A brief survey of program slicing
B Xu, J Qian, X Zhang, Z Wu, L Chen - ACM SIGSOFT Software …, 2005 - dl.acm.org
Program slicing is a technique to extract program parts with respect to some special
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …
computation. Since Weiser first proposed the notion of slicing in 1979, hundreds of papers …
A vocabulary of program slicing-based techniques
J Silva - ACM computing surveys (CSUR), 2012 - dl.acm.org
This article surveys previous work on program slicing-based techniques. For each
technique, we describe its features, its main applications, and a common example of slicing …
technique, we describe its features, its main applications, and a common example of slicing …
Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …
vulnerable certificate verification, seriously threaten software security. The vision of …
New frontiers of reverse engineering
G Canfora, M Di Penta - Future of Software Engineering (FOSE' …, 2007 - ieeexplore.ieee.org
Comprehending and modifying software is at the heart of many software engineering tasks,
and this explains the growing interest that software reverse engineering has gained in the …
and this explains the growing interest that software reverse engineering has gained in the …
[图书][B] Model-based testing for embedded systems
J Zander, I Schieferdecker, PJ Mosterman - 2017 - books.google.com
What the experts have to say about Model-Based Testing for Embedded Systems:" This
book is exactly what is needed at the exact right time in this fast-growing area. From its …
book is exactly what is needed at the exact right time in this fast-growing area. From its …
[图书][B] The compiler design handbook: optimizations and machine code generation
YN Srikant, P Shankar - 2002 - taylorfrancis.com
The widespread use of object-oriented languages and Internet security concerns are just the
beginning. Add embedded systems, multiple memory banks, highly pipelined units …
beginning. Add embedded systems, multiple memory banks, highly pipelined units …
Comprehending reality-practical barriers to industrial adoption of software maintenance automation
JR Cordy - 11th IEEE International Workshop on Program …, 2003 - ieeexplore.ieee.org
Recent years have seen many significant advances in program comprehension and
software maintenance automation technology. In spite of the enormous potential savings in …
software maintenance automation technology. In spite of the enormous potential savings in …
[PDF][PDF] A New Representation And Crossover Operator For Search-based Optimization Of Software Modularization.
This paper reports experiments with automated software modularization and
remodularization, using search-based algorithms, the fitness functions of which are derived …
remodularization, using search-based algorithms, the fitness functions of which are derived …
A survey of empirical results on program slicing.
DW Binkley, M Harman - Adv. Comput., 2004 - books.google.com
A program slice extracts a semantically meaningful portion of a program, based upon a user-
selected slicing criterion. As the study of program slicing has matured, a growing body of …
selected slicing criterion. As the study of program slicing has matured, a growing body of …