Henrique Madeira

ORCID: 0000-0001-8146-4664
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Reliability and Analysis Research
  • Radiation Effects in Electronics
  • Software System Performance and Reliability
  • Distributed systems and fault tolerance
  • Software Engineering Research
  • Advanced Database Systems and Queries
  • Security and Verification in Computing
  • Software Testing and Debugging Techniques
  • Data Management and Algorithms
  • Real-Time Systems Scheduling
  • EEG and Brain-Computer Interfaces
  • Cloud Computing and Resource Management
  • Software Engineering Techniques and Practices
  • Advanced Software Engineering Methodologies
  • Web Application Security Vulnerabilities
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Risk and Safety Analysis
  • Service-Oriented Architecture and Web Services
  • Neural and Behavioral Psychology Studies
  • Semantic Web and Ontologies
  • Fault Detection and Control Systems
  • Parallel Computing and Optimization Techniques
  • Data Mining Algorithms and Applications
  • Data Quality and Management

University of Coimbra
2016-2025

Los Alamitos Medical Center
2020

Polytechnic University of Puerto Rico
2019

Laboratoire d'Analyse et d'Architecture des Systèmes
2018

Centre National de la Recherche Scientifique
2018

Chalmers University of Technology
2018

Università della Svizzera italiana
2018

Universitat Politècnica de València
2018

Warsaw University of Technology
2018

San Antonio College
2016

An important step in the development of dependable systems is validation their fault tolerance properties. Fault injection has been widely used for this purpose, however with rapid increase processor complexity, traditional techniques are also increasingly more difficult to apply. This paper presents a new software-implemented and monitoring environment, called Xception, which targeted at modern complex processors. Xception uses advanced debugging performance features existing most...

10.1109/32.666826 article EN IEEE Transactions on Software Engineering 1998-01-01

The injection of faults has been widely used to evaluate fault tolerance mechanisms and assess the impact in computer systems. However, software is not as well understood other classes (e.g., hardware faults). In this paper, we analyze how can be injected (emulated) a source-code independent manner. We specifically address important emulation requirements such representativeness accuracy. start with analysis an extensive collection real faults. observed that large percentage falls into...

10.1109/tse.2006.113 article EN IEEE Transactions on Software Engineering 2006-11-01

The injection of software faults in components to assess the impact these on other or system as a whole, allowing evaluation fault tolerance, is relatively new compared decades research hardware injection. This paper presents an extensive experimental study (more than 3.8 million individual experiments three real systems) evaluate representativeness injected by state-of-the-art approach (G-SWFIT). Results show that significant share (up 72 percent) cannot be considered representative...

10.1109/tse.2011.124 article EN IEEE Transactions on Software Engineering 2012-01-04

Although Web services are becoming business-critical components, they often deployed with critical software bugs that can be maliciously explored. vulnerability scanners allow detecting security vulnerabilities in by stressing the service from point of view an attacker. However, research and practice show different have performance on detection. In this paper we present experimental evaluation 300 publicly available services. Four well known been used to identify flaws implementations. A...

10.1109/dsn.2009.5270294 article EN 2009-06-01

Web applications are typically developed with hard time constraints and often deployed security vulnerabilities. Automatic web vulnerability scanners can help to locate these vulnerabilities popular tools among developers of applications. Their purpose is stress the application from attacker's point view by issuing a huge amount interaction within it. Two most widely spread dangerous in SQL injection cross site scripting (XSS), because damage they may cause victim business. Trusting results...

10.1109/prdc.2007.55 article EN 2007-12-01

This paper presents an experimental study on the emulation of software faults by fault injection. In a first experiment, set real has been compared with injected SWIFI tool (Xception) to evaluate accuracy faults. Results revealed limitations Xception (and other tools) in different classes (about 44% cannot be emulated). The use field data about was discussed and metrics were suggested as alternative guide injection process when is nor available. second rules for errors meant emulate...

10.1109/icdsn.2000.857571 article EN 2002-11-07

This paper proposes an approach for the evaluation of robustness web services, which are complex software components that must provide a robust interface to client applications. However, although services becoming business-critical components, there is no practical way assess code or compare alternative implementations concerning robustness. The proposed based on set tests (i.e., invalid call parameters) applied in order discover both programming and design errors. classified failures...

