Sciweavers

2213 search results - page 380 / 443
» Software Security
Sort
View
EUROSYS
2010
ACM
16 years 7 days ago
Reverse Engineering of Binary Device Drivers with RevNIC
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driverâ€...
Vitaly Chipounov, George Candea
SOSP
2007
ACM
16 years 1 days ago
Triage: diagnosing production run failures at the user's site
Diagnosing production run failures is a challenging yet important task. Most previous work focuses on offsite diagnosis, i.e. development site diagnosis with the programmers prese...
Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanth...
SASO
2007
IEEE
15 years 9 months ago
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT
Information systems form the backbones of the critical infrastructures of modern societies. Unfortunately, these systems are highly vulnerable to attacks that can result in enormo...
Howard E. Shrobe, Robert Laddaga, Robert Balzer, N...
OOPSLA
2007
Springer
15 years 9 months ago
Notation and representation in collaborative object-oriented design: an observational study
Software designers in the object-oriented paradigm can make use of modeling tools and standard notations such as UML. Nevertheless, casual observations from collocated design coll...
Uri Dekel, James D. Herbsleb
OOPSLA
2007
Springer
15 years 9 months ago
Understanding the value of program analysis tools
It is difï¬cult to determine the cost effectiveness of program analysis tools because we cannot evaluate them in the same environment where we will be using the tool. Tool evalua...
Ciera Jaspan, I-Chin Chen, Anoop Sharma