By Topic

The 18th IEEE International Symposium on Software Reliability (ISSRE '07)

Date 5-9 Nov. 2007

Filter Results

Displaying Results 1 - 25 of 36
  • The 18th IEEE International Symposium on Software Reliability - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (303 KB)
    Freely Available from IEEE
  • The 18th IEEE International Symposium on Software Reliability - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • The 18th IEEE International Symposium on Software Reliability - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (45 KB)
    Freely Available from IEEE
  • The 18th IEEE International Symposium on Software Reliability - TOC

    Publication Year: 2007, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (47 KB)
    Freely Available from IEEE
  • Greetings from the General and Program Chairs

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (34 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s):ix - x
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (34 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2007, Page(s):xiii - xiv
    Request permission for commercial reuse | PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Secondary reviewers

    Publication Year: 2007, Page(s):xv - xvi
    Request permission for commercial reuse | PDF file iconPDF (30 KB)
    Freely Available from IEEE
  • Sensitivity of Website Reliability to Usage Profile Changes

    Publication Year: 2007, Page(s):3 - 8
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (269 KB) | HTML iconHTML

    To measure the reliability of a website from a user's point of view, the uncertainly on the usage of the website has to be taken into account. In this paper we investigate the influence of this uncertainly on the reliability estimate for a web server. For this purpose a session based Markov model is used to model the usage extracted from the server's logfiles. From these logfiles a complete user p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Measuring Software Reliability in Practice: An Industry Case Study

    Publication Year: 2007, Page(s):9 - 16
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    Software reliability modeling techniques have been touted as way of measuring and tracking software systems reliability. However a number of issues make it difficult to use and apply these models in practice. In this paper we show some of the challenges and issues that we have encountered in applying these techniques to track and predict a networking software system reliability behavior at two dif... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Reliability Modeling with Test Coverage: Experimentation and Measurement with A Fault-Tolerant Software Project

    Publication Year: 2007, Page(s):17 - 26
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    As the key factor in software quality, software reliability quantifies software failures. Traditional software reliability growth models use the execution time during testing for reliability estimation. Although testing time is an important factor in reliability, it is likely that the prediction accuracy of such models can be further improved by adding other parameters which affect the final softw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinated Atomic Actions for Dependable Distributed Systems: the Current State in Concepts, Semantics and Verification Means

    Publication Year: 2007, Page(s):29 - 38
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (416 KB) | HTML iconHTML

    Coordinated Atomic Actions (CAAs) have been introduced about ten years ago as a conceptual framework for developing fault-tolerant concurrent systems. All the work done since then extended the CAA framework with the capabilities to model, verify, and implement concurrent distributed systems following pre-defined development methodologies. As a result, CAAs, compared to other approaches available, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Self-Protecting Enterprise Applications

    Publication Year: 2007, Page(s):39 - 48
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (606 KB) | HTML iconHTML

    Enterprise systems must guarantee high availability and reliability to provide 24/7 services without interruptions and failures. Mechanisms for handling exceptional cases and implementing fault tolerance techniques can reduce failure occurrences, and increase dependability. Most of such mechanisms address major problems that lead to unexpected service termination or crashes, but do not deal with m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability Modeling of a 1-Out-Of-2 System: Research with Diverse Off-The-Shelf SQL Database Servers

    Publication Year: 2007, Page(s):49 - 58
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Fault tolerance via design diversity is often the only viable way of achieving sufficient dependability levels when using off-the-shelf components. We have reported previously on studies with bug reports of four open-source and commercial off-the-shelf database servers and later release of two of them. The results were very promising for designers of fault-tolerant solutions that wish to employ di... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Corroborating User Assessments of Software Behavior to Facilitate Operational Testing

    Publication Year: 2007, Page(s):61 - 70
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB) | HTML iconHTML

    Operational or "beta" testing of software has a number of benefits for software vendors and has become common industry practice. However, ordinary users are more likely to overlook or misreport software problems than experienced software testers are. To compensate for this shortcoming, we present a technique called corroboration-based filtering for corroborating user assessments of individual oper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Requirement Error Abstraction and Classification: A Control Group Replicated Study

