Sciweavers

283 search results - page 33 / 57
» Software Inspections We Can Trust
Sort
View
68
Voted
ACSAC
2003
IEEE
15 years 2 months ago
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs
In this paper, we present a new approach for safe execution of untrusted programs by isolating their effects from the rest of the system. Isolation is achieved by intercepting fi...
Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar
ICST
2009
IEEE
14 years 7 months ago
Test Redundancy Measurement Based on Coverage Information: Evaluations and Lessons Learned
Measurement and detection of redundancy in test suites attempt to achieve test minimization which in turn can help reduce test maintenance costs, and to also ensure the integrity ...
Negar Koochakzadeh, Vahid Garousi, Frank Maurer
87
Voted
IEEEARES
2009
IEEE
15 years 4 months ago
Defeating Dynamic Data Kernel Rootkit Attacks via VMM-Based Guest-Transparent Monitoring
—Targeting the operating system kernel, the core of trust in a system, kernel rootkits are able to compromise the entire system, placing it under malicious control, while eluding...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
EUROMICRO
2006
IEEE
15 years 3 months ago
Visualization of Areas of Interest in Component-Based System Architectures
Understanding complex component-based systems often requires getting insight in how certain system properties, such as performance, trust, reliability, or structural attributes, c...
Heorhiy Byelas, Egor Bondarev, Alexandru Telea
ECSCW
2011
13 years 9 months ago
The Hugging Team: The Role of Technology in Business Networking Practices
Technological devices for social networking are produced in droves and networking through media seems to be the way of getting ahead in business. We examine what role technology pl...
Anne Thorsø Sørensen, Irina Shklovsk...