Results 1 to 10 of about 9,408 (140)

A dataset of windows malware execution tracesZenodo [PDF]

open access: yesData in Brief
Malware continues to be a major cybersecurity concern, with increasing volume and sophistication making effective detection methods essential. Behavior-based approaches rely on high-quality execution trace data to analyze how malicious software interacts
Razvan Raducu   +3 more
doaj   +2 more sources

Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace [PDF]

open access: yesIEEE Access, 2019
Complex functional integration leads to intricate logical control flows which in turn presents a great challenge to construct software behavior models. In this paper, we propose a probabilistic software behavior model by mining the execution traces using
Hongdou He   +4 more
doaj   +2 more sources

Embedding and classifying test execution traces using neural networks

open access: yesIET Software, 2022
Classifying test executions automatically as pass or fail remains a key challenge in software testing and is referred to as the test oracle problem. It is being attempted to solve this problem with supervised learning over test execution traces.
Foivos Tsimpourlas   +3 more
doaj   +2 more sources

From Capture–Recapture to No Recapture: Efficient SCAD Even After Software Updates [PDF]

open access: yesSensors
Side-Channel-based Anomaly Detection (SCAD) offers a powerful and non-intrusive means of detecting unauthorized behavior in IoT and cyber–physical systems.
Kurt A. Vedros   +3 more
doaj   +2 more sources

Runtime Monitoring of Software Execution Trace: Method and Tools [PDF]

open access: yesIEEE Access, 2020
As with the extensive use of complex software in many fields, such as finance, transportation, aeronautics, and astronautics, software plays an increasingly more important role in society. Software reliability becomes a critical bottleneck for system reliability and draws increasingly greater attention from software engineers.
Shiyi Kong   +3 more
openaire   +2 more sources

Software multi-fault localization via Chameleon clustering in parallel

open access: yesJournal of King Saud University: Computer and Information Sciences, 2023
Fault localization have proven to be useful in various software during the process of software testing and debugging. The presence of multiple faults simultaneously may deteriorate the effectiveness of existing fault-localization techniques.
Heling Cao   +3 more
doaj   +1 more source

Research on PoC Refactoring of Third-party Library in Heterogeneous Environment [PDF]

open access: yesJisuanji kexue, 2023
Vulnerabilities in third-party libraries are widely propagated to host applications(software that using third-party libra-ries),and developers of host applications usually fail to fix these vulnerabilities in a timely manner,which easily leads to ...
SONG Wenkai, YOU Wei, LIANG Bin, HUANG Jianjun, SHI Wenchang
doaj   +1 more source

Tracing execution of software for design coverage [PDF]

open access: yesProceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001), 2005
Test suites are designed to validate the operation of a system against requirements. One important aspect of a test suite design is to ensure that system operation logic is tested completely. A test suite should drive a system through all abstract states to exercise all possible cases of its operation. This is a difficult task.
Raimondas Lencevicius   +2 more
openaire   +2 more sources

DistAD: Software Anomaly Detection Based on Execution Trace Distribution

open access: yesCoRR, 2022
need modification, the experiment results need carefully ...
Kong, Shiyi   +4 more
openaire   +4 more sources

Mining dynamic noteworthy functions in software execution sequences. [PDF]

open access: yesPLoS ONE, 2017
As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the ...
Bing Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy