Achieving High Code Coverage in Android UI Testing via Automated Widget Exercising. | 0 | 0.34 | 2016 |
LibSift: Automated Detection of Third-Party Libraries in Android Applications. | 1 | 0.35 | 2016 |
BinGo: cross-architecture cross-OS binary search. | 30 | 0.79 | 2016 |
Auditing buffer overflow vulnerabilities using hybrid static–dynamic analysis | 2 | 0.44 | 2016 |
Buffer Overflow Vulnerability Prediction from x86 Executables Using Static Analysis and Machine Learning | 1 | 0.38 | 2015 |
Light-Weight Rule-Based Test Case Generation for Detecting Buffer Overflow Vulnerabilities | 0 | 0.34 | 2015 |
Detecting clones in Android applications through analyzing user interfaces | 5 | 0.41 | 2015 |
Web Application Vulnerability Prediction using Hybrid Program Analysis and Machine Learning | 13 | 0.74 | 2015 |
Mining Patterns of Unsatisfiable Constraints to Detect Infeasible Paths | 0 | 0.34 | 2015 |
Mining key and referential constraints enforcement patterns | 0 | 0.34 | 2014 |
Faceted Bug Report Search with Topic Model | 1 | 0.35 | 2014 |
Empirical Comparison of Intermediate Representations for Android Applications. | 0 | 0.34 | 2014 |
Automatic Removal of Buffer Overflow Vulnerabilities in C/C++ Programs. | 0 | 0.34 | 2014 |
Detecting infeasible branches based on code patterns | 2 | 0.39 | 2014 |
ABOR: An Automatic Framework for Buffer Overflow Removal in C/C++Programs | 0 | 0.34 | 2014 |
Detecting Anomaly in the Usage of Database Attribute. | 0 | 0.34 | 2014 |
Auditing Buffer Overflow Vulnerabilities Using Hybrid Static-Dynamic Analysis | 2 | 0.40 | 2014 |
Towards a Hybrid Framework for Detecting Input Manipulation Vulnerabilities. | 0 | 0.34 | 2013 |
Mining Attribute Lifecycle to Predict Faults and Incompleteness in Database Applications. | 0 | 0.34 | 2013 |
Automated Insertion of Exception Handling for Key and Referential Constraints | 2 | 0.39 | 2013 |
Defeating SQL Injection | 2 | 0.37 | 2013 |
Aiding Maintenance of Database Applications Through Extracting Attribute Dependency Graph | 3 | 0.40 | 2013 |
Has this bug been reported? | 0 | 0.34 | 2013 |
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns | 7 | 0.46 | 2013 |
Supporting the adaptation of open-source database applications through extracting data lifecycles. | 0 | 0.34 | 2013 |
A scalable approach for malware detection through bounded feature space behavior modeling. | 9 | 0.53 | 2013 |
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis | 35 | 1.26 | 2013 |
Binary Code Analysis | 0 | 0.34 | 2013 |
Detection of Infeasible Paths: Approaches and Challenges. | 3 | 0.41 | 2012 |
Automated verification and testing of user-interactive undo features in database applications | 1 | 0.35 | 2012 |
Auditing the XSS defence features implemented in web application programs. | 10 | 0.77 | 2012 |
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities | 21 | 0.96 | 2012 |
Defending against Cross-Site Scripting Attacks | 11 | 0.68 | 2012 |
Automated removal of cross site scripting vulnerabilities in web applications | 15 | 1.03 | 2012 |
Semi-Automated Verification of Defense against SQL Injection in Web Applications | 0 | 0.34 | 2012 |
Scalable malware clustering through coarse-grained behavior modeling | 5 | 0.45 | 2012 |
A Survey of Infeasible Path Detection. | 0 | 0.34 | 2012 |
Detection of Buffer Overflow Vulnerabilities in C/C++ with Pattern Based Limited Symbolic Evaluation | 0 | 0.34 | 2012 |
Predicting common web application vulnerabilities from input validation and sanitization code patterns | 24 | 0.96 | 2012 |
Extraction of Attribute Dependency Graph from Database Applications | 2 | 0.37 | 2011 |
Checking enforcement of integrity constraints in database applications based on code patterns | 7 | 0.48 | 2011 |
Design verification for database applications through analysing their support to data lifecycle. | 0 | 0.34 | 2011 |
Automated Extraction of Data Lifecycle Support from Database Applications. | 5 | 0.44 | 2011 |
Defending against Buffer-Overflow Vulnerabilities | 3 | 0.51 | 2011 |
Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications | 0 | 0.34 | 2010 |
Measuring design complexity of semantic web ontologies | 46 | 1.25 | 2010 |
Auditing the Defense Against Cross Site Scripting in Web Applications | 1 | 0.37 | 2010 |
Covering code behavior on input validation in functional testing | 13 | 0.66 | 2009 |
The Distribution of Program Sizes and Its Implications: An Eclipse Case Study | 2 | 0.40 | 2009 |
Conceptual data model-based software size estimation for information systems | 16 | 0.90 | 2009 |