103 papers:
DATE-2015-MirkhaniMCA #design #estimation #fault #performance- Efficient soft error vulnerability estimation of complex designs (SM, SM, CYC, JA), pp. 103–108.
ICSME-2015-PlatePS #assessment #library #open source- Impact assessment for vulnerabilities in open-source software libraries (HP, SEP, AS), pp. 411–420.
MSR-2015-CamiloMN #case study #debugging- Do Bugs Foreshadow Vulnerabilities? A Study of the Chromium Project (FC, AM, MN), pp. 269–279.
SANER-2015-CadariuBVD #security- Tracking known security vulnerabilities in proprietary software systems (MC, EB, JV, AvD), pp. 516–519.
CSCW-2015-KoganPA #twitter- Think Local, Retweet Global: Retweeting by the Geographically-Vulnerable during Hurricane Sandy (MK, LP, KMA), pp. 981–993.
SEKE-2015-WangSZ #detection #execution #symbolic computation- Statically-Guided Fork-based Symbolic Execution for Vulnerability Detection (YW, HS, QZ), pp. 536–539.
SIGIR-2015-HaraSKF #recommendation- Reducing Hubness: A Cause of Vulnerability in Recommender Systems (KH, IS, KK, KF), pp. 815–818.
SAC-2015-RrushiFNHCP #protocol #specification- By-design vulnerabilities in the ANSI C12.22 protocol specification (JLR, HF, RN, CH, KC, AP), pp. 2231–2236.
ESEC-FSE-2015-ParameshwaranBS15a #framework #named #robust #testing- DexterJS: robust testing platform for DOM-based XSS vulnerabilities (IP, EB, SS, HD, AS, PS), pp. 946–949.
ESEC-FSE-2015-SmithJMCL #developer #security #static analysis- Questions developers ask while diagnosing potential security vulnerabilities with static analysis (JS, BJ, ERMH, BC, HRL), pp. 248–259.
ICSE-v2-2015-SadeghiBM #analysis #android #security #using- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ISSTA-2015-HayTP #android #communication #detection- Dynamic detection of inter-application communication vulnerabilities in Android (RH, OT, MP), pp. 118–128.
DATE-2014-HelfmeierBNTS #physics- Physical vulnerabilities of Physically Unclonable Functions (CH, CB, DN, ST, JPS), pp. 1–4.
FASE-2014-SadeghiEM #analysis #mining #repository #security- Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
CHI-2014-WarnestalSN- Co-constructing child personas for health-promoting services with vulnerable children (PW, PS, JN), pp. 3767–3776.
DUXU-TMT-2014-CorreiaSCBS #design #risk management #safety- Design as a Tool for Managing Risks and Vulnerabilities Regarding Artifacts of Public Safety (WC, SXdS, FC, MLNB, MMS), pp. 437–444.
ICEIS-v2-2014-DingTZ #automation #c #c++ #source code- Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs (SD, HBKT, HZ), pp. 49–59.
ICEIS-v2-2014-SimpsonC #enterprise- Vulnerability and Remediation for a High-assurance Web-based Enterprise (WRS, CC), pp. 119–128.
SAC-2014-ChenZW #detection #named #testing- Crashmaker: an improved binary concolic testing tool for vulnerability detection (BC, QZ, WW), pp. 1257–1263.
SAC-2014-KarumanchiS #case study #scalability #web #web service- In the wild: a large scale study of web services vulnerabilities (SK, ACS), pp. 1239–1246.
SAC-2014-ShahriarH #assessment #fuzzy #injection #risk management #using- Risk assessment of code injection vulnerabilities using fuzzy logic-based system (HS, HH), pp. 1164–1170.
FSE-2014-BosuCHHJ #empirical #identification- Identifying the characteristics of vulnerable code changes: an empirical study (AB, JCC, MH, PH, DJ), pp. 257–268.
ASPLOS-2014-BanabicCG #distributed- Finding trojan message vulnerabilities in distributed systems (RB, GC, RG), pp. 113–126.
ICST-2014-AydinAB #automation #generative #testing- Automated Test Generation from Vulnerability Signatures (AA, MA, TB), pp. 193–202.
ISSTA-2014-AppeltNBA #approach #automation #injection #sql #testing- Automated testing for SQL injection vulnerabilities: an input mutation approach (DA, CDN, LCB, NA), pp. 259–269.
