Sciweavers

1629 search results - page 167 / 326
» Infeasible Code Detection
Sort
View
73
Voted
ACSAC
2005
IEEE
15 years 3 months ago
Dynamic Taint Propagation for Java
Improperly validated user input is the underlying root cause for a wide variety of attacks on web-based applications. Static approaches for detecting this problem help at the time...
Vivek Haldar, Deepak Chandra, Michael Franz
90
Voted
ACIVS
2005
Springer
15 years 3 months ago
Scene-Cut Processing in Motion-Compensated Temporal Filtering
Motion-compensated temporal filtering (MCTF) is a powerful technique entering scalable video coding schemes. Its performance decreases significantly however if the the video sig...
Maria Trocan, Béatrice Pesquet-Popescu
82
Voted
VSTTE
2005
Springer
15 years 3 months ago
WYSINWYX: What You See Is Not What You eXecute
What You See Is Not What You eXecute: computers do not execute source-code programs; they execute machine-code programs that are generated from source code. Not only can the WYSINW...
Gogul Balakrishnan, Thomas W. Reps, David Melski, ...
90
Voted
ERLANG
2004
ACM
15 years 3 months ago
Flow graphs for testing sequential Erlang programs
Testing of software components during development is a heavily used approach to detect programming errors and to evaluate the quality of software. Systematic approaches to softwar...
Manfred Widera
82
Voted
SIGSOFT
2010
ACM
14 years 8 months ago
Phantm: PHP analyzer for type mismatch
We present Phantm, a static analyzer that uses a flowsensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runti...
Etienne Kneuss, Philippe Suter, Viktor Kuncak