Predicting vulnerable software components

S Neuhaus, T Zimmermann, C Holler… - Proceedings of the 14th …, 2007 - dl.acm.org
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines
existing vulnerability databases and version archives to map past vulnerabilities to …

Abstract interpretation based formal methods and future challenges

P Cousot - Informatics: 10 Years Back, 10 Years Ahead, 2001 - Springer
In order to contribute to the solution of the software reliability problem, tools have been
designed to analyze statically the run-time behavior of programs. Because the correctness …

BPAC: An adaptive write buffer management scheme for flash-based solid state drives

G Wu, B Eckart, X He - 2010 IEEE 26th Symposium on Mass …, 2010 - ieeexplore.ieee.org
Solid State Drives (SSD's) have shown promise to be a candidate to replace traditional hard
disk drives, but due to certain physical characteristics of NAND flash, there are some …

Data-flow frameworks for worst-case execution time analysis

J Blieberger - Real-Time Systems, 2002 - Springer
The purpose of this paper is to introduce frameworks based on data-flow equations which
estimate the worst-case execution time (WCET) of real-time programs. These frameworks …

[图书][B] Advanced symbolic analysis for compilers: new techniques and algorithms for symbolic program analysis and optimization

T Fahringer, B Scholz - 2003 - Springer
Programming tools and compilers require sophisticated techniques to statically reason
about program semantics. Existing program analysis techniques often fail to give precise …

System and method for memory leak detection

J Fu - US Patent 7,089,460, 2006 - Google Patents
The present invention is directed to detecting leaks in computer memory. Memory leaks are
detected by analyzing computer component memory usage records. The first derivative of …

STVL: Improve the precision of static defect detection with symbolic three-valued logic

Y Zhao, Y Wang, Y Gong, H Chen… - 2011 18th Asia …, 2011 - ieeexplore.ieee.org
Among various abstract domains, the interval domain is simple but also less precise. To
improve the precision of static defect detection based on the interval domain, we propose a …

A design and implementation of XML-Based mediation framework (XMF) for integration of internet information resources

K Lee, J Min, K Park, K Lee - Proceedings of the 35th Annual …, 2002 - ieeexplore.ieee.org
As the proliferation of the Internet, especially World Wide Web, numerous information
resources have been constructed. The characteristics of information resources on the …

A unified symbolic evaluation framework for parallelizing compilers

T Fahringer, B Scholz - IEEE Transactions on Parallel and …, 2000 - ieeexplore.ieee.org
The quality of many optimizations and analyses of parallelizing compilers depends
significantly on the ability to evaluate symbolic expressions and on the amount of …

Using symbolic execution to guide test generation

G Lee, J Morris, K Parker, GA Bundell… - Software Testing …, 2005 - Wiley Online Library
Although a number of weaknesses of symbolic execution, when used for software testing,
have been highlighted in the literature, the recent resurgence of strongly‐typed languages …