27,771 Hits in 4.5 sec

Capturing propagation of infected program states

Zhenyu Zhang, W. K. Chan, T. H. Tse, Bo Jiang, Xinming Wang
2009 Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering on European software engineering conference and foundations of software engineering symposium - ESEC/FSE '09  
We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspiciousness scores  ...  However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them.  ...  In our technique, we capture the propagation of infected program states via CFG.  ... 
doi:10.1145/1595696.1595705 dblp:conf/sigsoft/ZhangCTJW09 fatcat:w2bsdg4o6rfa3cchay36rsengm

Title Capturing propagation of infected program states

Z Zhang, Wk Chan, Th Tse, B Jiang, Wang
2009 unpublished
We assess the suspiciousness of the infected program states propagated through each edge, associate basic blocks with edges via such propagation of infected program states, calculate suspicious-ness scores  ...  However, many such techniques focus on assessing the suspiciousness of individual program entities but ignore the propagation of infected program states among them.  ...  In our technique, we capture the propagation of infected program states via CFG.  ... 

Automated unit test generation for evolving software

Sina Shamshiri
2015 Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2015  
state to the output, or may suffer from scalability issues, especially when a large sequence of calls is required for propagation.  ...  While this problem has been well studied in the literature, the current approaches for automatically generating such tests either only attempt to reach the change and do not aim to propagate the infected  ...  While this may indicate a lack of adequate oracles (i.e. assertions), it also shows that either the fault infected the state of the program and yet did not propagate to the output, or a specific dataflow  ... 
doi:10.1145/2786805.2803196 dblp:conf/sigsoft/Shamshiri15 fatcat:elug7xnlaje2lk4rpm2ge7y4bu

Modeling Social Engineering Botnet Dynamics across Multiple Social Networks [chapter]

Shuhao Li, Xiaochun Yun, Zhiyu Hao, Yongzheng Zhang, Xiang Cui, Yipeng Wang
2012 IFIP Advances in Information and Communication Technology  
In this paper, we formalize a new propagation model to reveal the general infection process of social engineering botnets in multiple social networks.  ...  In order to have a better understanding of the dynamics of these botnets, defenders should model the process of their propagation.  ...  When β i approaches to zero, n i is hardly infected by bot programs, and if β i = 1, n i will be captured as long as it is attacked by other infected nodes with the trap message.  ... 
doi:10.1007/978-3-642-30436-1_22 fatcat:gtuaj4aljrajdav3jrffrjs3ve

On Abstract Computer Virology from a Recursion Theoretic Perspective

G. Bonfante, M. Kaczmarek, J.-Y. Marion
2006 Journal in Computer Virology  
We in this study capture in a natural way previous definitions, and in particular the one of Adleman. We establish generic virus constructions and we illustrate them by various examples.  ...  We are concerned with theoretical aspects of computer viruses.  ...  This theorem, analogous to the one of Adleman's [1] , states the existence of a virus such that the set of its infected forms cannot be decided.  ... 
doi:10.1007/s11416-005-0007-4 fatcat:qszvdv54qbbsvpuveicfrskvpa

Guided path exploration for regression test generation

Kunal Taneja, Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte
2009 2009 31st International Conference on Software Engineering - Companion Volume  
program-state differences after its execution than the search strategies without guidance.  ...  Regression test generation can be automated by using Dynamic Symbolic Execution (DSE), a state-of-the-art test generation technique, to generate a test suite achieving high structural coverage.  ...  Suppose δ is executed, the program state is infected after the execution of δ, but the infection does not propagate to an observable output.  ... 
doi:10.1109/icse-companion.2009.5071009 dblp:conf/icse/TanejaXTHS09 fatcat:drdmu3yvyfgpbmmzjcrrphqfqm

Coincidental Correctness in the Defects4J Benchmark [article]

Rawad Abou Assi, Chadi Trad, Marwan Maalouf, Wes Masri
2019 arXiv   pre-print
RQ3: Do CC tests induce peculiar infection paths in Defects4J? RQ4: Are the infections likely to be nullified within or outside the buggy method? ....  ...  Coincidental correctness (CC) arises when a defective program produces the correct output despite the fact that the defect within was exercised.  ...  Acknowledgment This research was supported in part by the Lebanese National Council for Scientific Research, and by the University Research Board at the American University of Beirut.  ... 
arXiv:1808.09233v4 fatcat:f5maxygigfc4fmonbyabyexequ

Immunization against Infection Propagation in Heterogeneous Networks

Waseem Abbas, Sajal Bhatia, Yevgeniy Vorobeychik, Xenofon Koutsoukos
2014 2014 IEEE 13th International Symposium on Network Computing and Applications  
In this paper, we incorporate node properties in a well-known Susceptible Infected Recovered Susceptible (SIRS) model for infection propagation, and propose new heuristics to curb the spread of infection  ...  Modeling spreading processes for infections has been a widely researched area owing to its application in variety of domains especially epidemic spread and worm propagation.  ...  ACKNOWLEDGMENT This work is supported in part by the National Science Foundation (CNS-1238959, CNS-1035655) and National Institute of Standards and Technology (70NANB13H169).  ... 
doi:10.1109/nca.2014.51 dblp:conf/nca/AbbasBVK14 fatcat:zi3biyocmbbirexnfqrnfufxhu

