Searched for: subject%3A%22Call%255C%2Bgraph%22
(1 - 10 of 10)
document
Keshani, M. (author), Gousios, G. (author), Proksch, S. (author)
Call Graphs are a rich data source and form the foundation for advanced static analyses that can, for example, detect security vulnerabilities or dead code. This information is invaluable when it is immediately available, such as in the output of a build system. Call Graph generation is a whole-program analysis: not just the application, but...
journal article 2024
document
Li, Jingyu (author)
Call graphs are useful tools for representing method relationships within software projects and correlations between dependencies. Although static analysis is a prevalent method for call graph construction, it has its limitations such as struggling with handling dynamic features and lambda expressions. In this research, we introduced an approach...
master thesis 2023
document
Li, Bowu (author)
The escalating complexity of software systems in the digital age heavily relies on reusable code collections(packages) for their development and operation. Despite the numerous advantages of pre-existing libraries, managing dependencies can be intricate and time-consuming. This thesis focuses on enhancing package management tools through a...
master thesis 2023
document
Chuang, Ching Chi (author)
Dependency management is an important task in software maintenance. However, identifying and removing unused dependencies takes a lot of effort from developers as existing tools may discover many false positives which are challenging to distinguish. This paper proposes a decision framework to improve unused dependency detection. It is applied to...
master thesis 2022
document
Hejderup, J.I. (author), Beller, M.M. (author), Triantafyllou, K. (author), Gousios, G. (author)
Modern programming languages such as Java, JavaScript, and Rust encourage software reuse by hosting diverse and fast-growing repositories of highly interdependent packages (i.e., reusable libraries) for their users. The standard way to study the interdependence between software packages is to infer a package dependency network by parsing...
journal article 2022
document
Chuang, Ching-Chi (author), Cruz, Luis (author), van Dalen, Robbert (author), Mikovski, Vladimir (author), van Deursen, A. (author)
When developing and maintaining large software systems, a great deal of effort goes into dependency management. During the whole lifecycle of a software project, the set of dependencies keeps changing to accommodate the addition of new features or changes in the running environment. Package management tools are quite popular to automate this...
conference paper 2022
document
Nguyen, Jakub (author)
Nowadays software development greatly relies upon using third-party source code. A logical consequence is that vulnerabilities from such sources can be propagated to applications making use of those. Tools like Dependabot can alert developers about packages they use, which entail vulnerabilities. Such alerts oftentimes turn out to be false...
bachelor thesis 2021
document
Anker, Eva (author)
In the modern world, Smartphones are everywhere and Android is the most used operating system. <br/>To protect these devices against malicious actions, the behaviour of Android apps needs to be studied.<br/><br/>Current tooling does not provide complete insight into the behaviour of an Android app.<br/>A tool was built to observe what goes on...
master thesis 2020
document
van Cuilenborg, Dominique (author), van Schaick, Bart (author), Stelmach, Fabian (author), Zwaan, Aron (author)
Technolution is a company that specializes in building embedded and information systems, in which software plays a key role. Recently, Technolution is transitioning from the use of C in embedded systems, to Rust, a relatively new programming language developed by Mozilla. By design, Rust provides the programmer with higher security and...
bachelor thesis 2018
document
Hejderup, J.I. (author), van Deursen, A. (author), Gousios, G. (author)
A popular form of software reuse is the use of open source software libraries hosted on centralized code repositories, such as Maven or npm. Developers only need to declare dependencies to external libraries, and automated tools make them available to the workspace of the project. Recent incidents, such as the Equifax data breach and the leftpad...
conference paper 2018
Searched for: subject%3A%22Call%255C%2Bgraph%22
(1 - 10 of 10)