Zobrazeno 1 - 10
of 35
pro vyhledávání: '"Katsuhiko Gondow"'
Autor:
Katsuhiko Gondow, Yoshitaka Arahori
Publikováno v:
IEEE Access, Vol 12, Pp 187877-187891 (2024)
Memory error detection tools like Address Sanitizer (ASAN) can detect the existence of dangling pointers and memory leaks, but cannot report their root causes, i.e., where they occur in the source code. For this reason, even with vulnerability report
Externí odkaz:
https://doaj.org/article/fcff900ea4804b0b9d4885d5299d4ff8
Publikováno v:
ACM SIGAPP Applied Computing Review. 21:33-48
Debugging failures of deployed concurrent software is important for quality assurance. However, such failures are difficult to debug because their behavior is non-deterministic and limited information can be obtained with conventional means. Reverse
Publikováno v:
SAC
Debugging failures of deployed concurrent software is important for quality assurance. However, such failures are difficult to debug because their behavior is non-deterministic and limited information can be obtained with conventional means. Reverse
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fdab5b2f7f3012be989cde529ea28999
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849392
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849392
Publikováno v:
SAC
The existing methods of difference analysis cannot cope with event-driven code well, since they explore only the input space for program input like integers and strings, but do not explore the event space for all possible event sequences. This paper
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d22224419284238c2c6766b58f50c823
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849391
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849391
Publikováno v:
IEICE Transactions on Information and Systems. :2179-2189
Publikováno v:
Proceedings of the 2019 3rd International Conference on E-Business and Internet.
Content Providers (e.g. Disney, Sony), who make the content, distribute their own content through Content Platformers (e.g. Netflix, Amazon) on the mobile for the security and platform dependency reasons. The one of reasons why Providers use Platform
Publikováno v:
SAC
To solve JavaScript's callback hell problem, several language mechanisms like Promise and async/await have already been introduced to JavaScript. Using async/await, which is the most promising one, callback hell code can be rewritten to another simpl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9802400cff2202ca5801ee1aef885b26
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849389
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849389
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030150310
AINA
AINA
Grammar-based fuzzing is effective at finding the vulnerabilities of various input-parsing programs which take as inputs complex data conforming to a certain grammar. Traditional grammar-based fuzzing techniques require a manually-generated grammar f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d83d3a407903ff0e59345b57120f04e5
https://doi.org/10.1007/978-3-030-15032-7_40
https://doi.org/10.1007/978-3-030-15032-7_40
Publikováno v:
APSEC
We are trying to find source code comments that help programmers understand a nontrivial part of source code. One of such examples would be explaining to assign a zero as a way to "clear" a buffer. Such comments are invaluable to programmers and iden
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a91d9fcc0ff2e7e93737ddc82817240b
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849387
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849387
Publikováno v:
SCAM
Multithreaded programs are prone to dataraces. Dataraces are known to be hard to detect and reproduce by manual effort, although they often have detrimental effects on program reliability. Automated techniques are thus demanded for detecting datarace