Smartphone viruses propagation on heterogeneous composite networks

Xuetao Wei, Nicholas C. Valler, Michalis Faloutsos, Iulian Neamtiu, B. Aditya Prakash, Christos Faloutsos
2013 2013 IEEE 2nd Network Science Workshop (NSW)  
We analyze our model using techniques from dynamic systems and find that the first eigenvalue of the system matrices λ S1 ,λ S2 of the two networks (static and dynamic networks) appropriately captures  ...  Smartphones are now targets of malicious viruses.  ...  This work is also partially supported by funds from the VT College of Engineering.  ... 
doi:10.1109/nsw.2013.6609203 dblp:conf/nsw/WeiVFNPF13 fatcat:xmpkst3pfzcddaubsor7ihehum

Research on Propagation Model of Malicious Programs in Ad Hoc Wireless Network

Weimin GAO, Lingzhi ZHU, Junbin LIANG
2014 Sensors & Transducers  
the immunization strategy and the degrees of node can affect the propagation of malicious program.  ...  The research of malicious programs on wireless network has become a new research hotspot in the field of malicious programs.  ...  Acknowledgements This work is partially supported by National Natural Science Foundation of China under grant (No. 61103245) and Hengyang Science &Pan Project (No. 2009KG55).  ... 
doaj:a25b925d1e794c5db9853ab15ab45483 fatcat:kroxlporgvboloaplqnufqgsla

Search-Based Propagation of Regression Faults in Automated Regression Testing

Sina Shamshiri, Gordon Fraser, Phil Mcminn, Alessandro Orso
2013 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops  
However, simply executing the changed code does not guarantee that a regression fault manifests in a state change, or that this state change propagates to an observable output where it could be detected  ...  Over the lifetime of software programs, developers make changes by adding, removing, enhancing functionality or by refactoring code.  ...  Secondly, the execution should result in a change and therefore infect the state of the program. Finally, it should propagate to an observable difference in the output.  ... 
doi:10.1109/icstw.2013.51 dblp:conf/icst/ShamshiriFMO13 fatcat:e6vpkga65nhyzlud27bnxylika

Killing Stubborn Mutants with Symbolic Execution

Thierry Titcheu Chekam, Mike Papadakis, Maxime Cordy, Yves Le Traon
2021 ACM Transactions on Software Engineering and Methodology  
SEMu aims at mutant propagation (triggering erroneous states to the program output) by incrementally searching for divergent program behaviours between the original and the mutant versions.  ...  Perhaps more importantly, our results also show that, within a two-hour time limit, SEMu kills 37% of the stubborn mutants, where KLEE kills none and where the mutant infection strategy (strategy suggested  ...  ACKNOWLEDGMENTS This work was supported by the CORE Grant of National Research Fund, Luxembourg, C17/IS/11686509/CODEMATES.  ... 
doi:10.1145/3425497 fatcat:7oxqh7xm4bhndaz4ltexsl5ysy

Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT

Mingyong Yin, Xingshu Chen, Qixu Wang, Wei Wang, Yulong Wang
2019 Security and Communication Networks  
In this paper, we propose a non-Markovian spread dynamics model to understand the effects of botnet propagation, which can characterize the hybrid contagion situation in reality.  ...  Furthermore, we give the theory and simulation result on BA network and also compare the two hybrid methods—single infection in one time slice and double infections in one time slice—to evaluate the influence  ...  Acknowledgments is study was financially supported in part by a program of National Natural Science Foundation of China (NSFC)  ... 
doi:10.1155/2019/6803801 fatcat:jqjy4weslrb27a4o2bvv6fitl4

Distributed Detection of Sensor Worms Using Sequential Analysis and Remote Software Attestations

Jun-Won Ho, Matthew Wright
2017 IEEE Access  
In particular, a worm in a sensor network requires a long sequence of packets propagating hop-by-hop to each new infected node in turn.  ...  In particular, it blocks worm propagation while restricting the fraction of infected nodes to at most 13.5% with an overhead of at most 0.63 remote attestations per node per time slot.  ...  All sensor nodes are initially in the susceptible state except worm originators that are in the infectious state. Once a susceptible node is infected by worm, its state is changed to infectious.  ... 
doi:10.1109/access.2017.2648853 fatcat:ygxyntyssjaytoa3snjqxy653y

First detection ofWest Nile virusin domestic pigeon in Korea

C-Yoon Kim, Hanseul Oh, Juha Song, Moonsuk Hur, Jae-Hwa Suh, Weon-Hwa Jheong, Jong-Taek Kim, Hong-Shik Oh, Jae-Hak Park
2016 Journal of Veterinary Science  
West Nile virus (WNV) is a mosquito-borne zoonotic pathogen that has spread throughout Europe and the United States.  ...  Recently, WNV spread to East and Southeast Asia, and great efforts have been made in South Korea to prevent the spread of WNV from neighboring countries.  ...  and the National Institute of Environmental Research (NIER) in Korea.  ... 
doi:10.4142/jvs.2016.17.4.587 pmid:27030190 pmcid:PMC5204039 fatcat:eh54yebfxvev7oin52ajezahxe
« Previous Showing results 1 — 15 out of 27,771 results