Search Results - automatic programming|program modication
-
1
Authors: et al.
Contributors: et al.
Subject Terms: Categories and Subject Descriptors, F.3.1 [Logics and Meanings of Programs, Specifying, Verifying and Reasoning about Programs, F.4.1 [Mathematical Logic and Formal Languages, Mathematical Logic, F.2.3 [Analysis of Algorithms and Problem Complexity, Tradeos between Complexity Mea- sures, D.1.2 [Programming Techniques, Automatic Programming|Program modication, synthesis, transformation, D.4.7 [Operating Systems, Organization and Design|Real-time and embedded systems General Terms, Algorithms, Theory, Verication Additional Key Words and Phrases, UNITY, Formal Methods, Stabilization
File Description: application/pdf
-
2
Contributors: The Pennsylvania State University CiteSeerX Archives
File Description: application/pdf
-
3
Authors: Eberbach, Eugene
Source: Fundamenta Informaticae; 2022, Vol. 188 Issue 2, p63-90, 28p
Subject Terms: TURING machines, ALGORITHMS, PROBLEM solving, COST, METAHEURISTIC algorithms
-
4
Authors: et al.
Source: ACM/IEEE International Conference on Human-Robot Interaction; Mar2024, p361-370, 10p
Subject Terms: LANGUAGE models, LOGIC programming, SYSTEMS design, ROBOT programming, NATURAL languages, ROBOTS
-
5
Authors:
Source: Journal of Big Data; 7/26/2025, Vol. 12 Issue 1, p1-57, 57p
Subject Terms: DATA science, MATHEMATICAL formulas, MATHEMATICAL functions, LAYPERSONS
-
6
Source: Pediatric Blood & Cancer; Apr2024 Supplement 1, Vol. 71, p1-268, 268p
-
7
Authors:
Source: BMC Bioinformatics; 2008, Vol. 9, Special section p1-6, 6p, 1 Diagram, 1 Graph
Subject Terms: STATISTICS, COMPUTER software, BIOINFORMATICS, ALGORITHMS, COMPUTERS
-
8
Authors: et al.
Source: Asian Journal of Engineering, Sciences & Technology (AJEST); Mar2018, Vol. 8 Issue 1, p1-8, 8p
-
9
Authors: et al.
Source: Applied Physics Reviews; Dec2023, Vol. 10 Issue 4, p1-93, 93p
-
10
Authors: et al.
Source: PLoS ONE; 9/21/2020, Vol. 15 Issue 9, p1-23, 23p
Subject Terms: CARTESIAN coordinates, COORDINATES, IMAGE segmentation, OPTIC disc, IMAGE analysis, COST functions, PETRI nets
-
11
Alternate Title: Le rôle de l'ordinateur dans la technologie des stimulateurs cardiaques. (French)
Authors:
Source: Pacing & Clinical Electrophysiology; Nov1984, Vol. 7 Issue 6, p1217-1227, 11p, 10 Diagrams, 1 Chart
-
12
Authors: et al.
Source: Advanced Robotics; 2010, Vol. 24 Issue 5/6, p719-737, 19p, 9 Graphs
Subject Terms: PREDICTIVE control systems, ROBOT motion, WALKING, FOOTSTEPS, ROBOTICS
-
13
Authors:
Resource Type: eBook.
Categories: COMPUTERS / Languages / C#, COMPUTERS / Programming / Object Oriented, COMPUTERS / Languages / .NET
-
14
Source: Movement Disorders Clinical Practice; Apr2019 Supplement S1, Vol. 6, pS11-S164, 154p
-
15
Authors: Norbert E. Fuchs
Resource Type: eBook.
Categories: COMPUTERS / Programming / General, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Computer Science
-
16
Source: Journal of Clinical Periodontology; Jun2015 Supplement, Vol. 42, p64-442, 379p
Subject Terms: CONFERENCES & conventions, PERIODONTAL disease
Geographic Terms: EUROPE
-
17
Authors: Petra Perner
Resource Type: eBook.
