NUK - logo

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 189
1.
  • Automated library recommend... Automated library recommendation
    Thung, Ferdian; Lo, David; Lawall, Julia 2013 20th Working Conference on Reverse Engineering (WCRE), 2013-Oct.
    Conference Proceeding
    Open access

    Many third party libraries are available to be downloaded and used. Using such libraries can reduce development time and make the developed software more reliable. However, developers are often ...
Full text

PDF
2.
  • Effective Detection of Slee... Effective Detection of Sleep-in-atomic-context Bugs in the Linux Kernel
    Bai, Jia-Ju; Lawall, Julia; Hu, Shi-Min ACM transactions on computer systems, 06/2020, Volume: 36, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Atomic context is an execution state of the Linux kernel in which kernel code monopolizes a CPU core. In this state, the Linux kernel may only perform operations that cannot sleep, as otherwise a ...
Full text

PDF
3.
  • RACOON++: A Semi-Automatic ... RACOON++: A Semi-Automatic Framework for the Selfishness-Aware Design of Cooperative Systems
    Cota, Guido Lena; Mokhtar, Sonia Ben; Gianini, Gabriele ... IEEE transactions on dependable and secure computing, 07/2019, Volume: 16, Issue: 4
    Journal Article
    Open access

    A challenge in designing cooperative distributed systems is to develop feasible and cost-effective mechanisms to foster cooperation among selfish nodes, i.e., nodes that strategically deviate from ...
Full text

PDF
4.
  • Hector: Detecting Resource-... Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software
    Saha, Suman; Lozi, Jean-Pierre; Thomas, Gael ... 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013-June
    Conference Proceeding
    Open access

    Omitting resource-release operations in systems error handling code can lead to memory leaks, crashes, and deadlocks. Finding omission faults is challenging due to the difficulty of reproducing ...
Full text

PDF
5.
  • Coccinelle: Tool support fo... Coccinelle: Tool support for automated CERT C Secure Coding Standard certification
    Olesen, Mads Chr; Hansen, René Rydhof; Lawall, Julia L. ... Science of computer programming, 10/2014, Volume: 91
    Journal Article
    Peer reviewed
    Open access

    Writing correct C programs is well-known to be hard, not least due to the many low-level language features intrinsic to C. Writing secure C programs is even harder and, at times, seemingly ...
Full text

PDF
6.
  • Ahead of time static analys... Ahead of time static analysis for automatic generation of debugging interfaces to the Linux kernel
    Bissyandé, Tegawendé F.; Réveillère, Laurent; Lawall, Julia L. ... Automated software engineering, 03/2016, Volume: 23, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The Linux kernel does not export a stable, well-defined kernel interface, complicating the development of kernel-level services, such as device drivers and file systems. While there does exist a set ...
Full text

PDF
7.
  • SEWordSim: software-specifi... SEWordSim: software-specific word similarity database
    Tian, Yuan; Lo, David; Lawall, Julia Companion Proceedings of the 36th International Conference on Software Engineering, 05/2014
    Conference Proceeding
    Open access

    Measuring the similarity of words is important in accurately representing and comparing documents, and thus improves the results of many natural language processing (NLP) tasks. The NLP community has ...
Full text

PDF
8.
Full text
9.
  • Fuzzing Error Handling Code in Device Drivers Based on Software Fault Injection
    Jiang, Zu-Ming; Bai, Jia-Ju; Lawall, Julia ... 2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)
    Conference Proceeding
    Open access

    Device drivers remain a main source of runtime failures in operating systems. To detect bugs in device drivers, fuzzing has been commonly used in practice. However, a main limitation of existing ...
Full text

PDF
10.
  • WYSIWIB: exploiting fine-gr... WYSIWIB: exploiting fine-grained program structure in a scriptable API-usage protocol-finding process
    Lawall, Julia L.; Brunel, Julien; Palix, Nicolas ... Software, practice & experience, 01/2013, Volume: 43, Issue: 1
    Journal Article
    Peer reviewed

    SUMMARY Bug‐finding tools rely on specifications of what is correct or incorrect code. As it is difficult for a tool developer or user to anticipate all possible specifications, strategies for ...
Full text
1 2 3 4 5
hits: 189

Load filters