Filters








591 Hits in 6.9 sec

Abstractions for Practical Virtual Machine Replay

Anton Burtsev, David Johnson, Mike Hibler, Eric Eide, John Regehr
2016 Proceedings of the12th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments - VEE '16  
Efficient deterministic replay of whole operating systems is feasible and useful, so why isn't replay a default part of the software stack?  ...  We build and evaluate our architecture in Xen, a full-featured hypervisor. Our architecture can be readily followed and adopted, enabling replay as a ubiquitous part of a modern virtualization stack.  ...  This work was supported in part by the Air Force Research Laboratory and DARPA under Contract No. FA8750-10-C-0242.  ... 
doi:10.1145/2892242.2892257 dblp:conf/vee/BurtsevJHER16 fatcat:vszr2bmn7fg4doesvf65x36eny

Abstractions for Practical Virtual Machine Replay

Anton Burtsev, David Johnson, Mike Hibler, Eric Eide, John Regehr
2016 SIGPLAN notices  
Efficient deterministic replay of whole operating systems is feasible and useful, so why isn't replay a default part of the software stack?  ...  We build and evaluate our architecture in Xen, a full-featured hypervisor. Our architecture can be readily followed and adopted, enabling replay as a ubiquitous part of a modern virtualization stack.  ...  This work was supported in part by the Air Force Research Laboratory and DARPA under Contract No. FA8750-10-C-0242.  ... 
doi:10.1145/3007611.2892257 fatcat:z6er5t25pba7hnlnffkjp62ovq

Automatically Recommending Triage Decisions for Pragmatic Reuse Tasks

Reid Holmes, Tristan Ratchford, Martin P. Robillard, Robert J. Walker
2009 2009 IEEE/ACM International Conference on Automated Software Engineering  
Pragmatic reuse tasks, where source code is reused in a white-box fashion, is an example of a complex and error-prone modification task: the developer must plan out which portions of a system to reuse,  ...  extract the code, and integrate it into their own system.  ...  This work was supported by the Natural Sciences and Engineering Research Council of Canada in the form of a Postdoctoral Fellowship and Discovery Grants.  ... 
doi:10.1109/ase.2009.65 dblp:conf/kbse/HolmesRRW09 fatcat:3mvvvliuobd7zhhncshrzx6chq

Patterns for Blockchain Data Migration [article]

HMN Dilum Bandara and Xiwei Xu and Ingo Weber
2020 arXiv   pre-print
, cost efficiency, privacy, and regulatory compliance.  ...  Practical considerations and research challenges are also highlighted.  ...  However, code reuse requires both the source and target smart contract execution environment to behave the same way [11] .  ... 
arXiv:1906.00239v2 fatcat:aqiqt4zy4jbefpqph2hoz2u45i

SpyREST: Automated RESTful API Documentation Using an HTTP Proxy Server (N)

S M Sohan, Craig Anslow, Frank Maurer
2015 2015 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)  
RESTful API documentation is expensive to produce and maintain due to the lack of reusable tools and automated solutions.  ...  SpyREST uses a proxy to intercept example API calls and intelligently produces API documentation for RESTful Web APIs by processing the request and response data.  ...  The documentation produced by such tools include description of objects and methods, with custom texts primarily sourced via comments in the source code.  ... 
doi:10.1109/ase.2015.52 dblp:conf/kbse/SohanAM15 fatcat:eayvqsjzejbefavcxybm3czsji

Finding and Reproducing Heisenbugs in Concurrent Programs

Madanlal Musuvathi, Shaz Qadeer, Thomas Ball, Gérard Basler, Piramanayagam Arumuga Nainar, Iulian Neamtiu
2008 USENIX Symposium on Operating Systems Design and Implementation  
CHESS has been integrated into the test frameworks of many code bases inside Microsoft and is used by testers on a daily basis.  ...  For each bug, CHESS consistently reproduces an erroneous execution manifesting the bug, thereby making it significantly easier to debug the problem.  ...  Acknowledgments We would like to thank Chris Dern, Pooja Nagpal, Rahul Patil, Raghu Simha, Roy Tan, and Susan Wo for being immensely patient first users of CHESS.  ... 
dblp:conf/osdi/MusuvathiQBBNN08 fatcat:woqyt2dmdrh5das5xesa3f2dby

DR-OSGi: Hardening Distributed Components with Network Volatility Resiliency [chapter]

Young-Woo Kwon, Eli Tilevich, Taweesup Apiwattanapong
2009 Lecture Notes in Computer Science  
DR-OSGi imposes a very low overhead on the hardened applications, requires no changes to their source code, and is plug-in extensible.  ...  In addition, these solutions are difficult to customize for different networks and to reuse across different applications.  ...  Recall that queuing works by recording remote service calls when the network is unavailable and replays the recorded calls once the connection is restored.  ... 
doi:10.1007/978-3-642-10445-9_19 fatcat:t5o3cxfq6nenfczspwgdzqvhwq

Usable live programming

Sean McDirmid
2013 Proceedings of the 2013 ACM international symposium on New ideas, new paradigms, and reflections on programming & software - Onward! '13  
Programming today involves code editing mixed with bouts of debugging to get feedback on code execution.  ...  This paper describes how live execution feedback can be woven into the editor by making places in program execution, not just code, navigable so that evaluation results can be probed directly within the  ...  Acknowledgments Thanks to Jonathan Edwards, Jules Jacob, and the anonymous reviewers for providing feedback on this work.  ... 
doi:10.1145/2509578.2509585 dblp:conf/oopsla/McDirmid13 fatcat:jgz7xa3znfbxpeojt4sjsziqpm