Subjects: Compilers (Computer programs), Data mining, Application software, Artificial intelligence, Machine theory, Database management
Categories: COMPUTERS / Programming / Compilers, COMPUTERS / Artificial Intelligence / General, COMPUTERS / Business & Productivity Software / General, COMPUTERS / Computer Science, COMPUTERS / Database Administration & Management, COMPUTERS / Data Science / Data Analytics, MATHEMATICS / Probability & Statistics / General
-
18
Authors:
Source: IEEE Transactions on Industrial Informatics; May2005, Vol. 1 Issue 2, p112-123, 12p
-
19
Authors:
Source: Analog Integrated Circuits & Signal Processing; Feb2004, Vol. 38 Issue 2/3, p121-135, 15p
-
20
Authors: et al.
Contributors: et al.
Subject Terms: 靜態分析, 廣告欺詐檢測, iOS, 行動應用程式, 資訊安全, Static analysis, Ad fraud detection, Mobile application, Software security
File Description: 4948718 bytes; application/pdf
Relation: [1] M. C. Grace, W. Zhou, X. Jiang, and A.-R. Sadeghi, \\Unsafe exposure analysis\nof mobile in-app advertisements," in Proceedings of the Lfth ACM conference on\nSecurity and Privacy in Wireless and Mobile Networks, pp. 101{112, ACM, 2012.\n[2] D. Graziano, \\Android and iOS Still Rule the Mobile World;Microsoft and RIM Have\nLong Roads Ahead." https://www.appannie.com/en/insights/market-data/\napp-advertising-spend-2021/, 2012.\n[3] Google, \\Google Admob." https://admob.google.com/, 2019.\n[4] Apple, \\Apple Search Ads." https://searchads.apple.com/, 2019.\n[5] Facebook, \\Facebook Ad." https://www.facebook.com/business/ads, 2019.\n[6] A. Mamiit, \\Google\nags preinstalled malware as hidden threat on mil-\nlions of Android phones." https://www.digitaltrends.com/mobile/\nandroid-phones-preinstalled-malware, 2019.\n[7] Google, \\Google Behavioral policies." https://support.google.com/admob/\nanswer/2753860, 2019.\n[8] B. Liu, S. Nath, R. Govindan, and J. Liu, \\fDECAFg: Detecting and characterizing\nad fraud in mobile apps," in 11th fUSENIXg Symposium on Networked Systems\nDesign and Implementation (fNSDIg 14), pp. 57{70, 2014.\n[9] F. Dong, H. Wang, L. Li, Y. Guo, T. F. BissyandSe, T. Liu, G. Xu, and J. Klein,\n\\Frauddroid: Automated ad fraud detection for android apps," in Proceedings of the\n2018 26th ACM Joint Meeting on European Software Engineering Conference and\nSymposium on the Foundations of Software Engineering, pp. 257{268, ACM, 2018.\n[10] B. Wang, F. Wu, and G. Chen, \\Placement fraud detection on smart phones: A joint\ncrowdsourcing and data analyzing based approach," in International Conference on\nMobile Ad-Hoc and Sensor Networks, pp. 163{179, Springer, 2017.\n[11] V. Dave, S. Guha, and Y. Zhang, \\Viceroi: Catching click-spam in search ad net-\nworks," in Proceedings of the 2013 ACM SIGSAC conference on Computer & com-\nmunications security, pp. 765{776, ACM, 2013.\n[12] \\Google AD Size." https://developers.google.com/admob/ios/banner.\n[13] V. Dave, S. Guha, and Y. Zhang, \\Measuring and Lngerprinting click-spam in ad\nnetworks," in Proceedings of the ACM SIGCOMM 2012 conference on Applications,\ntechnologies, architectures, and protocols for computer communication, pp. 175{186,\nACM, 2012.\n[14] T. Yeh, T.