A systematic review of API evolution literature
Recent software advances have led to an expansion of the development and usage of
application programming interfaces (APIs). From millions of Android packages (APKs) …
application programming interfaces (APIs). From millions of Android packages (APKs) …
Clear: contrastive learning for api recommendation
Automatic API recommendation has been studied for years. There are two orthogonal lines
of approaches for this task, ie, information-retrieval-based (IR-based) and neural-based …
of approaches for this task, ie, information-retrieval-based (IR-based) and neural-based …
Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques
The correct use of cryptography is central to ensuring data security in modern software
systems. Hence, several academic and commercial static analysis tools have been …
systems. Hence, several academic and commercial static analysis tools have been …
Fail through the cracks: Cross-system interaction failures in modern cloud systems
Modern cloud systems are orchestrations of independent and interacting (sub-) systems,
each specializing in important services (eg, data processing, storage, resource …
each specializing in important services (eg, data processing, storage, resource …
How do python framework apis evolve? an exploratory study
Python is a popular dynamic programming language. In recent years, many frameworks
implemented in Python have been widely used for data science and web development …
implemented in Python have been widely used for data science and web development …
Cryptogo: Automatic detection of go cryptographic api misuses
Cryptographic algorithms act as essential ingredients of all secure systems. However, the
expected security guarantee from cryptographic algorithms often falls short in practice due to …
expected security guarantee from cryptographic algorithms often falls short in practice due to …
Active learning of discriminative subgraph patterns for api misuse detection
A common cause of bugs and vulnerabilities are the violations of usage constraints
associated with Application Programming Interfaces (APIs). API misuses are common in …
associated with Application Programming Interfaces (APIs). API misuses are common in …
Rtfm! automatic assumption discovery and verification derivation from library document for api misuse detection
To use library APIs, a developer is supposed to follow guidance and respect some
constraints, which we call integration assumptions (IAs). Violations of these assumptions can …
constraints, which we call integration assumptions (IAs). Violations of these assumptions can …
Evaluating automatic program repair capabilities to repair api misuses
API misuses are well-known causes of software crashes and security vulnerabilities.
However, their detection and repair is challenging given that the correct usages of (third …
However, their detection and repair is challenging given that the correct usages of (third …
Could I have a stack trace to examine the dependency conflict issue?
Intensive use of libraries in Java projects brings potential risk of dependency conflicts, which
occur when a project directly or indirectly depends on multiple versions of the same library …
occur when a project directly or indirectly depends on multiple versions of the same library …