Sciweavers

488 search results - page 28 / 98
» ST-Tool: A CASE Tool for Security Requirements Engineering
Sort
View
63
Voted
HICSS
2000
IEEE
99views Biometrics» more  HICSS 2000»
15 years 1 months ago
Selecting a Model Interchange Format: The SPOOL Case Study
The aim of this paper is to provide tool developers with effective strategies to minimize the risks, costs, effort and time involved in handling model interchange issues. Specific...
Guy Saint-Denis, Reinhard Schauer, Rudolf K. Kelle...
OOPSLA
2007
Springer
15 years 3 months ago
CodeGenie: : a tool for test-driven source code search
We present CodeGenie, a tool that implements a test-driven approach to search and reuse of code available on largescale code repositories. With CodeGenie, developers design test c...
Otávio Augusto Lazzarini Lemos, Sushil Kris...
INFSOF
2007
83views more  INFSOF 2007»
14 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
109
Voted
ISSTA
2010
ACM
15 years 1 months ago
Automatic detection of unsafe component loadings
Dynamic loading of software components (e.g., libraries or modules) is a widely used mechanism for improved system modularity and flexibility. Correct component resolution is cri...
Taeho Kwon, Zhendong Su
IWPC
2006
IEEE
15 years 3 months ago
Understanding Obfuscated Code
Code obfuscation makes it harder for a security analyst to understand the malicious payload of a program. In most cases an analyst needs to study the program at the machine code l...
Matias Madou, Ludo Van Put, Koen De Bosschere