enter search term and/or author name
Introduction to the Special Issue International Conference on Software Engineering (ICSE 2012)
Gail C. Murphy, Mauro Pezzé
Article No.: 28
Automated Detection of Client-State Manipulation Vulnerabilities
Anders Møller, Mathias Schwarz
Article No.: 29
Web application programmers must be aware of a wide range of potential security risks. Although the most common pitfalls are well described and categorized in the literature, it remains a challenging task to ensure that all guidelines are...
DIG: A Dynamic Invariant Generator for Polynomial and Array Invariants
Thanhvu Nguyen, Deepak Kapur, Westley Weimer, Stephanie Forrest
Article No.: 30
This article describes and evaluates DIG, a dynamic invariant generator that infers invariants from observed program traces, focusing on numerical and array variables. For numerical invariants, DIG supports both nonlinear equalities and...
Research in program comprehension has evolved considerably over the past decades. However, only little is known about how developers practice program comprehension in their daily work. This article reports on qualitative and quantitative research...
Amplifying Tests to Validate Exception Handling Code: An Extended Study in the Mobile Application Domain
Pingyu Zhang, Sebastian Elbaum
Article No.: 32
Validating code handling exceptional behavior is difficult, particularly when dealing with external resources that may be noisy and unreliable, as it requires (1) systematic exploration of the space of exceptions that may be thrown by the external...
Some Code Smells Have a Significant but Small Effect on Faults
Tracy Hall, Min Zhang, David Bowes, Yi Sun
Article No.: 33
We investigate the relationship between faults and five of Fowler et al.'s least-studied smells in code: Data Clumps, Switch Statements, Speculative Generality, Message Chains, and Middle Man. We developed a tool to detect these five smells in...
Scaling Up Symbolic Analysis by Removing Z-Equivalent States
Yueqi Li, S. C. Cheung, Xiangyu Zhang, Yepang Liu
Article No.: 34
Path explosion is a major issue in applying path-sensitive symbolic analysis to large programs. We observe that many symbolic states generated by the symbolic analysis of a procedure are indistinguishable to its callers. It is, therefore, possible...
Peer Review on Open-Source Software Projects: Parameters, Statistical Models, and Theory
Peter C. Rigby, Daniel M. German, Laura Cowen, Margaret-Anne Storey
Article No.: 35
Peer review is seen as an important quality-assurance mechanism in both industrial development and the open-source software (OSS) community. The techniques for performing inspections have been well studied in industry; in OSS development, software...