Zobrazeno 1 - 10
of 27
pro vyhledávání: '"Michael Reif"'
Publikováno v:
2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE).
Autor:
Michael Reif
Publikováno v:
Öffentliche Wissenschaft und gesellschaftlicher Wandel ISBN: 9783658169916
Öffentliche Wissenschaft und gesellschaftlicher Wandel
Öffentliche Wissenschaft und gesellschaftlicher Wandel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::4e6fc5a29724bcb167dc38810058f423
https://doi.org/10.1007/978-3-658-16991-6_6-1
https://doi.org/10.1007/978-3-658-16991-6_6-1
Publikováno v:
SOAP@PLDI
Most Java static analysis frameworks provide an intermediate presentation (IR) of Java Bytecode to facilitate the development of static analyses. While such IRs are often based on three-address code, the transformation itself is a great opportunity t
Autor:
Michael Reif, Sven Amann, Leonid Glanz, Pauline Anthonysamy, Lars Baumgärtner, Mira Mezini, Patrick Müller
Publikováno v:
AsiaCCS
String obfuscation is an established technique used by proprietary, closed-source applications to protect intellectual property. Furthermore, it is also frequently used to hide spyware or malware in applications. In both cases, the techniques range f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::46a35fe9424fb2a88bc98e3eb7b7fbaf
Publikováno v:
ESEC/SIGSOFT FSE
Current approaches combining multiple static analyses deriving different, independent properties focus either on modularity or performance. Whereas declarative approaches facilitate modularity and automated, analysis-independent optimizations, impera
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::aee6bb3bff7a02af3204bc9216db21b4
Publikováno v:
ISSTA
Call graphs are widely used; in particular for advanced control- and data-flow analyses. Even though many call graph algorithms with different precision and scalability properties have been proposed, a comprehensive understanding of sources of unsoun
Publikováno v:
MSR
Cryptographic APIs (Crypto APIs) provide the foundations for the development of secure applications. Unfortunately, most applications do not use Crypto APIs securely and end up being insecure, e.g., by the usage of an outdated algorithm, a constant i
Publikováno v:
ASE
This paper was presented in 2018 at the 33rd ACM/IEEE International Conference on Automated Software Engineering and proposes a framework for purity analyses. Analyzing methods in object-oriented programs whether they are side-effect free and also de
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7b643e0aeb7c7b9281bf08b5a5a95da4
Publikováno v:
ISSTA/ECOOP Workshops
Call graphs are at the core of many static analyses ranging from the detection of unused methods to advanced control-and data-flow analyses. Therefore, a comprehensive understanding of the precision and recall of the respective graphs is crucial to e
Publikováno v:
ISSTA/ECOOP Workshops
Static analyses which compute conceptually independent information, e.g., class immutability or method purity are typically developed as standalone, closed analyses. Complementary information that could improve the analyses is either ignored by makin