Information Flow Control is important for securing applications, primarily to preserve the confidentiality and integrity of applications and the data they process. Statically determining the flows of information for s...
详细信息
ISBN:
(纸本)9789897586477
Information Flow Control is important for securing applications, primarily to preserve the confidentiality and integrity of applications and the data they process. Statically determining the flows of information for security purposes helps to secure applications early in the development pipeline. However, a sound and precise static analysis is difficult to scale. Modular static analysis is a technique for improving the scalability of static analysis. In this paper, we present an approach for constructing a modular static analysis for performing Information Flow Control for higher-order, imperative programs. A modular analysis requires information about data dependencies between modules. these dependencies arise as a result of information flows between modules, and therefore we piggy-back an Information Flow Control analysis on top of an existing modular analysis. Additionally, the resulting modular Information Flow Control analysis retains the benefits of its modular character. We validate our approach by performing an Information Flow Control analysis on 9 synthetic benchmark programs that contain both explicit and implicit information flows.
As part of a large Information and Communication Technology for Development (ICT4D) programme, we conducted a number of research projects to empower fisherfolk in Bangladesh. Due to their low socio-economic status, lo...
详细信息
ISBN:
(纸本)9798350322613
As part of a large Information and Communication Technology for Development (ICT4D) programme, we conducted a number of research projects to empower fisherfolk in Bangladesh. Due to their low socio-economic status, low level of digital as well as general literacy and many other similar factors, fisherfolk are very diverse as end users of software. It was important to understand their characteristics before designing any software for them. We started with exploratory research in reviewing literature and hearing from experts who closely work with fisherfolk. Based on the identification of some of the challenges, we designed a prototype software for tacit knowledge transfer among captains of boats. We conducted number of focus groups withthe captains of the boats and adopted a co-creation process where the functionality and usability of the prototype software were decided by the end users themselves. From our experience of working withthis diverse group of end users we propose specific recommendations for future software development for end users with a low socio-economic background.
the inherent dynamism of Vehicular Ad hoc Networks (VANETs), distinguished by rapid movement and frequent changes in network structure, imposes substantial obstacles in effective route management and optimization. the...
详细信息
Large Language Models (LLMs) have shown promising results in automatic code generation by improving coding efficiency to a certain extent. However, generating high-quality and reliable code remains a formidable task b...
详细信息
ISBN:
(纸本)9798350329964
Large Language Models (LLMs) have shown promising results in automatic code generation by improving coding efficiency to a certain extent. However, generating high-quality and reliable code remains a formidable task because of LLMs' lack of good programming practice, especially in exception handling. In this paper, we first conduct an empirical study and summarize three crucial challenges of LLMs in exception handling, i.e., incomplete exception handling, incorrect exception handling and abuse of try-catch. We then try prompts with different granularities to address such challenges, finding fine-grained knowledge-driven prompts works best. Based on our empirical study, we propose a novel knowledge-driven Prompt Chaining-based code generation approach, name KPC, which decomposes code generation into an AI chain with iterative check-rewrite steps and chains fine-grained knowledge-driven prompts to assist LLMs in considering exception-handling specifications. We evaluate our KPC-based approach with 3,079 code generation tasks extracted from the Java official API documentation. Extensive experimental results demonstrate that the KPC-based approach has considerable potential to ameliorate the quality of code generated by LLMs. It achieves this through proficiently managing exceptions and obtaining remarkable enhancements of 109.86% and 578.57% with static evaluation methods, as well as a reduction of 18 runtime bugs in the sampled dataset with dynamic validation.
software developers commonly use mailing lists to communicate and discuss issues. Some of the emails discuss architectural design decisions (ADDs) to design the components of a system, or achieve quality attributes. I...
详细信息
ISBN:
(纸本)9783031707964;9783031707971
software developers commonly use mailing lists to communicate and discuss issues. Some of the emails discuss architectural design decisions (ADDs) to design the components of a system, or achieve quality attributes. In this paper, we explore (a) the types of ADDs in mailing lists, and their co-occurrences, and (b) Methods used by practitioners to discuss ADDs using both mailing lists and issue trackers (e.g. Jira). We applied qualitative methods, as well as deep learning classification to classify ADDs in mailing lists. Furthermore, we applied similarity algorithms to detect related ADDs between emails and issues. Our findings support empirically-grounded approaches to identify and classify ADDs in mailing lists and issue trackers for future system design.
Research demonstrates that we continue to be deficient in creating inclusive and equitable software, with a lack of empathy among software developers attributed to this issue, even if unintentional. Although increasin...
详细信息
ISBN:
(纸本)9798400704987
Research demonstrates that we continue to be deficient in creating inclusive and equitable software, with a lack of empathy among software developers attributed to this issue, even if unintentional. Although increasing empathy has been shown to be part of the solution, unfortunately there is a lack of data that can be analyzed that shows how empathy-building and accessibility awareness interventions can be utilized in computing education, along with a shortage of free, public, and easily adoptable educational material regarding empathy and the creation of accessible software. through large in-person studies that involve real-world participants, we are able to contribute to the knowledge regarding the potential benefits that can be used to improve computing education by implementing empathy-building strategies in the curriculum. Two forms of accessibility awareness exercises are utilized to display the effectiveness of empathy-based learning and teach the importance of accessibility in computing, including experiential and expression-based interventions. In these interventions, we expect to find an increase in awareness and empathy in participants, as well as an increase in participant interest in the topic of software inclusivity and accessibility by placing the participant in a situation they may encounter in the real world. We additionally present a web-hosted, easily adoptable experiential and expression-based educational lab to support the inclusion of inclusive development and/or empathy-focused topics into a variety of curricula formats. Complete materials are available on the project website: https://***
Various approaches have been proposed for extracting microservices from the source code of monolithic software systems. the extracted microservices are usually evaluated by using the metrics of the precision and recal...
详细信息
the present study investigated emissions of black carbon, PM2.5, Particle number and surface concentrations and gases of 17 heated cooking oils available in the US market. Briefly, the process involved heating 100 ml ...
详细信息
Probabilistic timed systems are increasingly crucial in modern system architecture. Ensuring the correctness of system behavior has become a crucial problem, and model checking offers a solution. However, it is a chal...
详细信息
Crack segmentation is a critical and demanding task in pavement engineering. Recent studies using Convolutional Neural Networks (CNNs) or vision Transformer (ViT) for crack segmentation have shown promising results, b...
详细信息
暂无评论