Search For:

Displaying 1-4 out of 4 total
Contemporary Peer Review in Action: Lessons from Open Source Development
Found in: IEEE Software
By Peter Rigby,Brendan Cleary,Frederic Painchaud,Margaret-Anne Storey,Daniel German
Issue Date:November 2012
pp. 56-61
Do you use software peer reviews? Are you happy with your current code review practices? Even though formal inspection is recognized as one of the most effective ways to improve software quality, many software organizations struggle to effectively implemen...
ATLANTIS - Assembly Trace Analysis Environment
Found in: 2012 19th Working Conference on Reverse Engineering (WCRE)
By Brendan Cleary,Margaret-Anne Storey,Laura Chan,Martin Salois,Frederic Painchaud
Issue Date:October 2012
pp. 505-506
For malware authors, software is an ever fruitful source of vulnerabilities to exploit. Exploitability assessment through fuzzing aims to proactively identify potential vulnerabilities by monitoring the execution of a program while attempting to induce a c...
On the Implementation of a Stand-Alone Java(tm) Bytecode Verifier
Found in: Enabling Technologies, IEEE International Workshops on
By Frédéric Painchaud, Mourad Debbabi
Issue Date:March 2000
pp. 189
A member of our research team has already produced a well-organized, clear, technical and complete specification of the Java Bytecode Verifier. We are now using this specification to implement a stand-alone version of the Verifier that totally complies wit...
Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis
Found in: 2013 20th Working Conference on Reverse Engineering (WCRE)
By Brendan Cleary,Patrick Gorman,Eric Verbeek,Margaret-Anne Storey,Martin Salois,Frederic Painchaud
Issue Date:October 2013
pp. 42-51
Exploitability analysis is the process of attempting to determine if a vulnerability in a program is exploitable. Fuzzing is a popular method of finding such vulnerabilities, in which a program is subjected to millions of generated program inputs until it ...