Using a Formal B Model at Runtime in a Demonstration of the ETCS Hybrid Level 3 Concept with Real Trains [chapter]

Dominik Hansen, Michael Leuschel, David Schneider, Sebastian Krings, Philipp Körner, Thomas Naulin, Nader Nayeri, Frank Skowron
2018 Lecture Notes in Computer Science  
We report on the development of the VBF, implemented as a formal B model executed at runtime using ProB and successfully used in a field demonstration to control real trains.  ...  Centre (RBC) of Thales, called Virtual Block Function (VBF), which computes the occupation states of the VSSs according to the HL3 concept using the train position reports, train integrity information, and  ...  ClearSy for their work and support on the demonstrator.  ... 
doi:10.1007/978-3-319-91271-4_20 fatcat:aqouizs7kfhwvftqlxqrb7ru4u

Automated Verification for Secure Messaging Protocols and Their Implementations: A Symbolic and Computational Approach

Nadim Kobeissi, Karthikeyan Bhargavan, Bruno Blanchet
2017 2017 IEEE European Symposium on Security and Privacy (EuroS&P)  
The protocol is implemented in ProScript, a new domain-specific language that is designed for writing cryptographic protocol code that can both be executed within JavaScript programs and automatically  ...  If ProVerif finds an attack, or if the CryptoVerif proof reveals a weakness, the protocol designer modifies the ProScript protocol code and regenerates the model to enable a new analysis.  ...  This work was funded by the following grants: ERC CIRCUS, EU NEXTLEAP, and ANR AJACS.  ... 
doi:10.1109/eurosp.2017.38 dblp:conf/eurosp/KobeissiBB17 fatcat:jc3mdwujmzd2rhtzd3262sn2ca

Validation and real-life demonstration of ETCS hybrid level 3 principles using a formal B model

Dominik Hansen, Michael Leuschel, Philipp Körner, Sebastian Krings, Thomas Naulin, Nader Nayeri, David Schneider, Frank Skowron
2020 International Journal on Software Tools for Technology Transfer (STTT)  
We report on the development of the VBF, implemented as a formal B model executed at runtime using ProB and successfully used in a field demonstration to control real trains.  ...  radio block centre (RBC) of Thales, called virtual block function (VBF), which computes the occupation states of the virtual subsections using the train position reports, train integrity information, and  ...  as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.  ... 
doi:10.1007/s10009-020-00551-6 fatcat:xvpwfgb5fnfb5cjn3ji6jzy7j4

Employing a Parametric Model for Analytic Provenance

Yingjie Victor Chen, Zhenyu Cheryl Qian, Robert Woodbury, John Dill, Chris D. Shaw
2014 ACM transactions on interactive intelligent systems (TiiS)  
In each Challenge the analyst first created a symbolic model to help explore, understand, analyze, and solve a particular sub-problem, and later reused the model via its dependency graph propagation mechanism  ...  This approach combines a script language to capture and encode the analytic process and a parametrically controlled symbolic model to represent and reuse the analytic process.  ...  Phone 309 is likely the replacement of phone 1 alyst can use the same strategy to check all the 6 phones: phones 1, 2, 3, 5, 97, and 137, a process made much simpler and more reliable via script reuse,  ... 
doi:10.1145/2591510 fatcat:g3b7qbyeevfjvcmkb2d7cua2zm

SPIDER: A Practical Fuzzing Framework to Uncover Stateful Performance Issues in SDN Controllers [article]

Ao Li, Rohan Padhye, Vyas Sekar
2022 arXiv   pre-print
We identify key challenges in applying canonical program analysis techniques: large input space of messages (e.g., stateful OpenFlow protocol), complex code base and software architecture (e.g., OSGi framework  ...  with dynamic launch), and the semantic dependencies between the internal state and external inputs.  ...  At the other extreme, we have "white-box" fuzzing [35] which inspects source code to analyze state and execution paths.  ... 
arXiv:2209.04026v1 fatcat:cvbqlynj4vg77gcntrmhjalxce

Platforms for publishing and archiving computer-aided research

Konrad Hinsen
2014 F1000Research  
in a form that enables installation-free deployment, encourages reuse, and permits the full integration of datasets and software into the scientific record.  ...  The lack of replicability and reproducibility of scientific studies based on computational methods has lead to serious mistakes in published scientific findings, some of which have been discovered and  ...  The second solution is to record all interactive code execution in a log, which can then be replayed.  ... 
doi:10.12688/f1000research.5773.1 pmid:26064469 pmcid:PMC4448745 fatcat:5y7do2vk4jbp5evodp6277dymm

A Bad Dream: Subverting Trusted Platform Module While You Are Sleeping

Seunghun Han, Wook Shin, Jun-Hyeok Park, Hyoung-Chun Kim
2018 USENIX Security Symposium  
The other attack is exploiting an implementation flaw in tboot, the most popular measured launched environment used with Intel's Trusted Execution Technology.  ...  The attacks allow an adversary to reset and forge platform configuration registers which are designed to securely hold measurements of software that are used for bootstrapping a computer.  ...  His constructive and priceless advice greatly helped us improve our manuscript. We also thank the anonymous reviewers and Junghwan Kang for their insightful comments.  ... 
dblp:conf/uss/HanSPK18 fatcat:l46jncxlyzea3hwo3ick3ku4ei
« Previous Showing results 1 — 15 out of 591 results