Many software attacks are based on injecting malicious code into a target host. This paper demonstrates the use of a wellknown technique, data tainting, to track data received fro...
Alex Ho, Michael A. Fetterman, Christopher Clark, ...
Previous studies have shown that software code attributes, such as lines of source code, and history information, such as the number of code changes and the number of faults in pr...
Yonghee Shin, Robert M. Bell, Thomas J. Ostrand, E...
Robustness is an important feature required for embedded systems. This paper presents a methodology to test robustness of such systems. We investigate system behaviour aspects. We...
Software configuration problems are a major source of failures in computer systems. In this paper, we present a new framework for categorizing configuration problems. We apply thi...
Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong We...
Predicting the incidence of faults in code has been commonly associated with measuring complexity. In this paper, we propose complexity metrics that are based on the code change p...