Hidden truths in dead software paths

M Eichberg, B Hermann, M Mezini… - … on Foundations of Software …, 2015 - dl.acm.org
… Compared to our approach these approaches are trying to prove that the software is free …
dead paths of a specific kind while we are interested in dead paths as such and find dead paths

Software maturity: Design as dark Art

R Schaefer - ACM SIGSOFT Software Engineering Notes, 2009 - dl.acm.org
… of self-defense, some paths of investigation have been somewhat … Myths created from repeated
truths become invisible and … Here my research hits a dead end (This is disingenuous. My …

T-Fuzz: fuzzing by program transformation

H Peng, Y Shoshitaishvili… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
program contains a list of secrets in memory and reads an index from the user to retrieve the
secret … that trigger deep program paths and therefore find vulnerabilities hidden deep in the …

A qualitative analysis of android taint-analysis results

L Luo, E Bodden, J Späth - … Conference on Automated Software …, 2019 - ieeexplore.ieee.org
… VASCO propagates data-flow facts (elements of a data-flow … Such dead code was probably
intentionally built in by … APIs through the program and computing path constraints based on …

Raccoon: Closing digital {Side-Channels} through obfuscated execution

A Rane, C Lin, M Tiwari - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
… It is difficult to keep secrets during program execution. Even … ing extraneous program paths,
which we refer to as decoy paths. … Various compiler optimizations (dead code elimination, …

Is static analysis able to identify unnecessary source code?

R Haas, R Niedermayr, T Roehm, S Apel - … Transactions on Software …, 2020 - dl.acm.org
program execution paths that are not reachable. Our work focuses on unnecessary code and
is not limited to dead … RQ 2 is that there is no ground truth for unnecessary code. To mitigate …

How about bug-triggering paths?-understanding and characterizing learning-based vulnerability detectors

X Cheng, X Nie, N Li, H Wang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
… works does not distinguish program paths, which are opaque to … the ground truth of bug-triggering
paths from the D2A dataset. … The reason for high BTP recall and accuracy under DEAD

[图书][B] Healing invisible wounds: Paths to hope and recovery in a violent world

RF Mollica - 2009 - books.google.com
… Because of the boy's honesty, the play's secret truth is revealed: The bow is worthless …
depriving them of a sacred burial that would bring the dead person’s soul to rest, allowing it to be …

Call graph construction for java libraries

M Reif, M Eichberg, B Hermann, J Lerch… - … Foundations of Software …, 2016 - dl.acm.org
… of an analysis for general software quality attributes, eg, dead methods or unused fields.
This … Hidden truths in dead software paths. In Proceedings of the 2015 10th Joint Meeting on …

Hermes: assessment and creation of effective test corpora

M Reif, M Eichberg, B Hermann, M Mezini - … State Of the Art in Program …, 2017 - dl.acm.org
… The concrete goal for the evaluation was to use the minimal set of projects for testing the
analysis described in the paper “Hidden Truths in Dead Software Paths” [8]. The core part of …