Sciweavers

1489 search results - page 23 / 298
» The First Bug Report
Sort
View
CCS
2010
ACM
14 years 9 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
ICSE
2007
IEEE-ACM
15 years 9 months ago
Bug Hunt: Making Early Software Testing Lessons Engaging and Affordable
Software testing efforts account for a large part of the software development costs. We still struggle, however, to properly prepare students to perform software testing activitie...
Sebastian G. Elbaum, Suzette Person, Jonathan Doku...
84
Voted
SIGSOFT
2010
ACM
14 years 7 months ago
Finding latent performance bugs in systems implementations
Robust distributed systems commonly employ high-level recovery mechanisms enabling the system to recover from a wide variety of problematic environmental conditions such as node f...
Charles Edwin Killian, Karthik Nagaraj, Salman Per...
CONEXT
2009
ACM
14 years 10 months ago
Virtually eliminating router bugs
Software bugs in routers lead to network outages, security vulnerabilities, and other unexpected behavior. Rather than simply crashing the router, bugs can violate protocol semant...
Eric Keller, Minlan Yu, Matthew Caesar, Jennifer R...
SIGMOD
2011
ACM
249views Database» more  SIGMOD 2011»
14 years 9 days ago
FlexMin: a flexible tool for automatic bug isolation in DBMS software
Debugging a database engine is an arduous task due to the complexity of the query workloads and systems. The first step in isolating a bug involves identifying a sequence of step...
Kristi Morton, Nicolas Bruno