Focusing Automatic Code Inspections

Automatic Code Inspection tools help developers in early detection of defects in software. A well-known drawback of many automatic inspection approaches is that they yield too many warnings and require a clearer focus. In this thesis, we provide such focus by proposing two methods to prioritize inspection results, based on the execution likelihood and the historical fault likelihood of warnings. We describe both methods in detail, and evaluate them on various open-source and industry projects.

[1]  Wen-mei W. Hwu,et al.  Improving static branch prediction in a compiler , 1998, Proceedings. 1998 International Conference on Parallel Architectures and Compilation Techniques (Cat. No.98EX192).

[2]  Audris Mockus,et al.  Identifying reasons for software changes using historic databases , 2000, Proceedings 2000 International Conference on Software Maintenance.

[3]  William R. Bush,et al.  A static analyzer for finding dynamic programming errors , 2000 .

[4]  Norman E. Fenton,et al.  Quantitative Analysis of Faults and Failures in a Complex Software System , 2000, IEEE Trans. Software Eng..

[5]  E Elena Mumford,et al.  Drawing graphs for cartographic applications , 2008 .

[6]  A. Frank Ackerman,et al.  Software inspections: an effective verification process , 1989, IEEE Software.

[7]  Leslie Hatton Safer C: Developing for High-Integrity and Safety-Critical Systems , 1995 .

[8]  Martijn Hendriks,et al.  Model checking timed automata : techniques and applications , 2006 .

[9]  Nancy G. Leveson,et al.  An investigation of the Therac-25 accidents , 1993, Computer.

[10]  Leon Moonen,et al.  Evaluating the relation between coding standard violations and faultswithin and across software versions , 2009, 2009 6th IEEE International Working Conference on Mining Software Repositories.

[11]  Cheun Ngen Chong Experiments in rights control : expression and enforcement , 2005 .

[12]  Erika Ábrahám,et al.  An Assertional Proof System for Multithreaded Java - Theory and Tool Support , 2005 .

[13]  Ana Sokolova,et al.  Coalgebraic analysis of probabilistic systems , 2005 .

[14]  Jasen Markovski,et al.  Real and stochastic time in process algebras for performance evaluation , 2008 .

[15]  Raluca Marin-Perianu,et al.  Wireless Sensor Networks in Motion - Clustering Algorithms for Service Discovery and Provisioning , 2008 .

[16]  Wolter Pieters,et al.  La volonté machinale: understanding the electronic voting controversy , 2008 .

[17]  A. J. Markvoort Towards hybrid molecular simulations , 2006 .

[18]  F. J. Anscombe,et al.  Graphs in Statistical Analysis , 1973 .

[19]  David Biggs,et al.  A method of choosing multiway partitions for classification and decision trees , 1991 .

[20]  Gürcan Gülesir,et al.  Evolvable Behavior Specifications Using Context-Sensitive Wildcards , 2008 .

[21]  S. J. Lipoff,et al.  At the crossroads of the information highway: new technology directions in consumer electronics , 1994 .

[22]  Ron Kohavi,et al.  A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection , 1995, IJCAI.

[23]  J. van den Berg,et al.  Reasoning about Java programs in PVS using JML , 2009 .

[24]  de Im Ilse Visser,et al.  Analyzing user perceived failure severity in consumer electronics products : incorporating the user perspective into the development process , 2008 .

[25]  T. van der Storm Component-based configuration, integration and delivery , 2003 .

[26]  Yuanyuan Zhou,et al.  Have things changed now?: an empirical study of bug characteristics in modern open source software , 2006, ASID '06.

[27]  Ali Mesbah,et al.  Analysis and Testing of Ajax-based Single-page Web Applications , 2009 .

[28]  Marcin Czenko,et al.  TuLiP : reshaping trust management , 2009 .

[29]  C.-B. Breunesse On JML: topics in tool-assisted verification of Java programs , 2006 .

[30]  Marius Adrian Marin,et al.  An Integrated System to Manage Crosscutting Concerns in Source Code , 2008 .

[31]  Claes Wohlin,et al.  Software inspection benchmarking-a qualitative and quantitative comparative opportunity , 2002, Proceedings Eighth IEEE Symposium on Software Metrics.

[32]  U Uzma Khadim,et al.  Process algebras for hybrid systems : comparison and development , 2008 .

