A systematic review of API evolution literature

M Lamothe, YG Guéhéneuc, W Shang - ACM Computing Surveys …, 2021 - dl.acm.org
Recent software advances have led to an expansion of the development and usage of
application programming interfaces (APIs). From millions of Android packages (APKs) …

Application programming interface (API) research: A review of the past to inform the future

J Ofoeda, R Boateng, J Effah - International Journal of Enterprise …, 2019 - igi-global.com
The purpose of this study is to perform a synthesis of API research. The study took stock of
literature from academic journals on APIs with their associated themes, frameworks …

Jumping through hoops: Why do Java developers struggle with cryptography APIs?

S Nadi, S Krüger, M Mezini, E Bodden - Proceedings of the 38th …, 2016 - dl.acm.org
To protect sensitive data processed by current applications, developers, whether security
experts or not, have to rely on cryptography. While cryptography algorithms have become …

Recommendation systems for software engineering

M Robillard, R Walker, T Zimmermann - IEEE software, 2009 - ieeexplore.ieee.org
Software development can be challenging because of the large information spaces that
developers must navigate. Without assistance, developers can become bogged down and …

An empirical study of developer discussions on low-code software development challenges

MA Al Alamin, S Malakar, G Uddin… - 2021 IEEE/ACM 18th …, 2021 - ieeexplore.ieee.org
Low-code software development (LCSD) is an emerging paradigm that combines minimal
source code with interactive graphical interfaces to promote rapid application development …

Imf: Inferred model-based fuzzer

HS Han, SK Cha - Proceedings of the 2017 ACM SIGSAC Conference on …, 2017 - dl.acm.org
Kernel vulnerabilities are critical in security because they naturally allow attackers to gain
unprivileged root access. Although there has been much research on finding kernel …

An empirical study on real bug fixes

H Zhong, Z Su - 2015 IEEE/ACM 37th IEEE International …, 2015 - ieeexplore.ieee.org
Software bugs can cause significant financial loss and even the loss of human lives. To
reduce such loss, developers devote substantial efforts to fixing bugs, which generally …

CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs

S Krüger, J Späth, K Ali, E Bodden… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Various studies have empirically shown that the majority of Java and Android applications
misuse cryptographic libraries, causing devastating breaches of data security. It is crucial to …

General LTL specification mining (T)

C Lemieux, D Park… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Temporal properties are useful for describing and reasoning about software behavior, but
developers rarely write down temporal specifications of their systems. Prior work on inferring …

Mining stackoverflow for program repair

X Liu, H Zhong - 2018 IEEE 25th international conference on …, 2018 - ieeexplore.ieee.org
In recent years, automatic program repair has been a hot research topic in the software
engineering community, and many approaches have been proposed. Although these …