Sciweavers

944 search results - page 118 / 189
» Software model checking without source code
Sort
View
MSR
2005
ACM
15 years 7 months ago
Mining version histories to verify the learning process of Legitimate Peripheral Participants
Since code revisions reflect the extent of human involvement in the software development process, revision histories reveal the interactions and interfaces between developers and...
Shih-Kun Huang, Kang-min Liu
FUIN
2006
128views more  FUIN 2006»
15 years 2 months ago
A Rewriting Framework for Rule-Based Programming Dynamic Applications
In recent years light-weighted formal methods are of growing interest in construction and analysis of complex concurrent software system. A new rule-action based term rewriting fr...
Anatoly E. Doroshenko, Ruslan Shevchenko
ICSE
2008
IEEE-ACM
16 years 2 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 6 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ASWEC
2009
IEEE
15 years 9 months ago
Change Propagation Analysis Using Domain Information
We propose a novel methodology for analysing change propagation in software using the domain-level behavioural model of a system. We hypothesize that change propagation analysis i...
Amir Aryani, Ian D. Peake, Margaret Hamilton, Hein...