-H. Chang, and R. C. Miller, \\Sikuli: using gui screenshots for search and\nautomation," in Proceedings of the 22nd annual ACM symposium on User interface\nsoftware and technology, pp. 183{192, ACM, 2009.\n[15] Apple, \\Apple Developer Documentation." https://developer.apple.com/\ndocumentation/, 2019.\n[16] P. Z. Ian Beer, \\A very deep dive into iOS Exploit chains found\nin the wild." https://googleprojectzero.blogspot.com/2019/08/\na-very-deep-dive-into-ios-exploit.html, 2019.\n[17] W. Wang, I. L. Kim, and Y. Zheng, \\Adjust: runtime mitigation of resource abus-\ning third-party online ads," in Proceedings of the 41st International Conference on\nSoftware Engineering, pp. 1005{1015, IEEE Press, 2019.\n[18] W. Yang, M. Prasad, and T. Xie, \\Enmobile: Entity-based characterization and\nanalysis of mobile malware," in 2018 IEEE/ACM 40th International Conference on\nSoftware Engineering (ICSE), pp. 384{394, IEEE, 2018.\n[19] P. Z. Ian Beer, \\In-the-wild iOS Exploit Chain 1." https://googleprojectzero.\nblogspot.com/2019/08/in-wild-ios-exploit-chain-1.html, 2019.\n[20] H.Wang and Y. Guo, \\Understanding third-party libraries in mobile app analysis," in\n2017 IEEE/ACM 39th International Conference on Software Engineering Companion\n(ICSE-C), pp. 515{516, IEEE, 2017.\n[21] D. M. Lazer, M. A. Baum, Y. Benkler, A. J. Berinsky, K. M. Greenhill, F. Menczer,\nM. J. Metzger, B. Nyhan, G. Pennycook, D. Rothschild, et al., \\The science of fake\nnews," Science, vol. 359, no. 6380, pp. 1094{1096, 2018.\n[22] A. Kantchelian, M. C. Tschantz, S. Afroz, B. Miller, V. Shankar, R. Bachwani, A. D.\nJoseph, and J. D. Tygar, \\Better malware ground truth: Techniques for weighting\nanti-virus vendor labels," in Proceedings of the 8th ACM Workshop on Articial\nIntelligence and Security, pp. 45{56, ACM, 2015.\n[23] B. J. Kwon, J. Mondal, J. Jang, L. Bilge, and T. DumitraXs, \\The dropper effect:\nInsights into malware distribution with downloader graph analytics," in Proceedings\nof the 22nd ACM SIGSAC Conference on Computer and Communications Security,\npp. 1118{1129, ACM, 2015.\n[24] K. Chen, X. Wang, Y. Chen, P. Wang, Y. Lee, X. Wang, B. Ma, A. Wang, Y. Zhang,\nand W. Zou, \\Following devil`s footprints: Cross-platform analysis of potentially\nharmful libraries on android and ios," in 2016 IEEE Symposium on Security and\nPrivacy (SP), pp. 357{376, IEEE, 2016.\n[25] X. Liao, K. Yuan, X.Wang, Z. Pei, H. Yang, J. Chen, H. Duan, K. Du, E. Alowaisheq,\nS. Alrwais, et al., \\Seeking nonsense, looking for trouble: Efficient promotional-\ninfection detection through semantic inconsistency search," in 2016 IEEE Symposium\non Security and Privacy (SP), pp. 707{723, IEEE, 2016.\n[26] S. Roy, J. DeLoach, Y. Li, N. Herndon, D. Caragea, X. Ou, V. P. Ranganath, H. Li,\nand N. Guevara, \\Experimental study with real-world data for android app secu-\nrity analysis using machine learning," in Proceedings of the 31st Annual Computer\nSecurity Applications Conference, pp. 81{90, ACM, 2015.\n[27] F. Wei, S. Roy, X. Ou, et al., \\Amandroid: a precise and general inter-component\ndata\now analysis framework for security vetting of android apps," ACM Transactions\non Privacy and Security (TOPS), vol. 21, no. 3, p. 14, 2018.\n[28] H. Chen, H.