The proposed research defines an approach to combine Information Retrieval based analysis of the textual information embedded in software artifacts with program static and dynamic...
In recent years, code obfuscation has attracted attention as a low cost approach to improving software security by making it difficult for attackers to understand the inner worki...
Noninterference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checking of noni...
Modeling software components from multiple perspectives provides complementary views of a software system and enables sophisticated analyses of its functionality. A software compon...
When software developers want to understand the reason for a program's behavior, they must translate their questions about the behavior into a series of questions about code,...