Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3423360
|View full text |Cite
|
Sign up to set email alerts
|

RTFM! Automatic Assumption Discovery and Verification Derivation from Library Document for API Misuse Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 21 publications
0
11
0
Order By: Relevance
“…The overlapping ratio is the number of shared rules divided by the minimum number of rules in the three libraries. For example, 12 of the dtype rules are the same across the libraries, resulting in an overlapping ratio of 31.6%, which is 12 š‘šš‘–š‘› (41,38,47) , since at most only š‘šš‘–š‘› (41,38,47) number of rules can be shared across the libraries.…”
Section: Constraint Extraction Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The overlapping ratio is the number of shared rules divided by the minimum number of rules in the three libraries. For example, 12 of the dtype rules are the same across the libraries, resulting in an overlapping ratio of 31.6%, which is 12 š‘šš‘–š‘› (41,38,47) , since at most only š‘šš‘–š‘› (41,38,47) number of rules can be shared across the libraries.…”
Section: Constraint Extraction Resultsmentioning
confidence: 99%
“…Analyzing software text to detect bugs: Prior work leverages documents [16,38] and comments [57-59, 76, 78] to detect inconsistency bugs between code and its specifications. Some prior work leverages UML statecharts for test case generation [45] and translates software specifications into assertions [37], verificatino code [38], and oracles [25,41].…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Then during JIT compilation, PYE uses the library's pre-calculated condition values to parse the conditions related to these values to generate the final result. Tao et al proposed a technique called Advance (Lv et al, 2020), which is used to verify some inviolable properties in the Java API library, such as null dereferences.…”
Section: Null Dereference Analysismentioning
confidence: 99%