[1] IEEE, “IEEE Standard Glossary of Software Engineering Terminology,” IEEE Standard 610.12-1990, 1990.

[2] P. A. Laplante, Dictionary of Computer Science Engineering and Technology (Boca Raton, FL: CRC Press, 2001).

[3] J. Voas, “Building Software Recovery Assertions from a Fault Injection-Based Propagation Analysis,” Proceedings of the International Computer Software & Applications Conference, Washington D.C., 1997, pp. 505–570.

[4] B. Beizer, Black-Box Testing (New York: John Wiley & Sons, 1995).

[5] C. Kaner, J. Falk, and H. Q. Nguyen, Testing Computer Software (New York: John Wiley & Sons, 1999).

[6] G. J. Myers, The Art of SoftwareTesting, 2nd ed. (New York: John Wiley & Sons, 2004).

[7] J. A. Whittaker, How to Break Software (Boston: Addison-Wesley, 2003).

[8] T. Ball and S. Rajamani, “The SLAM Project: Debugging System Software via Static Analysis,” Proceedings of Principles of Programming Languages, Portland, OR, 2002, pp. 1–3.

[9] S. Kumar and K. Li, “Using Model Checking to Debug Device Firmware,” Proceedings of Symposium On Operating Systems Design and Implementation, Boston, 2002, pp. 61–74.

[10] A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler, “An Empirical Study of Operating System Errors,” Proceedings of Symposium on Operating System Principles, Banff, 2001, pp. 73–88.

[11] A. Ganapathi, V. Ganapathi, and D. Patterson, “Windows XP Kernel Crash Analysis,” Proceedings of Large Installation System Administration Conference, Washington D.C., 2006.

[12] J. Gray, “Why Do Computers Stop and What Can We Do About It,” Tandem Technical Report 85.7, 1985.

[13] R. Iyer and P. Velardi, “Hardware-Related Software Errors: Measurement and Analysis,” IEEE Transactions on Software Engineering SE-11, No. 2 (Feb. 1985): 223–231.

[14] I. Lee and R. K. Iyer, “Faults, Symptoms, and Software Fault Tolerance in the Tandem GUARDIAN90 Operating System,” Proceedings of the International Symposium on Fault-Tolerant Computing, Toulouse, France, 1993, pp. 20–29.

[15] A. Johansson and N. Suri, “Error Propagation in Operating Systems,” Proceedings of the International Conference on Dependable Systems and Networks, Yokohama, Japan, 2005, pp. 86–95.

[16] W. Gu, Z. Kalbarczyk, and R. K. Iyer, “Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors,” Proceedings of the International Conference on Dependable Systems and Networks, Florence, Italy, 2004, pp. 887–896.

[17] J. DeVale and P. Koopman, “Performance Evaluation of Exception Handling in I/O Libraries,” Proceedings of the International Conference on Dependable Systems and Networks, Göteborg, Sweden, 2001, pp. 519–524.

[18] J. Durães and H. Madeira, “Multidimensional Characterization of the Impact of Faulty Drivers on the OS Behavior,” IEICE Transactions, E86-D(12) (Dec. 2003): 2563–2570.

[19] C. Fetzer and Z. Xiao, “An Automated Approach to Increasing the Robustness of C Libraries,” Proceedings of the International Conference on Dependable Systems and Networks, 2002, Bethesda, MD, pp. 155–164.

[20] P. Koopman and J. DeVale, “Comparing the Robustness of POSIX OSs,” Proceedings of the International Symposium on Fault-Tolerant Computing, Madison, 1999, pp. 30–37.

[21] D. P. Siewiorek, J. J. Hudak, B.-H. Suh, and Z. Segal, “Development of a Benchmark to Measure System Robustness,” Proceedings of the International Symposium on Fault-Tolerant Computing, Toulouse, France, 1993, pp. 88–97.

[22] B. P. Miller, L. Fredriksen, and B. So, “An Empirical Study of the Reliability of UNIX Utilities,” Communications of the ACM 33, No. 12 (Nov. 1990): 32–43.

[23] A. Mukherjee and D. P. Siewiorek, “Measuring Software Dependability by Robustness Benchmarking,” IEEE Transaction on Software Engineering 23, No. 6 (June 1997): 366–378.

[24] Ballista project, Carnegie Mellon University, at http://www.ballista.org.

[25] DBench, EC-IST Dependability Benchmarking Project, at http://www.dbench.org.

