Blogs (61) >>
Wed 18 Jul 2018 14:41 - 14:57 at Winterthur - Session 2

Junior Submission
Static code analysis is a technology to automatically detect various security vulnerabilities at implementation time. Nevertheless, studies show that developers reject static analysis tools. The reason is that developers struggle to configure the static analysis such that it can operate efficiently in their application context. In this work, we improve the current situation by making the domain of static code analysis more transparent to developers when they use static analysis tools. In our approach, we propose a generator of configurations for static analyses for specific vulnerabilities selected by the developer. Moreover, the configurations are automatically customized to the code of interest that the developer works on.

Wed 18 Jul

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

13:30 - 15:24
14:00
25m
Doctoral symposium paper
Optimization based on Facts and Fiction
Doc Symposium
Olivier Flückiger Northeastern University, USA
File Attached
14:25
16m
Doctoral symposium paper
Two-phase Analysis for Precision and Scalability
Doc Symposium
Anastasios Antoniadis University of Athens, Greece
File Attached
14:41
16m
Doctoral symposium paper
Transparent Static Analysis for the Detection of Security Vulnerabilities
Doc Symposium
Goran Piskachev Fraunhofer IEM
File Attached
14:57
16m
Doctoral symposium paper
Improving Symbolic Flat Memory Models with Pointer Alias Analysis
Doc Symposium
Timotej Kapus Imperial College London
File Attached
15:13
16m
Doctoral symposium paper
Auto-tuning Framework for Multi-core Interference Analysis
Doc Symposium
Dan Iorga Imperial College London, UK