Sciweavers

3889 search results - page 99 / 778
» The Use of Program Dependence Graphs in Software Engineering
Sort
View
OSDI
2006
ACM
16 years 3 months ago
Securing Software by Enforcing Data-flow Integrity
Software attacks often subvert the intended data-flow in a vulnerable program. For example, attackers exploit buffer overflows and format string vulnerabilities to write data to u...
Manuel Costa, Miguel Castro, Timothy L. Harris
120
Voted
FASE
2001
Springer
15 years 8 months ago
Strengthening UML Collaboration Diagrams by State Transformations
Abstract. Collaboration diagrams as described in the official UML documents specify patterns of system structure and interaction. In this paper, we propose their use for specifying...
Reiko Heckel, Stefan Sauer
IWPC
2009
IEEE
15 years 10 months ago
A plethora of paths
A common static software bug detection technique is to use path simulation. Each execution path is simulated using symbolic variables to determine if any software errors could occ...
Eric Larson
ICSE
2001
IEEE-ACM
15 years 8 months ago
Workshop on Software Engineering and Mobility
Mobility is redefining the hardware and software fabric of distributed systems. Wireless communication allows network hosts to participate in a distributed computation while on t...
Gruia-Catalin Roman, Gian Pietro Picco
106
Voted
CGO
2010
IEEE
15 years 10 months ago
Dynamic interpretation for dynamic scripting languages
Dynamic scripting languages offer programmers increased flexibility by allowing properties of programs to be defined at run-time. Typically, program execution begins with an int...
Kevin Williams, Jason McCandless, David Gregg