메뉴 건너뛰기




Volumn 53, Issue 4, 2011, Pages 363-387

A systematic literature review of actionable alert identification techniques for automated static code analysis

Author keywords

Actionable alert identification; Actionable alert prediction; Automated static analysis; Systematic literature review; Unactionable alert mitigation; Warning prioritization

Indexed keywords

AUTOMATION; CLASSIFICATION (OF INFORMATION); DATA FUSION; GRAPH THEORY; LEARNING SYSTEMS; SOFTWARE DESIGN;

EID: 79951811783     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2010.12.007     Document Type: Review
Times cited : (132)

References (61)
  • 1
    • 34247507725 scopus 로고    scopus 로고
    • Integrating static and dynamic analysis for detecting vulnerabilities
    • DOI 10.1109/COMPSAC.2006.55, 4020095, Proceedings - 30th Annual International Computer Software and Applications Conference, COMPSAC 2006
    • A. Aggarwal, P. Jalote, Integrating static and dynamic analysis for detecting vulnerabilities, in: Proceedings of the 30th Annual International Computer Software and Applications Conference, Chicago, Illinois, USA, September 17-21, 2006, pp. 343-350. (Pubitemid 46661666)
    • (2006) Proceedings - International Computer Software and Applications Conference , vol.1 , pp. 343-350
    • Aggarwal, A.1    Jalote, P.2
  • 2
    • 84949224755 scopus 로고    scopus 로고
    • Applying static analysis to large-scale, multi-threaded java programs
    • Canberra, Australia, August 27-28
    • C. Artho, A. Biere, Applying static analysis to large-scale, multi-threaded java programs, in: Proceedings of the 13th Australian Conference on Software Engineering, Canberra, Australia, August 27-28, 2001, pp. 68-75.
    • (2001) Proceedings of the 13th Australian Conference on Software Engineering , pp. 68-75
    • Artho, C.1    Biere, A.2
  • 9
    • 10944267118 scopus 로고    scopus 로고
    • Static analysis for security
    • DOI 10.1109/MSP.2004.111
    • B. Chess, and G. McGraw Static analysis for security IEEE Security & Privacy 2 6 2004 76 79 (Pubitemid 40010916)
    • (2004) IEEE Security and Privacy , vol.2 , Issue.6 , pp. 76-79
    • Chess, B.1    Mcgraw, G.2
  • 16
    • 0035250541 scopus 로고    scopus 로고
    • Dynamically discovering likely program invariants to support program evolution
    • DOI 10.1109/32.908957
    • M.D. Ernst, J. Cockrell, W.G. Griswold, and D. Notkin Dynamically discovering likely program invariants to support program evolution IEEE Transactions on Software Engineering 27 2 2001 99 123 (Pubitemid 32254259)
    • (2001) IEEE Transactions on Software Engineering , vol.27 , Issue.2 , pp. 99-123
    • Ernst, M.D.1    Cockrell, J.2    Griswold, W.G.3    Notkin, D.4
  • 18
    • 33645066726 scopus 로고
    • Large sample standard errors of kappa and weighted kappa
    • J.L. Fleiss, J. Cohen, and B.S. Everitt Large sample standard errors of kappa and weighted kappa Psychological Bulletin 72 1969 323 327
    • (1969) Psychological Bulletin , vol.72 , pp. 323-327
    • Fleiss, J.L.1    Cohen, J.2    Everitt, B.S.3
  • 20
    • 67650213214 scopus 로고    scopus 로고
    • A measurement framework of alert characteristics for false positive mitigation models
    • October 6
    • S. Heckman, L. Williams, A measurement framework of alert characteristics for false positive mitigation models, in: North Carolina State University TR-2008-23, October 6, 2008.
    • (2008) North Carolina State University TR-2008-23
    • Heckman, S.1    Williams, L.2
  • 30
    • 33646050367 scopus 로고    scopus 로고
    • Taming false alarms from a domain-unaware C analyzer by a Bayesian statistical post analysis
    • Imperial College London, UK
    • Y. Jung, J. Kim, J. Shin, K. Yi, Taming false alarms from a domain-unaware C analyzer by a Bayesian statistical post analysis, in: Proceedings of the 12th International Static Analysis Symposium, Imperial College London, UK, 2005, pp. 203-217.
