Essays about: "Static code analysis"
Showing result 1 - 5 of 111 essays containing the words Static code analysis.
-
1. UCov : A Static Analysis Tool for API Usage Coverage Validation
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Nowadays, all software projects are based on a large number of libraries, so they do not have to start from scratch. These libraries evolve over time, whether to add functionality or to simplify their use. These updates are necessary to improve their libraries, but can lead to errors in their clients’ code. READ MORE
-
2. The impacts of code structure analysis, powered by the language model FastText
University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknikAbstract : The goal of this study was to investigate how the use of language models in the context of code structure analysis could impact how developers manage code structure. To do this, a prototype tool GOSPLAT (GoLang Static Package Language-model Analysis Tool) was created. READ MORE
-
3. Investigating programming language support for fault-tolerance
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Dataflow systems have become the norm for developing data-intensive computing applications. These systems provide transparent scalability and fault tolerance. For fault tolerance, many dataflow-system adopt a snapshotting approach which persists the state of an operator once it has received a snapshot marker on all its input channels. READ MORE
-
4. Role Based Access Control (RBAC) in the context of Smart Grids : Implementing and Evaluating a Role Based Access Control System for Configuration Loading in a Substation from a Desktop
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Access control is a crucial aspect of cybersecurity, and Role Based Access Control (RBAC) is a typical framework for controlling the access to specific resources. However, in the context of Smart Grids, the usual authentication solution of using a trusted identity provider might not be possible to provide authentication of a user, as systems cannot rely on external services. READ MORE
-
5. Static Analysis Of Client-Side JavaScript Code To Detect Server-Side Business Logic Vulnerabilities
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In the real world, web applications are crucial in various domains, from e-commerce to finance and healthcare. However, these applications are not immune to vulnerabilities, particularly in business logic. Detecting such vulnerabilities can be challenging due to the complexity and diversity of application functionality. READ MORE