A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Capturing propagation of infected program states
2009
Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium - ESEC/FSE '09
We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspiciousness scores ...
However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them. ...
In our technique, we capture the propagation of infected program states via CFG. ...
doi:10.1145/1595696.1595705
dblp:conf/sigsoft/ZhangCTJW09
fatcat:w2bsdg4o6rfa3cchay36rsengm
Title Capturing propagation of infected program states
2009
unpublished
We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspicious-ness scores ...
However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them. ...
In our technique, we capture the propagation of infected program states via CFG. ...
fatcat:onyg6gdnufhszofjbqpqjcuwdm
Automated unit test generation for evolving software
2015
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015
state to the output, or may suffer from scalability issues, especially when a large sequence of calls is required for propagation. ...
While this problem has been well studied in the literature, the current approaches for automatically generating such tests either only attempt to reach the change and do not aim to propagate the infected ...
While this may indicate a lack of adequate oracles (i.e. assertions), it also shows that either the fault infected the state of the program and yet did not propagate to the output, or a specific dataflow ...
doi:10.1145/2786805.2803196
dblp:conf/sigsoft/Shamshiri15
fatcat:elug7xnlaje2lk4rpm2ge7y4bu
Modeling Social Engineering Botnet Dynamics across Multiple Social Networks
[chapter]
2012
IFIP Advances in Information and Communication Technology
In this paper, we formalize a new propagation model to reveal the general infection process of social engineering botnets in multiple social networks. ...
In order to have a better understanding of the dynamics of these botnets, defenders should model the process of their propagation. ...
When β i approaches to zero, n i is hardly infected by bot programs, and if β i = 1, n i will be captured as long as it is attacked by other infected nodes with the trap message. ...
doi:10.1007/978-3-642-30436-1_22
fatcat:gtuaj4aljrajdav3jrffrjs3ve
On Abstract Computer Virology from a Recursion Theoretic Perspective
2006
Journal in Computer Virology
We in this study capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic virus constructions and we illustrate them by various examples. ...
We are concerned with theoretical aspects of computer viruses. ...
This theorem, analogous to the one of Adleman's [1] , states the existence of a virus such that the set of its infected forms cannot be decided. ...
doi:10.1007/s11416-005-0007-4
fatcat:qszvdv54qbbsvpuveicfrskvpa
Guided path exploration for regression test generation
2009
2009 31st International Conference on Software Engineering - Companion Volume
program-state differences after its execution than the search strategies without guidance. ...
Regression test generation can be automated by using Dynamic Symbolic Execution (DSE), a state-of-the-art test generation technique, to generate a test suite achieving high structural coverage. ...
Suppose δ is executed, the program state is infected after the execution of δ, but the infection does not propagate to an observable output. ...
doi:10.1109/icse-companion.2009.5071009
dblp:conf/icse/TanejaXTHS09
fatcat:drdmu3yvyfgpbmmzjcrrphqfqm
Coincidental Correctness in the Defects4J Benchmark
[article]
2019
arXiv
pre-print
RQ3: Do CC tests induce peculiar infection paths in Defects4J? RQ4: Are the infections likely to be nullified within or outside the buggy method? .... ...
Coincidental correctness (CC) arises when a defective program produces the correct output despite the fact that the defect within was exercised. ...
Acknowledgment This research was supported in part by the Lebanese National Council for Scientific Research, and by the University Research Board at the American University of Beirut. ...
arXiv:1808.09233v4
fatcat:f5maxygigfc4fmonbyabyexequ
Immunization against Infection Propagation in Heterogeneous Networks
2014
2014 IEEE 13th International Symposium on Network Computing and Applications
In this paper, we incorporate node properties in a well-known Susceptible Infected Recovered Susceptible (SIRS) model for infection propagation, and propose new heuristics to curb the spread of infection ...
Modeling spreading processes for infections has been a widely researched area owing to its application in variety of domains especially epidemic spread and worm propagation. ...
