Black-box web vulnerability scanners are a popular choice for finding security vulnerabilities in web applications in an automated fashion. These tools operate in a point-and-shoot …
G Fraser, A Arcuri - 2012 34th International Conference on …, 2012 - ieeexplore.ieee.org
Several promising techniques have been proposed to automate different tasks in software testing, such as test data generation for object-oriented software. However, reported studies …
Bugs in programs are often introduced when programs evolve from a stable version to a new version. In this article, we propose a new approach called DARWIN for automatically finding …
Many mainstream static code checkers make a number of compromises to improve automation, performance, and accuracy. These compromises include not checking certain …
Testing multithreaded code is hard and expensive. A multithreaded unit test creates two or more threads, each executing one or more methods on shared objects of the class under …
S Allier, N Anquetil, A Hora… - 2012 19th Working …, 2012 - ieeexplore.ieee.org
To improve software quality, rule checkers statically check if a software contains violations of good programming practices. On a real sized system, the alerts (rule violations detected by …
R Zhang, S Huang, Z Qi, H Guan - Computers & Mathematics with …, 2012 - Elsevier
The evolution of computer science has exposed us to the growing gravity of security problems and threats. Dynamic taint analysis is a prevalent approach to protect a program …
T Xie - 2012 IEEE 12th International Working Conference on …, 2012 - ieeexplore.ieee.org
Tool automation to reduce manual effort has been an active research area in various sub fields of software engineering such as software testing and analysis. To maximize the value …
Constraint-based input generation is an effective technique for testing programs, such as compilers and web browsers, which have complex inputs. However, efficient generation of …