[33]  D. Graaf,et al.  Mining semi-structured data, theoretical and experimental aspects of pattern evaluation , 2008 .

[34]  J. Voas,et al.  Software Testability: The New Verification , 1995, IEEE Softw..

[35]  Sarah Smith Heckman,et al.  On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques , 2008, ESEM '08.

[36]  M. Kyas Verifying OCL Specifications of UML models , 2006 .

[37]  Tomas Krilavicius,et al.  Hybrid Techniques for Hybrid Systems , 2006 .

[38]  M. T. Ionita,et al.  Scenario-based system architecting : a systematic approach to developing future-proof system architectures , 2005 .

[39]  Glen W. Russell,et al.  Experience with inspection in ultralarge-scale development , 1991, IEEE Software.

[40]  Ivan S. Zapreev Model checking Markov chains : techniques and tools , 2008 .

[41]  Michael A. Harrison,et al.  Accurate static estimators for program optimization , 1994, PLDI '94.

[42]  William R. Bush,et al.  A static analyzer for finding dynamic programming errors , 2000, Softw. Pract. Exp..

[43]  David Evans,et al.  Improving Security Using Extensible Lightweight Static Analysis , 2002, IEEE Softw..

[44]  W. Basalaj,et al.  Correlation between coding standards compliance and software quality , 2005 .

[45]  Michael E. Fagan Design and Code Inspections to Reduce Errors in Program Development , 1976, IBM Syst. J..

[46]  Richard Lippmann,et al.  Testing static analysis tools using exploitable buffer overflows from open source code , 2004, SIGSOFT '04/FSE-12.

[47]  Leon Moonen,et al.  Assessing the value of coding standards: An empirical study , 2008, 2008 IEEE International Conference on Software Maintenance.

[48]  B. Gebremichael-Tesfagiorgis,et al.  Expressivity of Timed Automata Models , 2006 .

[49]  Peter J. Middleton,et al.  Software Inspection , 1994, J. Inf. Technol..

[50]  Siegfried Nijssen Mining Structured Data , 2006 .

[51]  Michael W. Godfrey,et al.  Facilitating software evolution research with kenyon , 2005, ESEC/FSE-13.

[52]  Luigi Lavazza Providing Automated Support for the GQM Measurement Process , 2000, IEEE Softw..

[53]  Harald C. Gall,et al.  Populating a Release History Database from version control and bug tracking systems , 2003, International Conference on Software Maintenance, 2003. ICSM 2003. Proceedings..

[54]  Peter Zoeteweij,et al.  Diagnosis of Embedded Software Using Program Spectra , 2007, 14th Annual IEEE International Conference and Workshops on the Engineering of Computer-Based Systems (ECBS'07).

[55]  A Adam Koprowski,et al.  Termination of rewriting and its certification , 2004 .

[56]  Taghi M. Khoshgoftaar,et al.  EMERALD: software metrics and models on the desktop , 1996, Proceedings of the Fourth International Symposium on Assessment of Software Tools.

[57]  Gabriele Lenzini,et al.  Integration of Analysis Techniques in Security and Fault-Tolerance , 2005 .

[58]  Watts S. Humphrey,et al.  A discipline for software engineering , 2012, Series in software engineering.

[59]  E. P. Doolan,et al.  Experience with Fagan's inspection method , 1992, Softw. Pract. Exp..

[60]  Andreas Zeller,et al.  When do changes induce fixes? , 2005, ACM SIGSOFT Softw. Eng. Notes.

[61]  James R. Larus,et al.  Static branch frequency and program profile analysis , 1994, MICRO 27.

[62]  Aad Mathssen,et al.  Logical Calculi for Reasoning with Binding , 2008 .

[63]  David A. Wagner,et al.  MOPS: an infrastructure for examining security properties of software , 2002, CCS '02.

[64]  de Ism Ivo Jong Integration and test strategies for complex manufacturing machines , 2008 .

[65]  Brent Hailpern,et al.  Software debugging, testing, and verification , 2002, IBM Syst. J..

[66]  Ileana Buhan,et al.  Cryptographic keys from noisy data, theory and applications , 2008 .

[67]  Barry W. Boehm,et al.  Software Engineering Economics , 1993, IEEE Transactions on Software Engineering.