[26] J. Durães and H. Madeira, “Generic Faultloads Based on Software Faults for Dependability Benchmarking,” Proceedings of the International Conference on Dependable Systems and Networks, Florence, Italy, 2004, pp. 261–270.

[27] A. Kalakech, K. Kanoun, Y. Crouzet, and J. Arlat, “Benchmarking the Dependability of Windows NT4, 2000 and XP,” Proceedings of the International Conference on Dependable Systems and Networks, Florence, Italy, 2004, pp. 681–686.

[28] K. Kanoun, Y. Crouzet, A. Kalakech, A. E. Rugina, and P. Rumeau, “Benchmarking the Dependability of Windows and Linux using PostMark™ Workloads,” Proceedings of the International Symposium on Software Reliability Engineering, Chicago, IL, 2005, pp. 11–20.

[29] A. Albinet, J. Arlat, and J.-C. Fabre, “Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel,” Proceedings of the International Conference on Dependable Systems and Networks, Florence, Italy, 2004, pp. 807–816.

[30] J. Arlat, J.-C. Fabre, M. Rodríguez, and F. Salles, “Dependability of COTS Microkernel-Based Systems,” IEEE Transactions on Computers 51, No. 2 (Feb. 2002): 138–163.

[31] J.-C. Fabre, M. Rodriguez, J. Arlat, F. Salles and J.-M. Sizun, “Building Dependable COTS Microkernel-Based Systems Using Mafalda,” Proceedings of the Pacific Rim International Symposium on Dependable Computing, Los Angeles, CA, 2000, pp. 85–92.

[32] B. P. Miller, D. Koski, C. P. Lee, V. Maganty, R. Murthy, A. Natarajan, and J. Steidl, “Fuzz Revisited: A Reexamination of the Reliability of UNIX Utilities and Services,” Computer Sciences Technical Report #1268, University of Wisconsin-Madison, 1995.

[33] T. Mitchem, R. Lu, R. OäBrien and K. Larson, “Linux Kernel Loadable Wrappers,” Proceedings of DARPA Information Survivability Conference, Vol. 2, Hilton Head, SC, 2000, pp. 296–307.

[34] B. Murphy and B. Levidow, “Windows 2000 Dependability,” Proceedings of the Workshop on Dependable Networks and OS, New York, 2000, pp. D20–28.

[35] K. Whisnant, R. K. Iyer, P. Jones, R. Some, and D. Rennels, “An Experimental Evaluation of the REE SIFT Environment for Spaceborne Applications,” Proceedings of the International Conference on Dependable Systems and Networks, Bethesda, MD, 2002, pp. 585–594.

[36] S. Chen, J. Xu, R. K. Iyer, and K. Whisnant, “Evaluating the Security Threat of Firewall Data Corruption Caused by Instruction Transient Errors,” Proceedings of the International Conference on Dependable Systems and Networks, Bethesda, MD, 2002, pp. 495–504.

[37] W. Du and A. P. Mathur, “Testing for Software Vulnerability Using Environment Perturbation,” Proceedings of the International Conference on Dependable Systems and Networks, New York, NY, pp. 603–612.

[38] J. Xu, S. Chen, Z. Kalbarczyk, and R. K. Iyer, “An Experimental Study of Security Vulnerabilities Caused by Errors,” Proceedings of the International Conference on Dependable Systems and Networks, Göteborg, Sweden, 2001, pp. 421–432.

[39] J. Voas, “Certifying Off-the-Shelf Software Components,” IEEE Computer 31, No. 6 (1998): 53–59.

[40] M. M. Swift, B. Bershad and H. Levy, “Improving the Reliability of Commodity OSs,” Proceedings of Symposium on Operating System Principles, Bolton Landing, NY, 2003, pp. 207–222.

[41] W. Gu, Z. Kalbarczyk, R. Iyer and Z. Yang, “Characterization of Linux Kernel Behavior Under Errors,” Proceedings of the International Conference on Dependable Systems and Network, San Francisco, CA, 2003, pp. 459–468.

[42] J. Arlat, A. Costes, Y. Crouzet, J.-C. Laprie, and D. Powell, “Fault Injection and Dependability Evaluation of Fault-Tolerant Systems,” IEEE Transactions on Computers 42, No. 8 (Aug. 1993): 913–923.

[43] J. V. Carreira, D. Costa, and J. G. Silva, “Fault Injection Spot-Checks Computer System Dependability,” IEEE Spectrum 36, No. 8 (Aug. 1999): 50–55.

