Sciweavers

KBSE
2009
IEEE
14 years 7 months ago
Generating Vulnerability Signatures for String Manipulating Programs Using Automata-Based Forward and Backward Symbolic Analyses
Given a program and an attack pattern (specified as a regular expression), we automatically generate string-based vulnerability signatures, i.e., a characterization that includes...
Fang Yu, Muath Alkhalaf, Tevfik Bultan
KBSE
2009
IEEE
14 years 7 months ago
Improving API Usage through Automatic Detection of Redundant Code
—Software projects often rely on third-party libraries made accessible through Application Programming Interfaces (APIs). We have observed many cases where APIs are used in ways ...
David Kawrykow, Martin P. Robillard
KBSE
2009
IEEE
14 years 7 months ago
A Petri Net Based Debugging Environment for QVT Relations
—In the Model-Driven Architecture (MDA) paradigm the Query/View/Transformation (QVT) standard plays a vital role for model transformations. Especially the high-level declarative ...
Manuel Wimmer, Gerti Kappel, Johannes Schönb&...
KBSE
2009
IEEE
14 years 7 months ago
Clone-Aware Configuration Management
Tung Thanh Nguyen, Hoan Anh Nguyen, Nam H. Pham, J...
KBSE
2009
IEEE
14 years 7 months ago
Symbolic Deadlock Analysis in Concurrent Libraries and Their Clients
Methods in object-oriented concurrent libraries hide internal synchronization details. However, information hiding may result in clients causing thread safety violations by invoki...
Jyotirmoy V. Deshmukh, E. Allen Emerson, Sriram Sa...
KBSE
2009
IEEE
14 years 7 months ago
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
Propositional bounded model checking has been applied successfully to verify embedded software but is limited by the increasing propositional formula size and the loss of structur...
Lucas Cordeiro, Bernd Fischer, João Marques...
KBSE
2009
IEEE
14 years 7 months ago
Automatically Recommending Triage Decisions for Pragmatic Reuse Tasks
—Planning a complex software modification task imposes a high cognitive burden on developers, who must juggle navigating the software, understanding what they see with respect t...
Reid Holmes, Tristan Ratchford, Martin P. Robillar...
KBSE
2009
IEEE
14 years 7 months ago
Cache-Based Model Checking of Networked Applications: From Linear to Branching Time
Abstract—Many applications are concurrent and communicate over a network. The non-determinism in the thread and communication schedules makes it desirable to model check such sys...
Cyrille Artho, Watcharin Leungwattanakit, Masami H...
KBSE
2009
IEEE
14 years 7 months ago
Adding Examples into Java Documents
—Code examples play an important role to explain the usage of Application Programming Interfaces (APIs), but most API documents do not provide sufficient code examples. For exam...
Jinhan Kim, Sanghoon Lee, Seung-won Hwang, Sunghun...