Software Engineering Institute | Carnegie Mellon University
Software Engineering Institute | Carnegie Mellon University

Digital Library

Javascript is currently disabled for your browser. For an optimal search experience, please enable javascript.

Advanced Search

Basic Search

Content Type

Topics

Publication Date

Showing 1 - 5 of 5 results for the Type - conference paper Secure Coding

Conference Paper | November 2016 - Conference Paper Automated Code Repair Based on Inferred Specifications By William Klieber, William Snavely

In this paper, the authors describe automated repairs for three types of bugs: integer overflows, missing array bounds checks, and missing authorization checks.

Conference Paper | November 2016 - Conference Paper Static Analysis Alert Audits: Lexicon & Rules By David Svoboda, Lori Flynn, William Snavely

In this paper, the authors provide a suggested set of auditing rules and a lexicon for auditing static analysis alerts.

Conference Paper | May 2014 - Conference Paper Android Taint Flow Analysis for App Sets By Will Klieber, Lori Flynn, Amar S. Bhosale (Carnegie Mellon Heinz School), Limin Jia (Carnegie Mellon University - Department of Electrical and Computer Engineering), Lujo Bauer (Carnegie Mellon University - Department of Electrical and Computer Engineering)

This paper describes a new static taint flow analysis that precisely tracks both inter-component and intra-component data flow in a set of Android applications.

Conference Paper | January 2014 - Conference Paper Pointer Ownership Model By David Svoboda, Lutz Wrage

In this paper, the authors describe how the Pointer Ownership Model improves static analysis of C programs for errors involving dynamic memory management.

Conference Paper | May 2015 - Conference Paper A Course-Based Usability Analysis of Cilk Plus and OpenMP By Michael Coblenz (Carnegie Mellon School of Computer Science), Robert C. Seacord, Brad Myers, Joshua Sunshine (Institute for Software Research), Jonathan Aldrich

In this paper, the authors compare Cilk Plus and OpenMP to evaluate the design tradeoffs in the usability and security of these two approaches.