[68]  Taolue Chen Clocks, Dice and Processes , 2009 .

[69]  Mohammad Ali Abam New data structures and algorithms for mobile data , 2007 .

[70]  Sunghun Kim,et al.  Memories of bug fixes , 2006, SIGSOFT '06/FSE-14.

[71]  G. Rozenberg,et al.  Effective models for the structure of ð-calculus processes with replication , 2001 .

[72]  M. J. de Mol,et al.  Reasoning about functional programs : Sparkle, a proof assistant for Clean , 2009 .

[73]  Tingting Han,et al.  Diagnosis, Synthesis and Analysis of Probabilistic Models , 2009, Ausgezeichnete Informatikdissertationen.

[74]  Juan Visente Guillen Scholten,et al.  Mobile Channels for Exogenous Coordination of Distributed Systems: Semantics, Implementation and Composition , 2007 .

[75]  Bahareh Badban,et al.  Verification Techniques for Extensions of Equality Logic , 2006 .

[76]  Gary McGraw,et al.  ITS4: a static vulnerability scanner for C and C++ code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[77]  Jens R. Calamé,et al.  Testing reactive systems with data: enumerative methods and constraint solving , 2008 .

[78]  Murray Hill,et al.  Lint, a C Program Checker , 1978 .

[79]  van Mj Muck Weerdenburg,et al.  Efficient rewriting techniques , 2009 .

[80]  Mohammed G. Khatib MEMS-Based Storage Devices : Integration in Energy-Constrained Mobile Systems , 2009 .

[81]  J. David Morgenthaler,et al.  Evaluating static analysis defect warnings on production software , 2007, PASTE '07.

[82]  Daniel Jackson,et al.  A new model of program dependences for reverse engineering , 1994, SIGSOFT '94.

[83]  Rudolf Eigenmann,et al.  Demand-Driven, Symbolic Range Propagation , 1995, LCPC.

[84]  Michiel van Genuchten The Impact of Software Growth on the Electronics Industry , 2007, Computer.

[85]  R Ronald Ruimerman,et al.  Modeling and remodeling in bone tissue , 2005 .

[86]  van Mpwj Michiel Osch Automated model-based testing of hybrid systems , 2009 .

[87]  Andreas Zeller,et al.  Predicting faults from cached history , 2008, ISEC '08.

[88]  Ling Cheung,et al.  Reconciling nondeterministic and probabilistic choices , 2006 .

[89]  Ichiro Hasuo,et al.  Tracing Anonymity with Coalgebras , 2008 .

[90]  Arjen van Weelden,et al.  Putting Types To Good Use , 2007 .

[91]  R.S.S. O'Connor,et al.  Incompleteness & completeness : formalizing logic and analysis in type theory , 2005 .

[92]  Marcel Verhoef,et al.  Modeling and validating distributed embedded real-time control systems , 2009 .

[93]  Yee Wei Law Key management and link-layer security of wireless sensor networks: Energy-efficient attack and defense , 2005 .

[94]  Jan Jürjens,et al.  Comparing Bug Finding Tools with Reviews and Tests , 2005, TestCom.

[95]  J. Ketema,et al.  Bohm-Like Trees for Rewriting , 2006 .

[96]  Cfj Christian Lange,et al.  Assessing and improving the quality of modeling : a series of empirical studies about the UML , 2007 .

[97]  Ivan Kurtev,et al.  Adaptability of model transformations , 2005 .

[98]  Nikolay Kavaldjiev,et al.  A run-time reconfigurable Network-on-Chip for streaming DSP applications , 2006 .

[99]  Dawson R. Engler,et al.  Checking system rules using system-specific, programmer-written compiler extensions , 2000, OSDI.

[100]  Yang Meng Tan,et al.  LCLint: a tool for using specifications to check code , 1994, SIGSOFT '94.

[101]  R. Boumen,et al.  Integration and test plans for complex manufacturing systems , 2007 .

[102]  Martijn van Veelen,et al.  Considerations on modeling for early detection of abnormalities in locally autonomous distributed systems , 2007 .

[103]  A. Rodriguez Yakushev,et al.  Towards Getting Generic Programming Ready for Prime Time , 2009 .