    • (2005) Proceedings of the 12th International Static Analysis Symposium , pp. 203-217
    • Jung, Y.1    Kim, J.2    Shin, J.3    Yi, K.4
  • 36
    • 35248882461 scopus 로고    scopus 로고
    • Z-ranking: Using statistical analysis to counter the impact of static analysis approximations
    • San Diego, California
    • T. Kremenek, D. Engler, Z-ranking: using statistical analysis to counter the impact of static analysis approximations, in: Proceedings of the 10th International Static Analysis Symposium, San Diego, California, 2003, pp. 295-315.
    • (2003) Proceedings of the 10th International Static Analysis Symposium , pp. 295-315
    • Kremenek, T.1    Engler, D.2
  • 42
    • 26444584996 scopus 로고    scopus 로고
    • Eclat: Automatic generation and classification of test inputs
    • ECOOP 2005 - Object-Oriented Programming: 19th European Conference. Proceedings
    • C. Pacheco, M.D. Ernst, Eclat: automatic generation and classification of test inputs, in: Proceedings of the 19th European Conference on Object-Oriented Programming, Glasgow, Scotland, July 27-29, 2005, pp. 504-527. (Pubitemid 41435995)
    • (2005) Lecture Notes in Computer Science , vol.3586 , pp. 504-527
    • Pacheco, C.1    Ernst, M.D.2
  • 46
    • 0037587229 scopus 로고    scopus 로고
    • Writing good software engineering research papers: Minitutorial
    • Portland, Oregon, USA, May 3-10
    • M. Shaw, Writing good software engineering research papers: minitutorial, in: Proceedings of the 25th International Conference on Software Engineering, Portland, Oregon, USA, May 3-10, 2003, pp. 726-736.
    • (2003) Proceedings of the 25th International Conference on Software Engineering , pp. 726-736
    • Shaw, M.1
  • 48
    • 0032070168 scopus 로고    scopus 로고
    • Should computer scientists experiment more?
    • W.F. Tichy Should computer scientists experiment more? Computer 31 5 1998 32 40 (Pubitemid 128556565)
    • (1998) Computer , vol.31 , Issue.5 , pp. 32-40
    • Tichy, W.F.1
  • 55
    • 24344496977 scopus 로고    scopus 로고
    • Automatic mining of source code repositories to improve bug finding techniques
    • DOI 10.1109/TSE.2005.63
    • C.C. Williams, and J.K. Hollingsworth Automatic mining of source code repositories to improve bug finding techniques IEEE Transactions on Software Engineering 31 6 2005 466 480 (Pubitemid 41245069)
    • (2005) IEEE Transactions on Software Engineering , vol.31 , Issue.6 , pp. 466-480
    • Williams, C.C.1    Hollingsworth, J.K.2
  • 57
    • 18944369123 scopus 로고    scopus 로고
    • Performing high efficiency source code static analysis with intelligent extensions
    • Proceedings - 11th Asia-Pacific Software Engineering Conference, APSEC 2004
    • S. Xiao, C. Pham, Performing high efficiency source code static analysis with intelligent extensions, in: Proceedings of the 11th Asia-Pacific Software Engineering Conference, Busan, Korea, November 30-December 3, 2004, pp. 346-355. (Pubitemid 40700525)
    • (2004) Proceedings - Asia-Pacific Software Engineering Conference, APSEC , pp. 346-355
    • Xiao, S.1    Pham, C.2
  • 58
    • 33847647240 scopus 로고    scopus 로고
    • An empirical study on classification methods for alarms from a bug-finding static C analyzer
    • DOI 10.1016/j.ipl.2006.11.004, PII S0020019006003371
    • K. Yi, H. Choi, J. Kim, and Y. Kim An empirical study on classification methods for alarms from a bug-finding static C analyzer Information Processing Letters 102 2-3 2007 118 123 (Pubitemid 46357475)
    • (2007) Information Processing Letters , vol.102 , Issue.2-3 , pp. 118-123
    • Yi, K.1    Choi, H.2    Kim, J.3    Kim, Y.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.