• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 6 of 6

Combining McCabe IQ with Fuzz TestingCombining McCabe IQ with Fuzz Testing

by unknown authors
"... Fuzz testing, or fuzzing, is a black-box testing technique that has recently leapt to prominence as a quick and cost effective method for uncovering security bugs. Over 70 % of security vulnerabilities Microsoft patched in 2006 were found by fuzzing 1. This approach involves randomly mutating well-f ..."
Abstract - Add to MetaCart
Fuzz testing, or fuzzing, is a black-box testing technique that has recently leapt to prominence as a quick and cost effective method for uncovering security bugs. Over 70 % of security vulnerabilities Microsoft patched in 2006 were found by fuzzing 1. This approach involves randomly mutating well

Role-Based Security

by Maverick Woo, Sang Kil, Cha Samantha, Gottlieb David Brumley - in Data Base Management Systems", in Database Security: Status and Prospects , 1988
"... Black-box mutational fuzzing is a simple yet effective tech-nique to find bugs in software. Given a set of program-seed pairs, we ask how to schedule the fuzzings of these pairs in order to maximize the number of unique bugs found at any point in time. We develop an analytic framework using a mathem ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Black-box mutational fuzzing is a simple yet effective tech-nique to find bugs in software. Given a set of program-seed pairs, we ask how to schedule the fuzzings of these pairs in order to maximize the number of unique bugs found at any point in time. We develop an analytic framework using a

unknown title

by Program-adaptive Mutational Fuzzing, Sang Kil Cha, Maverick Woo, David Brumley
"... Abstract—We present the design of an algorithm to maximize the number of bugs found for black-box mutational fuzzing given a program and a seed input. The major intuition is to leverage white-box symbolic analysis on an execution trace for a given program-seed pair to detect dependencies among the b ..."
Abstract - Add to MetaCart
Abstract—We present the design of an algorithm to maximize the number of bugs found for black-box mutational fuzzing given a program and a seed input. The major intuition is to leverage white-box symbolic analysis on an execution trace for a given program-seed pair to detect dependencies among

Applying Interface-Contract Mutation in Regression Testing of Component- Based Software

by Shan-shan Hou, Lu Zhang, Tao Xie, Hong Mei, Jia-su Sun
"... Regression testing, which plays an important role in software maintenance, usually relies on test adequacy criteria to select and prioritize test cases. However, with the wide use and reuse of black-box components, such as reusable class libraries and COTS components, it is challenging to establish ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
Regression testing, which plays an important role in software maintenance, usually relies on test adequacy criteria to select and prioritize test cases. However, with the wide use and reuse of black-box components, such as reusable class libraries and COTS components, it is challenging to establish

Coupling Memory and Computation for Locality Management

by Umut A. Acar, Guy E. Blelloch, Matthew Fluet, Stefan K. Muller, Ram Raghunathan, Umut A. Acar, Guy Blelloch, Matthew Fluet, Stefan K. Muller, Ram Raghunathan
"... We articulate the need for managing (data) locality automatically rather than leaving it to the programmer, especially in parallel programming systems. To this end, we propose techniques for coupling tightly the computation (including the thread scheduler) and the memory manager so that data and com ..."
Abstract - Add to MetaCart
as a “black box”. As an example of the approach, in this paper we consider a specific class of parallel computa-tions, nested-parallel computations. Such computations dynamically create a nesting of parallel tasks. We propose a method for organizing memory as a tree of heaps reflecting the structure

TO CODE OR NOT TO CODE

by Présentée À La, Faculté Informatique, Et Communications, Section Des, Systèmes De Communication, Du Grade, De Docteur, Ès Sciences, Prof M. Vetterli, Prof B. Rimoldi, Prof R. Gallager, Prof A. Lapidoth, Prof J. Massey, Prof E. Telatar, Prof S. Verdú, Michael Gastpar, Amos Lapidoth, Jim Ma , 2002
"... de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury: ..."
Abstract - Add to MetaCart
de nationalité suisse et originaire de Zurich (ZH) et Lucerne (LU) acceptée sur proposition du jury:
Results 1 - 6 of 6
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University