WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns (Englisch)
- Neue Suche nach: Grottke, Michael
- Neue Suche nach: Avritzer, Alberto
- Neue Suche nach: Menasche, Daniel S.
- Neue Suche nach: Alonso, Javier
- Neue Suche nach: Aguiar, Leandro
- Neue Suche nach: Alvarez, Sara G.
- Neue Suche nach: Grottke, Michael
- Neue Suche nach: Avritzer, Alberto
- Neue Suche nach: Menasche, Daniel S.
- Neue Suche nach: Alonso, Javier
- Neue Suche nach: Aguiar, Leandro
- Neue Suche nach: Alvarez, Sara G.
In:
2015 IEEE 26th International Symposium on Software Reliability Engineering (ISSRE)
;
330-335
;
2015
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaigns
-
Beteiligte:Grottke, Michael ( Autor:in ) / Avritzer, Alberto ( Autor:in ) / Menasche, Daniel S. ( Autor:in ) / Alonso, Javier ( Autor:in ) / Aguiar, Leandro ( Autor:in ) / Alvarez, Sara G. ( Autor:in )
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.11.2015
-
Format / Umfang:159354 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Anomaly detection in computer systems using compressed measurementsHuang, Tingshan / Kandasamy, Nagarajan / Sethu, Harish et al. | 2015
- 12
-
AtomChase: Directed search towards atomicity violationsEslamimehr, Mahdi / Lesani, Mohsen et al. | 2015
- 24
-
Experience report: Anomaly detection of cloud application operations using log and cloud metric correlation analysisFarshchi, Mostafa / Schneider, Jean-Guy / Weber, Ingo / Grundy, John et al. | 2015
- 35
-
PAID: Prioritizing app issues for developers by tracking user reviews over versionsGao, Cuiyun / Wang, Baoxiang / He, Pinjia / Zhu, Jieming / Zhou, Yangfan / Lyu, Michael R. et al. | 2015
- 46
-
Mutation-based test-case prioritization in software evolutionLou, Yiling / Hao, Dan / Zhang, Lu et al. | 2015
- 58
-
A similarity-based approach for test case prioritization using historical failure dataNoor, Tanzeem Bin / Hemmati, Hadi et al. | 2015
- 69
-
Exciting FPGA cryptographic Trojans using combinatorial testingKitsos, Paris / Simos, Dimitris E. / Torres-Jimenez, Jose / Voyiatzis, Artemios G. et al. | 2015
- 77
-
Model generation to support model-based testing applied on the NASA DAT Web-application — An experience reportSchulze, Christoph / Lindvall, Mikael / Bjorgvinsson, Sigurthor / Wiegand, Robert et al. | 2015
- 88
-
Discovering model transformation pre-conditions using automatically generated test modelsMottu, Jean-Marie / Simula, Sagar Sen / Cadavid, Juan / Baudry, Benoit et al. | 2015
- 100
-
WAP: Unreasonable distributions of execution time under reasonable conditionsFlater, David et al. | 2015
- 106
-
WAP: What activates a bug? A refinement of the Laprie terminology modelTroger, Peter / Feinbube, Lena / Werner, Matthias et al. | 2015
- 112
-
Using normalized compression distance to measure the evolutionary stability of software systemsThrem, David / Yu, Liguo / Ramaswamy, S. / Sudarsan, S D et al. | 2015
- 121
-
Towards comprehensive software reliability evaluation in open source softwareOkamura, Hiroyuki / Dohi, Tadashi et al. | 2015
- 130
-
Conservative claims about the probability of perfection of software-based systemsZhao, Xingyu / Littlewood, Bev / Povyakalo, Andrey / Wright, David et al. | 2015
- 141
-
Experience report: An application-specific checkpointing technique for minimizing checkpoint corruptionLi, Guanpeng / Pattabiraman, Karthik / Cher, Chen-Yong / Bose, Pradip et al. | 2015
- 153
-
Experience report: Memory accesses for avionic applications and operating systems on a multi-core platformLofwenmark, Andreas / Nadjm-Tehrani, Simin et al. | 2015
- 161
-
A safe generic adaptation mechanism for smart carsRuiz, Alejandra / Juez, Garazi / Schleiss, Philipp / Weiss, Gereon et al. | 2015
- 172
-
Automated resource release in device driversBai, Jia-Ju / Wang, Yu-Ping / Liu, Hu-Qiu / Hu, Shi-Min et al. | 2015
- 183
-
Contrasting exception handling code across languages: An experience report involving 50 open source projectsJakobus, Benjamin / Barbosa, Eiji Adachi / Garcia, Alessandro / de Lucena, Carlos Jose Pereira et al. | 2015
- 194
-
Experience report: How do techniques, programs, and tests impact automated program repair?Kong, Xianglong / Zhang, Lingming / Wong, W. Eric / Li, Bixin et al. | 2015
- 205
-
Studying the influence of standard compiler optimizations on symbolic executionDong, Shiyu / Olivo, Oswaldo / Zhang, Lingming / Khurshid, Sarfraz et al. | 2015
- 216
-
How hard does mutation analysis have to be, anyway?Gopinath, Rahul / Alipour, Amin / Ahmed, Iftekhar / Jensen, Carlos / Groce, Alex et al. | 2015
- 228
-
Efficient observability-based test generation by dynamic symbolic executionYou, Dongjiang / Rayadurgam, Sanjai / Whalen, Michael / Heimdahl, Mats P. E. / Gay, Gregory et al. | 2015
- 239
-
Boundary value analysis in automatic white-box test generationZhang, Zhiqiang / Wu, Tianyong / Zhang, Jian et al. | 2015
- 250
-
