A methodology is presented that will detect robustness failures in source code where I/O errors could occur and where there is no mechanism in place to handle the error. The details of the methodology are described showing how traditional compiler data flow analysis can be augmented to find structurally, within the application, code that can be used to perform error checking. In addition we describe how this code can be used to ensure the correctness of the I/O error checking
This paper presents a new error detection technique called software implemented error detection (SIE...
We develop an approach to apply formal methods to represent the program source codes as a model, aft...
Previous work has shown that using only simple behavior based error detection mechanisms invisible t...
This paper presents a technique to derive and implement error detectors to protect an application fr...
Constructing a dependable and fault-tolerant system is inherently difficult. Not only should the sys...
A major obstacle to nding program errors in a real system is knowing what correctness rules the sys...
We present a methodology and a prototype of a source-to-source transformation tool for error fixing ...
As semiconductor technology scales into the deep submicron regime the occurrence of transient or sof...
International audienceThis paper presents two error models to evaluate safety of a software error de...
More applications are designed as server programs, many of which are expected to run 24x7. Ensuring ...
We introduce a general way to locate programmer mistakes that are detected by static anal-yses such ...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
We evaluate the use of program checking to ensure the correctness of compiler implementations. Our c...
Content replaced at author's request on 2013-12-17.We introduce a general way to locate program erro...
Programmers generally attempt to perform useful work. If they performed an action, it was because th...
This paper presents a new error detection technique called software implemented error detection (SIE...
We develop an approach to apply formal methods to represent the program source codes as a model, aft...
Previous work has shown that using only simple behavior based error detection mechanisms invisible t...
This paper presents a technique to derive and implement error detectors to protect an application fr...
Constructing a dependable and fault-tolerant system is inherently difficult. Not only should the sys...
A major obstacle to nding program errors in a real system is knowing what correctness rules the sys...
We present a methodology and a prototype of a source-to-source transformation tool for error fixing ...
As semiconductor technology scales into the deep submicron regime the occurrence of transient or sof...
International audienceThis paper presents two error models to evaluate safety of a software error de...
More applications are designed as server programs, many of which are expected to run 24x7. Ensuring ...
We introduce a general way to locate programmer mistakes that are detected by static anal-yses such ...
Computer intrusions can occur in various ways. Many of them occur by exploiting program flaws and sy...
We evaluate the use of program checking to ensure the correctness of compiler implementations. Our c...
Content replaced at author's request on 2013-12-17.We introduce a general way to locate program erro...
Programmers generally attempt to perform useful work. If they performed an action, it was because th...
This paper presents a new error detection technique called software implemented error detection (SIE...
We develop an approach to apply formal methods to represent the program source codes as a model, aft...
Previous work has shown that using only simple behavior based error detection mechanisms invisible t...