ACKNOWLEDGMENT This work is supported in part by the National Science Foundation (CNS-1238959, CNS-1035655) and National Institute of Standards and Technology (70NANB13H169). ...
doi:10.1109/nca.2014.51
dblp:conf/nca/AbbasBVK14
fatcat:zi3biyocmbbirexnfqrnfufxhu
Smartphone viruses propagation on heterogeneous composite networks
2013
2013 IEEE 2nd Network Science Workshop (NSW)
We analyze our model using techniques from dynamic systems and find that the first eigenvalue of the system matrices λ S1 ,λ S2 of the two networks (static and dynamic networks) appropriately captures ...
Smartphones are now targets of malicious viruses. ...
This work is also partially supported by funds from the VT College of Engineering. ...
doi:10.1109/nsw.2013.6609203
dblp:conf/nsw/WeiVFNPF13
fatcat:xmpkst3pfzcddaubsor7ihehum
Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network
2014
Sensors & Transducers
the immunization strategy and the degrees of node can affect the propagation of malicious program. ...
The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs. ...
Acknowledgements This work is partially supported by National Natural Science Foundation of China under grant (No. 61103245) and Hengyang Science &Pan Project (No. 2009KG55). ...
doaj:a25b925d1e794c5db9853ab15ab45483
fatcat:kroxlporgvboloaplqnufqgsla
Search-Based Propagation of Regression Faults in Automated Regression Testing
2013
2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops
However, simply executing the changed code does not guarantee that a regression fault manifests in a state change, or that this state change propagates to an observable output where it could be detected ...
Over the lifetime of software programs, developers make changes by adding, removing, enhancing functionality or by refactoring code. ...
Secondly, the execution should result in a change and therefore infect the state of the program. Finally, it should propagate to an observable difference in the output. ...
doi:10.1109/icstw.2013.51
dblp:conf/icst/ShamshiriFMO13
fatcat:e6vpkga65nhyzlud27bnxylika
Killing Stubborn Mutants with Symbolic Execution
2021
ACM Transactions on Software Engineering and Methodology
SEMu aims at mutant propagation (triggering erroneous states to the program output) by incrementally searching for divergent program behaviours between the original and the mutant versions. ...
Perhaps more importantly, our results also show that, within a two-hour time limit, SEMu kills 37% of the stubborn mutants, where KLEE kills none and where the mutant infection strategy (strategy suggested ...
ACKNOWLEDGMENTS This work was supported by the CORE Grant of National Research Fund, Luxembourg, C17/IS/11686509/CODEMATES. ...
doi:10.1145/3425497
fatcat:7oxqh7xm4bhndaz4ltexsl5ysy
Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT
2019
Security and Communication Networks
In this paper, we propose a non-Markovian spread dynamics model to understand the effects of botnet propagation, which can characterize the hybrid contagion situation in reality. ...
Furthermore, we give the theory and simulation result on BA network and also compare the two hybrid methods—single infection in one time slice and double infections in one time slice—to evaluate the influence ...
Acknowledgments is study was financially supported in part by a program of National Natural Science Foundation of China (NSFC) ...
doi:10.1155/2019/6803801
fatcat:jqjy4weslrb27a4o2bvv6fitl4
Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations
2017
IEEE Access
In particular, a worm in a sensor network requires a long sequence of packets propagating hop-by-hop to each new infected node in turn. ...
In particular, it blocks worm propagation while restricting the fraction of infected nodes to at most 13.5% with an overhead of at most 0.63 remote attestations per node per time slot. ...
All sensor nodes are initially in the susceptible state except worm originators that are in the infectious state. Once a susceptible node is infected by worm, its state is changed to infectious. ...
doi:10.1109/access.2017.2648853
fatcat:ygxyntyssjaytoa3snjqxy653y
First detection ofWest Nile virusin domestic pigeon in Korea
2016
Journal of Veterinary Science
West Nile virus (WNV) is a mosquito-borne zoonotic pathogen that has spread throughout Europe and the United States. ...
Recently, WNV spread to East and Southeast Asia, and great efforts have been made in South Korea to prevent the spread of WNV from neighboring countries. ...
and the National Institute of Environmental Research (NIER) in Korea. ...
doi:10.4142/jvs.2016.17.4.587
pmid:27030190
pmcid:PMC5204039
fatcat:eh54yebfxvev7oin52ajezahxe
« Previous
Showing results 1 — 15 out of 27,771 results