[104]  Chadd C. Williams,et al.  Automatic mining of source code repositories to improve bug finding techniques , 2005, IEEE Transactions on Software Engineering.

[105]  Andy Chou,et al.  Bugs as Inconsistent Behavior: A General Approach to Inferring Errors in Systems Code. , 2001, SOSP 2001.

[106]  Audris Mockus,et al.  Understanding the sources of variation in software inspections , 1998, TSEM.

[107]  Eelco Dolstra,et al.  The purely functional software deployment model , 2006 .

[108]  Andreas Zeller,et al.  Mining version archives for co-changed lines , 2006, MSR '06.

[109]  Junfeng Yang,et al.  MECA: an extensible, expressive system and language for statically checking security properties , 2003, CCS '03.

[110]  Hugo Jonker,et al.  Security matters : privacy in voting and fairness in digital exchange , 2009 .

[111]  Martijn Warnier,et al.  Language based security for Java and JML , 2006 .

[112]  James Miller,et al.  A Comparison of Computer Support Systems for Software Inspection , 2004, Automated Software Engineering.

[113]  Shari Lawrence Pfleeger,et al.  Preliminary Guidelines for Empirical Research in Software Engineering , 2002, IEEE Trans. Software Eng..

[114]  Jeffrey S. Foster,et al.  A comparison of bug finding tools for Java , 2004, 15th International Symposium on Software Reliability Engineering.

[115]  M. T. de Berg,et al.  Algorithms for Fat Objects: Decompositions and Applications , 2004 .

[116]  Leon Moonen,et al.  Evaluating the Relation Between Coding Standard Violations and Faults Within and Across Software Versions ∗ Cathal Boogerd , 2009 .

[117]  Thomas Zimmermann,et al.  Automatic Identification of Bug-Introducing Changes , 2006, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06).

[118]  P. Zoeteweij,et al.  Composing constraint solvers , 2005 .

[119]  Ivan Kurtev Ivanov,et al.  Adaptability of model transformations , 2005 .

[120]  Thomas W. Reps,et al.  Precise Interprocedural Dataflow Analysis with Applications to Constant Propagation , 1995, TAPSOFT.

[121]  AJ Arjan Mooij,et al.  Constructive formal methods and protocol standardization , 2006 .

[122]  L. Moonen,et al.  Supporting software inspection with static profiling , 2009 .

[123]  Arthur I. Baars,et al.  Embedded Compilers , 2009 .

[124]  Robert Brijder,et al.  Models of natural computation : gene assembly and membrane systems , 2008 .

[125]  Gao Design and verification of lock-free parallel algorithms , 2005 .

[126]  Meine van der Meulen,et al.  Correlations between Internal Software Metrics and Software Dependability in a Large Population of Small C/C++ Programs , 2007, The 18th IEEE International Symposium on Software Reliability (ISSRE '07).

[127]  Thomas A. Henzinger,et al.  The Blast Query Language for Software Verification , 2004, SAS.

[128]  Jason R. C. Patterson,et al.  Accurate static branch prediction by value range propagation , 1995, PLDI '95.

[129]  David W. Binkley,et al.  Interprocedural Constant Propagation using Dependence Graphs and a Data-Flow Model , 1994, CC.

[130]  Jeroen Doumen,et al.  Searching in encrypted data , 2004 .

[131]  Jeff Tian,et al.  Tool support for software measurement, analysis and improvement , 1997, J. Syst. Softw..

[132]  H.M.A. van Beek,et al.  Specification and analysis of Internet applications , 2005 .

[133]  Stefan Wagner,et al.  An Evaluation of Two Bug Pattern Tools for Java , 2008, 2008 1st International Conference on Software Testing, Verification, and Validation.

[134]  T. D. Vu,et al.  Semantics and applications of process and program algebra , 2007 .

[135]  Sebastiaan Gijsbert Marinus Cornelissen,et al.  Evaluating Dynamic Analysis Techniques for Program Comprehension , 2009 .

[136]  G Giovanni Russello,et al.  Separation and adaptation of concerns in a shared data space , 2006 .

[137]  Anton Wijs,et al.  What to do next? Analysing and optimising system behaviour in time , 2007 .

[138]  Damiano Bolzoni,et al.  Revisiting Anomaly-based Network Intrusion Detection Systems , 2009 .

