scholarly journals Other potential problems in Qlink.it

2018 ◽  
Vol 18 (02) ◽  
pp. e18
Author(s):  
Antonio Castro Lechtaler ◽  
Marcelo Cipriano ◽  
Edith García ◽  
Pablo Lázaro ◽  
Julio Liporace ◽  
...  

In previous work we presented preliminary results obtained by reviewing the source code of Qlink.it web application. In this article, after summarizing previous findings, results of the source code review of Qlink.it Android application will be described. This analysis focused on the implementation of cryptographic functionalities. The aim of this publication is also to invite other researchers to analyze the application in order to determine if Qlink.it could be considered secure.

Author(s):  
Iurii A. Lapshov ◽  

The paper describes the architecture of software tools for automating the management of code review of software prototypes of design solutions that allow to obtain such effects as ensuring interactive interaction between the designer and an expert performing code review, as well as reducing the expert’s time spent on commenting the code by selecting a comment from the list prepared in advance for each requirement from the requirements obtained during the analysis. The tools being developed consist of three main parts. The first part presents requirements in a question-and-answer format including standard comments to be inserted into the prototype code in case of non-compliance with these requirements. The second one is a relational database, which is designed to store the source codes of prototypes aimed at inspection and passed it with expert comments. The third one is a Web-application that allows the designer to send prototype codes for review and see the results of the inspection, and an expert to provide viewing and editing of the prototype source code with the insertion of both standard, pre-prepared comments, and written in free form.


2022 ◽  
Vol 31 (2) ◽  
pp. 1-23
Author(s):  
Jevgenija Pantiuchina ◽  
Bin Lin ◽  
Fiorella Zampetti ◽  
Massimiliano Di Penta ◽  
Michele Lanza ◽  
...  

Refactoring operations are behavior-preserving changes aimed at improving source code quality. While refactoring is largely considered a good practice, refactoring proposals in pull requests are often rejected after the code review. Understanding the reasons behind the rejection of refactoring contributions can shed light on how such contributions can be improved, essentially benefiting software quality. This article reports a study in which we manually coded rejection reasons inferred from 330 refactoring-related pull requests from 207 open-source Java projects. We surveyed 267 developers to assess their perceived prevalence of these identified rejection reasons, further complementing the reasons. Our study resulted in a comprehensive taxonomy consisting of 26 refactoring-related rejection reasons and 21 process-related rejection reasons. The taxonomy, accompanied with representative examples and highlighted implications, provides developers with valuable insights on how to ponder and polish their refactoring contributions, and indicates a number of directions researchers can pursue toward better refactoring recommenders.


2011 ◽  
Vol 7 (2) ◽  
pp. 71
Author(s):  
Ivan Magdalenić ◽  
Danijel Radošević ◽  
Dragutin Kermek

The on demand generation of source code and its execution is essential if computers are expected to play an active role in information discovery and retrieval. This paper presents a model of implementation of a source code generator, whose purpose is to generate source code on demand. Theimplementation of the source code generator is fully configurable and its adoption to a new application is done by changing the generator configuration and not the generator itself. The advantage of using the source code generator is rapid and automatic development of a family of application once necessary program templates and generator configuration are made. The model of implementation of the source code generator is general and implemented source code generator can be used in differentareas. We use a source code generator for dynamic generation of ontology supported Web services for data retrieval and for building of different kind of web application.


2021 ◽  
Vol 15 (3) ◽  
pp. 310-317
Author(s):  
Kristijan Lukaček ◽  
Matija Mikac ◽  
Miroslav Horvatić

This paper is focused on the usage of location services in mobile applications that were developed for the purpose of reporting different events that are based on their location. The event that is intended to be generic and universal can, as in examples used in this paper, be the reporting of some occurrence to a city’s communal affairs office. Such a generic event can include both multimedia and textual data, in addition to location information obtained using mobile device running the app. The software solution that is described in this paper consists of a mobile application that was developed for the Android operating system and a web application that includes a series of PHP scripts that run on a dedicated server. The web application consists of a backend scripts that facilitate the communication of a smart phone and the server and frontend related scripts used by users and administrators to access and check the data and process the reported events.


2019 ◽  
Vol 35 (21) ◽  
pp. 4462-4464
Author(s):  
Jordan H Creed ◽  
Garrick Aden-Buie ◽  
Alvaro N Monteiro ◽  
Travis A Gerke

Abstract Summary Complementary advances in genomic technology and public data resources have created opportunities for researchers to conduct multifaceted examination of the genome on a large scale. To meet the need for integrative genome wide exploration, we present epiTAD. This web-based tool enables researchers to compare genomic 3D organization and annotations across multiple databases in an interactive manner to facilitate in silico discovery. Availability and implementation epiTAD can be accessed at https://apps.gerkelab.com/epiTAD/ where we have additionally made publicly available the source code and a Docker containerized version of the application.


Author(s):  
G.I. Morgunov ◽  
◽  
, A.V. Orlovsky

This paper focuses on Quantum GIS (QGIS), an open-source cross-platform application that allows to visualize geospatial data in various formats. The paper indicated the main advantages of QGIS web application (second version) – QGIS Web Client 2: free distribution; free access to open-source code, which allows to write or modify a script or program module; permission to modify the source code; the ability to install the program on various operating systems (Windows, Mac OS, Ubuntu, etc.); a large library of free modules for working with geodata; the ability to publish maps on the web using Mapserver and other analogs; the ability to download space images from different sources (Yandex, Google, Bing Aerial, etc.); the ability to post data and publish projects on the Internet using the QGIS Cloud plugin. The technical requirements for the design of the QWC2 web application are presented; instructions for installing and QWC2 configuration on the available infrastructure are also given. The testing and the functionality of QWC2 application were presented on practical examples (area / length / coordinate measurements; thumbnail / redline functionality; generation of permalinks; PDF printing; ability to export maps in different images; import WMS/WFS; map comparison).


2014 ◽  
Vol 5 (1) ◽  
pp. 19-38
Author(s):  
Romaric Ludinard ◽  
Éric Totel ◽  
Frédéric Tronel ◽  
Vincent Nicomette ◽  
Mohamed Kaâniche ◽  
...  

RRABIDS (Ruby on Rails Anomaly Based Intrusion Detection System) is an application level intrusion detection system (IDS) for applications implemented with the Ruby on Rails framework. The goal of this intrusion detection system is to detect attacks against data in the context of web applications. This anomaly based IDS focuses on the modelling of the normal application profile using invariants. These invariants are discovered during a learning phase. Then, they are used to instrument the web application at source code level, so that a deviation from the normal profile can be detected at run-time. This paper illustrates on simple examples how the approach detects well-known categories of web attacks that involve a state violation of the application, such as SQL injections. Finally, an assessment phase is performed to evaluate the accuracy of the detection provided by the proposed approach.


F1000Research ◽  
2017 ◽  
Vol 6 ◽  
pp. 596 ◽  
Author(s):  
Eric M. Weitz ◽  
Lorena Pantano ◽  
Jingzhi Zhu ◽  
Bennett Upton ◽  
Ben Busby

RNA-Seq Viewer is a web application that enables users to visualize genome-wide expression data from NCBI’s Sequence Read Archive (SRA) and Gene Expression Omnibus (GEO) databases. The application prototype was created by a small team during a three-day hackathon facilitated by NCBI at Brandeis University. The backend data pipeline was developed and deployed on a shared AWS EC2 instance. Source code is available at https://github.com/NCBI-Hackathons/rnaseqview.


Sign in / Sign up

Export Citation Format

Share Document