State-of-the-art program-analysis techniques are not yet able to effectively verify safety properties of heterogeneous systems, that is, systems with components implemented using …
Software verification has recently made enormous progress due to the development of novel verification methods and the speed-up of supporting technologies like SMT solving. To keep …
This study presents a methodology to evaluate and prevent security vulnerabilities issues for web applications. The analysis process is based on the use of techniques and tools that …
RTCA/DO-178B&C standards mandate Modified Condition/Decision Coverage (MC/DC) criterion for level-A category software. In critical safety system applications such as Aircraft or …
As software evolves, developers typically perform regression testing to ensure that their code changes do not break existing functionalities. During regression testing, developers …
Automated specification-based testing has a long history with several notable tools having emerged. For example, QuickCheck for Haskell focuses on testing against user-provided …
Binary code analysis is widely used in many applications, including reverse engineering, software forensics and security. It is very critical in these applications, since the analysis of …
With the advent of the Internet and Information Society, the popularity of web applications is increasing, resulting in rapid information growth and a clear impact on security aspects. In …
Modern computer systems still have various security and reliability vulnerabilities. Well- known dynamic analyses solutions can mitigate them using runtime monitors that serve as …