Bug detection in Java code: An extensive evaluation of static analysis tools using Juliet Test Suites
R Amankwah, J Chen, H Song… - Software: Practice and …, 2023 - Wiley Online Library
Previous studies have demonstrated the usefulness of employing automated static analysis
tools (ASAT) and techniques to detect security bugs in software systems. However, these …
tools (ASAT) and techniques to detect security bugs in software systems. However, these …
[PDF][PDF] Tool support for correctness-by-construction
Correctness-by-Construction (CbC) is an approach to incrementally create formally correct
programs guided by pre-and postcondition specifications. A program is created using …
programs guided by pre-and postcondition specifications. A program is created using …
The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more
Abstract The Symbolic Execution Debugger (SED), is an extension of the debug platform for
interactive debuggers based on symbolic execution. The SED comes with a static symbolic …
interactive debuggers based on symbolic execution. The SED comes with a static symbolic …
The interactive verification debugger: Effective understanding of interactive proof attempts
The Symbolic Execution Debugger (SED) is an extension of the Eclipse debug platform for
interactive symbolic execution. Like a traditional debugger, the SED can be used to locate …
interactive symbolic execution. Like a traditional debugger, the SED can be used to locate …
An empirical evaluation of two user interfaces of an interactive program verifier
Theorem provers have highly complex interfaces, but there are not many systematic studies
of their usability and effectiveness. Specifically, for interactive theorem provers the ability to …
of their usability and effectiveness. Specifically, for interactive theorem provers the ability to …
Deductive verification of legacy code
Deductive verification is about proving that a piece of code conforms to a given requirement
specification. For legacy code, this task is notoriously hard for three reasons:(1) writing …
specification. For legacy code, this task is notoriously hard for three reasons:(1) writing …
What do we know about buffer overflow detection?: A survey on techniques to detect a persistent vulnerability
Buffer overflow (BO) is a well-known and widely exploited security vulnerability. Despite the
extensive body of research, BO is still a threat menacing security-critical applications. The …
extensive body of research, BO is still a threat menacing security-critical applications. The …
[PDF][PDF] User interaction in deductive interactive program verification
S Grebing - 2019 - core.ac.uk
There are many options to improve the quality of software systems by checking that the
system fulfills its intended requirements. Among the most rigorous options is deductive …
system fulfills its intended requirements. Among the most rigorous options is deductive …
An interaction concept for program verification systems with explicit proof object
Deductive program verification is a difficult task: in general, user guidance is required to
control the proof search and construction. Providing the right guiding information is …
control the proof search and construction. Providing the right guiding information is …
Applying formal methods to design of migrator component of data masking software
A Kulkarni - Proceedings of the 11th Innovations in Software …, 2018 - dl.acm.org
Developing defect free design of software systems is an important problem. This is because
of high cost incurred due to failure of incorrectly designed software. In this paper, we …
of high cost incurred due to failure of incorrectly designed software. In this paper, we …