Athena: A framework to automatically generate security test oracle via extracting policies from source code and intended software behaviour

2019 ◽  
Vol 107 ◽  
pp. 112-124
Author(s):  
Hossein Homaei ◽  
Hamid Reza Shahriari
2019 ◽  
Vol 2 (1) ◽  
pp. 1-16
Author(s):  
Nana Suarna
Keyword(s):  

Seiring waktu, jumlah surat dalam sebuah perusahaan semakin hari makin banyak, sehingga muncul permasalahan dalam mengelolanya administrasi suarat, baik ketika dalam pencatatan surat maupun proses disposisi, serta pada saat pencarian arsip surat. Hampir sebagai besar surat yang ada di kantor-kantor masih disimpan dalam bentuk file-file yang masih bersifat manual, sehingga memungkinkan surat tersebut menunpuk, dan memerlukan waktu yang lama dalam pencarian dan pemrosesannya. Dengan dibangunnya  sistem manajemen pengarsipan bertujuan untuk mengatasi permasalahan-permasalahan tersebut di atas. Pemrograman  saat ini, baik desktop maupun web based, semakin marak  pengerjaannya menggunakan framework code igniter berbasis PHP. Framework CI memang dikembangkan untuk memudahkan dalam developing aplikasi dengan struktur  file source code-nya menggunakan pendekatan Models-Views-Controller (MVC) dan pemrograman berorientasi objek, oleh sebab itu penulis menggunakan CI dalam developing aplikasi ini. Aplikasi sistem manajemen surat dan pengarsipan ini dapat diakses dalam internal perusahaan web, yang bertujuan untuk memudahkan karyawan  dalam pengelolaan dan  mengaksesnya surat menyurat, selain itu aplikasi ini juga memberikan kemudahan dalam proses pencatatan surat,  disposisi, dan proses pencarian sehingga aplikasisi ini memiliki performa yang handal, mudah untuk di-maintenance dan dikembangkan lebih lanjut seiring perkembangan kebutuhan penggunanya.


Author(s):  
Himanshi Vashisht ◽  
Sanjay Bharadwaj ◽  
Sushma Sharma

Code refactoring is a “Process of restructuring an existing source code.”. It also helps in improving the internal structure of the code without really affecting its external behaviour”. It changes a source code in such a way that it does not alter the external behaviour yet still it improves its internal structure. It is a way to clean up code that minimizes the chances of introducing bugs. Refactoring is a change made to the internal structure of a software component to make it easier to understand and cheaper to modify, without changing the observable behaviour of that software component. Bad smells indicate that there is something wrong in the code that have to refactor. There are different tools that are available to identify and emove these bad smells. A software has two types of quality attributes- Internal and external. In this paper we will study the effect of clone refactoring on software quality attributes.


2020 ◽  
Vol 2020 (1) ◽  
pp. 91-95
Author(s):  
Philipp Backes ◽  
Jan Fröhlich

Non-regular sampling is a well-known method to avoid aliasing in digital images. However, the vast majority of single sensor cameras use regular organized color filter arrays (CFAs), that require an optical-lowpass filter (OLPF) and sophisticated demosaicing algorithms to suppress sampling errors. In this paper a variety of non-regular sampling patterns are evaluated, and a new universal demosaicing algorithm based on the frequency selective reconstruction is presented. By simulating such sensors it is shown that images acquired with non-regular CFAs and no OLPF can lead to a similar image quality compared to their filtered and regular sampled counterparts. The MATLAB source code and results are available at: http://github. com/PhilippBackes/dFSR


2005 ◽  
Vol 4 (2) ◽  
pp. 393-400
Author(s):  
Pallavali Radha ◽  
G. Sireesha

The data distributors work is to give sensitive data to a set of presumably trusted third party agents.The data i.e., sent to these third parties are available on the unauthorized places like web and or some ones systems, due to data leakage. The distributor must know the way the data was leaked from one or more agents instead of as opposed to having been independently gathered by other means. Our new proposal on data allocation strategies will improve the probability of identifying leakages along with Security attacks typically result from unintended behaviors or invalid inputs.  Due to too many invalid inputs in the real world programs is labor intensive about security testing.The most desirable thing is to automate or partially automate security-testing process. In this paper we represented Predicate/ Transition nets approach for security tests automated generationby using formal threat models to detect the agents using allocation strategies without modifying the original data.The guilty agent is the one who leaks the distributed data. To detect guilty agents more effectively the idea is to distribute the data intelligently to agents based on sample data request and explicit data request. The fake object implementation algorithms will improve the distributor chance of detecting guilty agents.


Author(s):  
Tran Thanh Luong ◽  
Le My Canh

JavaScript has become more and more popular in recent years because its wealthy features as being dynamic, interpreted and object-oriented with first-class functions. Furthermore, JavaScript is designed with event-driven and I/O non-blocking model that boosts the performance of overall application especially in the case of Node.js. To take advantage of these characteristics, many design patterns that implement asynchronous programming for JavaScript were proposed. However, choosing a right pattern and implementing a good asynchronous source code is a challenge and thus easily lead into less robust application and low quality source code. Extended from our previous works on exception handling code smells in JavaScript and exception handling code smells in JavaScript asynchronous programming with promise, this research aims at studying the impact of three JavaScript asynchronous programming patterns on quality of source code and application.


2019 ◽  
Author(s):  
Andri Taufiq ◽  
Robby Yuli Endra
Keyword(s):  

SOURCE CODE / KODING PROGRAM Pemograman Java untuk Rumah Sakit.


Sign in / Sign up

Export Citation Format

Share Document