Sciweavers

452 search results - page 30 / 91
» Symbolic Execution of Behavioral Requirements
Sort
View
ICSE
2009
IEEE-ACM
15 years 5 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
ITICSE
2005
ACM
15 years 4 months ago
Iconic programming for flowcharts, java, turing, etc
One of the largest barriers to learning programming is the precise and complex syntax required to write programs. This barrier is a key impediment to the integration of programmin...
Stephen Chen, Stephen Morris
CAV
2006
Springer
86views Hardware» more  CAV 2006»
15 years 2 months ago
The Power of Hybrid Acceleration
This paper addresses the problem of computing symbolically the set of reachable configurations of a linear hybrid automaton. A solution proposed in earlier work consists in explori...
Bernard Boigelot, Frédéric Herbretea...
78
Voted
SPIN
2005
Springer
15 years 4 months ago
Model Checking Machine Code with the GNU Debugger
Embedded software verification is an important verification problem that requires the ability to reason about the timed semantics of concurrent behaviors at a low level of atomic...
Eric Mercer, Michael Jones
ASPDAC
2004
ACM
107views Hardware» more  ASPDAC 2004»
15 years 4 months ago
Fast, predictable and low energy memory references through architecture-aware compilation
The design of future high-performance embedded systems is hampered by two problems: First, the required hardware needs more energy than is available from batteries. Second, curren...
Peter Marwedel, Lars Wehmeyer, Manish Verma, Stefa...