Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
The Impact Of Bug Localization Based on Crash Report Mining: A Developers' Perspective
ICSE-SEIP '24: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in PracticePages 13–24https://doi.org/10.1145/3639477.3639730Developers often use crash reports to understand the root cause of bugs. However, locating the buggy source code snippet from such information is a challenging task, mainly when the log database contains many crash reports. To mitigate this issue, recent ...
- research-articleFebruary 2022
Experiences Implementing and Utilizing a Notional Machine in the Classroom
SIGCSE 2022: Proceedings of the 53rd ACM Technical Symposium on Computer Science Education - Volume 1Pages 850–856https://doi.org/10.1145/3478431.3499320In the computing education community, discussion is growing about the benefits of teaching programming by explicitly using notional machines to help students. To-date most work is largely theoretical and little work addresses actually using them in a ...
- research-articleFebruary 2022
Does Unit-Tested Code Crash? A Case Study of Eclipse
PCI '21: Proceedings of the 25th Pan-Hellenic Conference on InformaticsPages 260–264https://doi.org/10.1145/3503823.3503872Context: Software development projects increasingly adopt unit testing as a way to identify and correct program faults early in the construction process. Code that is unit tested should therefore have fewer failures associated with it. Objective: ...
- research-articleJune 2020
Engage Against the Machine: Rise of the Notional Machines as Effective Pedagogical Devices
ITiCSE '20: Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science EducationPages 159–165https://doi.org/10.1145/3341525.3387404The term "the machine" is commonly used to refer to the complicated physical hardware running similarly complex software that ultimately executes programs. The idea that programmers write programs for a notional machine - an abstract model of an ...
- research-articleMay 2017
Risk-based attack surface approximation: how much data is enough?
ICSE-SEIP '17: Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Practice TrackPages 273–282https://doi.org/10.1109/ICSE-SEIP.2017.9Proactive security reviews and test efforts are a necessary component of the software development lifecycle. Resource limitations often preclude reviewing the entire code base. Making informed decisions on what code to review can improve a team's ...
- articleOctober 2016
AmaLgam+: Composing Rich Information Sources for Accurate Bug Localization
Journal of Software: Evolution and Process (WSMR), Volume 28, Issue 10Pages 921–942https://doi.org/10.1002/smr.1801During the evolution of a software system, a large number of bug reports are submitted. Locating the source code files that need to be fixed to resolve the bugs is a challenging problem. Thus, there is a need for a technique that can automatically ...
- research-articleMay 2016
Reusing stack traces: automated attack surface approximation
ICSE '16: Proceedings of the 38th International Conference on Software Engineering CompanionPages 859–862https://doi.org/10.1145/2889160.2889263Security requirements around software systems have become more stringent as society becomes more interconnected via the Internet. New ways of prioritizing security efforts are needed so security professionals can use their time effectively to find ...
- posterApril 2016
Risk-based attack surface approximation: poster
HotSos '16: Proceedings of the Symposium and Bootcamp on the Science of SecurityPages 121–123https://doi.org/10.1145/2898375.2898388Proactive security review and test efforts are a necessary component of the software development lifecycle. Since resource limitations often preclude reviewing, testing and fortifying the entire code base, prioritizing what code to review/test can ...
- research-articleMay 2015
Approximating attack surfaces with stack traces
ICSE '15: Proceedings of the 37th International Conference on Software Engineering - Volume 2Pages 199–208Security testing and reviewing efforts are a necessity for software projects, but are time-consuming and expensive to apply. Identifying vulnerable code supports decision-making during all phases of software development. An approach for identifying ...
- ArticleSeptember 2014
On the Use of Stack Traces to Improve Text Retrieval-Based Bug Localization
ICSME '14: Proceedings of the 2014 IEEE International Conference on Software Maintenance and EvolutionPages 151–160https://doi.org/10.1109/ICSME.2014.37Many bug localization techniques rely on Text Retrieval (TR) models. The most successful approaches have been proven to be the ones combining TR techniques with static analysis, dynamic analysis, and/or software repositories information. Dynamic ...
- short-paperSeptember 2014
Improvement of applications' stability through robust APIs
ASE '14: Proceedings of the 29th ACM/IEEE International Conference on Automated Software EngineeringPages 907–910https://doi.org/10.1145/2642937.2653473Modern programs require useful and robust APIs to guarantee applications' responsiveness. Given that large APIs can be used by novice developers and that not all experts are infallible, a well-designed API should inform developers about all the possible ...
- ArticleMay 2014
Undocumented and unchecked: exceptions that spell trouble
MSR 2014: Proceedings of the 11th Working Conference on Mining Software RepositoriesPages 312–315https://doi.org/10.1145/2597073.2597089Modern programs rely on large application programming interfaces (APIs). The Android framework comprises 231 core APIs, and is used by countless developers. We examine a sample of 4,900 distinct crash stack traces from 1,800 different Android ...
- ArticleJuly 2010
A Debugging Approach for Java Runtime Exceptions Based on Program Slicing and Stack Traces
QSIC '10: Proceedings of the 2010 10th International Conference on Quality SoftwarePages 393–398https://doi.org/10.1109/QSIC.2010.23Program debugging is an important process to improve the quality of software. Runtime exception can occur often and can be difficult to debug. In this paper, we present a new approach for locating faults that cause runtime exceptions in Java programs ...
- research-articleMay 2008
Extracting structural information from bug reports
MSR '08: Proceedings of the 2008 international working conference on Mining software repositoriesPages 27–30https://doi.org/10.1145/1370750.1370757In software engineering experiments, the description of bug reports is typically treated as natural language text, although it often contains stack traces, source code, and patches. Neglecting such structural elements is a loss of valuable information; ...