers

1210 search results - page 47 / 242
» Formal Techniques for Java Programs
Sort
View
PPPJ
2003
ACM
15 years 7 months ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling
ICECCS
2000
IEEE
133views Hardware» more  ICECCS 2000»
15 years 6 months ago
An Analysis Tool for Coupling-Based Integration Testing
This research is part of a project to develop practical, effective, formalizable, automatable techniques for integration testing. Integration testing is an important part of the t...
A. Jefferson Offutt, Aynur Abdurazik, Roger T. Ale...
137
Voted
ICECCS
1996
IEEE
209views Hardware» more  ICECCS 1996»
15 years 6 months ago
Coupling-based Integration Testing
This research is part of a project to develop practical, effective, formalizable, automatable techniques for integration testing. Integration testing is an important part of the t...
Zhenyi Jin, A. Jefferson Offutt
POPL
2006
ACM
16 years 2 months ago
The essence of command injection attacks in web applications
Web applications typically interact with a back-end database to retrieve persistent data and then present the data to the user as dynamically generated output, such as HTML web pa...
Zhendong Su, Gary Wassermann
ICDCS
2007
IEEE
15 years 8 months ago
Exploiting Symbolic Techniques in Automated Synthesis of Distributed Programs with Large State Space
Automated formal analysis methods such as program verification and synthesis algorithms often suffer from time complexity of their decision procedures and also high space complex...
Borzoo Bonakdarpour, Sandeep S. Kulkarni