Filters








180,549 Hits in 6.3 sec

Automating Information Flow Analysis of Low Level Code

Musard Balliu, Mads Dam, Roberto Guanciale
2014 Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14  
Low level code is challenging: It lacks structure, it uses jumps and symbolic addresses, the control flow is often highly optimized, and registers and memory locations may be reused in ways that make typing  ...  Information flow properties create additional complications: They are hyperproperties relating multiple executions, and the possibility of interrupts and concurrency, and use of devices and features like  ...  Instead we propose to directly verify relational (i.e. information flow) properties at machine code level, leveraging as much as possible recent progress on low level code analysis tools such as BAP [  ... 
doi:10.1145/2660267.2660322 dblp:conf/ccs/BalliuDG14 fatcat:kbbl7y5ofnbenhaqqxukilztlu

Automated source code annotation for timing analysis of embedded software

Mabel Mary Joy, Markus Becker, Wolfgang Mueller, Emi Mathews
2012 2012 18th International Conference on Advanced Computing and Communications (ADCOM)  
The annotation technique automatically inserts marks into the software, which can later be identified at assembler code level in order to back-annotate them with timing or power information.  ...  Our graph based technique applies automated labeling of basic blocks to aid in efficient construction of basic blocks for the disassembler.  ...  Acknowledgements This work was partly funded by the DFG Collaborative Research Centre 614 and by the German Ministry of Education and Research (BMBF) through the BMBF project SANITAS (01M3088) and the  ... 
doi:10.1109/adcom.2012.6563578 fatcat:nebcs2izpjesbbdv7ttkvi55wa

Towards automating software maintenance [chapter]

Stanislaw Jarzabek, Kelly Tham
1991 Lecture Notes in Computer Science  
This paper describes an ongoing project on automating program maintenance.  ...  We discuss the concept of a framework for the customization of program maintenance methodologies and for supporting them with integrated tools.  ...  We are also grateful to the following members of DISCS and ISS (both at the National University of Singapore) community for many interesting discussions: Dr Ling T.W., Dr Loh W.L., Dr Lu H.J., Dr Tan C.L  ... 
doi:10.1007/3-540-54059-8_93 fatcat:bkppzxyjgngzjjwrafjgctisha

APPLICATION OF LEAN MANUFACTURING TOOLS AND ICT TO INCREASE PRODUCTIVITY LEVELS AND REDUCE COSTS IN THE BREWING INDUSTRY IN ENSENADA, BAJA CALIFORNIA, MEXICO

Raul Armando Villareal Gonzalez Elizabeth Romero Samaniego, , Hector Jose Garcia Avila , Juan Carlos Leal Nodal, Juan Manuel Esponiza Figueroa
2022 Zenodo  
In addition, an automated system was used using Information and Communication Technology (ICT) to control time and improve the flow of the production process.  ...  This investigation was prepared to evaluate productivity levels because in 2018 there were low rates due to inadequate planning in the manufacturing stages of a brewing industry, located in the city of  ...  Productivity-Low Level, PHL  ... 
doi:10.5281/zenodo.6386471 fatcat:sd5vnnw6njgnvogvo2o6werwfm

Comparative Study on DFD to UML Diagrams Transformations [article]

Atif A. A. Jilani, Muhammad Usman, Aamer Nadeem
2011 arXiv   pre-print
It is observed that most of the transformation approaches are rule based, which are incomplete and defined at abstract level that does not cover in depth transformation and automation issues.  ...  In this paper, we present a survey of the existing Data Flow Diagram (DFD) to Unified Modeling language (UML) transformation techniques.  ...  Technique uses informal rules. Rules for very few construct of source and target model are provided, which make both source and target model coverage low. E.  ... 
arXiv:1102.4162v1 fatcat:loyspivxrvdhfdtenrxaabpx4a

Automated Face Analysis by Feature Point Tracking Has High Concurrent Validity With Manual FACS Coding [chapter]

Jeffrey F. Cohn, Adena J. Zlochower, James Lien, Takeo Kanade
2005 What the Face RevealsBasic and Applied Studies of Spontaneous Expression Using the Facial Action Coding System (FACS)  
To enable rigorous and efficient quantitative measurement of facial displays, we have developed an automated method of facial display analysis.  ...  Automated Face Analysis by feature point tracking demonstrated high concurrent validity with manual FACS coding.  ...  Automated Face Analysis Table 4 4 Proportion of Agreement Between Automated Face Analysis and Manual Coding in Identifying Action Units in the Mouth Region Automated Face Analysis Table 4 continued  ... 
doi:10.1093/acprof:oso/9780195179644.003.0018 fatcat:xl6etc4kd5ewpojmbc5t2rzolu

Automated face analysis by feature point tracking has high concurrent validity with manual FACS coding

JEFFREY F. COHN, ADENA J. ZLOCHOWER, JAMES LIEN, TAKEO KANADE
1999 Psychophysiology  
To enable rigorous and efficient quantitative measurement of facial displays, we have developed an automated method of facial display analysis.  ...  Automated Face Analysis by feature point tracking demonstrated high concurrent validity with manual FACS coding.  ...  Automated Face Analysis Table 4 4 Proportion of Agreement Between Automated Face Analysis and Manual Coding in Identifying Action Units in the Mouth Region Number of samples of each AU appears in parentheses.κ  ... 
doi:10.1017/s0048577299971184 pmid:10098378 fatcat:nttzmziidjhpjetkc4fio7xtmy

Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions

George Stergiopoulos, Panagiotis Katsaros, Dimitris Gritzalis, Theodore Apostolopoulos
2016 Proceedings of the 13th International Joint Conference on e-Business and Telecommunications  
Context: Modern automated source code analysis techniques can be very successful in detecting a priori defined defect patterns and security vulnerabilities.  ...  Albeit not without restrictions, the proposed automated analysis seems able to detect a wide variety of logical errors, while at the same time limiting the false positives.  ...  Rank Example of classified methods Set of Attributes Low javax.servlet.http.Cookie (new Cookie()) Set 1 (Level 1) Low java.lang.reflection.Field.set() Set 2 (Level 2) Medium java.io.PipedInputStream  ... 
doi:10.5220/0005947200280040 dblp:conf/secrypt/StergiopoulosKG16 fatcat:kknyclcwybhprbhjz66af6eta4

Jif-Based Verification of Information Flow Policies for Android Apps

Lina M. Jimenez, Martin Ochoa, Sandra J. Rueda
2017 International Journal of Secure Software Engineering  
Although various previous works use data and control flow techniques to evaluate security features of Android applications, this paper extends those works by using Jif to verify compliance of information  ...  Jif also provides an open source compiler, generates executable code for an application only if such application meets a defined policy, and checks implicit flows which may be relevant for highly sensitive  ...  Additionally, information flow policies (IFP) guarantee noninterference, that is high level input does not affect low level outputs, unless programmers explicitly use mechanisms to securely modify levels  ... 
doi:10.4018/ijsse.2017010102 fatcat:uoozihm2lja5zlc7oeh3pcwiku

Enabling Automated Bug Detection for IP-based Designs using High-Level Synthesis

Pietro Fezzardi, Christian Pilato, Fabrizio Ferrandi
2018 IEEE design & test  
Control Flow Traces The Control Flow is a high-level description of the "paths of execution".  ...  Automated Bug Detection The key feature of Discrepancy Analysis is that its engine for automated bug detection can manipulate control-flow traces and operation traces in the same way.  ... 
doi:10.1109/mdat.2018.2824121 fatcat:g63mjz76yncw5l2tob7xvd2mrm

Uncertainty and Emerging Tensions in Organizational Change: A Grounded Theory Study on the Orchestrating Role of the Change Leader

Francesco Virili, Cristiano Ghiringhelli
2021 Sustainability  
We draw on the grounded theory methodology to analyze an automation project in a global parcel delivery company, as implemented in three parcel sorting hubs in two countries, seeking to identify key factors  ...  orchestrate the differing views and expectations of corporate actors toward a successful implementation of a change program.  ...  Acknowledgments: Preliminary outcomes of this research at an earlier stage of development were presented at ItAIS 2017, the 14th conference of the Italian Chapter of AIS (Association for Information Systems  ... 
doi:10.3390/su13094776 doaj:09438294c55644fdb700321e3fa69514 fatcat:ufhug7x7vjbl5nqqnwk2r72luy

Page 294 of American Society of Civil Engineers. Collected Journals Vol. 116, Issue CP3 [page]

1990 American Society of Civil Engineers. Collected Journals  
By using an automated identification system technology for data acqui- sition in support of data processing and analysis, information flow through- out all levels of management and all stages in the design  ...  A uniform application of bar coding to both data acquisition and document control enhances the flow of information as well as material through the process.  ... 

AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach

Amr Amin, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy, Islam Hegazy
2019 Information  
Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities.  ...  One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks.  ...  Vulnerability risk of enabling backup is estimated Low as the information that is backed up may not have sensitive information to be fully risky.  ... 
doi:10.3390/info10100326 fatcat:3mnzfplc7zbndm6buo7cqjfzhe

Checking Security Compliance between Models and Code [article]

Katja Tuma and Sven Peldszus and Daniel Strüber and Riccardo Scandariato and Jan Jürjens
2021 arXiv   pre-print
These mappings enable an automated, and project-specific static analysis of the implementation with respect to the desired security properties of the design model.  ...  We develop heuristic-based automated mappings between a design-level model (SecDFD, provided by humans) and a code-level representation (Program Model, automatically extracted from the implementation)  ...  This paper reflects only the author's view and the Commission is not responsible for any use that may be made of the information contained therein.  ... 
arXiv:2108.08579v2 fatcat:7e3lkst5ejffvaeevnihv3mweu

Platform choices and design demands for IoT platforms: cost, power, and performance tradeoffs

Deming Chen, Jason Cong, Swathi Gurumani, Wen-mei Hwu, Kyle Rupnow, Zhiru Zhang
2016 IET Cyber-Physical Systems  
technologies to enable rapid, low cost design of effective IoT platforms with smaller design teams and lower risk.  ...  The rise of the Internet of Things has led to an explosion of new sensor computing platforms.  ...  Accurate power information is usually not available until after logic synthesis or even physical design, which is too late for system-level modeling and analysis.  ... 
doi:10.1049/iet-cps.2016.0020 fatcat:zokl4apn5ze3rl27j7jc63hqfi
« Previous Showing results 1 — 15 out of 180,549 results