[139]  Laurie J. Hendren,et al.  Generalized Constant Propagation: A Study in C , 1996, CC.

[140]  Ncwm Niels Braspenning Model-based integration and testing of high-tech multi-disciplinary systems , 2008 .

[141]  Thomas Fahringer,et al.  A Uniied Symbolic Evaluation Framework for Parallelizing Compilers , 1999 .

[142]  M. Torabi Dashti,et al.  Keeping Fairness Alive : Design and formal verification of optimistic fair exchange protocols , 2008 .

[143]  Scw Bas Ploeger,et al.  Improved verification methods for concurrent systems , 2009 .

[144]  Hasan Sözer,et al.  Architecting Fault-Tolerant Software Systems , 2009 .

[145]  Magiel Bruntink,et al.  Renovation of idiomatic crosscutting concerns in embedded systems , 2005 .

[146]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[147]  Colin Potts,et al.  Software-engineering research revisited , 1993, IEEE Software.

[148]  Les Hatton,et al.  Safer language subsets: an overview and a case history, MISRA C , 2004, Inf. Softw. Technol..

[149]  Tibor Gyimóthy,et al.  Empirical validation of object-oriented metrics on open source software for fault prediction , 2005, IEEE Transactions on Software Engineering.

[150]  David W. Wall,et al.  Predicting program behavior using real or estimated profiles , 2004, SIGP.

[151]  Michael D. Ernst,et al.  Which warnings should I fix first? , 2007, ESEC-FSE '07.

[152]  Jurgen Vinju,et al.  Analysis and transformation of source code by parsing and rewriting , 2005 .

[153]  Joseph A. Fisher,et al.  Predicting conditional branch directions from previous runs of a program , 1992, ASPLOS V.

[154]  Hausi A. Müller,et al.  Predicting fault-proneness using OO metrics. An industrial case study , 2002, Proceedings of the Sixth European Conference on Software Maintenance and Reengineering.

[155]  Susan Horwitz,et al.  Fast and accurate flow-insensitive points-to analysis , 1997, POPL '97.

[156]  RH Rudolf Mak,et al.  Design and performance analysis of data-independent stream processing systems , 2008 .

[157]  Bill Brykczynski,et al.  Software inspection : an industry best practice , 1996 .

[158]  Thomas Wolle,et al.  Computational aspects of treewidth : Lower bounds and network reliability , 2005 .

[159]  David W. Binkley,et al.  Interprocedural slicing using dependence graphs , 1988, SIGP.

[160]  Laura Brandán Briones,et al.  Theories for Model-based Testing: Real-time and Coverage , 2007 .

[161]  Ka Lok Man,et al.  Formal specification and analysis of hybrid systems , 2006 .

[162]  Junfeng Yang,et al.  Correlation exploitation in error ranking , 2004, SIGSOFT '04/FSE-12.

[163]  Atze Dijkstra Stepping through Haskell , 2000 .

[164]  J. Kwisthout,et al.  The Computational Complexity of Probabilistic Networks , 2009 .

[165]  de Hayco Jong Flexible heterogeneous software systems , 2007 .

[166]  Thomas Bäck,et al.  Mixed-integer evolution strategies for parameter optimization and their applications to medical image analysis , 2005 .

[167]  David A. Wagner,et al.  A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities , 2000, NDSS.

[168]  Dawson R. Engler,et al.  Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations , 2003, SAS.

[169]  Peter Verbaan,et al.  The Computational Complexity of Evolving Systems , 2006 .

[170]  Anton Wijs,et al.  Silent steps in transition systems and Markov chains , 2007 .

[171]  H. Hansen Coalgebraic Modelling : Applications in Automata theory and Modal logic , 2009 .

[172]  Andreas Zeller,et al.  How Long Will It Take to Fix This Bug? , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).

[173]  Pascal Durr,et al.  Resource-based Verification for Robust Composition of Aspects , 2008 .

[174]  Goran Frehse,et al.  Compositional verification of hybrid systems using simulation relations , 2005 .

[175]  Iris Loeb Natural Deduction, Sharing By Presentation , 2007 .

[176]  Sorin Lerner,et al.  ESP: path-sensitive program verification in polynomial time , 2002, PLDI '02.

[177]  James R. Larus,et al.  Branch prediction for free , 1993, PLDI '93.