-f. Leung, B. Han, and J. Su, \\Automatic privacy leakage detection\nfor massive android apps via a novel hybrid approach," in 2017 IEEE International\nConference on Communications (ICC), pp. 1{7, IEEE, 2017.\n[29] X. Pan, X. Wang, Y. Duan, X. Wang, and H. Yin, \\Dark hazard: Learning-based,\nlarge-scale discovery of hidden sensitive operations in android apps.," in NDSS, 2017.\n[30] A. Armando, G. Costa, A. Merlo, and L. Verderame, \\Enabling byod through secure\nmeta-market," in Proceedings of the 2014 ACM conference on Security and privacy\nin wireless & mobile networks, pp. 219{230, ACM, 2014.\n[31] Y. Nan, M. Yang, Z. Yang, S. Zhou, G. Gu, and X. Wang, \\Uipicker: User-input pri-\nvacy identifcation in mobile applications," in 24th fUSENIXg Security Symposium\n(fUSENIXg Security 15), pp. 993{1008, 2015.\n[32] J. Huang, Z. Li, X. Xiao, Z. Wu, K. Lu, X. Zhang, and G. Jiang, \\fSUPORg: Precise\nand scalable sensitive user input detection for android apps," in 24th fUSENIXg\nSecurity Symposium (fUSENIXg Security 15), pp. 977{992, 2015.\n[33] Z. Qu, V. Rastogi, X. Zhang, Y. Chen, T. Zhu, and Z. Chen, \\Autocog: Measur-\ning the description-to-permission ldelity in android applications," in Proceedings of\nthe 2014 ACM SIGSAC Conference on Computer and Communications Security,\npp. 1354{1365, ACM, 2014.\n[34] R. Pandita, X. Xiao, W. Yang, W. Enck, and T. Xie, \\fWHYPERg: Towards au-\ntomating risk assessment of mobile applications," in Presented as part of the 22nd\nfUSENIXg Security Symposium (fUSENIXg Security 13), pp. 527{542, 2013.\n[35] P. Suciu, \\The Biggest Cybercrime Threats of 2019." https://www.\necommercetimes.com/story/85782.html, 2019.\n[36] A. Metwally, D. Agrawal, and A. El Abbadi, \\Detectives: detecting coalition hit\nin\nation attacks in advertising networks streams," in Proceedings of the 16th inter-\nnational conference on World Wide Web, pp. 241{250, ACM, 2007.\n[37] A. Metwally, F. Emekci, D. Agrawal, and A. El Abbadi, \\Sleuth: Single-publisher\nattack detection using correlation hunting," Proceedings of the VLDB Endowment,\nvol. 1, no. 2, pp. 1217{1228, 2008.\n[38] F. Yu, Y. Xie, and Q. Ke, \\Sbotminer: large scale search bot detection," in Pro-\nceedings of the third ACM international conference on Web search and data mining,\npp. 421{430, ACM, 2010.\n[39] S. A. Alrwais, A. Gerber, C. W. Dunn, O. Spatscheck, M. Gupta, and E. Osterweil,\n\\Dissecting ghost clicks: Ad fraud via misdirected human clicks," in Proceedings of\nthe 28th Annual Computer Security Applications Conference, pp. 21{30, ACM, 2012.\n[40] T. Blizard and N. Livic, \\Click-fraud monetizing malware: A survey and case study,"\nin 2012 7th International Conference on Malicious and Unwanted Software, pp. 67{\n72, IEEE, 2012.\n[41] J. Crussell, R. Stevens, and H. Chen, \\Madfraud: Investigating ad fraud in android\napplications," in Proceedings of the 12th annual international conference on Mobile\nsystems, applications, and services, pp. 123{134, ACM, 2014.\n[42] X. Xiao, X. Wang, Z. Cao, H. Wang, and P. Gao, \\Iconintent: automatic identi-\ncation of sensitive ui widgets based on icon classication for android apps," in Pro-\nceedings of the 41st International Conference on Software Engineering, pp. 257{268,\nIEEE Press, 2019.