International audienceSecurity issues can be leveraged when input parameters are not checked. These missing checks can lead an application to an unexpected state where an attacker can get access to assets. The tool Chucky-ng aims at detecting such missing checks in source code. Such source codes are the only input required for Chuck-yJava. Since it is sensible to the identifier names used in these source codes, we want to normalize them in order to improve its efficiency. To achieve this, we propose an algorithm which works in four steps. It renames constant, parameter , variable and method names. We evaluate the impact of this renaming on two different experiments. Since our results are concluding, we show the benefits of using our tool. M...
Code clones are duplicate fragments of code that perform the same task. As software code bases incre...
International audienceA significant percentage of warnings reported by tools to detect coding standa...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
Uncovering security vulnerabilities in software is a key for operating secure systems. Unfortunately...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
International audienceIn Apache Ant, a convention to improve maintenance was introduced in 2004 stat...
Given the importance of identifier names and the value of naming conventions to program comprehensio...
International audienceRecently, logical attacks have been published that target Java based smart car...
Code clones are duplicate fragments of code that perform the same task. As software code bases incre...
International audienceA significant percentage of warnings reported by tools to detect coding standa...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceSecurity issues can be leveraged when input parameters are not checked. These ...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
Uncovering security vulnerabilities in software is a key for operating secure systems. Unfortunately...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceA fuzzing attack enables an attacker to gain access to restricted resources by...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...
International audienceIn Apache Ant, a convention to improve maintenance was introduced in 2004 stat...
Given the importance of identifier names and the value of naming conventions to program comprehensio...
International audienceRecently, logical attacks have been published that target Java based smart car...
Code clones are duplicate fragments of code that perform the same task. As software code bases incre...
International audienceA significant percentage of warnings reported by tools to detect coding standa...
International audienceThis study focuses on automatically detecting wrong implementations of specifi...