[178]  A. L. de Groot,et al.  Practical Automaton proofs in PVS , 2000 .

[179]  Cjf Cas Cremers Scyther : semantics and verification of security protocols , 2006 .

[180]  Tim K. Cocx,et al.  Metrics and visualisation for crime analysis and genomics , 2005 .

[181]  David A. Wagner,et al.  Finding User/Kernel Pointer Bugs with Type Inference , 2004, USENIX Security Symposium.

[182]  Bastiaan Heeren,et al.  Top quality type error Messages , 2005 .

[183]  Michael D. Ernst,et al.  Prioritizing Warning Categories by Analyzing Software History , 2007, Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007).

[184]  Mari Antonius Cornelis Dekker,et al.  Flexible Access Control for Dynamic Collaborative Environments , 2009 .

[185]  David Hovemeyer,et al.  Tracking defect warnings across versions , 2006, MSR '06.

[186]  L. Moonen,et al.  Prioritizing Software Inspection Results using Static Profiling , 2006, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation.

[187]  Les Hatton Language subsetting in an industrial context: A comparison of MISRA C 1998 and MISRA C 2004 , 2007, Inf. Softw. Technol..

[188]  Mohammad Reza Mousavi,et al.  Structuring structural operational semantics , 2005 .

[189]  Harald C. Gall,et al.  Change Analysis with Evolizer and ChangeDistiller , 2009, IEEE Software.

[190]  V. Sundramoorthy,et al.  At Home in Service Discovery , 2006 .

[191]  Joost Noppen,et al.  Imperfect Information in Software Design Processes , 2007 .

[192]  Mark Lillibridge,et al.  Extended static checking for Java , 2002, PLDI '02.

[193]  Bastiaan Stephan Graaf,et al.  Model-Driven Evolution of Software Architectures , 2007, 11th European Conference on Software Maintenance and Reengineering (CSMR'07).

[194]  Harmen Kastenberg Graph-based software specification and verification , 2008 .

[195]  M. T. de Berg,et al.  Multi-functional geometric data structures , 2003 .

[196]  M. G. van der Horst,et al.  Scalable block processing algorithms , 2008 .

[197]  Dmitri Jarnikov,et al.  QoS framework for video streaming in home networks , 2007 .

[198]  Karina R. Olmos Joffré Strategies for Context Sensitive Program Transformation , 2009 .

[199]  Edward N. Adams,et al.  Optimizing Preventive Service of Software Products , 1984, IBM J. Res. Dev..

[200]  Thomas W. Reps,et al.  Precise interprocedural chopping , 1995, SIGSOFT FSE.

[201]  G. V. Kass An Exploratory Technique for Investigating Large Quantities of Categorical Data , 1980 .

[202]  Tim K. Cocx,et al.  Algorithmic tools for data-oriented law enforcement , 2009 .

[203]  Jeffrey S. Foster,et al.  Type qualifiers: lightweight specifications to improve software quality , 2002 .

[204]  Michiel van Genuchten,et al.  Software Quality in Consumer Electronics Products , 1996, IEEE Softw..

[205]  Martin Bravenboer,et al.  Exercises in Free Syntax. Syntax Definition, Parsing, and Assimilation of Language Conglomerates , 2003 .

[206]  M. A. Valero Espada,et al.  Modal Abstraction and Replication of Processes with Data , 2005 .

[207]  Flavio D. Garcia Formal and Computational Cryptography: Protocols, Hashes and Commitments , 2008 .

[208]  EM Elena Bortnik,et al.  Formal methods in support of SMC design , 2008 .

[209]  Leon Moonen,et al.  On the Use of Data Flow Analysis in Static Profiling , 2008, 2008 Eighth IEEE International Working Conference on Source Code Analysis and Manipulation.

[210]  Alex Groce,et al.  Modular verification of software components in C , 2003, 25th International Conference on Software Engineering, 2003. Proceedings..

[211]  Jeroen Eggermont,et al.  Data Mining using Genetic Programming : Classification and Symbolic Regression , 2005 .

[212]  Jens Knoop,et al.  Constant Propagation on the Value Graph: Simple Constants and Beyond , 2000, CC.

[213]  Ricardo Corin,et al.  Analysis Models for Security Protocols , 2006 .