Sciweavers

69 search results - page 7 / 14
» Protected IP-core test generation
Sort
View
CCS
2010
ACM
14 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ISESE
2006
IEEE
15 years 3 months ago
An industrial case study of structural testing applied to safety-critical embedded software
Effective testing of safety-critical real-time embedded software is difficult and expensive. Many companies are hesitant about the cost of formalized criteria-based testing and a...
Jing Guan, Jeff Offutt, Paul Ammann
ISSTA
2004
ACM
15 years 2 months ago
Testing malware detectors
In today’s interconnected world, malware, such as worms and viruses, can cause havoc. A malware detector (commonly known as virus scanner) attempts to identify malware. In spite...
Mihai Christodorescu, Somesh Jha
SENSYS
2010
ACM
14 years 7 months ago
Efficient diagnostic tracing for wireless sensor networks
Wireless sensor networks (WSNs) are hard to program due to unconventional programming models used to satisfy stringent resource constraints. The common event-driven concurrent pro...
Vinaitheerthan Sundaram, Patrick Th. Eugster, Xian...
71
Voted
WETICE
2003
IEEE
15 years 2 months ago
A Network Worm Vaccine Architecture
The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present th...
Stelios Sidiroglou, Angelos D. Keromytis