Source code analysis and manipulation

نویسندگان

  • Mark Harman
  • Malcolm Munro
  • Lin Hu
  • Xingyuan Zhang
چکیده

The special section contains nine papers which are extended versions of papers originally published in the proceedings of the IEEE workshop on Source Code Analysis and Manipulation (SCAM 2001). The papers cover the spectrum of analysis and manipulation work from traditional transformation application areas concerned with optimisation through to more novel application areas such as transformation for evolution of websites; they cover the use of linguistic source code aspects which arise from the semantics of the language to more ephemeral, yet higher level domain-related information. The special issue brings together work on algorithms, tools, empirical results and novel approaches to source code analysis and manipulation. There are five papers on analysis and four on manipulation in this special issue. The next two sections describe the papers on analysis and manipulation respectively.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Special issue on source code analysis and manipulation (SCAM 2006)

The aim of SCAM is to bring together researchers and practitioners working on theory, techniques and applications, concerning analysis and/or manipulation of the source code of computer systems. While much attention in the wider software engineering community is properly directed toward other aspects of systems' development and evolution, such as specification, design and requirements engineeri...

متن کامل

Identification and Removal of Software Security Vulnerabilities using Source Code Analysis: A Case Study on a Java File Writer Program with Password Validation Features

We illustrate the use of source code analysis to identify and remove the following software security vulnerabilities: (i) Hardcoded Password, (ii) Empty Password Initialization, (iii) Denial of Service, (iv) System Information Leak, (v) Unreleased Resource and (vi) Path Manipulation. We propose one or more solution approaches to remove or at least mitigate each of these vulnerabilities that hav...

متن کامل

Live Programming by Example: Using Direct Manipulation for Live Program Synthesis

To provide a better programming experience, live programming environments allow changes to the code of running programs. These changes are usually made by editing the source code. In this paper, we introduce live programming by example which enables updates to the code by direct manipulation of the program’s user interface. Besides a formal definition of live programming by example, we also pre...

متن کامل

Delphi: A Source-code Analysis and Manipulation System for Bricklayer

Delphi is a source-code analysis and manipulation system being developed to analyze and transform Bricklayer programs. The information obtained from Delphi analysis can be used to generate problemspecific text in the form of a mini-lecture. This opens the door to the automated integration of such texts with commercial animation software and textto-speech (TTS) tools. The result is a scalable in...

متن کامل

SQLUnitGen: SQL Injection Testing Using Static and Dynamic Analysis

This paper proposes an approach to facilitate the identification of actual input manipulation vulnerabilities via automated testing based on static analysis. We implemented a prototype of a SQL injection vulnerability detection tool, SQLUnitGen, which we compared to a static analysis tool, FindBugs. The evaluation results show that our approach can be used to locate precise vulnerable locations...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Information & Software Technology

دوره 44  شماره 

صفحات  -

تاریخ انتشار 2002