[44] M.-C. Hsueh, T. K. Tsai, and R. K. Iyer, “Fault Injection Techniques and Tools,” IEEE Computer 30, No. 4 (April 1997): 75–82.

[45] T. Jarboui, J. Arlat, Y. Crouzet, K. Kanoun, and T. Marteau, “Impact of Internal and External Software Faults on the Linux Kernel,” IEICE Transactions on Information and Systems E86-D, No. 12 (Dec. 2003): 2571–2578.

[46] J. E. Forrester and B. P. Miller, “An Empirical Study of the Robustness of Windows NT Applications Using Random Testing,” USENIX Windows Systems Symposium, Seattle, WA, 2000.

[47] B. P. Miller, G. Cooksey, and F. Moore, “An Empirical Study of the Robustness of MacOS Applications Using Random Testing,” International Workshop on Random Testing, Portland, ME, 2006, pp. 46–54.

[48] A. K. Ghosh, M. Schmid, V. Shah, “Testing the Robustness of Windows NT Software,” Proceedings of the International Symposium on Software Reliability Engineering, Paderborn, Germany, 1998, pp. 231–235.

[49] M. Howard and S. Lipner, The Security Development Lifecycle Redmond: Microsoft Press, 2006).

[50] P. Oehlert, “Violating Assumptions with Fuzzing,” IEEE Security & Privacy Magazine 3, No. 2 (2005): 58–62.

[51] J. V. Carreira, H. Madeira, and J. G. Silva, “Xception: A Technique for the Experimental Evaluation of Dependability in Modern Computers,” IEEE Transactions on Software Engineering 24, No. 2 (Feb. 1998): 125–136.

[52] G. Kanawati, N. A. Kanawati, and J. A. Abraham, “FERRARI: A Flexible Software-Based Fault and Error Injection System,” IEEE Transactions on Computers 44, No. 2 (Feb. 1995): 248–260.

[53] M. Rodríguez, A. Albinet, and J. Arlet, “MAFALDA-RT: A Tool for Dependability Assessment of Real-Time Systems,” Proceedings of the International Conference on Dependable Systems and Network, Bethesda, MD, 2002, pp. 267–272.

[54] H. Madeira, R. R. Some, F. Moreira, D. Costa, and D. Rennels, “Experimental Evaluation of a COTS System for Space Applications,” Proceedings of the International Conference on Dependable Systems and Network, Bethesda, MD, 2002, pp. 325–330.

[55] C. P. Dingman, J. Marshall, and D. P. Siewiorek, “Measuring Robustness of a Fault-Tolerant Aerospace System,” Proceedings of the International Symposium on Fault-Tolerant Computing, Pasadena, CA, 1995, pp. 522–527.

[56] T. Jarboui, J. Arlat, Y. Crouzet, K. Kanoun, and T. Marteau, “Analysis of the Effects of Real and Injected Software Faults,” Proceedings of the Pacific Rim International Symposium on Dependable Computing, 2002, pp. 51–58.

[57] A. K. Ghosh, M. Schmid, and F. Hill, “Wrapping Windows NT Software for Robustness,” Proceedings of the International Symposium on Fault-Tolerant Computing, Madison, WI, 1999, pp. 344–347.

[58] A. K. Ghosh, V. Shah, and M. Schmid, “An Approach to Testing COTS Software for Robustness to Operating System Exceptions and Errors,” Proceedings of the International Symposium on Software Reliability Engineering, Boca Raton, FL, 1999, pp. 166–174.

[59] P. Koopman, J. Sung, C. Dingman, D. Siewiorek, and T. Marz, “Comparing Operating Systems Using Robustness Benchmarks,” Proceedings of the International Symposium on Reliable Distributed Systems, Durham, NC, 1997, pp. 72–79.

[60] J. Voas, G. McGraw, and A. Gosh, “Gluing Together Software Components: How Good Is Your Glue?,” Proceedings of Pacific Northwest Software Quality Conference, 1996.

[61] T. Tsai, R. K. Iyer, and D. Jewitt, “An Approach Towards Benchmarking of Fault-Tolerant Commercial Systems,” Proceedings of the International Symposium on Fault-Tolerant Computing, Sendai, 1996, pp. 314–323.

[62] T. Tsai and N. Singh, “Reliability Testing of Applications on Windows NT,” Proceedings of DSN, 2000, pp. 427–436.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset