Sciweavers

57 search results - page 11 / 12
» Lean Implementations of Software Testing Tools Using XML Rep...
Sort
View
SIGSOFT
2003
ACM
14 years 7 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ISSTA
2009
ACM
14 years 28 days ago
HAMPI: a solver for string constraints
Many automatic testing, analysis, and verification techniques for programs can be effectively reduced to a constraint-generation phase followed by a constraint-solving phase. Th...
Adam Kiezun, Vijay Ganesh, Philip J. Guo, Pieter H...
IWPC
2005
IEEE
14 years 4 hour ago
System Evolution Tracking through Execution Trace Analysis
Software evolution analysis is concerned with analysis of artifacts produced during a software systems life-cycle. Execution traces produced from instrumented code reflect a syst...
Michael Fischer, Johann Oberleitner, Harald Gall, ...
OOPSLA
2005
Springer
13 years 12 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
VL
2005
IEEE
159views Visual Languages» more  VL 2005»
13 years 12 months ago
Executable Visual Contracts
Design by Contract (DbC) is widely acknowledged to be a powerful technique for creating reliable software. DbC allows developers to specify the behavior of an operation precisely ...
Marc Lohmann, Stefan Sauer, Gregor Engels