    Publication Year: 2007, Page(s):71 - 80
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (459 KB) | HTML iconHTML

    This paper is the second in a series of empirical studies about requirement error abstraction and classification as a quality improvement approach. The Requirement error abstraction and classification method supports the developers' effort in efficiently identifying the root cause of requirements faults. By uncovering the source of faults, the developers can locate and remove additional related fa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prioritization of Regression Tests using Singular Value Decomposition with Empirical Change Records

    Publication Year: 2007, Page(s):81 - 90
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (473 KB) | HTML iconHTML

    During development and testing, changes made to a system to repair a detected fault can often inject a new fault into the code base. These injected faults may not be in the same files that were just changed, since the effects of a change in the code base can have ramifications in other parts of the system. We propose a methodology for determining the effect of a change and then prioritizing regres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Testing Security Policies: Going Beyond Functional Testing

    Publication Year: 2007, Page(s):93 - 102
    Cited by:  Papers (21)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (341 KB) | HTML iconHTML

    While important efforts are dedicated to system functional testing, very few works study how to test specifically security mechanisms, implementing a security policy. This paper introduces security policy testing as a specific target for testing. We propose two strategies for producing security policy test cases, depending if they are built in complement of existing functional test cases or indepe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrated Software Vulnerability and Security Functionality Assessment

    Publication Year: 2007, Page(s):103 - 108
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Product security is an on-going challenge for network equipment vendors. In this paper, we present a systematic methodology for some software vulnerability assessment and security function verification. Based on this approach, a scalable and adaptable automatic test system was implemented to test over a hundred production software releases over the past year. This paper describes the methodology, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison between Internal and External Malicious Traffic

    Publication Year: 2007, Page(s):109 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1088 KB) | HTML iconHTML

    This paper empirically compares malicious traffic originating inside an organization (i.e., internal traffic) with malicious traffic originating outside an organization (i.e., external traffic). Two honeypot target computers were deployed to collect malicious traffic data over a period of fifteen weeks. In the first study we showed that there was a weak correlation between internal and external tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automated Oracle Comparators for TestingWeb Applications

    Publication Year: 2007, Page(s):117 - 126
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB) | HTML iconHTML

    Software developers need automated techniques to maintain the correctness of complex, evolving Web applications. While there has been success in automating some of the testing process for this domain, there exists little automated support for verifying that the executed test cases produce expected results. We assist in this tedious task by presenting a suite of automated oracle comparators for tes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the Impact of Injection Triggers for OS Robustness Evaluation

    Publication Year: 2007, Page(s):127 - 126
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (366 KB) | HTML iconHTML

    Traditionally, in fault injection-based robustness evaluation of software (specifically for operating systems - OS's), faults or errors are injected at specific code locations. This paper studies the sensitivity and accuracy of the robustness evaluation results arising from varying the timing of injecting the faults into the OS. A strategy to guide the triggering of fault injection is proposed, ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Machine Learning to Support Debugging with Tarantula

    Publication Year: 2007, Page(s):137 - 146
    Cited by:  Papers (12)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Using a specific machine learning technique, this paper proposes a way to identify suspicious statements during debugging. The technique is based on principles similar to Tarantula but addresses its main flaw: its difficulty to deal with the presence of multiple faults as it assumes that failing test cases execute the same fault(s). The improvement we present in this paper results from the use of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statistical Inference of Computer Virus Propagation Using Non-Homogeneous Poisson Processes

    Publication Year: 2007, Page(s):149 - 158
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (270 KB) | HTML iconHTML

    This paper presents statistical inference of computer virus propagation using non-homogeneous Poisson processes (NHPPs). Under some mathematical assumptions, the number of infected hosts can be modeled by an NHPP In particular, this paper applies a framework of mixed-type NHPPs to the statistical inference of periodic virus propagation. The mixed-type NHPP is defined by a superposition of NHPPs. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.