A systematic evaluation of static api-misuse detectors

S Amann, HA Nguyen, S Nadi… - IEEE Transactions …, 2018 - ieeexplore.ieee.org
Application Programming Interfaces (APIs) often have usage constraints, such as restrictions
on call order or call conditions. API misuses, ie, violations of these constraints, may lead to …

Fail through the cracks: Cross-system interaction failures in modern cloud systems

L Tang, C Bhandari, Y Zhang, A Karanika, S Ji… - Proceedings of the …, 2023 - dl.acm.org
Modern cloud systems are orchestrations of independent and interacting (sub-) systems,
each specializing in important services (eg, data processing, storage, resource …

Runtime verification of train control systems with parameterized modal live sequence charts

M Chai, H Wang, T Tang, H Liu - Journal of Systems and Software, 2021 - Elsevier
With the growing complexity of railway control systems, it is required to preform runtime
safety checks of system executions that go beyond conventional runtime monitoring of pre …

Linear-time temporal logic guided greybox fuzzing

R Meng, Z Dong, J Li, I Beschastnikh… - Proceedings of the 44th …, 2022 - dl.acm.org
Software model checking as well as runtime verification are verification techniques which
are widely used for checking temporal properties of software systems. Even though they are …

Investigating next steps in static API-misuse detection

A Sven, HA Nguyen, S Nadi… - 2019 IEEE/ACM 16th …, 2019 - ieeexplore.ieee.org
Application Programming Interfaces (APIs) often impose constraints such as call order or
preconditions. API misuses, ie, usages violating these constraints, may cause software …

An empirical study on API usages

H Zhong, H Mei - IEEE Transactions on Software Engineering, 2017 - ieeexplore.ieee.org
API libraries provide thousands of APIs, and are essential in daily programming tasks. To
understand their usages, it has long been a hot research topic to mine specifications that …

Predictive Monitoring against Pattern Regular Languages

Z Ang, U Mathur - Proceedings of the ACM on Programming Languages, 2024 - dl.acm.org
While current bug detection techniques for concurrent software focus on unearthing low-
level issues such as data races or deadlocks, they often fall short of discovering more …

Active learning of discriminative subgraph patterns for api misuse detection

HJ Kang, D Lo - IEEE Transactions on Software Engineering, 2021 - ieeexplore.ieee.org
A common cause of bugs and vulnerabilities are the violations of usage constraints
associated with Application Programming Interfaces (APIs). API misuses are common in …

Enriching compiler testing with real program from bug report

H Zhong - Proceedings of the 37th IEEE/ACM International …, 2022 - dl.acm.org
Researchers have proposed various approaches to generate test programs. The state-of-the-
art approaches can be roughly divided into random-based and mutation-based approaches …

Automatically generating precise oracles from structured natural language specifications

M Motwani, Y Brun - 2019 IEEE/ACM 41st International …, 2019 - ieeexplore.ieee.org
Software specifications often use natural language to describe the desired behavior, but
such specifications are difficult to verify automatically. We present Swami, an automated …