[PDF][PDF] Toward automated detection of logic vulnerabilities in web applications

V Felmetsger, L Cavedon, C Kruegel… - 19th USENIX Security …, 2010 - usenix.org
Web applications are the most common way to make services and data available on the
Internet. Unfortunately, with the increase in the number and complexity of these applications …

Detecting kernel-level rootkits using data structure invariants

A Baliga, V Ganapathy, L Iftode - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Rootkits affect system security by modifying kernel data structures to achieve a variety of
malicious goals. While early rootkits modified control data structures, such as the system call …

Has the bug really been fixed?

Z Gu, ET Barr, DJ Hamilton, Z Su - Proceedings of the 32nd ACM/IEEE …, 2010 - dl.acm.org
Software has bugs, and fixing those bugs pervades the software engineering process. It is
folklore that bug fixes are often buggy themselves, resulting in bad fixes, either failing to fix a …

Dynamic analysis for diagnosing integration faults

L Mariani, F Pastore, M Pezze - IEEE Transactions on Software …, 2010 - ieeexplore.ieee.org
Many software components are provided with incomplete specifications and little access to
the source code. Reusing such gray-box components can result in integration faults that can …

Detecting missing method calls in object-oriented software

M Monperrus, M Bruch, M Mezini - … , Maribor, Slovenia, June 21-25, 2010 …, 2010 - Springer
When using object-oriented frameworks it is easy to overlook certain important method calls
that are required at particular places in code. In this paper, we provide a comprehensive set …

Golden implementation driven software debugging

A Banerjee, A Roychoudhury, JA Harlie… - Proceedings of the …, 2010 - dl.acm.org
The presence of a functionally correct golden implementation has a significant advantage in
the software development life cycle. Such a golden implementation is exploited for software …

Program behavior discovery and verification: A graph grammar approach

C Zhao, J Kong, K Zhang - IEEE Transactions on software …, 2010 - ieeexplore.ieee.org
Discovering program behaviors and functionalities can ease program comprehension and
verification. Existing program analysis approaches have used text mining algorithms to infer …

Random testing for higher-order, stateful programs

C Klein, M Flatt, RB Findler - ACM Sigplan Notices, 2010 - dl.acm.org
Testing is among the most effective tools available for finding bugs. Still, we know of no
automatic technique for generating test cases that expose bugs involving a combination of …

Hidden dependencies in software systems

R Vanciu, V Rajlich - 2010 IEEE International Conference on …, 2010 - ieeexplore.ieee.org
In this paper, we study the hidden dependencies that are a special kind of data flows. They
play an important role in software maintenance and evolution because they propagate …

SEIM: static extraction of interaction models

L Mariani, M Pezzè, O Riganelli… - Proceedings of the 2nd …, 2010 - dl.acm.org
The quality of systems that integrate Web services provided by independent organizations
depends on the ways the systems interact with the services, ie, on their interaction protocols …