[PDF][PDF] The Soot framework for Java program analysis: a retrospective

P Lam, E Bodden, O Lhoták… - Cetus Users and …, 2011 - pdfs.semanticscholar.org
You can write a compiler pass extending Soot, as either a BodyTransformer, for a
intraprocedural analysis; or SceneTransformer, for a whole-program analysis. You choose …

Sherlog: error diagnosis by connecting clues from run-time logs

D Yuan, H Mai, W Xiong, L Tan, Y Zhou… - Proceedings of the …, 2010 - dl.acm.org
Computer systems often fail due to many factors such as software bugs or administrator
errors. Diagnosing such production run failures is an important but challenging task since it …

Taming reflection: Aiding static analysis in the presence of reflection and custom class loaders

E Bodden, A Sewe, J Sinschek, H Oueslati… - Proceedings of the 33rd …, 2011 - dl.acm.org
Static program analyses and transformations for Java face many problems when analyzing
programs that use reflection or custom class loaders: How can a static analysis know which …

Mining temporal specifications from object usage

A Wasylkowski, A Zeller - Automated Software Engineering, 2011 - Springer
A caller must satisfy the callee's precondition—that is, reach a state in which the callee may
be called. Preconditions describe the state that needs to be reached, but not how to reach it …

Jadeite: a novel image-behavior-based approach for java malware detection using deep learning

I Obaidat, M Sridhar, KM Pham, PH Phung - Computers & Security, 2022 - Elsevier
Java malware exploiting language vulnerabilities has become increasingly prevalent in the
recent past. Since Java is a platform-independent language, these security threats open up …

A runtime model based monitoring approach for cloud

J Shao, H Wei, Q Wang, H Mei - 2010 IEEE 3rd International …, 2010 - ieeexplore.ieee.org
Monitoring plays a significant role in improving the quality of service in cloud computing. It
helps clouds to scale resource utilization adaptively, to identify defects in services for service …

A bandwidth guaranteed polling MAC protocol for Ethernet passive optical networks

M Ma, Y Zhu, TH Cheng - … Annual Joint Conference of the IEEE …, 2003 - ieeexplore.ieee.org
While the backbone networks have experienced substantial changes in the last decade; the
access networks have not changed much. Recently, passive optical networks (PONs) seem …

Online inference and enforcement of temporal properties

M Gabel, Z Su - Proceedings of the 32nd ACM/IEEE International …, 2010 - dl.acm.org
The interfaces of software components are often paired with specifications or protocols that
prescribe correct and safe usage. An important class of these specifications consists of …

Finding patterns in static analysis alerts: improving actionable alert ranking

Q Hanam, L Tan, R Holmes, P Lam - … of the 11th working conference on …, 2014 - dl.acm.org
Static analysis (SA) tools that find bugs by inferring programmer beliefs (eg, FindBugs) are
commonplace in today's software industry. While they find a large number of actual defects …

How good are the specs? A study of the bug-finding effectiveness of existing Java API specifications

O Legunsen, WU Hassan, X Xu, G Roşu… - Proceedings of the 31st …, 2016 - dl.acm.org
Runtime verification can be used to find bugs early, during software development, by
monitoring test executions against formal specifications (specs). The quality of runtime …