A systematic review of API evolution literature
Recent software advances have led to an expansion of the development and usage of
application programming interfaces (APIs). From millions of Android packages (APKs) …
application programming interfaces (APIs). From millions of Android packages (APKs) …
Application programming interface (API) research: A review of the past to inform the future
The purpose of this study is to perform a synthesis of API research. The study took stock of
literature from academic journals on APIs with their associated themes, frameworks …
literature from academic journals on APIs with their associated themes, frameworks …
Jumping through hoops: Why do Java developers struggle with cryptography APIs?
To protect sensitive data processed by current applications, developers, whether security
experts or not, have to rely on cryptography. While cryptography algorithms have become …
experts or not, have to rely on cryptography. While cryptography algorithms have become …
Recommendation systems for software engineering
M Robillard, R Walker, T Zimmermann - IEEE software, 2009 - ieeexplore.ieee.org
Software development can be challenging because of the large information spaces that
developers must navigate. Without assistance, developers can become bogged down and …
developers must navigate. Without assistance, developers can become bogged down and …
An empirical study of developer discussions on low-code software development challenges
Low-code software development (LCSD) is an emerging paradigm that combines minimal
source code with interactive graphical interfaces to promote rapid application development …
source code with interactive graphical interfaces to promote rapid application development …
Imf: Inferred model-based fuzzer
Kernel vulnerabilities are critical in security because they naturally allow attackers to gain
unprivileged root access. Although there has been much research on finding kernel …
unprivileged root access. Although there has been much research on finding kernel …
An empirical study on real bug fixes
Software bugs can cause significant financial loss and even the loss of human lives. To
reduce such loss, developers devote substantial efforts to fixing bugs, which generally …
reduce such loss, developers devote substantial efforts to fixing bugs, which generally …
CrySL: An Extensible Approach to Validating the Correct Usage of Cryptographic APIs
Various studies have empirically shown that the majority of Java and Android applications
misuse cryptographic libraries, causing devastating breaches of data security. It is crucial to …
misuse cryptographic libraries, causing devastating breaches of data security. It is crucial to …
General LTL specification mining (T)
C Lemieux, D Park… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Temporal properties are useful for describing and reasoning about software behavior, but
developers rarely write down temporal specifications of their systems. Prior work on inferring …
developers rarely write down temporal specifications of their systems. Prior work on inferring …
Mining stackoverflow for program repair
In recent years, automatic program repair has been a hot research topic in the software
engineering community, and many approaches have been proposed. Although these …
engineering community, and many approaches have been proposed. Although these …