10.1109/prdc.2007.56 article EN 2007-12-01

In this paper we propose a methodology and prototype tool to evaluate web application security mechanisms. The is based on the idea that injecting realistic vulnerabilities in attacking them automatically can be used support assessment of existing mechanisms tools custom setup scenarios. To provide true life results, proposed vulnerability attack injection relies study large number real applications. addition generic methodology, describes implementation Vulnerability & Attack Injector Tool...

10.1109/tdsc.2013.45 article EN IEEE Transactions on Dependable and Secure Computing 2013-10-11

This paper proposes a new automatic approach for the detection of SQL Injection and XPath vulnerabilities, two most common critical types vulnerabilities in Web services. Although there are tools that allow testing applications against security previous research shows effectiveness those services environments is very poor. In our representative workload used to exercise service large set SQL/XPath injection attacks applied disclose vulnerabilities. Vulnerabilities detected by comparing...

10.1109/scc.2009.23 article EN IEEE International Conference on Services Computing 2009-01-01

Most web applications have critical bugs (faults) affecting their security, which makes them vulnerable to attacks by hackers and organized crime. To prevent these security problems from occurring it is of utmost importance understand the typical software faults. This paper contributes this body knowledge presenting a field study on two most widely spread application vulnerabilities: SQL Injection XSS. It analyzes source code patches used Web written in weak strong typed languages. Results...

10.1109/tdsc.2013.37 article EN IEEE Transactions on Dependable and Secure Computing 2013-09-06

We propose that understanding functional patterns of activity in mapped brain regions associated with code comprehension tasks and, more specifically, to the finding bugs traditional inspections could reveal useful insights improve software reliability and development process general. This includes helping select best professionals for debugging effort, improving conditions inspections, identify new directions follow training reviewers. paper presents an interdisciplinary study analyze...

10.1109/issre.2016.53 article EN 2016-10-01

An emergent research area in software engineering and reliability is the use of wearable biosensors to monitor cognitive state developers during development tasks. The goal gather physiologic manifestations that can be linked error-prone scenarios related programmers’ states. In this paper we investigate whether electroencephalography (EEG) applied accurately identify load associated with comprehension code different complexity levels. Therefore, a controlled experiment involving 26...

10.3390/s21072338 article EN cc-by Sensors 2021-03-27

Abstract Comprehending digital content written in natural language online is vital for many aspects of life, including learning, professional tasks, and decision-making. However, facing comprehension difficulties can have negative consequences learning outcomes, critical thinking skills, decision-making, error rate, productivity. This paper introduces an innovative approach to predict at the local level (e.g., paragraphs). Using affordable wearable devices, we acquire physiological responses...

10.1038/s41598-024-63654-z article EN cc-by Scientific Reports 2024-06-13

An important research topic deals with the investigation of whether a non-duplicated computer can be made fail-silent, since that behaviour is a-priori assumed in many algorithms. However, previous has shown systems using simple based error detection mechanism invisible to programmer (e.g. memory protection), percentage fail-silent violations could higher than 10%. Since study these errors they were mostly caused by pure data errors, we evaluate effectiveness software techniques capable...

10.1109/ftcs.1996.534625 article EN 2002-12-23

This paper evaluates the impact of transient errors in operating system a COTS-based (CETIA board with two PowerPC 750 processors running LynxOS) and quantifies their effects at both OS application level. The study has been conducted using Software-Implemented Fault Injection tool (Xception) realistic programs synthetic workloads (to focus on specific features) have used. results provide comprehensive picture faults LynxOS key features (process scheduling most frequent calls), data...

10.1109/dsn.2002.1028916 article EN 2003-06-25

Web-services and service-oriented architectures are gaining momentum in the area of distributed systems Internet applications. However, as we increase abstraction level applications also increasing complexity underlying middleware. In this paper, present a dependability benchmarking study to evaluate compare robustness some most popular SOAP-RPC implementations that intensively used industry. The was focused on Apache Axis where have observed high susceptibility software aging. Building...

10.1109/nca.2006.51 article EN 2006-08-08

Web-services are supported by a complex software infrastructure that must provide robust service to the client applications. This practical experience report presents approach for evaluation of robustness infrastructures. A set tests (i.e., invalid web-services call parameters) is applied during execution in order reveal possible problems code and application server infrastructure. The illustrated using two different implementations specified TPC-App performance benchmark running on top...

10.1109/dsn.2007.16 article EN 2007-06-01
Coming Soon ...