[1]OSTRAND T J, WEYUKER E J, BELL R M. Locating where faults will be [C]// Proceedings of the 2005 Richard Tapia Celebration of Diversity in Computing Conference. Washington, DC: IEEE Computer Society, 2005: 48-50.[2]KAUR A, SANDHU P S, BRA A S. Early software fault prediction using real time defect data [C]// Proceedings of the Second International Conference on Machine Vision. Washington, DC: IEEE Computer Society, 2009: 242-245.[3]HASSAN A E. Predicting faults using the complexity of code changes [C]// Proceedings of IEEE 31st International Conference on Software Engineering. Washington, DC: IEEE Computer Society, 2009: 78-88.[4]LESSMANN S, BAESENS B, MUES C, et al. Benchmarking classification models for software defect prediction: a proposed framework and novel findings [J]. IEEE Transactions on Software Engineering, 2008, 34(4): 485-496.[5]REIS G A, CHANG J, VACHHARAJANI N, et al. SWIFT: software implemented fault tolerance [C]// Proceedings of the 2005 International Symposium on Code Generation and Optimization. Washington, DC: IEEE Computer Society, 2005: 243-254.[6]LESZAK M, PERRY D E, STOLL D. Classification and evaluation of defects in a project retrospective [J]. Journal of Systems and Software, 2002, 61(3): 173-187.[7]GIL D, GRACIA J, BARAZA J C, et al. Analysis of the influence of processor hidden registers on the accuracy of fault injection techniques [C]// Proceedings of the Ninth IEEE International High-level Design Validation and Test Workshop. Washington, DC: IEEE Computer Society, 2004: 173-178.〖HJ1.5mm〗[8]CHRISTMANSSON J, CHILLAREGE R. Generation of an error set that emulates software faults based on field data [C]// Proceedings of the Twenty-Sixth Annual International Symposium on Fault-Tolerant Computing. Washington, DC: IEEE Computer Society, 1996: 304-313.[9]CHRISTMANSSON J, SANTHANAM P. Error injection aimed at fault removal in fault tolerance mechanisms—criteria for selection using field data on software faults [C]// Proceedings of the 7th International Symposium on Software Reliability Engineering. Washington, DC: IEEE Computer Society, 1996: 175-184.[10]da SILVA A, GONZALEZ-CALERO A, MARTINEZ J F, et al. Design and implementation of a Java fault injector for Exhaustif SWIFI tool [C]// Proceedings of the Fourth International Conference on Dependability of Computer Systems. Washington, DC: IEEE Computer Society, 2009: 77-83.[11]DU W L, MATHUR A P. Testing for software vulnerability using environment perturbation [C]// Proceedings of International Conference on Dependable Systems and Networks. Washington, DC: IEEE Computer Society, 2000: 603-612.[12]杨学军,高珑.错误流模型:硬件故障的软件传播建模与分析[J].软件学报,2007,18(4):808-820.[13]李爱国,洪炳镕,王司.基于错误传播分析的软件脆弱点识别方法研究[J].计算机学报,2007,30(11):1910-1921.[14]YE N, ZHANG Y B, BORROR C M. Robustness of the Markov-chain model for cyber-attack detection [J]. IEEE Transactions on Reliability, 2004, 53(1): 116-123.[15]MAGGI F, MATTEUCCI M, ZANERO S. Detecting intrusions through system call sequence and argument analysis [J]. IEEE Transactions on Dependable and Secure Computing, 2010, 7(4): 381-395.[16]陆炜,曾庆凯.一种基于控制流的程序行为扩展模型[J].软件学报,2007,18(11):2841-2850.[17]WAGNER D, DEAN D. Intrusion detection via static analysis [C]// Proceedings of the IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2001: 156-168.[18]WAGNER D. Static analysis and computer security: new tech-niques for software assurance [D]. Berkeley: University of California at Berkeley, 2000.[19]FENG H H, KOLESNIKOV O M, FOGLA P, et al. Anomaly detection using call stack information [C]// Proceedings of the 2003 IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2003: 62-75.[20]FENG H H, GIFFIN J T, HUANG Y, et al. Formalizing sensitivi-ty in static analysis for intrusion detection [C]// Proceedings of the IEEE Symposium on Security and Privacy. Washington, DC: IEEE Computer Society, 2004: 194-210.[21]McMASTER S, MEMON A M. Call stack coverage for test suite re-duction [C]// Proceedings of the 21st IEEE International Conference on Software Maintenance. Washington, DC: IEEE Computer Society, 2005: 539-548.[22]MARIANI L, PASTORE F, PEZZE M. Dynamic analysis for diagnosing integration faults [J]. IEEE Transactions on Software Engineering, 2011, 37(4): 486-508.[23]李爱国,洪炳镕,王司.一种软件实现的程序控制流错误检测方法[J].宇航学报,2006,27(6):1424-1430.[24]OH N, SHIRVANI P P, McCLUSKEY E J. Control-flow checking by software signatures [J]. IEEE Transactions on Reliability, 2002, 51(1): 111-122.[25]ZARANDI H R, MAGHSOUDLOO M, KHOSHAVI N. Two efficient software techniques to detect and correct control-flow errors [C]// Proceedings of the 16th Pacific Rim International Symposium on Dependable Computing. Washington, DC: IEEE Computer Society, 2010: 141-148.[26]ARLAT J, FABRE J C, RODRGUEZ M, et al. Dependability of COTS microkernel-based systems [J]. IEEE Transactions on Computers, 2002, 51(2): 138-163.[27]GU W N, KALBARCZYK Z, IYER R K. Error sensitivity of the Linux kernel executing on PowerPC G4 and Pentium4 processors [C]// Proceedings of the 2004 International Conference on Dependable Systems and Networks. Washington, DC: IEEE Computer Society, 2004: 887-896.[28]ALBINET A, ARLAT J, FABRE J C. Characterization of the impact of faulty drivers on the robustness of the Linux kernel [C]// Proceedings of the 2004 International Conference on Dependable Systems and Networks. Washington, DC: IEEE Computer Society, 2004: 867-876.[29]DARAN M, THEVENOD-FOSSE P. Software error analysis a real case study involving real faults and mutations [C]// Proceedings of the 1996 ACM SIGSOFT International Symposium on Software Testing and Analysis. New York: ACM Press, 1996: 158-171.[30]DURAES J A, MADEIRA H S. Emulation of software fault: a field data study and a practical approach [J]. IEEE Transactions on Software Engineering, 2006, 32(11): 849-867.[31]AUGUSTON M. Software architecture built from behavior models [J]. ACM SIGSOFT Software Engineering Notes, 2009: 34(5): 1-15. |