DAC-2013-AgostaBMP #analysis- Compiler-based side channel vulnerability analysis and optimized countermeasures application (GA, AB, MM, GP), p. 6.
DATE-2013-CarreteroHMRV- Capturing vulnerability variations for register files (JC, EH, MM, TR, XV), pp. 1468–1473.
DATE-2013-ImagawaTOS #analysis #architecture #configuration management #effectiveness- A cost-effective selective TMR for heterogeneous coarse-grained reconfigurable architectures based on DFG-level vulnerability analysis (TI, HT, HO, TS), pp. 701–706.
IFM-2013-SavaryFL #bytecode #detection #modelling #testing #using #verification- Detecting Vulnerabilities in Java-Card Bytecode Verifiers Using Model-Based Testing (AS, MF, JLL), pp. 223–237.
CHI-2013-ThiemeWJMLWOM #design #women- Design to promote mindfulness practice and sense of self for vulnerable women in secure hospital services (AT, JW, PJ, JCM, SEL, PCW, PO, TDM), pp. 2647–2656.
SAC-2013-PayetDKV #analysis #execution #scalability- EARs in the wild: large-scale analysis of execution after redirect vulnerabilities (PP, AD, CK, GV), pp. 1792–1799.
ICSE-2013-MeneelyL #re-engineering- Vulnerability of the day: concrete demonstrations for software engineering undergraduates (AM, SL), pp. 1154–1157.
ICSE-2013-SharTB #hybrid #injection #mining #program analysis #sql #using- Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis (LKS, HBKT, LCB), pp. 642–651.
ICSE-2013-ZhengZ #detection #execution #static analysis #web- Path sensitive static analysis of web applications for remote code execution vulnerability detection (YZ, XZ), pp. 652–661.
CAV-2013-SosnovichGN #network #protocol #security #using- Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
ICST-2013-BlomeOLPD #flexibility #modelling #named #testing- VERA: A Flexible Model-Based Vulnerability Testing Tool (AB, MO, KL, MP, MTD), pp. 471–478.
ICST-2013-Vernotte #modelling #research #testing #web- Research Questions for Model-Based Vulnerability Testing of Web Applications (AV), pp. 505–506.
ASE-2012-AlmorsyGI #analysis #automation #using- Supporting automated vulnerability analysis using formalized vulnerability signatures (MA, JG, ASI), pp. 100–109.
ASE-2012-SharT #predict #validation #web- Predicting common web application vulnerabilities from input validation and sanitization code patterns (LKS, HBKT), pp. 310–313.
DATE-2012-RahimiBG #analysis- Analysis of instruction-level vulnerability to dynamic voltage and temperature variations (AR, LB, RKG), pp. 1102–1105.
DATE-2012-TabkhiS #approach #power management- Application-specific power-efficient approach for reducing register file vulnerability (HT, GS), pp. 574–577.
WCRE-2012-GauthierM #data access #detection #performance #php- Fast Detection of Access Control Vulnerabilities in PHP Applications (FG, EM), pp. 247–256.
CHI-2012-ShiraziMKS #authentication #gesture- Assessing the vulnerability of magnetic gestural authentication to video-based shoulder surfing attacks (ASS, PM, HK, AS), pp. 2045–2048.
ICSE-2012-MollerS #automation #detection- Automated detection of client-state manipulation vulnerabilities (AM, MS), pp. 749–759.
ICSE-2012-ShahzadSL #analysis #lifecycle #scalability- A large scale exploratory analysis of software vulnerability life cycles (MS, MZS, AXL), pp. 771–781.
ICSE-2012-SharT #injection #mining #predict #sql- Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities (LKS, HBKT), pp. 1293–1296.
OSDI-2012-KimCZ #performance #web- Efficient Patch-based Auditing for Web Application Vulnerabilities (TK, RC, NZ), pp. 193–206.
ICST-2012-DucheneGRR #detection #fuzzing #model inference #using- XSS Vulnerability Detection Using Model Inference Assisted Evolutionary Fuzzing (FD, RG, SR, JLR), pp. 815–817.
ISSTA-2012-CaballeroGMN #detection #named #pointer- Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities (JC, GG, MM, AN), pp. 133–143.
