Sciweavers

1490 search results - page 198 / 298
» Monitoring Mobile Code
Sort
View
189
Voted
DIMVA
2011
14 years 6 months ago
Operating System Interface Obfuscation and the Revealing of Hidden Operations
Many software security solutions—including malware analyzers, information flow tracking systems, auditing utilities, and host-based intrusion detectors—rely on knowledge of s...
Abhinav Srivastava, Andrea Lanzi, Jonathon T. Giff...
117
Voted
ASPLOS
2004
ACM
15 years 8 months ago
Low-overhead memory leak detection using adaptive statistical profiling
Sampling has been successfully used to identify performance optimization opportunities. We would like to apply similar techniques to check program correctness. Unfortunately, samp...
Matthias Hauswirth, Trishul M. Chilimbi
ICSE
2010
IEEE-ACM
15 years 7 months ago
An exploratory study of the evolution of software licensing
Free and open source software (FOSS) is distributed and made available to users under different software licenses, mentioned in FOSS code by means of licensing statements. Variou...
Massimiliano Di Penta, Daniel M. Germán, Ya...
143
Voted
ICPP
1995
IEEE
15 years 6 months ago
Progress: A Toolkit for Interactive Program Steering
Interactive program steering permits researchers to monitor and guide their applications during runtime. Interactive steering can help make end users more effective in addressing ...
Jeffrey S. Vetter, Karsten Schwan
137
Voted
ENTCS
2007
113views more  ENTCS 2007»
15 years 2 months ago
Modular Checkpointing for Atomicity
Transient faults that arise in large-scale software systems can often be repaired by re-executing the code in which they occur. Ascribing a meaningful semantics for safe re-execut...
Lukasz Ziarek, Philip Schatz, Suresh Jagannathan