Sciweavers

1376 search results - page 127 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
SOCO
2008
Springer
14 years 10 months ago
Component-Based Access Control: Secure Software Composition through Static Analysis
Abstract. Extensible Component Platforms support the discovery, installation, starting, uninstallation of components at runtime. Since they are often targeted at mobile resource-co...
Pierre Parrend, Stéphane Frénot
TSE
2008
113views more  TSE 2008»
14 years 10 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
IUI
2004
ACM
15 years 3 months ago
A plan-based mission control center for autonomous vehicles
Teams of autonomous vehicles (AVs) carry out missions in a number of fields such as space exploration and searchand-rescue. However, human supervision is still required to monito...
Gary Look, Howard E. Shrobe
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 4 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
SOSP
2007
ACM
15 years 6 months ago
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes
We propose SecVisor, a tiny hypervisor that ensures code integrity for commodity OS kernels. In particular, SecVisor ensures that only approved code can execute in kernel mode ove...
Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig