Sciweavers

1629 search results - page 78 / 326
» Infeasible Code Detection
Sort
View
ECOOP
2010
Springer
15 years 2 months ago
Detecting Missing Method Calls in Object-Oriented Software
When using object-oriented frameworks it is easy to overlook certain important method calls that are required at particular places in code. In this paper, we provide a comprehensiv...
Martin Monperrus, Marcel Bruch, Mira Mezini
CASES
2009
ACM
15 years 2 months ago
Automatic detection of fault attack and countermeasures
Security of smart cards is continuously threatened by many software and hardware attacks. Those attacks focus on giving secret information that are stored in the card like PIN cod...
Ahmadou A. Sere, Julien Iguchi-Cartigny, Jean-Loui...
NDSS
2000
IEEE
15 years 2 months ago
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities
We describe a new technique for finding potential buffer overrun vulnerabilities in security-critical C code. The key to success is to use static analysis: we formulate detection...
David Wagner, Jeffrey S. Foster, Eric A. Brewer, A...
PLDI
2000
ACM
15 years 2 months ago
Type-based race detection for Java
This paper presents a static race detection analysis for multithreaded Java programs. Our analysis is based on a formal type system that is capable of capturing many common synchr...
Cormac Flanagan, Stephen N. Freund
CODES
2001
IEEE
15 years 1 months ago
Empirical comparison of software-based error detection and correction techniques for embedded systems
"Function Tokens" and "NOP Fills" are two methods proposed by various authors to deal with Instruction Pointer corruption in microcontrollers, especially in th...
Royan H. L. Ong, Michael J. Pont