The article presents a method for quality assurance on resource leakage by defect search automation using developed model of program code. Resources requested by the program are identified and assigned extended types storing state markers. Detection occurs by assignment of this markers to elements of code model according to resource management functions, evidencing resource availability. Further analysis is taken place by propagation of the markers according to the rules of a model. Rules are structured a in way that prevents unsafe use of resource handles. Inability to apply specific rule at analysis stage signifies that resource is used in unsafe way, creating potential security flaw in a program
The traditional system safety paradigm of isolating safety-critical functionality is no longer tenab...
We propose to use Search-Based Software Engineering to automatically evolve coverage criteria that a...
Abstract Software projects often reach hundreds or thousands of files. Therefore, manually searching...
Since the early days of the development of programming languages, people have been developing variou...
In many situations a programmer must be concerned with resources which are not accounted and control...
Rust’s ownership type system enforces a strict discipline on how memory locations are accessed and s...
The large transformer-based language models demonstrate excellent performance in natural language pr...
Abstract Rust’s ownership type system enforces a strict discipline on how memory locations are acce...
The impact of software is ever increasing as more and more systems are being software operated. Desp...
A software program requesting a resource that is not available usually raises an out-of-resource exc...
Safety-critical systems are pervading all areas of our lives. Accompanying the growth is an increa...
A resource leak occurs when a program fails to free some finite resource after it is no longer neede...
Software vulnerabilities are mistakes in software such that its execution can violate the security p...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
Software bugs are expensive. Recent estimates by the US National Institute of Standards and Technolo...
The traditional system safety paradigm of isolating safety-critical functionality is no longer tenab...
We propose to use Search-Based Software Engineering to automatically evolve coverage criteria that a...
Abstract Software projects often reach hundreds or thousands of files. Therefore, manually searching...
Since the early days of the development of programming languages, people have been developing variou...
In many situations a programmer must be concerned with resources which are not accounted and control...
Rust’s ownership type system enforces a strict discipline on how memory locations are accessed and s...
The large transformer-based language models demonstrate excellent performance in natural language pr...
Abstract Rust’s ownership type system enforces a strict discipline on how memory locations are acce...
The impact of software is ever increasing as more and more systems are being software operated. Desp...
A software program requesting a resource that is not available usually raises an out-of-resource exc...
Safety-critical systems are pervading all areas of our lives. Accompanying the growth is an increa...
A resource leak occurs when a program fails to free some finite resource after it is no longer neede...
Software vulnerabilities are mistakes in software such that its execution can violate the security p...
Software assurance is of paramount importance given the increasing impact of software on our lives. ...
Software bugs are expensive. Recent estimates by the US National Institute of Standards and Technolo...
The traditional system safety paradigm of isolating safety-critical functionality is no longer tenab...
We propose to use Search-Based Software Engineering to automatically evolve coverage criteria that a...
Abstract Software projects often reach hundreds or thousands of files. Therefore, manually searching...