Embedded systems security—an overview

S Parameswaran, T Wolf - Design Automation for Embedded Systems, 2008 - Springer
Security is an important aspect of embedded system design. The characteristics of
embedded systems give rise to a number of novel vulnerabilities. A variety of different …

[PDF][PDF] 一种软件故障诊断过程框架

单锦辉[1, 徐克俊, 王戟 - 2011 - researchgate.net
摘要软件在国民经济和社会生活中发挥着重要作用. 软件出现故障给人们的工作, 生活带来不便,
甚至造成严重危害. 但是当前所进行的多为软件故障诊断中单项活动的研究 …

Automated program repair using genetic programming and model checking

Z Zojaji, BT Ladani, A Khalilian - Applied Intelligence, 2016 - Springer
Automated program repair is still a highly challenging problem mainly due to the reliance of
the current techniques on test cases to validate candidate patches. This leads to the …

[PDF][PDF] Towards assisted remediation of security vulnerabilities

G Serme, AS De Oliveira, M Guarnieri… - The Sixth International …, 2012 - eurecom.eu
Security vulnerabilities are still prevalent in systems despite the existence of their
countermeasures for several decades. In order to detect the security vulnerabilities missed …

APRSuite: A suite of components and use cases based on categorical decomposition of automatic program repair techniques and tools

A Khalilian, A Baraani-Dastjerdi, B Zamani - Journal of Computer …, 2020 - Elsevier
During the last decade, we are witnessing the advent of a proliferation of techniques and
associated tools for automatic program repair (APR). The current techniques and tools …

[PDF][PDF] Scaffolding industry knowledge on errors in construction estimates

OA Olatunji - A paper presented at the 2011proceedings of the …, 2011 - researchgate.net
The construction industry has had considerable criticisms on inefficiencies in the quality and
outcomes of professional services in project delivery. These criticisms have spanned design …

Analysis of module-based software reliability growth model incorporating imperfect debugging and fault reduction factor

M Jain, A Jain, R Gupta - Quality, IT and Business Operations: Modeling …, 2018 - Springer
This investigation deals with the module-based software reliability growth model that
incorporates both imperfect debugging and fault reduction factor. The increasing number of …

On the evaluation of automatic program repair techniques and tools

A Khalilian, A Baraani-Dastjerdi… - 2016 24th Iranian …, 2016 - ieeexplore.ieee.org
Since 2009 several scalable and promising techniques to automatic program repair have
been proposed with each technique often accompanied with a prototype tool. These …

Hardware-enforced fine-grained isolation of untrusted code

E Leontie, G Bloom, B Narahari, R Simha… - Proceedings of the first …, 2009 - dl.acm.org
We present a novel combination of hardware (architecture) and software (compiler)
techniques to support the safe execution of untrusted code. While other efforts focus on …

[PDF][PDF] A compiler-hardware technique for protecting against buffer overflow attacks

E Leontie, G Bloom, O Gelbart, B Narahari… - Journal of Information …, 2010 - seas.gwu.edu
Buffer overflow attacks are widely acknowledged by computer security professionals to be
one of the greatest threats to the security of computer systems. We present an integrated …