Suchergebnisse - "Software and its engineering → Software verification and validation"
-
1
Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts
ISSN: 1558-1225Veröffentlicht: ACM 14.04.2024Veröffentlicht in Proceedings / International Conference on Software Engineering (14.04.2024)“… Reentrancy, a notorious vulnerability in smart contracts, has led to millions of dollars in financial loss. However, current smart contract vulnerability …”
Volltext
Tagungsbericht -
2
AmbieGenVAE at the SBFT 2024 Tool Competition - Cyber-Physical Systems Track
Veröffentlicht: ACM 14.04.2024Veröffentlicht in 2024 IEEE/ACM International Workshop on Search-Based and Fuzz Testing (SBFT) (14.04.2024)“… Testing and verification of autonomous systems is critically important. In the context of SBFT 2024 Cyber-physical systems (CPS) testing tool competition, we …”
Volltext
Tagungsbericht -
3
AmbieGen at the SBFT 2024 Tool Competition - CPS-UAV Track
Veröffentlicht: ACM 14.04.2024Veröffentlicht in 2024 IEEE/ACM International Workshop on Search-Based and Fuzz Testing (SBFT) (14.04.2024)“… Simulation based testing of autonomous systems prior to their deployment in the real world is of big importance. AmbieGen is a tool for automatic generation of …”
Volltext
Tagungsbericht -
4
Runtime Instrumentation for Reactive Components (Artifact)
ISSN: 2509-8195Veröffentlicht: Schloss Dagstuhl – Leibniz-Zentrum für Informatik 12.09.2024“… Reactive software calls for instrumentation methods that uphold the reactive attributes of systems. Runtime verification sets another demand on the …”
Volltext
Datensatz -
5
A Framework for Including Uncertainty in Robustness Evaluation of Bayesian Neural Network Classifiers
Veröffentlicht: ACM 20.04.2024Veröffentlicht in 2024 IEEE/ACM International Workshop on Deep Learning for Testing and Testing for Deep Learning (DeepTest) (20.04.2024)“… Neural networks (NNs) play a crucial role in safety-critical fields, requiring robustness assurance. Bayesian Neural Networks (BNNs) address data uncertainty, …”
Volltext
Tagungsbericht -
6
MASS: A tool for Mutation Analysis of Space CPS
Veröffentlicht: IEEE 01.05.2022Veröffentlicht in 2022 IEEE/ACM 44th International Conference on Software Engineering: Companion Proceedings (ICSE-Companion) (01.05.2022)“… We present MASS, a mutation analysis tool for embedded software in cyber-physical systems (CPS). We target space CPS (e.g., satellites) and other CPS with …”
Volltext
Tagungsbericht -
7
DFarm: Massive-Scaling Dynamic Android App Analysis on Real Hardware
Veröffentlicht: ACM 01.10.2020Veröffentlicht in Proceedings of the IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems (01.10.2020)“… Dynamic analysis is an important tool for assessing software quality during testing. It not only helps analysts identify performance bottlenecks and functional …”
Volltext
Tagungsbericht -
8
Do Instance-level Review Diagrams Support Validation Processes of Cyber-Physical System Specifications : Results from a Controlled Experiment
Veröffentlicht: ACM 01.06.2020Veröffentlicht in Proceedings of the International Conference on Software and System Processes (01.06.2020)“… In the field of safety-critical systems, manual reviews are important to ensure high-quality software and to satisfy legal obligations. When applying …”
Volltext
Tagungsbericht -
9
Making Android Apps Monkey-Friendly
Veröffentlicht: ACM 01.10.2020Veröffentlicht in Proceedings of the IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems (01.10.2020)“… Monkey testing is a random testing technique in which a stream of pseudo-random events are automatically fired on the GUI of the application under test, …”
Volltext
Tagungsbericht -
10
On the Monitorability of Session Types, in Theory and Practice (Artifact)
ISSN: 2509-8195Veröffentlicht: Schloss Dagstuhl – Leibniz-Zentrum für Informatik 06.07.2021“… In the paper "On the Monitorability of Session Types, in Theory and Practice" we study the monitorability of message-passing black-box processes against …”
Volltext
Datensatz