\n[43] P. Wang, D. Wu, Z. Chen, and T. Wei, \\Protecting million-user ios apps with ob-\nfuscation: motivations, pitfalls, and experience," in 2018 IEEE/ACM 40th Interna-\ntional Conference on Software Engineering: Software Engineering in Practice Track\n(ICSE-SEIP), pp. 235{244, IEEE, 2018.\n[44] A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, \\A survey of mobile\nmalware in the wild," in Proceedings of the 1st ACM Workshop on Security and\nPrivacy in Smartphones and Mobile Devices, SPSM `11, pp. 3{14, 2011.\n[45] S. Arzt, S. Rasthofer, C. Fritz, E. Bodden, A. Bartel, J. Klein, Y. L. Traon,\nD. Octeau, and P. McDaniel, \\Flowdroid: precise context,\now, eld, object-sensitive\nand lifecycle-aware taint analysis for android apps," in ACM SIGPLAN Conference\non Programming Language Design and Implementation, PLDI `14, Edinburgh, United\nKingdom - June 09 - 11, 2014, p. 29, 2014.\n[46] L. Li, T. F. Bissyande, D. Octeau, and J. Klein, \\Droidra: taming re\nection to\nsupport whole-program analysis of android apps," in Proceedings of the 25th Inter-\nnational Symposium on Software Testing and Analysis, pp. 318{329, ACM, 2016.\n[47] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. Mc-\nDaniel, and A. N. Sheth, \\Taintdroid: an information-\now tracking system for real-\ntime privacy monitoring on smartphones," ACM Transactions on Computer Systems\n(TOCS), vol. 32, no. 2, p. 5, 2014.\n[48] T. Bao, J. Burket, M. Woo, R. Turner, and D. Brumley, \\Byteweight: Learning to\nrecognize functions in binary code," in Proceedings of the 23rd USENIX Conference\non Security Symposium, SEC`14, pp. 845{860, USENIX Association, 2014.\n[49] X. Meng and B. P. Miller, \\Binary code is not easy," in Proceedings of the 25th\nInternational Symposium on Software Testing and Analysis, ISSTA 2016, pp. 24{35,\nACM, 2016.\n[50] Y. Shoshitaishvili, R. Wang, C. Salls, N. Stephens, M. Polino, A. Dutcher, J. Grosen,\nS. Feng, C. Hauser, C. Kruegel, et al., \\Sok:(state of) the art of war: Offensive\ntechniques in binary analysis," in 2016 IEEE Symposium on Security and Privacy\n(SP), pp. 138{157, IEEE, 2016.\n[51] T. Reinbacher and J. Brauer, \\Precise control\now reconstruction using boolean\nlogic," in Proceedings of the Ninth ACM International Conference on Embedded Soft-\nware, EMSOFT `11, pp. 117{126, ACM, 2011.\n[52] D. Brumley, I. Jager, T. Avgerinos, and E. J. Schwartz, \\BAP: A binary analysis\nplatform," in Computer Aided Verication - 23rd International Conference, CAV\n2011, Snowbird, UT, USA, July 14-20, 2011. Proceedings, pp. 463{469, 2011.\n[53] Dynist, \\Dynist: Tools for binary instrumentation, analysis, and modication."\nhttps://github.com/dyninst.\n[54] D. Song, D. Brumley, H. Yin, J. Caballero, I. Jager, M. G. Kang, Z. Liang, J. New-\nsome, P. Poosankam, and P. Saxena, \\Bitblaze: A new approach to computer security\nvia binary analysis," in Proceedings of the 4th International Conference on Informa-\ntion Systems Security, ICISS `08, pp. 1{25, 2008.\n[55] Y. Lee, X. Wang, K. Lee, X. Liao, X. Wang, T. Li, and X. Mi, \\Understanding\nios-based crowdturng through hidden fUIg analysis," in 28th fUSENIXg Security\nSymposium (fUSENIXg Security 19), pp. 765{781, 2019.