Essays about: "static source code analysis"
Showing result 11 - 15 of 49 essays containing the words static source code analysis.
-
11. Vulnerability assessment of source codeanalysis tools for memory corruptionvulnerabilities a comparative study
University essay fromAbstract : Background. One of the main reasons for memory corruption vulnerabilities lies in the lack of built in safety measures for the C/C++ programming language which is often time used to develop performance critical software. READ MORE
-
12. Signal Dependency Analysisand Status Propagation Tracking
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : In software engineering, analyzing the dependence of software modules and signals is a common method of verification and testing software behaviors. Through dependency analysis, users can improve the quality and operating efficiency of the code. Also, analyzing dependencies can reflect the working status of software modules. READ MORE
-
13. Analysing Lambda Usage in the C++ Open Source Community
University essay from Mittuniversitetet/Institutionen för data- och systemvetenskapAbstract : Object-oriented languages have made a shift towards incorporating functional concepts such as lambdas. Lambdas are anonymous functions that can be used within the scope of other functions. In C++ lambdas are considered difficult to use for inexperienced developers. This implies that there may be problems with lambdas in C++. READ MORE
-
14. Source code quality in connection to self-admitted technical debt
University essay from Linnéuniversitetet/Institutionen för datavetenskap och medieteknik (DM)Abstract : The importance of software code quality is increasing rapidly. With more code being written every day, its maintenance and support are becoming harder and more expensive. New automatic code review tools are developed to reach quality goals. One of these tools is SonarQube. READ MORE
-
15. Security & Forensic Analysis of an Internet of Things Smart Home Ecosystem
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The Internet of Things (IoT) is an ongoing trend where a multitude of internet- connected devices become more common. Many of these devices have easily exploitable security vulnerabilities. This has led to large-scale cyberattacks such as the Mirai botnet Distributed Denial of Service (DDOS) attacks. READ MORE