A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automating Information Flow Analysis of Low Level Code
2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security - CCS '14
Low level code is challenging: It lacks structure, it uses jumps and symbolic addresses, the control flow is often highly optimized, and registers and memory locations may be reused in ways that make typing ...
Information flow properties create additional complications: They are hyperproperties relating multiple executions, and the possibility of interrupts and concurrency, and use of devices and features like ...
Instead we propose to directly verify relational (i.e. information flow) properties at machine code level, leveraging as much as possible recent progress on low level code analysis tools such as BAP [ ...
doi:10.1145/2660267.2660322
dblp:conf/ccs/BalliuDG14
fatcat:kbbl7y5ofnbenhaqqxukilztlu
Automated source code annotation for timing analysis of embedded software
2012
2012 18th International Conference on Advanced Computing and Communications (ADCOM)
The annotation technique automatically inserts marks into the software, which can later be identified at assembler code level in order to back-annotate them with timing or power information. ...
Our graph based technique applies automated labeling of basic blocks to aid in efficient construction of basic blocks for the disassembler. ...
Acknowledgements This work was partly funded by the DFG Collaborative Research Centre 614 and by the German Ministry of Education and Research (BMBF) through the BMBF project SANITAS (01M3088) and the ...
doi:10.1109/adcom.2012.6563578
fatcat:nebcs2izpjesbbdv7ttkvi55wa
Towards automating software maintenance
[chapter]
1991
Lecture Notes in Computer Science
This paper describes an ongoing project on automating program maintenance. ...
We discuss the concept of a framework for the customization of program maintenance methodologies and for supporting them with integrated tools. ...
We are also grateful to the following members of DISCS and ISS (both at the National University of Singapore) community for many interesting discussions: Dr Ling T.W., Dr Loh W.L., Dr Lu H.J., Dr Tan C.L ...
doi:10.1007/3-540-54059-8_93
fatcat:bkppzxyjgngzjjwrafjgctisha
APPLICATION OF LEAN MANUFACTURING TOOLS AND ICT TO INCREASE PRODUCTIVITY LEVELS AND REDUCE COSTS IN THE BREWING INDUSTRY IN ENSENADA, BAJA CALIFORNIA, MEXICO
2022
Zenodo
In addition, an automated system was used using Information and Communication Technology (ICT) to control time and improve the flow of the production process. ...
This investigation was prepared to evaluate productivity levels because in 2018 there were low rates due to inadequate planning in the manufacturing stages of a brewing industry, located in the city of ...
Productivity-Low Level, PHL ...
doi:10.5281/zenodo.6386471
fatcat:sd5vnnw6njgnvogvo2o6werwfm
Comparative Study on DFD to UML Diagrams Transformations
[article]
2011
arXiv
pre-print
It is observed that most of the transformation approaches are rule based, which are incomplete and defined at abstract level that does not cover in depth transformation and automation issues. ...
In this paper, we present a survey of the existing Data Flow Diagram (DFD) to Unified Modeling language (UML) transformation techniques. ...
Technique uses informal rules. Rules for very few construct of source and target model are provided, which make both source and target model coverage low.
E. ...
arXiv:1102.4162v1
fatcat:loyspivxrvdhfdtenrxaabpx4a
Automated Face Analysis by Feature Point Tracking Has High Concurrent Validity With Manual FACS Coding
[chapter]
2005
What the Face RevealsBasic and Applied Studies of Spontaneous Expression Using the Facial Action Coding System (FACS)
To enable rigorous and efficient quantitative measurement of facial displays, we have developed an automated method of facial display analysis. ...
Automated Face Analysis by feature point tracking demonstrated high concurrent validity with manual FACS coding. ...
Automated Face Analysis
Table 4 4 Proportion of Agreement Between Automated Face Analysis and Manual Coding in Identifying Action Units in the Mouth Region Automated Face Analysis
Table 4 continued ...
doi:10.1093/acprof:oso/9780195179644.003.0018
fatcat:xl6etc4kd5ewpojmbc5t2rzolu
Automated face analysis by feature point tracking has high concurrent validity with manual FACS coding
1999
Psychophysiology
To enable rigorous and efficient quantitative measurement of facial displays, we have developed an automated method of facial display analysis. ...
Automated Face Analysis by feature point tracking demonstrated high concurrent validity with manual FACS coding. ...
Automated Face Analysis
Table 4 4 Proportion of Agreement Between Automated Face Analysis and Manual Coding in Identifying Action Units in the Mouth Region Number of samples of each AU appears in parentheses.κ ...
doi:10.1017/s0048577299971184
pmid:10098378
fatcat:nttzmziidjhpjetkc4fio7xtmy
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions
2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications
Context: Modern automated source code analysis techniques can be very successful in detecting a priori defined defect patterns and security vulnerabilities. ...
