This book describes the methodology and accompanying technology for reducing the costs of validation of changes by introducing automatic techniques to analyze and test software increments. It builds a unified approach to efficient and reliable validation of changes and upgrades, and may be used as a research monograph and a reference book
This open access two-volume set LNCS 13371 and 13372 constitutes the refereed proceedings of the 34rd International Conference on Computer Aided Verification, CAV 2022, which was held in Haifa, Israel, in August 2022. The 40 full papers presented together with 9 tool papers and 2 case studies were carefully reviewed and selected from 209 submissions. The papers were organized in the following t…
This book constitutes the refereed proceedings of the 5th International Symposium on Unifying Theories of Programming, UTP 2014, held in Singapore, Singapore, in May 13, 2014, co-located with the 19th International Symposium on Formal Methods, FM 2014. The 7 revised full papers presented together with one invited talk were carefully reviewed and selected from 11 submissions. They deal with nume…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security h…
This open access book constitutes the proceedings of the 24th International Conference on Fundamental Approaches to Software Engineering, FASE 2021, which took place during March 27–April 1, 2021, and was held as part of the Joint Conferences on Theory and Practice of Software, ETAPS 2021. The conference was planned to take place in Luxembourg but changed to an online format due to the COVID-…
This book constitutes the thoroughly refereed conference proceedings of the Third International Workshop on Risk Assessment and Risk-driven Testing, RISK 2015, held in conjunction with the OMG Technical Meeting in Berlin, Germany, in June 2015. The revised 8 full papers were carefully reviewed and selected from 12 submissions. This workshop addresses systematic approaches that combine risk a…
This book constitutes the refereed proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2014, held in Essen, Germany, in April 2013. The 23 papers presented together with 1 keynote were carefully reviewed and selected from 62 submissions. The REFSQ'15 conference is organized as a three-day symposium. The REFSQ'15 has chosen…
This book constitutes the proceedings of the second Asia Pacific Requirements Engineering Symposium, APRES 2015, held in Wuhan, China, in October 2015. The 9 full papers presented together with 3 tool demos papers and one short paper, were carefully reviewed and selected from 18 submissions. The papers deal with various aspects of requirements engineering in the big data era, such as automat…
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I analyze the data? To answer these questions the book draws o…