The literature is rife with examples of attackers exploiting unexpected system behaviours that arise from program bugs. This problem is particularly widespread in contemporary application programs, owing to the complexity of their many interconnected parts. We consider this problem, and consider how runtime verification could be used to check an executing program against a model of expected behaviour generated during unit testing.
CITATION STYLE
Pieczul, O., & Foley, S. N. (2015). The dark side of the code. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 9379, pp. 1–11). Springer Verlag. https://doi.org/10.1007/978-3-319-26096-9_1
Mendeley helps you to discover research relevant for your work.