Automated API property inference techniques
MP Robillard, E Bodden, D Kawrykow… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
Frameworks and libraries offer reusable and customizable functionality through Application
Programming Interfaces (APIs). Correctly using large and sophisticated APIs can represent a …
Programming Interfaces (APIs). Correctly using large and sophisticated APIs can represent a …
Code completion with statistical language models
We address the problem of synthesizing code completions for programs using APIs. Given a
program with holes, we synthesize completions for holes with the most likely sequences of …
program with holes, we synthesize completions for holes with the most likely sequences of …
MAPO: Mining and recommending API usage patterns
To improve software productivity, when constructing new software systems, programmers
often reuse existing libraries or frameworks by invoking methods provided in their APIs …
often reuse existing libraries or frameworks by invoking methods provided in their APIs …
Graph-based mining of multiple object usage patterns
The interplay of multiple objects in object-oriented programming often follows specific
protocols, for example certain orders of method calls and/or control structure constraints …
protocols, for example certain orders of method calls and/or control structure constraints …
Mining requirements from closed-loop control models
A significant challenge to the formal validation of software-based industrial control systems
is that system requirements are often imprecise, non-modular, evolving, or even simply …
is that system requirements are often imprecise, non-modular, evolving, or even simply …
Bugram: bug detection with n-gram language models
S Wang, D Chollak, D Movshovitz-Attias… - Proceedings of the 31st …, 2016 - dl.acm.org
To improve software reliability, many rule-based techniques have been proposed to infer
programming rules and detect violations of these rules as bugs. These rule-based …
programming rules and detect violations of these rules as bugs. These rule-based …
A graph-based approach to API usage adaptation
Reusing existing library components is essential for reducing the cost of software
development and maintenance. When library components evolve to accommodate new …
development and maintenance. When library components evolve to accommodate new …
Effective typestate verification in the presence of aliasing
This article addresses the challenge of sound typestate verification, with acceptable
precision, for real-world Java programs. We present a novel framework for verification of …
precision, for real-world Java programs. We present a novel framework for verification of …
Synthesizing near-optimal malware specifications from suspicious behaviors
Fueled by an emerging underground economy, malware authors are exploiting
vulnerabilities at an alarming rate. To make matters worse, obfuscation tools are commonly …
vulnerabilities at an alarming rate. To make matters worse, obfuscation tools are commonly …
[PDF][PDF] Contextual policy enforcement in android applications with permission event graphs.
The difference between a malicious and a benign Android application can often be
characterised by context and sequence in which certain permissions and APIs are used. We …
characterised by context and sequence in which certain permissions and APIs are used. We …