A systematic review of API evolution literature

M Lamothe, YG Guéhéneuc, W Shang - ACM Computing Surveys …, 2021 - dl.acm.org
Recent software advances have led to an expansion of the development and usage of
application programming interfaces (APIs). From millions of Android packages (APKs) …

Clear: contrastive learning for api recommendation

M Wei, NS Harzevili, Y Huang, J Wang… - Proceedings of the 44th …, 2022 - dl.acm.org
Automatic API recommendation has been studied for years. There are two orthogonal lines
of approaches for this task, ie, information-retrieval-based (IR-based) and neural-based …

Why crypto-detectors fail: A systematic evaluation of cryptographic misuse detection techniques

AS Ami, N Cooper, K Kafle, K Moran… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
The correct use of cryptography is central to ensuring data security in modern software
systems. Hence, several academic and commercial static analysis tools have been …

Fail through the cracks: Cross-system interaction failures in modern cloud systems

L Tang, C Bhandari, Y Zhang, A Karanika, S Ji… - Proceedings of the …, 2023 - dl.acm.org
Modern cloud systems are orchestrations of independent and interacting (sub-) systems,
each specializing in important services (eg, data processing, storage, resource …

How do python framework apis evolve? an exploratory study

Z Zhang, H Zhu, M Wen, Y Tao, Y Liu… - 2020 ieee 27th …, 2020 - ieeexplore.ieee.org
Python is a popular dynamic programming language. In recent years, many frameworks
implemented in Python have been widely used for data science and web development …

Cryptogo: Automatic detection of go cryptographic api misuses

W Li, S Jia, L Liu, F Zheng, Y Ma, J Lin - Proceedings of the 38th Annual …, 2022 - dl.acm.org
Cryptographic algorithms act as essential ingredients of all secure systems. However, the
expected security guarantee from cryptographic algorithms often falls short in practice due to …

Active learning of discriminative subgraph patterns for api misuse detection

HJ Kang, D Lo - IEEE Transactions on Software Engineering, 2021 - ieeexplore.ieee.org
A common cause of bugs and vulnerabilities are the violations of usage constraints
associated with Application Programming Interfaces (APIs). API misuses are common in …

Rtfm! automatic assumption discovery and verification derivation from library document for api misuse detection

T Lv, R Li, Y Yang, K Chen, X Liao, XF Wang… - Proceedings of the …, 2020 - dl.acm.org
To use library APIs, a developer is supposed to follow guidance and respect some
constraints, which we call integration assumptions (IAs). Violations of these assumptions can …

Evaluating automatic program repair capabilities to repair api misuses

M Kechagia, S Mechtaev, F Sarro… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
API misuses are well-known causes of software crashes and security vulnerabilities.
However, their detection and repair is challenging given that the correct usages of (third …

Could I have a stack trace to examine the dependency conflict issue?

Y Wang, M Wen, R Wu, Z Liu, SH Tan… - 2019 IEEE/ACM 41st …, 2019 - ieeexplore.ieee.org
Intensive use of libraries in Java projects brings potential risk of dependency conflicts, which
occur when a project directly or indirectly depends on multiple versions of the same library …