Sciweavers

946 search results - page 131 / 190
» Software engineering for security: a roadmap
Sort
View
FSTTCS
2003
Springer
15 years 3 months ago
Tagging Makes Secrecy Decidable with Unbounded Nonces as Well
Tagging schemes have been used in security protocols to ensure that the analysis of such protocols can work with messages of bounded length. When the set of nonces is bounded, this...
Ramaswamy Ramanujam, S. P. Suresh
PLDI
2006
ACM
15 years 3 months ago
Precise alias analysis for static detection of web application vulnerabilities
The number and the importance of web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Kruegel, Engin Kirda
OOPSLA
2007
Springer
15 years 3 months ago
Randoop: feedback-directed random testing for Java
RANDOOP FOR JAVA generates unit tests for Java code using feedback-directed random test generation. Below we describe RANDOOP’s input, output, and test generation algorithm. We ...
Carlos Pacheco, Michael D. Ernst
OOPSLA
2005
Springer
15 years 3 months ago
CanonSketch and TaskSketch: innovative modeling tools for usage-centered design
Two experimental tools to support usage-centered design using l use cases and canonical abstract prototypes are described. The models and methods of usage-centered design are outl...
Larry L. Constantine, Pedro Campos
KBSE
2005
IEEE
15 years 3 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer