default search action
SERE 2012: Gaithersburg, Maryland, USA
- Sixth International Conference on Software Security and Reliability, SERE 2012, Gaithersburg, Maryland, USA, 20-22 June 2012. IEEE 2012, ISBN 978-0-7695-4742-8
- Atef Mohamed, Mohammad Zulkernine:
A Control Flow Representation for Component-Based Software Reliability Analysis. 1-10 - Michael Le, Yuval Tamir:
Applying Microreboot to System Software. 11-20 - W. Eric Wong, Vidroha Debroy, Yihao Li, Ruizhi Gao:
Software Fault Localization Using DStar (D*). 21-30 - Gen Lu, Saumya K. Debray:
Automatic Simplification of Obfuscated JavaScript Code: A Semantics-Based Approach. 31-40 - Denis Feth, Alexander Pretschner:
Flexible Data-Driven Security for Android. 41-50 - Firas B. Alomari, Daniel A. Menascé:
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases. 51-60 - Jianchun Jiang, Liping Ding, Ennan Zhai, Ting Yu:
VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA. 61-70 - Yu-Lun Huang, Borting Chen, Ming-Wei Shih, Chien-Yu Lai:
Security Impacts of Virtualization on a Network Testbed. 71-77 - Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Chung-Wei Lai, Han-Lin Lu, Wai-Meng Leong:
CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations. 78-87 - Chih-Song Kuo, Chin-Yu Huang, Shao-Pu Luan:
A Study of Using Two-Parameter Generalized Pareto Model to Analyze the Fault Distribution of Open Source Software. 88-97 - Amatul Mohosina, Mohammad Zulkernine:
DESERVE: A Framework for Detecting Program Security Vulnerability Exploitations. 98-107 - Ben H. Smith, Laurie A. Williams:
On the Effective Use of Security Test Patterns. 108-117 - Jinho Choi, Eunkyoung Jee, Doo-Hwan Bae:
Toward Systematic Construction of Timing Diagrams from UML/MARTE Behavioral Models for Time-Triggered Embedded Software. 118-127 - Sari Haj Hussein:
A Precise Information Flow Measure from Imprecise Probabilities. 128-137 - Yabin Wang, Zhenyu Chen, Yang Feng, Bin Luo, Yijie Yang:
Using Weighted Attributes to Improve Cluster Test Selection. 138-146 - Rahul Murmuria, Jeffrey Medsger, Angelos Stavrou, Jeffrey M. Voas:
Mobile Application and Device Power Usage Measurements. 147-156 - Gizelle Sandrini Lemos, Eliane Martins:
Specification-guided Golden Run for Analysis of Robustness Testing Results. 157-166 - Luiz A. Laranjeira, Genaína Nunes Rodrigues:
Extending the Reliability of Wireless Sensor Networks through Informed Periodic Redeployment. 167-176 - Sanjay Rawat, Laurent Mounier:
Finding Buffer Overflow Inducing Loops in Binary Executables. 177-186 - Yun-Min Cheng, Bing-Han Li, Shiuhpyng Winston Shieh:
Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint. 187-196 - Mickaël Delahaye, Lionel C. Briand, Arnaud Gotlieb, Matthieu Petit:
µTIL: Mutation-based Statistical Test Inputs Generation for Automatic Fault Localization. 197-206 - Jinhee Park, Hyeon-Jeong Kim, Ju-Hwan Shin, Jongmoon Baik:
An Embedded Software Reliability Model with Consideration of Hardware Related Software Failures. 207-214 - Xiao Xiao, Tadashi Dohi:
Robust Wavelet Shrinkage Estimation without Data Transform for Software Reliability Assessment. 215-224 - Hsiao-Ying Lin, John Kubiatowicz, Wen-Guey Tzeng:
A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems. 225-234 - Qussai Yaseen, Brajendra Panda:
Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks. 235-244 - Chien-Cheng Lin, Chin-Chun Chang, Deron Liang, Ching-Han Yang:
A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users. 245-252 - Matthias Büchler, Johan Oudinet, Alexander Pretschner:
Semi-Automatic Security Testing of Web Applications from a Secure Model. 253-262 - Dianxiang Xu, Weifeng Xu, Bharath K. Bavikati, W. Eric Wong:
Mining Executable Specifications of Web Applications from Selenium IDE Tests. 263-272 - Faisal M. Sibai, Daniel A. Menascé:
Countering Network-Centric Insider Threats through Self-Protective Autonomic Rule Generation. 273-282 - Hehua Zhang, Yu Jiang, Xun Jiao, Xiaoyu Song, William N. N. Hung, Ming Gu:
Reliability Analysis of PLC Systems by Bayesian Network. 283-290 - Ferdous A. Barbhuiya, Vaibhav Gupta, Santosh Biswas, Sukumar Nandi:
Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack. 291-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.