Zobrazeno 1 - 10
of 17
pro vyhledávání: '"Yoshitaka Arahori"'
Publikováno v:
ACM SIGAPP Applied Computing Review. 21:33-48
Debugging failures of deployed concurrent software is important for quality assurance. However, such failures are difficult to debug because their behavior is non-deterministic and limited information can be obtained with conventional means. Reverse
Publikováno v:
SAC
Debugging failures of deployed concurrent software is important for quality assurance. However, such failures are difficult to debug because their behavior is non-deterministic and limited information can be obtained with conventional means. Reverse
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fdab5b2f7f3012be989cde529ea28999
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849392
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849392
Publikováno v:
SAC
The existing methods of difference analysis cannot cope with event-driven code well, since they explore only the input space for program input like integers and strings, but do not explore the event space for all possible event sequences. This paper
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d22224419284238c2c6766b58f50c823
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849391
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849391
Autor:
Yuta Koizumi, Yoshitaka Arahori
Publikováno v:
PRDC
Memory leak is a problematic bug that a heap object will never be deallocated after it is last accessed. Memory leaks can be classified into two categories in terms of their risk: high-risk leaks and low-risk ones. High-risk leaks eventually induce f
Autor:
Yoshitaka Arahori, Yuma Jitsunari
Publikováno v:
ICST Workshops
Grammar-based fuzzing is known to be an effective technique for checking security vulnerabilities in programs, such as parsers, which take complex structured inputs. Unfortunately, most of existing grammar-based fuzzers require a lot of manual effort
Publikováno v:
SAC
To solve JavaScript's callback hell problem, several language mechanisms like Promise and async/await have already been introduced to JavaScript. Using async/await, which is the most promising one, callback hell code can be rewritten to another simpl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9802400cff2202ca5801ee1aef885b26
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849389
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849389
Publikováno v:
Advanced Information Networking and Applications ISBN: 9783030150310
AINA
AINA
Grammar-based fuzzing is effective at finding the vulnerabilities of various input-parsing programs which take as inputs complex data conforming to a certain grammar. Traditional grammar-based fuzzing techniques require a manually-generated grammar f
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d83d3a407903ff0e59345b57120f04e5
https://doi.org/10.1007/978-3-030-15032-7_40
https://doi.org/10.1007/978-3-030-15032-7_40
Autor:
Yoshitaka Arahori
Publikováno v:
HASE
Publikováno v:
APSEC
We are trying to find source code comments that help programmers understand a nontrivial part of source code. One of such examples would be explaining to assign a zero as a way to "clear" a buffer. Such comments are invaluable to programmers and iden
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::a91d9fcc0ff2e7e93737ddc82817240b
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849387
http://t2r2.star.titech.ac.jp/cgi-bin/publicationinfo.cgi?q_publication_content_number=CTT100849387
Publikováno v:
SCAM
Multithreaded programs are prone to dataraces. Dataraces are known to be hard to detect and reproduce by manual effort, although they often have detrimental effects on program reliability. Automated techniques are thus demanded for detecting datarace