Sciweavers

443 search results - page 24 / 89
» Testing for Software Vulnerability Using Environment Perturb...
Sort
View
131
Voted
ISSRE
2010
IEEE
15 years 1 months ago
Automating System Tests Using Declarative Virtual Machines
—Automated regression test suites are an essential software engineering practice: they provide developers with rapid feedback on the impact of changes to a system’s source code...
Sander van der Burg, Eelco Dolstra
107
Voted
DRM
2004
Springer
15 years 8 months ago
Attacks and risk analysis for hardware supported software copy protection systems
Recently, there is a growing interest in the research community to use tamper-resistant processors for software copy protection. Many of these tamper-resistant systems rely on a s...
Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Tao ...
118
Voted
ACSAC
2005
IEEE
15 years 8 months ago
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX
Code injection vulnerabilities continue to prevail. Attacks of this kind such as stack buffer overflows and heap buffer overflows account for roughly half of the vulnerabilities...
Stig Andersson, Andrew Clark, George M. Mohay, Bra...
114
Voted
ISESE
2006
IEEE
15 years 8 months ago
An empirical evaluation of a testing and debugging methodology for Excel
Spreadsheets are one of the most commonly used types of programs in the world, and it is important that they be sufficiently dependable. To help end users who create spreadsheets ...
Jeffrey Carver, Marc Fisher II, Gregg Rothermel
96
Voted
XPU
2004
Springer
15 years 8 months ago
Suitability of FIT User Acceptance Tests for Specifying Functional Requirements: Developer Perspective
Abstract. The paper outlines an experiment conducted in two different academic environments, in which FIT tests were used as a functional requirements specification. Common challen...
Grigori Melnik, Kris Read, Frank Maurer