Sciweavers

443 search results - page 19 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
AGILEDC
2005
IEEE
15 years 5 months ago
Student Experiences with Executable Acceptance Testing
This report describes experiences of introducing executable acceptance testing in senior software engineering courses. Students in an agile environment completed a five-iteration ...
Kris Read, Grigori Melnik, Frank Maurer
NDSS
2008
IEEE
15 years 6 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
SAC
2009
ACM
15 years 6 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 6 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
SIGSOFT
2010
ACM
14 years 6 months ago
Evolution of a bluetooth test application product line: a case study
In this paper, we study the decision making process involved in the five year lifecycle of a Bluetooth software product produced by a large, multi-national test and measurement fi...
Narayan Ramasubbu, Rajesh Krishna Balan