Results 1 to 10 of about 9,408 (140)
A dataset of windows malware execution tracesZenodo [PDF]
Malware continues to be a major cybersecurity concern, with increasing volume and sophistication making effective detection methods essential. Behavior-based approaches rely on high-quality execution trace data to analyze how malicious software interacts
Razvan Raducu +3 more
doaj +2 more sources
Mining of Probabilistic Controlling Behavior Model From Dynamic Software Execution Trace [PDF]
Complex functional integration leads to intricate logical control flows which in turn presents a great challenge to construct software behavior models. In this paper, we propose a probabilistic software behavior model by mining the execution traces using
Hongdou He +4 more
doaj +2 more sources
Embedding and classifying test execution traces using neural networks
Classifying test executions automatically as pass or fail remains a key challenge in software testing and is referred to as the test oracle problem. It is being attempted to solve this problem with supervised learning over test execution traces.
Foivos Tsimpourlas +3 more
doaj +2 more sources
From Capture–Recapture to No Recapture: Efficient SCAD Even After Software Updates [PDF]
Side-Channel-based Anomaly Detection (SCAD) offers a powerful and non-intrusive means of detecting unauthorized behavior in IoT and cyber–physical systems.
Kurt A. Vedros +3 more
doaj +2 more sources
Runtime Monitoring of Software Execution Trace: Method and Tools [PDF]
As with the extensive use of complex software in many fields, such as finance, transportation, aeronautics, and astronautics, software plays an increasingly more important role in society. Software reliability becomes a critical bottleneck for system reliability and draws increasingly greater attention from software engineers.
Shiyi Kong +3 more
openaire +2 more sources
Software multi-fault localization via Chameleon clustering in parallel
Fault localization have proven to be useful in various software during the process of software testing and debugging. The presence of multiple faults simultaneously may deteriorate the effectiveness of existing fault-localization techniques.
Heling Cao +3 more
doaj +1 more source
Research on PoC Refactoring of Third-party Library in Heterogeneous Environment [PDF]
Vulnerabilities in third-party libraries are widely propagated to host applications(software that using third-party libra-ries),and developers of host applications usually fail to fix these vulnerabilities in a timely manner,which easily leads to ...
SONG Wenkai, YOU Wei, LIANG Bin, HUANG Jianjun, SHI Wenchang
doaj +1 more source
Tracing execution of software for design coverage [PDF]
Test suites are designed to validate the operation of a system against requirements. One important aspect of a test suite design is to ensure that system operation logic is tested completely. A test suite should drive a system through all abstract states to exercise all possible cases of its operation. This is a difficult task.
Raimondas Lencevicius +2 more
openaire +2 more sources
DistAD: Software Anomaly Detection Based on Execution Trace Distribution
need modification, the experiment results need carefully ...
Kong, Shiyi +4 more
openaire +4 more sources
Mining dynamic noteworthy functions in software execution sequences. [PDF]
As the quality of crucial entities can directly affect that of software, their identification and protection become an important premise for effective software development, management, maintenance and testing, which thus contribute to improving the ...
Bing Zhang +4 more
doaj +1 more source

