Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations

C Brubaker, S Jana, B Ray, S Khurshid… - … IEEE Symposium on …, 2014 - ieeexplore.ieee.org
Modern network security rests on the Secure Sockets Layer (SSL) and Transport Layer
Security (TLS) protocols. Distributed systems, mobile and desktop applications, embedded …

Improving refactoring speed by 10x

J Kim, D Batory, D Dig, M Azanza - Proceedings of the 38th International …, 2016 - dl.acm.org
Refactoring engines are standard tools in today's Integrated Development Environments
(IDEs). They allow programmers to perform one refactoring at a time, but programmers need …

Morpheus: Variability-aware refactoring in the wild

J Liebig, A Janker, F Garbe, S Apel… - 2015 IEEE/ACM 37th …, 2015 - ieeexplore.ieee.org
Today, many software systems are configurable with conditional compilation. Just like any
software system, configurable systems need to be refactored in their evolution, but their …

Towards refactoring-aware regression test selection

K Wang, C Zhu, A Celik, J Kim, D Batory… - Proceedings of the 40th …, 2018 - dl.acm.org
Regression testing checks that recent project changes do not break previously working
functionality. Although important, regression testing is costly when changes are frequent …

Making refactoring safer through impact analysis

M Mongiovi, R Gheyi, G Soares, L Teixeira… - Science of Computer …, 2014 - Elsevier
Currently most developers have to apply manual steps and use test suites to improve
confidence that transformations applied to object-oriented (OO) and aspect-oriented (AO) …

Detecting overly strong preconditions in refactoring engines

M Mongiovi, R Gheyi, G Soares… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Refactoring engines may have overly strong preconditions preventing developers from
applying useful transformations. We find that 32 percent of the Eclipse and JRRT test suites …

B-Refactoring: Automatic test code refactoring to improve dynamic analysis

J Xuan, B Cornu, M Martinez, B Baudry… - Information and …, 2016 - Elsevier
Context: Developers design test suites to verify that software meets its expected behaviors.
Many dynamic analysis techniques are performed on the exploitation of execution traces …

A HITS-based POI recommendation algorithm for location-based social networks

X Long, J Joshi - Proceedings of the 2013 IEEE/ACM international …, 2013 - dl.acm.org
Location-Based Social Networks (LBSNs),(also called as Geo-Social Networks), has been
attracting more and more users by providing services that integrate social activities with …

An Automated Approach to Extracting Local Variables

X Chi, H Liu, G Li, W Wang, Y Xia, Y Jiang… - Proceedings of the 31st …, 2023 - dl.acm.org
Extract local variable is a well-known and widely used refactoring. It is frequently employed
to replace one or more occurrences of a complex expression with simple accesses to a …

Scaling testing of refactoring engines

M Mongiovi - Companion Proceedings of the 2016 ACM SIGPLAN …, 2016 - dl.acm.org
Refactoring engines may have overly weak conditions, overly strong conditions, and
transformation issues related to the refactoring definitions. We find that 86% of the test suites …