Spotting problematic code lines using nonintrusive programmers' biofeedback

R Couceiro, R Barbosa, J Duráes… - 2019 IEEE 30th …, 2019 - ieeexplore.ieee.org
Recent studies have shown that programmers' cognitive load during typical code
development activities can be assessed using wearable and low intrusive devices that …

Mitigating virtualization failures through migration to a co-located hypervisor

F Cerveira, R Barbosa, H Madeira - IEEE Access, 2021 - ieeexplore.ieee.org
Many organizations are moving their systems to the cloud, where providers consolidate
multiple clients using virtualization, which creates challenges to business-critical …

[Retracted] Data Protection Software for Civil Aviation Control Flight Information System Based on FPE Algorithm

J Lu - Security and Communication Networks, 2022 - Wiley Online Library
This study is aimed in order to study the data protection software of civil aviation
management flight information system based on FPE algorithm. The author established the …

Fault injection acceleration using failure models on a virtualized fault-tolerant system

B Graça, F Cerveira, H Madeira - 2024 19th European …, 2024 - ieeexplore.ieee.org
Fault Injection (FI) is an experimental technique used to evaluate system behavior under
faults. It provides a significant speed-up over natural fault occurrence, condensing years of …

Evaluating and improving cloud computing dependability

FMD Cerveira - 2021 - estudogeral.uc.pt
Cloud computing has become the preferred choice by the large majority of organizations to
obtain computing resources. Despite the various advantages of cloud computing, it has …

[HTML][HTML] Towards an extensive set of criteria for safety and cyber-security evaluation of cyber-physical systems

A Smrčka, B Sangchoolie, E Mingozzi… - Open Research …, 2023 - ncbi.nlm.nih.gov
Verification and validation (V&V) are complex processes combining different approaches
and incorporating many different methods including many activities. System engineers …

The most frequent programming mistakes that cause software vulnerabilities

R Barbosa, F Cerveira, L Goncalo… - arXiv preprint arXiv …, 2019 - arxiv.org
All computer programs have flaws, some of which can be exploited to gain unauthorized
access to computer systems. We conducted a field study on publicly reported vulnerabilities …

Software verification aimed at security vulnerabilities

LMA Gonçalo - 2019 - estudogeral.uc.pt
Software testing is an activity aimed at the identification and later correction of faults capable
of reducing the software quality. This activity is essential because the occurrence of mistakes …