The electronic voting machines known as Direct Recording Electronic (DRE), that are used in many states in the US have been shown to contain security vulnerabilities [16, 9, 3]. O...
—An important application of binary-level reverse engineering is in reconstructing the internal logic of computer malware. Most malware code is distributed in encrypted (or “pa...
Current software suites suffer from problems due to poor integration of their individual tools. They require the designer to think of all possible integrating behaviours and leave...
Anind K. Dey, Gregory D. Abowd, Mike Pinkerton, An...
The paper describes results of an empirical study, where some hypotheses about the impact of reuse on defect-density and stability, and about the impact of component size on defec...
Parastoo Mohagheghi, Reidar Conradi, Ole M. Killi,...
Testers often represent systems under test in input parameter models. These contain parameters with associated values. Combinations of parameter values, with one value for each pa...