Survey of approaches for postprocessing of static analysis alarms

T Muske, A Serebrenik - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
Static analysis tools have showcased their importance and usefulness in automated
detection of defects. However, the tools are known to generate a large number of alarms …

On code analysis opportunities and challenges for enterprise systems and microservices

T Cerny, J Svacina, D Das, V Bushong, M Bures… - IEEE …, 2020 - ieeexplore.ieee.org
Code analysis brings excellent benefits to software development, maintenance, and quality
assurance. Various tools can uncover code defects or even software bugs in a range of …

Survey of approaches for handling static analysis alarms

T Muske, A Serebrenik - 2016 IEEE 16th International Working …, 2016 - ieeexplore.ieee.org
Static analysis tools have showcased their importance and usefulness in automated
detection of code anomalies and defects. However, the large number of alarms reported and …

Identifying and documenting false positive patterns generated by static code analysis tools

ZP Reynolds, AB Jayanth, U Koc… - 2017 IEEE/ACM 4th …, 2017 - ieeexplore.ieee.org
This paper presents our results from identifying anddocumenting false positives generated
by static code analysistools. By false positives, we mean a static code analysis …

[PDF][PDF] Software security static analysis false alerts handling approaches

A Akremi - International Journal of Advanced Computer Science …, 2021 - researchgate.net
False Positive Alerts (FPA), generated by Static Analyzers Tools (SAT), reduce the
effectiveness of the automatic code review, letting them be underused in practice …

Investigations into data published and consumed on the Web: a systematic mapping study

HDA Santos, MIS Oliveira, GFAB Lima… - Journal of the Brazilian …, 2018 - Springer
The increasing interest in using the Web as a platform for data sharing has motivated
research about publishing and consuming data on the Web. While this subject is gaining …

Static code analyzer for detecting web application vulnerability using control flow graphs

VH Halim, YDW Asnar - 2019 International Conference on Data …, 2019 - ieeexplore.ieee.org
Errors were made during software developments. In web applications, those errors could
lead to security vulnerabilities that end in exploitation or information security incidents …

ITS-Engineering: providing adaptive teaching in the engineering tutor

C Srisethanil, N Baker - Proceedings Frontiers in Education …, 1995 - ieeexplore.ieee.org
The successful learning of an engineering student depends substantially on the instructor's
ability to adapt instruction, both the content and the various teaching styles, to individual …

[PDF][PDF] An Automated Approach to Check Software Architecture Erosion

R Hu - research.tue.nl
Abstract Architecture erosion (AE) arises when the implementation diverges from the
prescribed architecture rules. It increases software complexity and undermines code …

Malware detection techniques and tools for Android

S Rani, KS Dhindsa - International Journal of Social …, 2016 - inderscienceonline.com
Smartphone, with its powerful capabilities, has been wildly used in every area of our day-to-
day life. The enormous kinds of applications installed in these smartphones like WhatsApp …