The existing solutions in the field of computer forensics are largely ad hoc. This paper discusses the need for a rigorous model of forensics and outlines qualities that such a m...
Sean Peisert, Matt Bishop, Sidney Karin, Keith Mar...
Program understanding relates a computer program to the goals and requirements it is designed to accomplish. Understanding techniques that rely only on source code analysis are li...
Richard Clayton, Spencer Rugaber, Lyman Taylor, Li...
Interviews with stakeholders can be a useful method for identifying user needs and establishing requirements. However, interviews are also problematic. They are time consuming and...
The selection process is a crucial activity of the development of COTS-based systems. A key step of the evaluation of COTS components carried out during selection is the matching b...
Carina Alves, Xavier Franch, Juan Pablo Carvallo, ...
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...