-
1
-
-
32444436486
-
-
Beetlesoft RatScan. http://www.beetlesoft.com.
-
-
-
-
3
-
-
32444447822
-
A static measure of a subset of intra-procedural data flow testing coverage based on node coverage
-
October
-
G. Antoniol and E. Merlo. A static measure of a subset of intra-procedural data flow testing coverage based on node coverage. In GASCON, October 1999.
-
(1999)
GASCON
-
-
Antoniol, G.1
Merlo, E.2
-
4
-
-
11244279740
-
Analysis and visualization of predicate dependence on formal parameters and global variables
-
Nov
-
D. Binkley and M. Harman. Analysis and visualization of predicate dependence on formal parameters and global variables. IEEE Transactions on Software Engineering, 30(11):715-735, Nov 2004.
-
(2004)
IEEE Transactions on Software Engineering
, vol.30
, Issue.11
, pp. 715-735
-
-
Binkley, D.1
Harman, M.2
-
5
-
-
77956610962
-
Characterizing the 'security vulnerability likelihood' of software functions
-
Amsterdam, The Netherlands, Oct
-
D. DaCosta, G.Dahn, S. Mancoridis, and V. Prevelakis, Characterizing the 'security vulnerability likelihood' of software functions. In Proceedings of IEEE International Conference on Software Maintenance, pages 266-276, Amsterdam, The Netherlands, Oct 2003.
-
(2003)
Proceedings of IEEE International Conference on Software Maintenance
, pp. 266-276
-
-
DaCosta, D.1
Dahn, G.2
Mancoridis, S.3
Prevelakis, V.4
-
6
-
-
32444447470
-
An evolutionary testing approach to detect buffer overflow
-
St. Malo, France, Nov
-
C. Del Grosso, G. Antoniol, and M. Di Penta. An evolutionary testing approach to detect buffer overflow. In Student Paper Proceedings of the International Symposium of Software Reliability Engineering (ISSRE), St. Malo, France, Nov 2004.
-
(2004)
Student Paper Proceedings of the International Symposium of Software Reliability Engineering (ISSRE)
-
-
Del Grosso, C.1
Antoniol, G.2
Di Penta, M.3
-
7
-
-
32444447470
-
An evolutionary testing approach to detect buffer overflows
-
St Malo, Bretagne, France, November, 2-5
-
C. Del Grosso, M. Di Penta, and G. Antoniol. An evolutionary testing approach to detect buffer overflows. In International Symposium on Software Reliability Engineering (student paper), pages 77-78, St Malo, Bretagne, France, November, 2-5 2004.
-
(2004)
International Symposium on Software Reliability Engineering (Student Paper)
, pp. 77-78
-
-
Del Grosso, C.1
Di Penta, M.2
Antoniol, G.3
-
13
-
-
3142725712
-
Search-based software test data generation: A survey
-
June
-
P. McMinn. Search-based software test data generation: a survey. Software Testing, Verification and Reliability, 14:105-156, June 2004.
-
(2004)
Software Testing, Verification and Reliability
, vol.14
, pp. 105-156
-
-
McMinn, P.1
-
15
-
-
0025557712
-
Empirical study of the reliability of unix utilities
-
Dec.
-
B. Miller, L. Fredricksen, and B. So. Empirical study of the reliability of unix utilities. Communications of the Association for Computing Machinery, 33(12) :32-44, Dec 1990.
-
(1990)
Communications of the Association for Computing Machinery
, vol.33
, Issue.12
, pp. 32-44
-
-
Miller, B.1
Fredricksen, L.2
So, B.3
-
18
-
-
0033880192
-
Automated test data generation for exception conditions
-
N. Tracey, J. Clark, K. Mander, and J. McDermid. Automated test data generation for exception conditions. Software - Practice and Experience, 30(1), 2000.
-
(2000)
Software - Practice and Experience
, vol.30
, Issue.1
-
-
Tracey, N.1
Clark, J.2
Mander, K.3
McDermid, J.4
-
19
-
-
84949505015
-
ITS4: A static vulnerability scanner for c and c++ code
-
Dec.
-
J. Viega, J. Bloch, T. Kohno, and G. McGraw. ITS4: A static vulnerability scanner for c and c++ code. In Proceedings of the 16th Annual Computer Security Applications Conference, pages 3-17, Dec 2000.
-
(2000)
Proceedings of the 16th Annual Computer Security Applications Conference
, pp. 3-17
-
-
Viega, J.1
Bloch, J.2
Kohno, T.3
McGraw, G.4
-
21
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
San Diego, CA, USA, Feb
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '00), pages 3-17, San Diego, CA, USA, Feb 2000.
-
(2000)
Proceedings of the Symposium on Network and Distributed Systems Security (NDSS '00)
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
|