Options Matter: Documenting and Fixing Non-Reproducible Builds in Highly-Configurable Systems

GA Randrianaina, DE Khelladi… - 2024 IEEE/ACM 21st …, 2024 - ieeexplore.ieee.org
A critical aspect of software development, build reproducibility, ensures the dependability,
security, and maintainability of software systems. Although several factors, including the …

Automated program repair for variability bugs in software product line systems

TT Nguyen, XY Zhang, P Arcaini, F Ishikawa… - Journal of Systems and …, 2024 - Elsevier
Software product line (SPL) systems are widely employed to develop industrial projects. For
an SPL system, different products/variants are created by combining different subsets of the …

Semantic configuration model with natural transformations

V Wolfengagen, L Ismailova, S Kosikov… - Cognitive Systems …, 2024 - Elsevier
In the present work, efforts have been made to create a configuration-based approach to
knowledge extraction. The notion of granularity is developed, which allows fine-tuning the …

Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations

J Lyu, S Li, H Zhang, L Yang, B Liu… - Proceedings of the ACM on …, 2024 - dl.acm.org
Software products have many configurations to meet different environments and diverse
needs. Building software with multiple software configurations typically incurs high costs in …

Does Using Bazel Help Speed Up Continuous Integration Builds?

S Zheng, B Adams, AE Hassan - arXiv preprint arXiv:2405.00796, 2024 - arxiv.org
A long continuous integration (CI) build forces developers to wait for CI feedback before
starting subsequent development activities, leading to time wasted. In addition to a variety of …

A Holistic Approach for Security Configuration

P Stöckle - 2024 - mediatum.ub.tum.de
Zusammenfassung Problemdomäne Die Standardkonfiguration von Software ist aus
verschiedenen Grunden unsicherer als möglich, z. B. weil der Softwarehersteller bei der …

Better Safe Than Sorry! Automated Identification of Functionality-Breaking Security-Configuration Rules

P Stöckle, M Sammereier, B Grobauer… - 2023 IEEE/ACM …, 2023 - ieeexplore.ieee.org
Insecure default values in software settings can be exploited by attackers to compromise the
system that runs the software. As a countermeasure, there exist security-configuration …

[PDF][PDF] A Comprehensive Model of Software Configuration.

R Mahdavi Hezaveh - 2022 - repository.lib.ncsu.edu
ABSTRACT MAHDAVI HEZAVEH, REZVAN. A Comprehensive Model of Software
Configuration.(Under the direction of Dr. Laurie Williams). Using feature toggles is a …

Subtree Hashing of Tests in Build Systems: Rust Tricorder

C Capitanu - 2023 - diva-portal.org
Software applications are built by teams of developers that constantly iterate over the
codebase. Software projects rely on a build system, which handles the management of …

PyroBuildS: Enabling Efficient Exploration of Linux Configuration Space with Incremental Build

GA Randrianaina, DE Khelladi, O Zendra, M Acher - 2023 - hal.science
Software engineers are acutely aware that the build of software is an essential but resource-
intensive step in any software development process. This is especially true when building …