Loading [MathJax]/extensions/MathMenu.js
AVSS 2011 demo session: Level of service classification for smart cameras | IEEE Conference Publication | IEEE Xplore

AVSS 2011 demo session: Level of service classification for smart cameras


Abstract:

Summary form only given. Automated code analysis is technology aimed at locating, describing and repairing areas of weakness in code. Code weaknesses range from security ...Show More

Abstract:

Summary form only given. Automated code analysis is technology aimed at locating, describing and repairing areas of weakness in code. Code weaknesses range from security vulnerabilities, logic errors, concurrency violations, to improper resource usage, violations of architectures or coding guidelines. Common to all code analysis techniques is that they build abstractions of code and then check those abstractions for properties of interest. For instance a type checker computes how types are used, abstract interpreters and symbolic evaluators check how values flow, model checkers analyze how state evolves. Building modern program analysis tools thus requires a multi-pronged approach to find a variety of weaknesses. In this talk I will discuss and compare several program analysis tools, which MSR build during the last ten years. They include theorem provers, program verifiers, bug finders, malware scanners, and test case generators. I will describe the need for their development, their innovation, and application. Many of these tools had considerable impact on Microsoft's development practices, as well as on the research community. Some of them are being shipped in products such as the Static Driver Verifier or as part of Visual Studio. Performing program analysis as part of quality assurance is meanwhile standard practice in many software development companies. However several challenges have not yet been resolved. Thus, I will conclude with a set of open challenges in program analysis which hopefully triggers new aspiring directions in our joint quest of delivering predictable software that is free from defect and vulnerabilities.
Date of Conference: 30 August 2011 - 02 September 2011
Date Added to IEEE Xplore: 26 September 2011
ISBN Information:
Conference Location: Klagenfurt, Austria

References

References is not available for this document.