Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites

R Amankwah, J Chen, H Song… - Software: Practice and …, 2023 - Wiley Online Library
Previous studies have demonstrated the usefulness of employing automated static analysis
tools (ASAT) and techniques to detect security bugs in software systems. However, these …

[PDF][PDF] Tool support for correctness-by-construction

T Runge, I Schaefer, L Cleophas, T Thüm… - … , FASE 2019, Held as …, 2019 - library.oapen.org
Correctness-by-Construction (CbC) is an approach to incrementally create formally correct
programs guided by pre-and postcondition specifications. A program is created using …

The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more

M Hentschel, R Bubel, R Hähnle - International Journal on Software Tools …, 2019 - Springer
Abstract The Symbolic Execution Debugger (SED), is an extension of the debug platform for
interactive debuggers based on symbolic execution. The SED comes with a static symbolic …

The interactive verification debugger: Effective understanding of interactive proof attempts

M Hentschel, R Hähnle, R Bubel - Proceedings of the 31st IEEE/ACM …, 2016 - dl.acm.org
The Symbolic Execution Debugger (SED) is an extension of the Eclipse debug platform for
interactive symbolic execution. Like a traditional debugger, the SED can be used to locate …

An empirical evaluation of two user interfaces of an interactive program verifier

M Hentschel, R Hähnle, R Bubel - Proceedings of the 31st IEEE/ACM …, 2016 - dl.acm.org
Theorem provers have highly complex interfaces, but there are not many systematic studies
of their usability and effectiveness. Specifically, for interactive theorem provers the ability to …

Deductive verification of legacy code

B Beckert, T Bormer, D Grahl - … 2016, Imperial, Corfu, Greece, October 10 …, 2016 - Springer
Deductive verification is about proving that a piece of code conforms to a given requirement
specification. For legacy code, this task is notoriously hard for three reasons:(1) writing …

What do we know about buffer overflow detection?: A survey on techniques to detect a persistent vulnerability

ML Chaim, DS Santos, DS Cruzes - International Journal of Systems …, 2018 - igi-global.com
Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the
extensive body of research, BO is still a threat menacing security-critical applications. The …

[PDF][PDF] User interaction in deductive interactive program verification

S Grebing - 2019 - core.ac.uk
There are many options to improve the quality of software systems by checking that the
system fulfills its intended requirements. Among the most rigorous options is deductive …

An interaction concept for program verification systems with explicit proof object

B Beckert, S Grebing, M Ulbrich - … , HVC 2017, Haifa, Israel, November 13 …, 2017 - Springer
Deductive program verification is a difficult task: in general, user guidance is required to
control the proof search and construction. Providing the right guiding information is …

Applying formal methods to design of migrator component of data masking software

A Kulkarni - Proceedings of the 11th Innovations in Software …, 2018 - dl.acm.org
Developing defect free design of software systems is an important problem. This is because
of high cost incurred due to failure of incorrectly designed software. In this paper, we …