The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The current static analysis approaches for detecting stack overflow vulnerabilities in binaries are only usable to the functions in system libraries and not suitable for user defined functions. In this paper, we model the characteristic of stack overflow vulnerabilities and propose a static taint analysis method, which can recognize user defined functions that may have that type of vulnerabilities...
A novel academic recommendation algorithm, MTAR (multi-type academic recommendation), which integrates resource content and user behaviors, is proposed to process five types of academic resources at the same time, which can quickly and precisely recommend academic resources of interest to users. The MTAR algorithm profiles five kinds of academic resources from four features including resource type,...
Modern software systems are becoming increasingly complex, relying on a lot of third-party library support. Library behaviors are hence an integral part of software behaviors. Analyzing them is as important as analyzing the software itself. However, analyzing libraries is highly challenging due to the lack of source code, implementation in different languages, and complex optimizations. We observe...
In recent times, use of third-party libraries has become prevalent practice in contemporary software development. Much like other code components, unmaintained libraries are a cause for concern, especially when it risks code degradation over time. Therefore, awareness of when a library should be updated is important. With the emergence of large libraries hosting repositories such as Maven Central,...
There are many illegal value use defects in C programs, for example, illegal computing, use of uninitialized variables and array out of bounds. When C programs are running, these defects may cause software failure, and may lead to serious consequences. For fully detecting these illegal value use defects, we apply abstract regions simulate memory blocks that allocated to memory objects at the runtime,...
Graphical User Interfaces (GUI) play an essential role in operating industrial facilities and machines. Depending on the range and variability of a manufacturer's product portfolio a huge library of GUI software may exist. This poses quite a challenge when it comes to testing or re-engineering. Static analysis helps to unveil valuable, inherent knowledge and prepare it for further analysis and processing...
As environmental models have become more complicated, we need new tools to analyze and validate these models and to facilitate collaboration among field scientists, observation dataset providers, environmental system modelers, and computer scientists. Modular design and function test of environmental models have gained attention recently within the Biological and Environmental Research Program of...
Power consumed by clocking has taken a major part of the whole design circuit. Given a design, we can reduce its power consumption by replacing several flip-flops with some multi-bit flip-flop. This may affect the performance of the original circuit because of its timing and placement capacity constraints. To overcome this problem efficiently, a technique combination table is built to enumerate possible...
As lacking clear understanding of energy-using characteristics for devices, it is difficult to reasonably assess their consumption levels of energy. In order to solve this problem, chart-module integration theory is applied to energy consumption simulation field to design a software system that supports dynamic energy consumption simulation in this article. Firstly, the overall architecture of the...
This paper develops an experimental and Evaluation system which accelerates the construction of experimental scheme. At the same time, it helps with the creation of experiment samples and evaluation of the impact of experiment variable attributes. Based on the analysis of the procedure of experimental design, four main components of the system are set up: experiment project editor, experiment sample...
Future smart systems will provide functionality by dynamically interacting with each other in cyber-physical systems. Such interactions require a message-based coordination under hard real-time constraints. This is realized by complex software, which combines discrete, state-based behavior with continuous behavior controlling the dynamics of the physical system parts. The development methods and tools...
Requirements are artefacts often described with text and models. It is important to manage traceability between requirements and other software artefacts, including designs and test cases, also often captured with specialized models. Some Requirements Management Systems (RMS) support traceability relationships, between (textual) requirements artefacts in the RMS and model artefacts created outside...
Establishment of quality evaluation model of trustworthiness plays an important role in quality analysis for collaboration software. Therefore, this paper researches the quality evaluation model and proposes a method of establishing the quality level model based on practical evidence. This method is mainly carried out as follows: The trustworthiness evidence model is established through collecting...
Analysis of formally specified Component Based Software (CBS) provides a concrete way to represent the requirements from both system and user. A CASE tool makes a development more powerful and gives a graphical effect by which a user can easily visualize the fact. Powerful CASE tools for CBS are useful to improve the developer productivity and ensure the syntactical correctness of the CBS model for...
This paper presents a new method, capable of automatically generating attacks on binary programs from software crashes. We analyze software crashes with a symbolic failure model by performing concolic executions following the failure directed paths, using a whole system environment model and concrete address mapped symbolic memory in . We propose a new selective symbolic input method...
Model checking is a powerful formal verification method that can also be used to evaluate PLC software. A lot of manual work and some expertise are still needed. Proposed methods for automating the process rely on standardised specification languages, but PLC software is often vendor-specific, and the source code for function blocks may not even be available. We propose a toolset for model checking...
The cost performance of radio simulation software is not high because of radio's characteristics of variety frequent update and complete function. An idea of radio simulation training platform design based on components is put forward through analyzing of the various components and functions of the radio. The article design functions and technical architectures of the simulation platform. Component...
This paper presents the application of a model-driven and compositionality techniques for the real-time requirements validation of the on-board software for the Instrument Control Unit (ICU) of the Energetic Particle Detector (EPD) suite, which will be launched as a payload of the Solar Orbiter mission of the European Space Agency (ESA) and NASA. The main purpose of this approach is to automate the...
Combinatorial test design model consists of parameters, values and the associated constraints. This model is the input for test generators. In this paper we present a rule based approach for deriving combinatorial test design model from UML activity diagrams resulting from requirement analysis. We have explored this approach on few sample cases. Our initial results suggest that this automated approach...
Static analysis cannot obtain the values of variables in actual program operation because it does not execute the code itself. It makes the detection of invalid arithmetic operation (IAO) in the field of static analysis difficult to achieve. This paper presents a practical model for IAO detection based on alias analysis. The model uses a triple to record information calculated in dataflow. In the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.