Sciweavers

IWPC
2009
IEEE
13 years 11 months ago
The effectiveness of source code obfuscation: An experimental assessment
Source code obfuscation is a protection mechanism widely used to limit the possibility of malicious reverse engineering or attack activities on a software system. Although several...
Mariano Ceccato, Massimiliano Di Penta, Jasvir Nag...
IWPC
2009
IEEE
13 years 11 months ago
Impact analysis and visualization toolkit for static crosscutting in AspectJ
Understanding aspect-oriented systems, without appropriate tool support, is a difficult and a recognized problem in the research community. Surprisingly, little has been done to ...
Dehua Zhang, Ekwa Duala-Ekoko, Laurie J. Hendren
IWPC
2009
IEEE
13 years 11 months ago
Vector space analysis of software clones
In this paper, we introduce a technique for applying Independent Component Analysis to vector space representations of software code fragments such as methods or blocks. The dista...
Scott Grant, James R. Cordy
IWPC
2009
IEEE
13 years 11 months ago
A plethora of paths
A common static software bug detection technique is to use path simulation. Each execution path is simulated using symbolic variables to determine if any software errors could occ...
Eric Larson
IWPC
2009
IEEE
13 years 11 months ago
Practical static analysis for inference of security-related program properties
We present a static analysis framework for inference of security-related program properties. Within this framework we design and implement ownership, immutability and information ...
Yin Liu, Ana Milanova
IWPC
2009
IEEE
13 years 11 months ago
Standing on the shoulders of giants - A data fusion approach to design pattern detection
Identification of design patterns can deliver important information to designers. Therefore, automated design pattern detection (DPD) is highly desirable when it comes to underst...
Günter Kniesel, Alexander Binun
IWPC
2009
IEEE
13 years 11 months ago
To camelcase or under_score
David Binkley, Marcia Davis, Dawn Lawrie, Christop...
IWPC
2009
IEEE
13 years 11 months ago
Reading the documentation of invoked API functions in program comprehension
Comprehending an unfamiliar code fragment requires an awareness of explicit usage directives that may be present in the documentation of some invoked functions. Since it is not pr...
Uri Dekel, James D. Herbsleb
IWPC
2009
IEEE
13 years 11 months ago
Variable granularity for improving precision of impact analysis
Impact analysis is a specialized process of program comprehension that investigates the nature and extent of a planned software change. Traditionally, impact analysis inspects dep...
Maksym Petrenko, Václav Rajlich
IWPC
2009
IEEE
13 years 11 months ago
Intensions are a key to program comprehension
The classical comprehension theories study relations between extensions, intensions, and names. Originally developed in linguistics and mathematics, these theories are applicable ...
Václav Rajlich