Sciweavers

197 search results - page 10 / 40
» Using Static Program Analysis to Aid Intrusion Detection
Sort
View
109
Voted
COMPSAC
2009
IEEE
15 years 9 months ago
A Static Java Birthmark Based on Control Flow Edges
—A software birthmark is an inherent characteristic of a program that can be used to identify that program. By comparing the birthmarks of two programs, it is possible to infer i...
Hyun-il Lim, Heewan Park, Seokwoo Choi, Taisook Ha...
156
Voted
ISSTA
2012
ACM
13 years 4 months ago
Static detection of brittle parameter typing
To avoid receiving incorrect arguments, a method specifies the expected type of each formal parameter. However, some parameter types are too general and have subtypes that the me...
Michael Pradel, Severin Heiniger, Thomas R. Gross
CCS
2007
ACM
15 years 6 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
117
Voted
ICSE
2008
IEEE-ACM
16 years 3 months ago
Predicting accurate and actionable static analysis warnings: an experimental approach
Static analysis tools report software defects that may or may not be detected by other verification methods. Two challenges complicating the adoption of these tools are spurious f...
Joseph R. Ruthruff, John Penix, J. David Morgentha...
TSE
2010
180views more  TSE 2010»
15 years 25 days ago
Aspect-Oriented Race Detection in Java
—In the past, researchers have developed specialized programs to aid programmers in detecting concurrent programming errors such as deadlocks, livelocks, starvation, and data rac...
Eric Bodden, Klaus Havelund