Sciweavers

3527 search results - page 116 / 706
» Test Automation in Practice
Sort
View
CCS
2008
ACM
15 years 15 hour ago
A practical mimicry attack against powerful system-call monitors
System-call monitoring has become the basis for many hostbased intrusion detection as well as policy enforcement techniques. Mimicry attacks attempt to evade system-call monitorin...
Chetan Parampalli, R. Sekar, Rob Johnson
ICCAD
2003
IEEE
159views Hardware» more  ICCAD 2003»
15 years 3 months ago
Mixed Signal DFT: A Concise Overview
Practical mixed-signal DFT solutions are presented with an emphasis on performance, cost, and test coverage. Special consideration is given to the possible DFT techniques for Phas...
Bozena Kaminska, Karim Arabi
ICIP
2003
IEEE
15 years 11 months ago
LLRT based detection of LSB hiding
In this paper we consider a hypothesis testing approach for detection of hiding in the least significant bit (LSB). This steganalysis problem is a composite hypothesis testing pro...
Kenneth Sullivan, Onkar Dabeer, Upamanyu Madhow, B...
APSEC
2006
IEEE
15 years 4 months ago
Interaction Testing in Model-Based Development: Effect on Model-Coverage
Model-based software development is gaining interest in domains such as avionics, space, and automotives. The model serves as the central artifact for the development efforts (suc...
Renée C. Bryce, Ajitha Rajan, Mats Per Erik...
SPIN
2010
Springer
14 years 8 months ago
Experimental Comparison of Concolic and Random Testing for Java Card Applets
Concolic testing is a method for test input generation where a given program is executed both concretely and symbolically at the same time. This paper introduces the LIME Concolic ...
Kari Kähkönen, Roland Kindermann, Keijo ...