Sciweavers

289 search results - page 41 / 58
» Using Slicing to Identify Duplication in Source Code
Sort
View
99
Voted
ENTCS
2007
182views more  ENTCS 2007»
15 years 1 months ago
Automated Fault Localization for C Programs
If a program does not fulfill a given specification, a model checker delivers a counterexample, a run which demonstrates the wrong behavior. Even with a counterexample, locating...
Andreas Griesmayer, Stefan Staber, Roderick Bloem
SIGSOFT
2003
ACM
16 years 2 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
ACMSE
2006
ACM
15 years 7 months ago
Static analysis of anomalies and security vulnerabilities in executable files
Software researchers have already developed static code security checkers to parse through and scan source code files, looking for security vulnerabilities [8, 9]. What about exec...
Jay-Evan J. Tevis, John A. Hamilton Jr.
METRICS
2003
IEEE
15 years 7 months ago
Design Patterns and Change Proneness: An Examination of Five Evolving Systems
Design patterns are recognized, named solutions to common design problems. The use of the most commonly referenced design patterns should promote adaptable and reusable program co...
James M. Bieman, Greg Straw, Huxia Wang, P. Willar...
108
Voted
ICSE
2009
IEEE-ACM
16 years 2 months ago
A toolset for automated failure analysis
Classic fault localization techniques can automatically provide information about the suspicious code blocks that are likely responsible for observed failures. This information is...
Fabrizio Pastore, Leonardo Mariani, Mauro Pezz&egr...