Prevalence of coincidental correctness and mitigation of its impact on fault localization

W Masri, RA Assi - ACM transactions on software engineering and …, 2014 - dl.acm.org
Researchers have argued that for failure to be observed the following three conditions must
be met: CR= the defect was reached; CI= the program has transitioned into an infectious …

Fault localization based on information flow coverage

W Masri - Software Testing, Verification and Reliability, 2010 - Wiley Online Library
Failures triggered by hard to debug defects usually involve complex interactions between
many program elements. This paper hypothesizes that information flows present a good …

Automated fault localization: advances and challenges

W Masri - Advances in Computers, 2015 - Elsevier
Following a program failure, the main concern of the developer is to identify what caused it
in order to repair the code that induced it. The first activity is termed fault localization …

SQLPIL: SQL injection prevention by input labeling

W Masri, S Sleiman - Security and Communication Networks, 2015 - Wiley Online Library
SQL injection attacks (SQLIAs) aim at exploiting vulnerabilities in web applications in order
to execute malicious SQL commands. It is established that prepared statements are resilient …

Precisely detecting runtime change interactions for evolving software

R Santelices, MJ Harrold, A Orso - 2010 Third International …, 2010 - ieeexplore.ieee.org
Developers often make multiple changes to software. These changes are introduced to work
cooperatively or to accomplish separate goals. However, changes might not interact as …

Identifying failure-correlated dependence chains

R Abou Assi, W Masri - 2011 IEEE Fourth International …, 2011 - ieeexplore.ieee.org
Coverage-based fault localization techniques aim at locating faulty code by first identifying
the executing program elements that correlate the most with failure. It often happens that the …

[PDF][PDF] Securing enterprise networks using traffic tainting

A Ramachandran, Y Mundada, MB Tariq… - Proc …, 2009 - conferences.sigcomm.org
Enterprise networks are vulnerable to attacks ranging from data leaks to the spread of
malware to insider threats. Previous defenses have largely focused on securing hosts; …

Coverage-based software testing: Beyond basic test requirements

W Masri, FA Zaraket - Advances in computers, 2016 - Elsevier
Code coverage is one of the core quality metrics adopted by software testing practitioners
nowadays. Researchers have devised several coverage criteria that testers use to assess …

Generating profile-based signatures for online intrusion and failure detection

W Masri, R Abou Assi, M El-Ghali - Information and Software Technology, 2014 - Elsevier
Context Program execution profiles have been extensively and successfully used in several
dynamic analysis fields such as software testing and fault localization. Objective This paper …

Does principal component analysis improve cluster-based analysis?

J Farjo, R Abou Assi, W Masri… - 2013 IEEE sixth …, 2013 - ieeexplore.ieee.org
Researchers in the dynamic program analysis field have extensively used cluster analysis to
address various problems. Typically, the clustering techniques are applied onto execution …