Sciweavers

246 search results - page 4 / 50
» Sampling-based program execution monitoring
Sort
View
NDSS
2008
IEEE
15 years 3 months ago
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution
Protocol reverse engineering has often been a manual process that is considered time-consuming, tedious and error-prone. To address this limitation, a number of solutions have rec...
Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zh...
89
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 1 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
78
Voted
SOFTVIS
2003
ACM
15 years 2 months ago
Visualization of Program-Execution Data for Deployed Software
Software products are often released with missing functionality, errors, or incompatibilities that may result in failures in the field, inferior performances, or, more generally,...
Alessandro Orso, James A. Jones, Mary Jean Harrold
SEW
2003
IEEE
15 years 2 months ago
Applying Run-Time Monitoring to the Deep-Impact Fault Protection Engine
Run-time monitoring is a lightweight verification method whereby the correctness of a programs’ execution is verified at run-time using executable specifications. This paper des...
Doron Drusinsky, Garth Watney
APSEC
1996
IEEE
15 years 1 months ago
A Prototype of a Concurrent Behavior Monitoring Tool for Testing of Concurrent Programs
Testing of concurrent programs is much more difficult than that of sequential programs. A concurrent program behaves nondeterministically, that is, the program may produce differe...
Eisuke Itoh, Zengo Furukawa, Kazuo Ushijima