You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 6th International Symposium on Search-Based Software Engineering, SSBSE 2014, held in Fortaleza, Brazil. The 14 revised full papers presented together with 2 keynote addresses, 1 invited talk, 1 short paper, 3 papers of the graduate track, and 4 challenge track papers were carefully reviewed and selected from 51 submissions. Search Based Software Engineering (SBSE) studies the application of meta-heuristic optimization techniques to various software engineering problems, ranging from requirements engineering to software testing and maintenance.
This book constitutes the refereed proceedings of the 15th International Conference on Tools and Algorithms for the Construction and Analysis of Systems, TACAS 2009, held in York, UK, in March 2009, as part of ETAPS 2009, the European Joint Conferences on Theory and Practice of Software. The 27 full papers and 8 tool demonstrations included in the volume were thoroughly reviewed and selected from 131 submissions. The papers are organized in topical sections on Model Checking, Tools, Verification of Concurrent Programs, Parametric Analysis, Program Analysis, and Hybrid Systems.
This thesis investigates the possibilities of automating parts of the bug handling process in large-scale software development organizations. The bug handling process is a large part of the mostly manual, and very costly, maintenance of software systems. Automating parts of this time consuming and very laborious process could save large amounts of time and effort wasted on dealing with bug reports. In this thesis we focus on two aspects of the bug handling process, bug assignment and fault localization. Bug assignment is the process of assigning a newly registered bug report to a design team or developer. Fault localization is the process of finding where in a software architecture the fault...
This book constitutes the refereed proceedings of the 9th International Conference on Software Engineering and Formal Methods, SEFM 2011, held in Montevideo, Uruguay, in November 2011. The 22 revised regular papers presented together with 1 short paper, 2 tool papers, and 4 keynote talks were carefully reviewed and selected from 105 initial abstracts and 85 full submissions. Besides the regular session the conference held a special track devoted to "Modeling for Sustainable Development" with 5 accepted papers - selected from 7 submissions - that are also part of this volume. The aim of SEFM is to advance the state of the art in formal methods, to scale up their application in software industry and to encourage their integration with practical engineering methods.
In recent years, binary code analysis, i.e., applying program analysis directly at the machine code level, has become an increasingly important topic of study. This is driven to a large extent by the information security community, where security auditing of closed-source software and analysis of malware are important applications. Since most of the high-level semantics of the original source code are lost upon compilation to executable code, static analysis is intractable for, e.g., fine-grained information flow analysis of binary code. Dynamic analysis, however, does not suffer in the same way from reduced accuracy in the absence of high-level semantics, and is therefore also more readily ...
This book provides a comprehensive view of cyber operations, analysis and targeting, including operational examples viewed through a lens of conceptual models available in current technical and policy literature. Readers will gain a better understanding of how the current cyber environment developed, as well as how to describe it for future defense. The author describes cyber analysis first as a conceptual model, based on well-known operations that span from media to suspected critical infrastructure threats. He then treats the topic as an analytical problem, approached through subject matter interviews, case studies and modeled examples that provide the reader with a framework for the probl...
This book constitutes the refereed proceedings of the 16th International Conference on Software Engineering and Formal Methods, SEFM 2018, held as part of STAF 2018, in Toulouse, France, in June 2018. The 17 full papers presented in this book were carefully reviewed and selected from 58 submissions. The papers deal with a large range of topics in the following research areas: specification; concurrency; program analysis; model checking and runtime verification; applications; and shape analysis and reuse.
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing. Moving Target Defense II: Application of Game Theory and Adversarial Modeling includes contributions from world experts in the cyber security field. In the first volume of MTD, we presented MTD a...
This book constitutes the refereed proceedings of the 9th International Symposium on Search-Based Software Engineering, SSBSE 2017, held in Paderborn, Germany, in September 2017. The 7 full papers and 5 short papers presented together with 4 challenge track and 2 students student track papers were carefully reviewed and selected from 26 submissions. SSBSE welcomes not only applications from throughout the software engineering lifecycle but also a broad range of search methods ranging from exact Operational Research techniques to nature-inspired algorithms and simulated annealing.