Call graphs are widely used; in particular for advanced control-and data-flow analyses. Even though many call graph algorithms with different precision and scalability properties have …
While state of the art of software refactoring research uses various quality attributes to identify refactoring opportunities and evaluate refactoring recommendations, the impact of …
Call graphs are at the core of many static analyses ranging from the detection of unused methods to advanced control-and data-flow analyses. Therefore, a comprehensive …
Context: Cryptographic APIs are often misused in real-world applications. Therefore, many cryptographic API misuse detection tools have been introduced. However, there exists no …
J Palsberg, CV Lopes - Companion Proceedings for the ISSTA/ECOOP …, 2018 - dl.acm.org
We are on the cusp of a major opportunity: software tools that take advantage of Big Code. Specifically, Big Code will enable novel tools in areas such as security enhancers, bug …
K Karakaya, E Bodden - 2021 IEEE 21st International Working …, 2021 - ieeexplore.ieee.org
Static code features are necessary components when using machine learning-based techniques to reason about a program of interest. To extract static code features …
Security breaches happen on a daily basis and are a serious threat to our society. The average cost of a data breach in 2021 has achieved the highest record in the 17-year history …
R Brunner, R Dyer, M Paquin, E Sherman - Proceedings of the 28th ACM …, 2020 - dl.acm.org
We present a web-based Program Analysis Collaboratory (PAClab) tool that helps researchers to obtain realistic program benchmarks using user-defined selection criteria …
I Pashchenko - Proceedings of the 2017 11th Joint Meeting on …, 2017 - dl.acm.org
We propose a novel methodology that allows automatic construction of benchmarks for Static Analysis Security Testing (SAST) tools based on real-world software projects by …