The following topics are dealt with: program slicing; sourcecodeanalysis; static analysis; program transformations; tool demonstrations; software metrics; program comprehension.
The following topics are dealt with: program slicing; sourcecodeanalysis; static analysis; program transformations; tool demonstrations; software metrics; program comprehension.
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carr...
Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center. The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors' opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors or the Institute of Electrical and Electronics Engineers, Inc.
The proceedings contain 24 papers. The topics discussed include: vulnerability prediction models: a case study on the Linux kernel;assessment of sourcecode obfuscation techniques;a security perspective on code review...
ISBN:
(纸本)9781509038503
The proceedings contain 24 papers. The topics discussed include: vulnerability prediction models: a case study on the Linux kernel;assessment of sourcecode obfuscation techniques;a security perspective on code review: the case of chromium;a source-level energy optimization framework for mobile applications;collective intelligence for smarter API recommendations in python;augur: incorporating hidden dependencies and variable granularity in change impact analysis;statically-informed dynamic analysis tools to detect algorithmic complexity vulnerabilities;a program interpreter framework for arbitrary abstractions;and similarity of sourcecode in the presence of pervasive modifications.
暂无评论