Albeit not without restrictions, the proposed automated analysis seems able to detect a wide variety of logical errors, while at the same time limiting the false positives. ...
Rank
Example of classified methods
Set of Attributes
Low
javax.servlet.http.Cookie (new Cookie())
Set 1 (Level 1)
Low
java.lang.reflection.Field.set()
Set 2 (Level 2)
Medium java.io.PipedInputStream ...
doi:10.5220/0005947200280040
dblp:conf/secrypt/StergiopoulosKG16
fatcat:kknyclcwybhprbhjz66af6eta4
Jif-Based Verification of Information Flow Policies for Android Apps
2017
International Journal of Secure Software Engineering
Although various previous works use data and control flow techniques to evaluate security features of Android applications, this paper extends those works by using Jif to verify compliance of information ...
Jif also provides an open source compiler, generates executable code for an application only if such application meets a defined policy, and checks implicit flows which may be relevant for highly sensitive ...
Additionally, information flow policies (IFP) guarantee noninterference, that is high level input does not affect low level outputs, unless programmers explicitly use mechanisms to securely modify levels ...
doi:10.4018/ijsse.2017010102
fatcat:uoozihm2lja5zlc7oeh3pcwiku
Enabling Automated Bug Detection for IP-based Designs using High-Level Synthesis
2018
IEEE design & test
Control Flow Traces The Control Flow is a high-level description of the "paths of execution". ...
Automated Bug Detection The key feature of Discrepancy Analysis is that its engine for automated bug detection can manipulate control-flow traces and operation traces in the same way. ...
doi:10.1109/mdat.2018.2824121
fatcat:g63mjz76yncw5l2tob7xvd2mrm
Uncertainty and Emerging Tensions in Organizational Change: A Grounded Theory Study on the Orchestrating Role of the Change Leader
2021
Sustainability
We draw on the grounded theory methodology to analyze an automation project in a global parcel delivery company, as implemented in three parcel sorting hubs in two countries, seeking to identify key factors ...
orchestrate the differing views and expectations of corporate actors toward a successful implementation of a change program. ...
Acknowledgments: Preliminary outcomes of this research at an earlier stage of development were presented at ItAIS 2017, the 14th conference of the Italian Chapter of AIS (Association for Information Systems ...
doi:10.3390/su13094776
doaj:09438294c55644fdb700321e3fa69514
fatcat:ufhug7x7vjbl5nqqnwk2r72luy
Page 294 of American Society of Civil Engineers. Collected Journals Vol. 116, Issue CP3
[page]
1990
American Society of Civil Engineers. Collected Journals
By using an automated identification system technology for data acqui- sition in support of data processing and analysis, information flow through- out all levels of management and all stages in the design ...
A uniform application of bar coding to both data acquisition and document control enhances the flow of information as well as material through the process. ...
AndroShield: Automated Android Applications Vulnerability Detection, a Hybrid Static and Dynamic Analysis Approach
2019
Information
Static analysis, on one hand, performs code analysis. It does not require running the application to detect vulnerabilities. ...
One of the techniques used is Automated Vulnerability Detection. Vulnerability detection is one of the security tests that aims at pinpointing potential security leaks. ...
Vulnerability risk of enabling backup is estimated Low as the information that is backed up may not have sensitive information to be fully risky. ...
doi:10.3390/info10100326
fatcat:3mnzfplc7zbndm6buo7cqjfzhe
Checking Security Compliance between Models and Code
[article]
2021
arXiv
pre-print
These mappings enable an automated, and project-specific static analysis of the implementation with respect to the desired security properties of the design model. ...
We develop heuristic-based automated mappings between a design-level model (SecDFD, provided by humans) and a code-level representation (Program Model, automatically extracted from the implementation) ...
This paper reflects only the author's view and the Commission is not responsible for any use that may be made of the information contained therein. ...
arXiv:2108.08579v2
fatcat:7e3lkst5ejffvaeevnihv3mweu
Platform choices and design demands for IoT platforms: cost, power, and performance tradeoffs
2016
IET Cyber-Physical Systems
technologies to enable rapid, low cost design of effective IoT platforms with smaller design teams and lower risk. ...
The rise of the Internet of Things has led to an explosion of new sensor computing platforms. ...
Accurate power information is usually not available until after logic synthesis or even physical design, which is too late for system-level modeling and analysis. ...
doi:10.1049/iet-cps.2016.0020
fatcat:zokl4apn5ze3rl27j7jc63hqfi
« Previous
Showing results 1 — 15 out of 180,549 results