Experience report: How do structural dependencies influence change propagation? An empirical studyOliva, Gustavo Ansaldi / Gerosa, Marco Aurelio et al. | 2015
- 261
-
Experience report: Evaluating the effectiveness of decision trees for detecting code smellsAmorim, Lucas / Costa, Evandro / Antunes, Nuno / Fonseca, Baldoino / Ribeiro, Marcio et al. | 2015
- 270
-
Efficient elimination of false positives using static analysisMuske, Tukaram / Khedker, Uday P. et al. | 2015
- 281
-
Event-based formalization of safety-critical operating system standards: An experience report on ARINC 653 using Event-BZhao, Yongwang / Yang, Zhibin / Sanan, David / Liu, Yang et al. | 2015
- 293
-
Experience report: Formal verification and testing in the development of embedded softwareUlrich, Andreas / Votintseva, Anjelika et al. | 2015
- 303
-
Specifying and verifying real-time self-adaptive systemsCamilli, Matteo / Gargantini, Angelo / Scandurra, Patrizia et al. | 2015
- 314
-
Experience report: A field analysis of user-defined security configurations of Android devicesVecchiato, Daniel / Martins, Eliane et al. | 2015
- 324
-
WAP: Digital dependability identitiesSchneider, Daniel / Trapp, Mario / Papadopoulos, Yiannis / Armengaud, Eric / Zeller, Marc / Hofig, Kai et al. | 2015
- 330
-
WAP: Models and metrics for the assessment of critical-infrastructure-targeted malware campaignsGrottke, Michael / Avritzer, Alberto / Menasche, Daniel S. / Alonso, Javier / Aguiar, Leandro / Alvarez, Sara G. et al. | 2015
- 336
-
Enhancing privacy protection in fault replication systemsMatos, Joao / Garcia, Joao / Romano, Paolo et al. | 2015
- 348
-
SpyAware: Investigating the privacy leakage signatures in app execution tracesXu, Hui / Zhou, Yangfan / Gao, Cuiyun / Kang, Yu / Lyu, Michael R. et al. | 2015
- 359
-
Experience report: Can software testing education lead to more reliable code?Lemos, Otavio Augusto Lazzarini / Ferrari, Fabiano Cutigi / Silveira, Fabio Fagundes / Garcia, Alessandro et al. | 2015
- 370
-
Experience report: An industrial experience report on test outsourcing practicesXia, Xin / Lo, David / Kochhar, Pavneet Singh / Xing, Zhenchang / Wang, Xinyu / Li, Shanping et al. | 2015
- 381
-
Software reliability growth model based on Bohrbugs and MandelbugsShooman, Martin L. et al. | 2015
- 387
-
WAP: Cognitive aspects in unit testing: The hunting game and the hunter's perspectivePrado, Marllos P. / Verbeek, Eric / Storey, Margaret-Anne / Vincenzi, Auri M. R. et al. | 2015
- 393
-
UPMOA: An improved search algorithm to support user-preference multi-objective optimizationWang, Shuai / Ali, Shaukat / Yue, Tao / Liaaen, Marius et al. | 2015
- 405
-
Experience report: Mining test results for reasons other than functional correctnessAnderson, Jeff / Do, Hyunsook / Salem, Saeed et al. | 2015
- 416
-
Classifying faulty modules with an extension of the H-indexMorasca, Sandro et al. | 2015
- 427
-
Should fixing these failures be delegated to automated program repair?Le, Xuan-Bach D. / Le, Tien-Duy B. / Lo, David et al. | 2015
- 438
-
Piecing together app behavior from multiple artifacts: A case studyKowalczyk, Emily / Memon, Atif M. / Cohen, Myra B. et al. | 2015
- 450
-
Detecting inconsistencies in multi-platform mobile appsJoorabchi, Mona Erfani / Ali, Mohamed / Mesbah, Ali et al. | 2015
- 461
-
SIG-Droid: Automated system input generation for Android applicationsMirzaei, Nariman / Bagheri, Hamid / Mahmood, Riyadh / Malek, Sam et al. | 2015
- 472
-
MoIO: Run-time monitoring for I/O protocol violations in storage device driversCotroneo, Domenico / De Simone, Luigi / Fucci, Francesco / Natella, Roberto et al. | 2015
- 484
-
Detecting latent cross-platform API violationsRasley, Jeff / Gessiou, Eleni / Ohmann, Tony / Brun, Yuriy / Krishnamurthi, Shriram / Cappos, Justin et al. | 2015
- 496
-
Discovering specification violations in networked software systemsWalls, Robert J. / Bruii, Yuriy / Liberatore, Marc / Levine, Brian Neil et al. | 2015
- 507
-
Experience report: How do bug characteristics differ across severity classes: A multi-platform studyZhou, Bo / Neamtiu, Iulian / Gupta, Rajiv et al. | 2015
- 518
-
Experience report: A characteristic study on out of memory errors in distributed data-parallel applicationsXu, Lijie / Dou, Wensheng / Zhu, Feng / Gao, Chushu / Liu, Jie / Zhong, Hua / Wei, Jun et al. | 2015
- 530
-
Fast reproducing web application errorsWang, Jie / Dou, Wensheng / Gao, Chushu / Wei, Jun et al. | 2015
- 541
-
An evidential reasoning approach for assessing confidence in safety evidenceNair, Sunil / Walkinshaw, Neil / Kelly, Tim / de la Vara, Jose Luis et al. | 2015
- 553
-
Security slicing for auditing XML, XPath, and SQL injection vulnerabilitiesThome, Julian / Shar, Lwin Khin / Briand, Lionel et al. | 2015
- 565
-
Pushing the limits on automation in GUI regression testingGao, Zebao / Fang, Chunroiig / Memon, Atif M. et al. | 2015