SCAM-2011-AvanciniC #approach #search-based #security #testing #web- Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
WCRE-2011-CodobanMM #design #fault #named #problem- iProblems — An Integrated Instrument for Reporting Design Flaws, Vulnerabilities and Defects (MC, CM, RM), pp. 437–438.
SIGAda-2011-PhDJPD- Software vulnerabilities precluded by spark (JLT, FDJ, PEB, CED), pp. 39–46.
ICEIS-v4-2011-WuW #enterprise #multi- A Multi-layer Tree Model for Enterprise Vulnerability Management (BW, AJAW), pp. 389–394.
KDD-2011-GundechaBL #network #privacy #social- Exploiting vulnerability to secure user privacy on a social networking site (PG, GB, HL), pp. 511–519.
SAC-2011-Mammar #approach #bibliography #c #detection- An overview of a proof-based approach to detecting C vulnerabilities (AM), pp. 1343–1344.
ICSE-2011-WuSG #case study #empirical- Empirical results on the study of software vulnerabilities (YW, HPS, RG), pp. 964–967.
ICSE-2011-YuAB #synthesis- Patching vulnerabilities with sanitization synthesis (FY, MA, TB), pp. 251–260.
CAV-2011-GaneshKAGHE #analysis #detection #named #string #testing- HAMPI: A String Solver for Testing, Analysis and Vulnerability Detection (VG, AK, SA, PJG, PH, MDE), pp. 1–19.
ICST-2011-BekrarBGM #fuzzing- Finding Software Vulnerabilities by Smart Fuzzing (SB, CB, RG, LM), pp. 427–430.
ICST-2011-SmithW #detection #heuristic #sql #using #web- Using SQL Hotspots in a Prioritization Heuristic for Detecting All Types of Web Application Vulnerabilities (BHS, LW), pp. 220–229.
ICTSS-2011-MammarCJMO #c #detection #source code #testing #using- Using Testing Techniques for Vulnerability Detection in C Programs (AM, ARC, WJ, WM, EMdO), pp. 80–96.
ISSTA-2011-GuarnieriPTDTB #javascript #web- Saving the world wide web from vulnerable JavaScript (SG, MP, OT, JD, ST, RB), pp. 177–187.
ASE-2010-PhamNNN #detection- Detection of recurring software vulnerabilities (NHP, TTN, HAN, TNN), pp. 447–456.
DATE-2010-PanHL #fault #named- IVF: Characterizing the vulnerability of microprocessor structures to intermittent faults (SP, YH, XL), pp. 238–243.
KDD-2010-BozorgiSSV #heuristic #learning #predict- Beyond heuristics: learning to classify vulnerabilities and predict exploits (MB, LKS, SS, GMV), pp. 105–114.
SEKE-2010-FuL #constraints #detection #string #theorem proving #web- A String Constraint Solver for Detecting Web Application Vulnerability (XF, CCL), pp. 535–542.
SEKE-2010-HuangLZ #towards- Towards a Structured Model for Software Vulnerabilities (MH, YL, QZ), pp. 543–547.
SAC-2010-ChowdhuryZ #complexity #metric #question- Can complexity, coupling, and cohesion metrics be used as early indicators of vulnerabilities? (IC, MZ), pp. 1963–1969.
ICSE-2010-PhamNNWNN #detection- Detecting recurring and similar software vulnerabilities (NHP, TTN, HAN, XW, ATN, TNN), pp. 227–230.
LCTES-2010-ShrivastavaLJ #embedded #equation #fault- Cache vulnerability equations for protecting data in embedded processor caches from soft errors (AS, JL, RJ), pp. 143–152.
ICST-2010-ZimmermannNW #predict #security- Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista (TZ, NN, LAW), pp. 421–428.
ASE-2009-YuAB #analysis #generative #source code #string #using- Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses (FY, MA, TB), pp. 605–609.
RE-2009-LongLYJ #approach #evaluation #requirements #security- AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
SAC-2009-BreauxLOA #identification #requirements #using- Identifying vulnerabilities and critical requirements using criminal court proceedings (TDB, JDL, PNO, AIA), pp. 355–359.
HPCA-2009-DuanLP #architecture #estimation #metric #performance #predict- Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics (LD, BL, LP), pp. 129–140.
HPCA-2009-FuLF #fault #process- Soft error vulnerability aware process variation mitigation (XF, TL, JABF), pp. 93–104.
