First international competition on runtime verification: rules, benchmarks, tools, and final results of CRV 2014
The first international Competition on Runtime Verification (CRV) was held in September
2014, in Toronto, Canada, as a satellite event of the 14th international conference on …
2014, in Toronto, Canada, as a satellite event of the 14th international conference on …
Memory Integrity Techniques for Memory-Unsafe Languages: A Survey
The complexity of modern software systems, the integration of several software components,
and the increasing exposure to public networks make systems more susceptible to cyber …
and the increasing exposure to public networks make systems more susceptible to cyber …
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking
Integer overflow and underflow, signedness conversion, and other types of arithmetic errors
in C/C++ programs are among the most common software flaws that result in exploitable …
in C/C++ programs are among the most common software flaws that result in exploitable …
Cloud resiliency and security via diversified replica execution and monitoring
A Benameur, NS Evans… - 2013 6th International …, 2013 - ieeexplore.ieee.org
The Information Technology industry heavily relies on the cloud computing paradigm for
large-scale infrastructures, and more military and critical infrastructure systems are moving …
large-scale infrastructures, and more military and critical infrastructure systems are moving …
Test suites as a source of training data for static analysis alert classifiers
L Flynn, W Snavely, Z Kurtz - 2021 IEEE/ACM International …, 2021 - ieeexplore.ieee.org
Flaw-finding static analysis tools typically generate large volumes of code flaw alerts
including many false positives. To save on human effort to triage these alerts, a significant …
including many false positives. To save on human effort to triage these alerts, a significant …
Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems
Unexpected interactions of linguistic elements of software often produce unexpected
composable computational artifacts called weird machines. Using the RPM package …
composable computational artifacts called weird machines. Using the RPM package …
{Large-Scale} Evaluation of a Vulnerability Analysis Framework
Ensuring that exploitable vulnerabilities do not exist in a piece of software written using type-
unsafe languages (eg, C/C++) is still a challenging, largely unsolved problem. Current …
unsafe languages (eg, C/C++) is still a challenging, largely unsolved problem. Current …
[图书][B] On Efficiency and Accuracy of Data Flow Tracking Systems
K Jee - 2016 - search.proquest.com
Abstract Data Flow Tracking (DFT) is a technique broadly used in a variety of security
applications such as attack detection, privacy leak detection, and policy enforcement …
applications such as attack detection, privacy leak detection, and policy enforcement …
Efficient Reliability Verification Testing in Open Source Software using Priority Prediction
P Pape - 2015 - search.proquest.com
Open source software is becoming a strong alternative to private development for a wide
market of applications. There is a stigma against using open source software in the private …
market of applications. There is a stigma against using open source software in the private …