\n[56] C. Xiao, \\Pirated iOS App Stores Client Successfully Evaded Ap-\nple iOS Code Review." https://unit42.paloaltonetworks.com/\npirated-ios-app-stores-client-successfully-evaded-apple-ios-code-review/,\n2016.\n[57] N. Statt, \\This illicit iPhone app store has been hiding in\nplain sight." https://www.theverge.com/2019/2/20/18232140/\napple-tutuapp-piracy-ios-apps-developer-enterprise-program-misuse,\n2019.\n[58] C.-H. Lin, F. Yu, J.-H. R. Jiang, and T. Bultan, \\Static detection of api call vulner-\nabilities in ios executables," in 2018 IEEE/ACM 40th International Conference on\nSoftware Engineering: Companion (ICSE-Companion), pp. 394{395, IEEE, 2018.\n[59] M. Egele, C. Kruegel, E. Kirda, and G. Vigna, \\Pios: Detecting privacy leaks in ios\napplications.," in NDSS, 2011.\n[60] T.Werthmann, R. Hund, L. Davi, A.-R. Sadeghi, and T. Holz, \\Psios: bring your own\nprivacy & security to ios devices," in Proceedings of the 8th ACM SIGSAC symposium\non Information, computer and communications security, pp. 13{24, ACM, 2013.\n[61] L. Davi, A. Dmitrienko, M. Egele, T. Fischer, T. Holz, R. Hund, S. Nurnberger,\nand A.-R. Sadeghi, \\Moc: A framework to mitigate control-\now attacks on smart-\nphones.," in NDSS, 2012.\n[62] Z. Deng, B. Saltaformaggio, X. Zhang, and D. Xu, \\iris: Vetting private api abuse in\nios applications," in Proceedings of the 22nd ACM SIGSAC Conference on Computer\nand Communications Security, pp. 44{56, ACM, 2015.\n[63] F. Yu, Y.-C. Lee, S. Tai, and W.-S. Tang, \\Appbeach: Characterizing app behaviors\nvia static binary analysis," in Proceedings of the 2013 IEEE Second International\nConference on Mobile Services, p. 86, IEEE Computer Society, 2013.\n[64] Z. R. Fang, S. W. Huang, and F. Yu, \\Appreco: Behavior-aware recommendation for\nios mobile applications," in 2016 IEEE International Conference on Web Services\n(ICWS), pp. 492{499, June 2016.\n[65] A. S. Christensen, A. Mller, and M. I. Schwartzbach, \\Precise analysis of\nstring expressions," in Proc. 10th International Static Analysis Symposium (SAS),\nvol. 2694 of LNCS, pp. 1{18, Springer-Verlag, June 2003. Available from\nhttp://www.brics.dk/JSA/.\n[66] C. Gould, Z. Su, and P. Devanbu, \\Static checking of dynamically generated queries\nin database applications," in Software Engineering, 2004. ICSE 2004. Proceedings.\n26th International Conference on, pp. 645{654, IEEE, 2004.\n[67] P. A. Abdulla, M. F. Atig, Y.-F. Chen, L. Holk, A. Rezine, P. Rummer, and J. Sten-\nman, \\String constraints for verication," in International Conference on Computer\nAided Verication, pp. 150{166, Springer, 2014.\n[68] A. Das, S. K. Lahiri, A. Lal, and Y. Li, \\Angelic verication: Precise verication\nmodulo unknowns," in International Conference on Computer Aided Verication,\npp. 324{342, Springer, 2015.\n[69] J. Schutte and D. Titze, \\lios: Lifting ios apps for fun and prot," 2019.\n[70] \\Hex-Rays Decompiler Manual." https://www.hex-rays.com/products/\ndecompiler/manual/tricks.shtml.\n[71] J. Webber, \\A programmatic introduction to neo4j," in Proceedings of the 3rd an-\nnual conference on Systems, programming, and applications: software for humanity,\npp. 217{218, ACM, 2012.