CS Store Search
Displaying 1-4 out of 4 total
Contemporary Peer Review in Action: Lessons from Open Source Development
By Peter Rigby,Brendan Cleary,Frederic Painchaud,Margaret-Anne Storey,Daniel German
Issue Date:November 2012
Do you use software peer reviews? Are you happy with your current code review practices? Even though formal inspection is recognized as one of the most effective ways to improve software quality, many software organizations struggle to effectively implemen...
ATLANTIS - Assembly Trace Analysis Environment
2012 19th Working Conference on Reverse Engineering (WCRE)
By Brendan Cleary,Margaret-Anne Storey,Laura Chan,Martin Salois,Frederic Painchaud
Issue Date:October 2012
For malware authors, software is an ever fruitful source of vulnerabilities to exploit. Exploitability assessment through fuzzing aims to proactively identify potential vulnerabilities by monitoring the execution of a program while attempting to induce a c...
On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier
Enabling Technologies, IEEE International Workshops on
By Frédéric Painchaud, Mourad Debbabi
Issue Date:March 2000
A member of our research team has already produced a well-organized, clear, technical and complete specification of the Java Bytecode Verifier. We are now using this specification to implement a stand-alone version of the Verifier that totally complies wit...
Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis
2013 20th Working Conference on Reverse Engineering (WCRE)
By Brendan Cleary,Patrick Gorman,Eric Verbeek,Margaret-Anne Storey,Martin Salois,Frederic Painchaud
Issue Date:October 2013
Exploitability analysis is the process of attempting to determine if a vulnerability in a program is exploitable. Fuzzing is a popular method of finding such vulnerabilities, in which a program is subjected to millions of generated program inputs until it ...
Original Search Engine
Need a Web Account?
Become a Member
This site and all contents (unless otherwise noted) are Copyright ©2008, IEEE, Inc. All rights reserved.