Assessing dependability with software fault injection: A survey

R Natella, D Cotroneo, HS Madeira - ACM Computing Surveys (CSUR), 2016 - dl.acm.org
With the rise of software complexity, software-related accidents represent a significant threat
for computer-based systems. Software Fault Injection is a method to anticipate worst-case …

Achieving quality in open-source software

M Aberdour - IEEE software, 2007 - ieeexplore.ieee.org
The open source software community has published a substantial body of research on OSS
quality. Focusing on this peer-reviewed body of work lets us draw conclusions from …

Fuzzing: State of the art

H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …

[PDF][PDF] Klee: unassisted and automatic generation of high-coverage tests for complex systems programs.

C Cadar, D Dunbar, DR Engler - OSDI, 2008 - usenix.org
We present a new symbolic execution tool, KLEE, capable of automatically generating tests
that achieve high coverage on a diverse set of complex and environmentally-intensive …

[PDF][PDF] Stackguard: automatic adaptive detection and prevention of buffer-overflow attacks.

C Cowan, C Pu, D Maier, J Walpole, P Bakke… - USENIX security …, 1998 - usenix.org
This paper presents a systematic solution to the persistent problem of buffer overflow
attacks. Buffer overflow attacks gained notoriety in 1988 as part of the Morris Worm incident …

Simplifying and isolating failure-inducing input

A Zeller, R Hildebrandt - IEEE Transactions on software …, 2002 - ieeexplore.ieee.org
Given some test case, a program fails. Which circumstances of the test case are responsible
for the particular failure? The delta debugging algorithm generalizes and simplifies the …

[图书][B] Internet-of-things (IoT) systems: architectures, algorithms, methodologies

D Serpanos, M Wolf - 2017 - Springer
The Internet of Things is the evolutionary step of the Internet that creates a worldwide
infrastructure interconnecting machines and humans. As the Internet became public in the …

An empirical study of operating systems errors

A Chou, J Yang, B Chelf, S Hallem… - Proceedings of the …, 2001 - dl.acm.org
We present a study of operating system errors found by automatic, static, compiler analysis
applied to the Linux and OpenBSD kernels. Our approach differs from previous studies that …

Location privacy in mobile systems: A personalized anonymization model

B Gedik, L Liu - … on Distributed Computing Systems (ICDCS'05), 2005 - ieeexplore.ieee.org
This paper describes a personalized k-anonymity model for protecting location privacy
against various privacy threats through location information sharing. Our model has two …

[PDF][PDF] A first step towards automated detection of buffer overrun vulnerabilities.

DA Wagner, JS Foster, EA Brewer, A Aiken - NDSS, 2000 - cs.umd.edu
We describe a new technique for finding potential buffer overrun vulnerabilities in security-
critical C code. The key to success is to use static analysis: we formulate detection of buffer …