First international competition on runtime verification: rules, benchmarks, tools, and final results of CRV 2014

E Bartocci, Y Falcone, B Bonakdarpour… - International journal on …, 2019 - Springer
The first international Competition on Runtime Verification (CRV) was held in September
2014, in Toronto, Canada, as a satellite event of the 14th international conference on …

Memory Integrity Techniques for Memory-Unsafe Languages: A Survey

VE Moghadam, G Serra, F Aromolo, G Buttazzo… - IEEE …, 2024 - ieeexplore.ieee.org
The complexity of modern software systems, the integration of several software components,
and the increasing exposure to public networks make systems more susceptible to cyber …

IntFlow: improving the accuracy of arithmetic error detection using information flow tracking

M Pomonis, T Petsios, K Jee, M Polychronakis… - Proceedings of the 30th …, 2014 - dl.acm.org
Integer overflow and underflow, signedness conversion, and other types of arithmetic errors
in C/C++ programs are among the most common software flaws that result in exploitable …

Cloud resiliency and security via diversified replica execution and monitoring

A Benameur, NS Evans… - 2013 6th International …, 2013 - ieeexplore.ieee.org
The Information Technology industry heavily relies on the cloud computing paradigm for
large-scale infrastructures, and more military and critical infrastructure systems are moving …

Test suites as a source of training data for static analysis alert classifiers

L Flynn, W Snavely, Z Kurtz - 2021 IEEE/ACM International …, 2021 - ieeexplore.ieee.org
Flaw-finding static analysis tools typically generate large volumes of code flaw alerts
including many false positives. To save on human effort to triage these alerts, a significant …

Weird Machines in Package Managers: A Case Study of Input Language Complexity and Emergent Execution in Software Systems

S Ali, ME Locasto, S Smith - 2024 IEEE Security and Privacy …, 2024 - ieeexplore.ieee.org
Unexpected interactions of linguistic elements of software often produce unexpected
composable computational artifacts called weird machines. Using the RPM package …

{Large-Scale} Evaluation of a Vulnerability Analysis Framework

NS Evans, A Benameur, M Elder - 7th Workshop on Cyber Security …, 2014 - usenix.org
Ensuring that exploitable vulnerabilities do not exist in a piece of software written using type-
unsafe languages (eg, C/C++) is still a challenging, largely unsolved problem. Current …

[图书][B] On Efficiency and Accuracy of Data Flow Tracking Systems

K Jee - 2016 - search.proquest.com
Abstract Data Flow Tracking (DFT) is a technique broadly used in a variety of security
applications such as attack detection, privacy leak detection, and policy enforcement …

Efficient Reliability Verification Testing in Open Source Software using Priority Prediction

P Pape - 2015 - search.proquest.com
Open source software is becoming a strong alternative to private development for a wide
market of applications. There is a stigma against using open source software in the private …

[引用][C] Compiler-assisted Adaptive Software Testing

T Petsios - 2018 - Columbia University