Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of 2018
DOI: 10.1145/3236024.3236035
|View full text |Cite
|
Sign up to set email alerts
|

Phys: probabilistic physical unit assignment and inconsistency detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 17 publications
0
15
0
Order By: Relevance
“…For example, they automatically refine string variables into some that represent passwords, some that represents file system paths, etc. Similarly, Kate et al [37] use probabilistic inference to predict physical units in scientific code. While they use probabilistic reasoning to perform this task, no learning is employed.…”
Section: Introductionmentioning
confidence: 99%
“…For example, they automatically refine string variables into some that represent passwords, some that represents file system paths, etc. Similarly, Kate et al [37] use probabilistic inference to predict physical units in scientific code. While they use probabilistic reasoning to perform this task, no learning is employed.…”
Section: Introductionmentioning
confidence: 99%
“…In practice, existing literature of probability inference typically makes use of pre-defined prior probability values derived from domain knowledge [84], [45], [36], [58], [21], [60], [50].…”
Section: A Random Variables and Probabilistic Constraintsmentioning
confidence: 99%
“…Dietz et al also leverage probabilistic inference to localize source code bugs [36]. Besides, probabilistic techniques are widely used for binary analysis [87], [61], physical unit security [45], program enhancement [49], and vulnerability detection [36], [58]. To the best of our knowledge, NETPLIER is the first approach that enforces probabilistic analysis on protocol reverse engineering.…”
Section: Related Workmentioning
confidence: 99%
“…VI. Re l a t e d W o r k a) Name-based Program Analysis: Various analyses exploit the rich information provided by identifier names, e.g., to find bugs [2]- [5] and vulnerabilities [46], to mine specifications [6 ], to infer types based on identifier names as implicit type hints [7], [8 ], to predict the name of a method [9], to complete partial code using a learned language model [1 0 ], to identify inappropriate names [1 1 ], to suggest more suitable names [1 2 ], to resolve fully qualified type names of methods, variables, etc. in a given code snippet [47], or to map APIs between programming languages based on an embedding of code tokens [18].…”
Section: B Threats To External Validitymentioning
confidence: 99%