Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration

Richard C. Linger, Mark G. Pleszkoch, Stacy J. Prowell, Kirk Sayre, T. Scott Ankrum. Computing legacy software behavior to understand functionality and security properties: an IBM/370 demonstration. In Frederick T. Sheldon, Annarita Giani, Axel W. Krings, Robert K. Abercrombie, editors, Cyber Security and Information Intelligence, CSIIRW '13, Oak Ridge, TN, USA, January 8-10, 2013. pages 43, ACM, 2013. [doi]

Abstract

Abstract is missing.