Sciweavers

530 search results - page 51 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
SIGSOFT
2003
ACM
16 years 17 days ago
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors
Memory corruption errors lead to non-deterministic, elusive crashes. This paper describes ARCHER (ARray CHeckER) a static, effective memory access checker. ARCHER uses path-sensit...
Yichen Xie, Andy Chou, Dawson R. Engler

Presentation
1575views
16 years 10 months ago
Beyond Generating Transit Performance Measures: Visualizations and Statistical Analysis using Historical Data
In recent years, the use of performance measures for transit planning and operations has gained a great deal of attention, particularly as transit agencies are required to provide ...
M. Berkow, A. El-Geneidy, R.L. Bertini, D. Crout
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
16 years 7 days ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
ESSOS
2010
Springer
15 years 6 months ago
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks
Completely handling SQL injection consists of two activities: properly protecting the system from malicious input, and preventing any resultant error messages caused by SQL injecti...
Ben H. Smith, Laurie Williams, Andrew Austin
SAFECOMP
1998
Springer
15 years 3 months ago
Safety Verification of Software Using Structured Petri Nets
A method is described for the analysis and the verification of safety in software systems. The method offers a formal notation for describing the software structure, the means for ...
Krzysztof Sacha