\n[72] Facebook, \\Facebook Infer: Linters bug types-Unavailable api in supported ios\nsdk ." https://fbinfer.com/docs/linters-bug-types.html#UNAVAILABLE_API_\nIN_SUPPORTED_IOS_SDK, 2019.\n[73] C. Calcagno, D. Distefano, J. Dubreil, D. Gabi, P. Hooimeijer, M. Luca, P. OHearn,\nI. Papakonstantinou, J. Purbrick, and D. Rodriguez, \\Moving fast with software\nverication," in NASA Formal Methods Symposium, pp. 3{11, Springer, 2015.\n[74] D. Distefano, P. W. Ohearn, and H. Yang, \\A local shape analysis based on separation\nlogic," in International Conference on Tools and Algorithms for the Construction and\nAnalysis of Systems, pp. 287{302, Springer, 2006.\n[75] C. Calcagno, D. Distefano, P. W. Ohearn, and H. Yang, \\Compositional shape anal-\nysis by means of bi-abduction," Journal of the ACM (JACM), vol. 58, no. 6, p. 26,\n2011.\n[76] J. Berdine, C. Calcagno, and P. W. Ohearn, \\Smallfoot: Modular automatic assertion\nchecking with separation logic," in International Symposium on Formal Methods for\nComponents and Objects, pp. 115{137, Springer, 2005.\n[77] P. Cousot, \\Abstract interpretation in a nutshell," howpublished, 7th October, 2012.\n[78] Facebook, \\Facebook Infer: linters.al." https://github.com/facebook/infer/\nblob/472f155a7a1a5afa95f46d4300137e58cb1fa643/infer/lib/linter_rules/\nlinters.al, 2019.\n[79] Facebook, \\Facebook Infer: cPredicates.ml." https://github.com/facebook/\ninfer/blob/86140581d5e8690ac8ba82965aaa9d970acbb78e/infer/src/al/\ncPredicates.ml, 2019.\n[80] M. Pradel and K. Sen, \\Deepbugs: A learning approach to name-based bug detec-\ntion," Proceedings of the ACM on Programming Languages, vol. 2, no. OOPSLA,\np. 147, 2018.\n[81] R. van Tonder and C. Le Goues, \\Static automated program repair for heap prop-\nerties," in 2018 IEEE/ACM 40th International Conference on Software Engineering\n(ICSE), pp. 151{162, IEEE, 2018.\n[82] M. Harman and P. O`Hearn, \\From start-ups to scale-ups: Opportunities and open\nproblems for static and dynamic program analysis," in 2018 IEEE 18th International\nWorking Conference on Source Code Analysis and Manipulation (SCAM), pp. 1{23,\nIEEE, 2018.\n[83] N. Alshahwan, X. Gao, M. Harman, Y. Jia, K. Mao, A. Mols, T. Tei, and I. Zorin,\n\\Deploying search based software engineering with sapienz at facebook," in Interna-\ntional Symposium on Search Based Software Engineering, pp. 3{45, Springer, 2018.\n[84] Facebook, \\Facebook Infer: AL-examples." https://fbinfer.com/docs/linters.\nhtml#examples, 2019.\n[85] Apple, \\App Store Review Guidelines." https://developer.apple.com/\napp-store/review/guidelines, 2019.\n[86] ARM, \\ARM Information Center." http://infocenter.arm.com/help/index.jsp,\n2009.\n[87] soslab nccu, \\Github: Static Ad Fraud Detection on iOS Applications." https:\n//github.com/soslab-nccu/detect-adfraud, 2019.\n[88] soslab nccu, \\Github: BinFlow-Static Detection of API Call Vulnerabilities in iOS\nExecutables." https://github.com/soslab-nccu/binflow, 2018.\n[89] C. Y. Huang, \\Video link of App 1077052682." https://drive.google.com/drive/\nfolders/1ep4RiMFPcL4CbfY05ZGc11UMAYGqHkA3?usp=sharing, 2019.; G0106356036; https://nccur.lib.nccu.edu.tw//handle/140.119/128563; https://nccur.lib.nccu.edu.tw/bitstream/140.119/128563/1/603601.pdf
Nájsť tento článok vo Web of Science
Full Text Finder