Sciweavers

15 search results - page 3 / 3
» The Evolution and Decay of Statically Detected Source Code V...
Sort
View
COMPSAC
2006
IEEE
13 years 10 months ago
An Ontology-Based Approach to Software Comprehension - Reasoning about Security Concerns
There exists a large variety of techniques to detect and correct software security vulnerabilities at the source code level, including human code reviews, testing, and static anal...
Yonggang Zhang, Juergen Rilling, Volker Haarslev
WCRE
2006
IEEE
13 years 10 months ago
Animated Visualization of Software History using Evolution Storyboards
The understanding of the structure of a software system can be improved by analyzing the system’s evolution during development. Visualizations of software history that provide o...
Dirk Beyer, Ahmed E. Hassan
WSE
2002
IEEE
13 years 9 months ago
Dynamic Model Extraction and Statistical Analysis of Web Applications
The World Wide Web, initially intended as a way to publish static hypertexts on the Internet, is moving toward complex applications. Static Web sites are being gradually replaced ...
Paolo Tonella, Filippo Ricca
WSE
2006
IEEE
13 years 10 months ago
Eliminating SQL Injection Attacks - A Transparent Defense Mechanism
The widespread adoption of web services as an instant means of information dissemination and various other transactions, has essentially made them a key component of today’s Int...
Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kotha...
OOPSLA
2005
Springer
13 years 10 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....