Program transformations to fix C buffer overflows
A Shaw - Companion Proceedings of the 36th International …, 2014 - dl.acm.org
This paper describes two program transformations to fix buffer overflows originating from
unsafe library functions and bad pointer operations. Together, these transformations fixed all …
unsafe library functions and bad pointer operations. Together, these transformations fixed all …
[PDF][PDF] Detection of refactorings
F Dreier, E Juergens, A Goeb - Bachelor's thesis. Technical …, 2015 - teamscale.com
To avoid bugs in software products a lot of effort is put into testing. Especially code which
has been modified since the last release, is likely to induce new bugs and hence should be …
has been modified since the last release, is likely to induce new bugs and hence should be …
Static error detection using semantic inconsistency inference
Inconsistency checking is a method for detecting software errors that relies only on
examining multiple uses of a value. We propose that inconsistency inference is best …
examining multiple uses of a value. We propose that inconsistency inference is best …
Conftest: Generating comprehensive misconfiguration for system reaction ability evaluation
Misconfigurations are not only prevalent, but also costly on diagnosing and troubleshooting.
Unlike software bugs, misconfigurations are more vulnerable to users' mistakes. Improving …
Unlike software bugs, misconfigurations are more vulnerable to users' mistakes. Improving …
Explaining failures of program analyses
D von Dincklage, A Diwan - ACM SIGPLAN Notices, 2008 - dl.acm.org
With programs getting larger and often more complex with each new release, programmers
need all the help they can get in understanding and transforming programs. Fortunately …
need all the help they can get in understanding and transforming programs. Fortunately …
UNCONTAINED: uncovering container confusion in the linux kernel
Type confusion bugs are a common source of security problems whenever software makes
use of type hierarchies, as an inadvertent downcast to an incompatible type is hard to detect …
use of type hierarchies, as an inadvertent downcast to an incompatible type is hard to detect …
Refactoring gcc using structure field access traces and concept analysis
RW Bowdidge - Proceedings of the third international workshop on …, 2005 - dl.acm.org
Refactoring usually involves statically analyzing source code to understand which
transformations safely preserve execution behavior of the program. However, static analysis …
transformations safely preserve execution behavior of the program. However, static analysis …
A study on the effects of exception usage in open-source C++ systems
K Bradley, M Godfrey - 2019 19th International Working …, 2019 - ieeexplore.ieee.org
Exception handling (EH) is a feature common to many modern programming languages,
including C++, Java, and Python, that allows error handling in client code to be performed in …
including C++, Java, and Python, that allows error handling in client code to be performed in …
Refdetect: A multi-language refactoring detection tool based on string alignment
IH Moghadam, MÓ Cinnéide, F Zarepour… - IEEE …, 2021 - ieeexplore.ieee.org
Refactoring is performed to improve software quality while leaving the behaviour of the
software unchanged. Identifying refactorings applied to a software system is an important …
software unchanged. Identifying refactorings applied to a software system is an important …
GuardRails: Automated Suggestions for Clarifying Ambiguous Purpose Statements
Before implementing a function, programmers are encouraged to write a purpose statement
ie, a short, natural-language explanation of what the function computes. A purpose …
ie, a short, natural-language explanation of what the function computes. A purpose …