Genprog: A generic method for automatic software repair

C Le Goues, TV Nguyen, S Forrest… - Ieee transactions on …, 2011 - ieeexplore.ieee.org
This paper describes GenProg, an automated method for repairing defects in off-the-shelf,
legacy programs without formal specifications, program annotations, or special coding …

Safestack: Automatically patching stack-based buffer overflow vulnerabilities

G Chen, H Jin, D Zou, BB Zhou, Z Liang… - … on Dependable and …, 2013 - ieeexplore.ieee.org
Buffer overflow attacks still pose a significant threat to the security and availability of today's
computer systems. Although there are a number of solutions proposed to provide adequate …

Katana: A hot patching framework for elf executables

A Ramaswamy, S Bratus, SW Smith… - … Reliability and Security, 2010 - ieeexplore.ieee.org
Despite advances in software modularity, security, and reliability, offline patching remains
the predominant form of updating or protecting commodity software. Unfortunately, the …

TxBox: Building secure, efficient sandboxes with system transactions

S Jana, DE Porter, V Shmatikov - 2011 IEEE Symposium on …, 2011 - ieeexplore.ieee.org
TxBox is a new system for sand boxing untrusted applications. It speculatively executes the
application in a system transaction, allowing security checks to be parallelized and yielding …

Characterizing self-healing software systems

AD Keromytis - 2007 - academiccommons.columbia.edu
The introduction of self-healing capabilities to software systems could offer a way to alter the
current, unfavorable imbalance in the software security arms race. Consequently, self …

Enforcing authorization policies using transactional memory introspection

A Birgisson, M Dhawan, U Erlingsson… - Proceedings of the 15th …, 2008 - dl.acm.org
Correct enforcement of authorization policies is a difficult task, especially for multi-threaded
software. Even in carefully-reviewed code, unauthorized access may be possible in subtle …

[PDF][PDF] Automatic program repair using genetic programming

C Le Goues - named-content content-type= ref-degree¿ Ph. D …, 2013 - cs.cmu.edu
Software quality is an urgent problem. There are so many bugs in industrial program source
code that mature software projects are known to ship with both known and unknown bugs …

[图书][B] Metamorphic testing techniques to detect defects in applications without test oracles

C Murphy - 2010 - search.proquest.com
Applications in the fields of scientific computing, simulation, optimization, machine learning,
etc. are sometimes said to be" non-testable programs" because there is no reliable test …

Eudaemon: Involuntary and on-demand emulation against zero-day exploits

G Portokalidis, H Bos - ACM SIGOPS Operating Systems Review, 2008 - dl.acm.org
Eudaemon is a technique that aims to blur the borders between protected and unprotected
applications, and brings together honeypot technology and end-user intrusion detection and …

Flexible access control for JavaScript

G Richards, C Hammer, F Zappa Nardelli… - Proceedings of the …, 2013 - dl.acm.org
Providing security guarantees for systems built out of untrusted components requires the
ability to define and enforce access control policies over untrusted code. In Web 2.0 …