Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration
暂无分享,去创建一个
Stacy J. Prowell | Richard C. Linger | Mark G. Pleszkoch | Kirk Sayre | T. Scott Ankrum | R. Linger | M. Pleszkoch | Kirk Sayre | S. Prowell | T. Ankrum
[1] Tim Daly,et al. FXplorer: Exploration of Computed Software Behavior - A New Approach to Understanding and Verification , 2009 .
[2] Stacy J. Prowell,et al. Automated Behavior Computation for Software Analysis and Validation , 2012, 2012 45th Hawaii International Conference on System Sciences.
[3] Stacy J. Prowell,et al. Cleanroom software engineering: technology and process , 1999 .
[4] Richard C. Linger,et al. Technology Foundations for Computational Evaluation of Software Security Attributes , 2006 .
[5] Alan R. Hevner,et al. The impacts of function extraction technology on program comprehension: A controlled experiment , 2008, Inf. Softw. Technol..
[6] Peter D. Mosses. A Practical Introduction to Denotational Semantics , 1989, Formal Description of Programming Concepts.
[7] Patrick Cousot,et al. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints , 1977, POPL.
[8] James C. King,et al. Symbolic execution and program testing , 1976, CACM.
[9] Lloyd Allison,et al. A Practical Introduction to Denotational Semantics , 1987 .
[10] Harlan D. Mills,et al. Structured programming - theory and practice , 1979, The systems programming series.