The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Dynamic symbolic execution is an important automated testing technique. Firstly, we introduce the traditional symbolic execution and dynamic symbolic execution technology, and then review the research status of Python application testing with dynamic symbolic execution technology. Then we compare and analyze the dynamic symbolic execution tools with the existing Python programs and Architectures,...
Active ECUs (Electronic Control Unit) in a hybrid car while it is charging leads to inefficient power usage and reduction in ECU lifetime. To solve this issue, AUTOSAR has suggested PN (partial networking). As per the AUTOSAR specification, ECUs which are not required to be kept active during battery charging must be shutdown. This project's aim is to analyze the robustness of the design suggested...
A Human Machine Interface (HMI) is software that presents information to a client regarding the state of a process, accept commands and execute the operators control directions. Usually in HMI, information is displayed in lifelike format or graphical user interface. As HMI is the need of hour in automobile industry, new vehicles are designed with more sophisticated safety features and driver vehicle...
The software birthmarks were proposed for detecting the software theft, which is suspected a copy. The birthmark system extracts native characteristics of a program. Then, the system computes the similarity between two birthmarks. This paper proposes the reduction method of the comparison time for the birthmark system. The conventional birthmark systems did not care the comparison time. Therefore,...
In this extended abstract, we briefly survey the vision and goals of On-The-Fly (OTF) computing. Then we turn to heterogeneous multi-cores which, as platforms for OTF computing scenarios, have to support a high dynamics in both the workload and the system state. We argue that concepts and models of self-awareness studied in, for example, psychology, have been successfully transferred to the computing...
Big Data refers to data volumes in the range of Exabyte (1018) and beyond. Such volumes exceed the capacity of current on-line storage and processing systems. With characteristics like volume, velocity and variety big data throws challenges to the traditional IT establishments. Computer assisted innovation, real time data analytics, customer-centric business intelligence, industry wide decision making...
Interactive images can increase the popularity of some existing technologies. Although the most popular way to create interactive images is using the already popular maps engines, there is a large number of available options. In this paper, we analyze several Maps APIs and evaluate the most suitable API for interactive images regarding its usability, accessibility and performance. The result is that...
A hazard of ongoing Network Function Virtualization (NFV) realizations is the lack of a common understanding in support of development, deployment and operation tasks related to Virtual Function Networks (VNFs), NFV components and interfaces. In the current state of affairs, NFV stakeholders commonly create their own terminology to define and describe NFV components, following going the specifications...
Given two test cases, one larger and one smaller, the smaller test case is preferred for many purposes. A smaller test case usually runs faster, is easier to understand, and is more convenient for debugging. However, smaller test cases also tend to cover less code and detect fewer faults than larger test cases. Whereas traditional research focused on reducing test suites while preserving code coverage,...
Concolic (concrete+symbolic) execution has recently gained popularity as an effective means to uncover non-trivial vulnerabilities in software, such as subtle buffer overflows. However, symbolic execution tools that are designed to optimize statement coverage often fail to cover potentially vulnerable code because of complex system interactions and scalability issues of constraint solvers. In this...
Software engineering is extremely information-intensive. Every day developers work with source code, version repositories, issue trackers, documentation, web-based and other information resources. However, three key aspects of information work lack good support: (i) combining information from different sources; (ii) flexibly presenting collected information to enable easier comprehension; and (iii)...
Buffer overflow is one of the most common types of software vulnerabilities. Various static analysis and dynamic testing techniques have been proposed to detect buffer overflow vulnerabilities. With automatic tool support, static buffer overflow detection technique has been widely used in academia and industry. However, it tends to report too many false positives fundamentally due to the lack of software...
Hardware-in-the-loop (HIL) and fault injection testing are widely used in automotive industry to validate hardware and software architectures as best practice and in fulfillment with international functional safety standards. Time and economical investments can constitute an obstacle to the development of effective testing systems, especially for small and medium automotive industries. This paper...
The verification and validation of industrial closed-loop automotive systems still remains a major challenge. The overall goal is to verify properties of the closed-loop combination of control software and physical plant. While current software model-checking techniques can be applied on a software component of the system, the end result is not very useful unless the interactions with the physical...
We present a dual technique for generating and verifying proof certificates in SMT-based model checkers, focusing on proofs of invariant properties. Certificates for two major model checking algorithms are extracted as k-inductive invariants, minimized and then reduced to a formal proof term with the help of an independent proof-producing SMT solver. SMT-based model checkers typically translate input...
Reverse Engineering benign or malicious samples can take a considerable amount of time. Reversing many samples, or tracking changes in malware families, can cause an analyst to see similar or even the same functions used over and over. The similar, or same, functions could be seen recently, allowing the analyst to recall the metadata they associated with it. However, most likely, the disassembly will...
Automatic Program Repair (APR) is an emerging and rapidly growing research area, with many techniques proposed to repair defective software. One notable state-of-the-art line of APR approaches is known as semantics-based techniques, e.g., Angelix, which extract semantics constraints, i.e., specifications, via symbolic execution and test suites, and then generate repairs conforming to these constraints...
Code smells represent well known symptoms of problems at code level, and architectural smells can be seen as their counterpart at architecture level. If identified in a system, they are usually considered more critical than code smells, for their effect on maintainability issues. In this paper, we introduce a tool for the detection of architectural smells that could have an impact on the stability...
The paper proposes an approach to instruction stream generation for verification of microprocessor designs. The approach is based on using formal specifications of the instruction set architecture as a source of knowledge about the design under verification. This knowledge is processed with generic engines implementing an extensible set of generation strategies to produce stimuli in the form of instruction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.