C Liu, X Xia, D Lo, C Gao, X Yang… - ACM Computing Surveys …, 2021 - dl.acm.org
Code search is a core software engineering task. Effective code search tools can help developers substantially improve their software development efficiency and effectiveness. In …
Real software, the kind working programmers produce by the kLOC to solve real-world problems, tends to be" natural", like speech or natural language; it tends to be highly …
Taint-style vulnerabilities are a persistent problem in software development, as the recently discovered" Heart bleed" vulnerability strikingly illustrates. In this class of vulnerabilities …
Ensuring security for modern IoT systems requires the use of complex methods to analyze their software. One of the most in-demand methods that has repeatedly been proven to be …
MP Robillard, E Bodden, D Kawrykow… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
Frameworks and libraries offer reusable and customizable functionality through Application Programming Interfaces (APIs). Correctly using large and sophisticated APIs can represent a …
Uncovering security vulnerabilities in software is a key for operating secure systems. Unfortunately, only some security flaws can be detected automatically and the vast majority …
Application Programming Interfaces (APIs) often have usage constraints, such as restrictions on call order or call conditions. API misuses, ie, violations of these constraints, may lead to …
Reusing existing library components is essential for reducing the cost of software development and maintenance. When library components evolve to accommodate new …
S Han, Y Dang, S Ge, D Zhang… - 2012 34th International …, 2012 - ieeexplore.ieee.org
Given limited resource and time before software release, development-site testing and debugging become more and more insufficient to ensure satisfactory software performance …