期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)
Malware detection at scale in the Android realm is often carried out using machine learning techniques. State-of-the-art approaches such as DREBIN and......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)
As data volume and complexity grow at an unprecedented rate, the performance of data manipulation programs is becoming a major concern for developers.......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)
Side-channel attacks, which are capable of breaking secrecy via side-channel information, pose a growing threat to the implementation of cryptographic......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)
Static bug detection has shown its effectiveness in detecting well-defined memory errors, e.g., memory leaks, buffer overflows, and null dereference. ......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)
Satisfiability modulo theories (SMT) solvers have been widely applied as the reasoning engine for diverse software analysis and verification technolog......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)
Android, the most popular mobile operating system, has attracted millions of users around the world. Meanwhile, the number of new Android malware inst......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)
Blockchain offers a distributed ledger to record data collected from Internet of Thing (IoT) devices as immutable and tamper-proof transactions and se......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (3)
UI (User Interface) is an essential factor influencing users' perception of an app. However, it is hard for even professional designers to determine i......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)
Commit messages recorded in version control systems contain valuable information for software development, maintenance, and comprehension. Unfortunate......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)
Modern systems, such as cyber-physical systems, often consist of multiple products within/across product lines communicating with each other through i......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (4)
Background. Self-admitted technical debt (SATD) is a special kind of technical debt that is intentionally introduced and remarked by code comments. Th......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)
Detecting software vulnerabilities is an important problem and a recent development in tackling the problem is the use of deep learning models to dete......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)
Many Stack Overflow answers have associated informative comments that can strengthen them and assist developers. A prior study found that comments can......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)
Machine learning-(ML) based approach is considered as one of the most promising techniques for Android malware detection and has achieved high accurac......
期刊: ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2021; 30 (2)
Message-passing interface (MPI) programs, a typical kind of parallel programs, have been commonly used in various applications. However, it generally ......