HPCA-2009-SridharanK #architecture #dependence- Eliminating microarchitectural dependency from Architectural Vulnerability (VS, DRK), pp. 117–128.
ICST-2009-JohM #process- Seasonal Variation in the Vulnerability Discovery Process (HJ, YKM), pp. 191–200.
CBSE-2008-ParrendF #classification #component #java #programming- Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms (PP, SF), pp. 80–96.
DAC-2008-HuangYX #composition #on the #reliability #testing- On reliable modular testing with vulnerable test access mechanisms (LH, FY, QX), pp. 834–839.
SCAM-2008-PentaCA #detection #evolution #source code- The Evolution and Decay of Statically Detected Source Code Vulnerabilities (MDP, LC, LA), pp. 101–110.
SCAM-2008-WangZZ #automation #detection #model checking #program analysis- Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking (LW, QZ, PZ), pp. 165–173.
CHI-2008-SankarpandianLE #named #using- Talc: using desktop graffiti to fight software vulnerability (KS, TL, WKE), pp. 1055–1064.
ICEIS-ISAS2-2008-LeL #analysis #web- Realizing Web Application Vulnerability Analysis via AVDL (HTL, PKKL), pp. 259–265.
ICSE-2008-WassermannS #detection #static analysis- Static detection of cross-site scripting vulnerabilities (GW, ZS), pp. 171–180.
ICLP-2008-Tsitovich #detection #model checking #security #using- Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
PLDI-2007-WassermannS #analysis #injection #precise #web- Sound and precise analysis of web applications for injection vulnerabilities (GW, ZS), pp. 32–41.
DATE-2006-AsadiSTK #analysis- Vulnerability analysis of L2 cache elements to single event upsets (HA, VS, MBT, DRK), pp. 1276–1281.
ICSM-2006-ByersASD #graph #modelling- Modeling Software Vulnerabilities With Vulnerability Cause Graphs (DB, SA, NS, CD), pp. 411–422.
WCRE-2006-MerloLA #analysis #injection #php #sql- Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP (EM, DL, GA), pp. 147–156.
AdaEurope-2006-BreuerP #fault #kernel #linux #source code #static analysis- One Million (LOC) and Counting: Static Analysis for Errors and Vulnerabilities in the Linux Kernel Source Code (PTB, SP), pp. 56–70.
OSDI-2006-ReisDWDE #html #named- BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML (CR, JD, HJW, OD, SE), pp. 61–74.
ICDAR-2005-YamazakiNTK #case study #online #verification- A Study on Vulnerability in On-line Writer Verification System (YY, AN, KT, NK), pp. 640–644.
SAC-2005-HouD #analysis #design #detection #search-based- Immunity-based intrusion detection system design, vulnerability analysis, and GENERTIA’s genetic arms race (HH, GVD), pp. 952–956.
SOSP-2005-JoshiKDC #detection- Detecting past and present intrusions through vulnerability-specific predicates (AJ, STK, GWD, PMC), pp. 91–104.
ICEIS-v3-2004-YongzhengX #taxonomy- A New Vulnerability Taxonomy Based on Privilege Escalation (YZ, XcY), pp. 596–600.
SAC-2004-BistarelliFO #constraints #detection #modelling #problem #using- Modeling and detecting the cascade vulnerability problem using soft constraints (SB, SNF, BO), pp. 383–390.
ICSM-2003-DaCostaDMP #security- Characterizing the “Security Vulnerability Likelihood” of Software Functions (DD, CD, SM, VP), p. 266–?.
CIKM-2002-TosunF #similarity- Vulnerabilities in similarity search based systems (AST, HF), pp. 110–117.
SAC-2002-ThompsonWM #security #testing- Software security vulnerability testing in hostile environments (HHT, JAW, FEM), pp. 260–264.
SCAM-2001-WeberSR #case study #constraints #detection #optimisation #security #using- A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
KDD-2000-RaghavanBS #detection #predict #process #using- Defection detection: using activity profiles to predict ISP customer vulnerability (NR, RMB, MS), pp. 506–515.
ASPLOS-1992-KubiatowiczCA #memory management #multi #transaction- Closing the Window of Vulnerability in Multiphase Memory Transactions (JK, DC, AA), pp. 274–284.