The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The best practice to prevent Cross Site Scripting (XSS) attacks is to apply encoders to sanitize untrusted data. To balance security and functionality, encoders should be applied to match the web page context, such as HTML body, JavaScript, and style sheets. A common programming error is the use of a wrong encoder to sanitize untrusted data, leaving the application vulnerable. We present a security...
Recently, Java has been educated in many universities and professional schools due to reliability, portability, and scalability. However, because of its limited time in Java programming courses, coding rules are rarely educated. As a result, codes made by students become far from readable codes. In this paper, we propose a coding rule learning function using static code analyzers in Java Programming...
Code review is an essential activity to ensure the quality of code being developed, and there have been static code checkers for aiding an effective code review. However, such tools have not been actively utilized in the world of programmers due to a lot of coding violations (warning) produced by tools and their false-positiveness. In order to analyze the automatically pointed violations and the actual...
Genetic Algorithms are heuristic approach for forming the bases of search based algorithms. It applies the mechanism of the natural selection of genes & the phenomena's associated with the genetics like mutation, crossover, and replication to provide solutions in some complex searches. In this paper, we have reviewed their applications in context of the Object oriented paradigm thus proving their...
As with many schools attracting international students, our postgraduate degrees must cater for students with diverse backgrounds and skill-levels. It is not practical to accurately assess students' domain-skills prior to enrollment. Thus, we found a need for a compulsory bridging course with the dual objectives of improving the problem solving and programming skills of the weakest computer graduates...
Testability is a software characteristic that aims at producing systems easy to test. A testability antipattern is a factor that could affect negatively the testability of software. In this paper we compare the antipatterns at source code level and at different abstraction levels, in order to understand at which point they are introduced during the development.
Many automated static analysis (ASA) tools have been developed in recent years for detecting software anomalies. The aim of these tools is to help developers to eliminate software defects at early stages and produce more reliable software at a lower cost. Determining the effectiveness of ASA tools requires empirical evaluation. This study evaluates coding concerns reported by three ASA tools on two...
Distributed component requires test automation more than other components. Test language plays an important role in test automation. This paper proposes a new language, Jata, for testing distributed component in a systematic way by integrating the advantages of Junit and TTCN-3. To test a distributed component, multiple test clients are needed to emulate users to request services from the component...
In a competitive business landscape, large organizations such as insurance companies and banks are under high pressure to innovate, improvise and distinguish their products and services while continuing to reduce the time-to market for new product introductions. Generating a single view of the customer is vital from different perspectives of the systems developer over a period of time because of the...
JWalk is a lazy systematic unit-testing tool for Java, which supports dynamic inference of specifications from code and systematic testing from the acquired specification. This paper describes the feedback-based development methodology that is possible using the JWalk Editor, an original Java-sensitive editor and compiler coupled to JWalk, which helps programmers to prototype Java class designs, generating...
Due to their reconfigurability and their high density of resources, SRAM-based FPGAs are more and more used in embedded systems. For some applications (Pay-TV,Banking, Telecommunication ...), a high level of security is needed. FPGAs are intrinsically sensitive to ionizing effects, such as light stimulation, and attackers can try to exploit faults injected in the downloaded configuration. Previous...
Distributed software systems are characterized by increasing autonomy. They often have the capability to sense the environment and react to it, discover the presence of other systems and take advantage of their services, adapt and re-configure themselves in accordance with the internal as well as the global state. Testing this kind of systems is challenging, and systematic and automated approaches...
This paper presents a course model for teaching component-based software development (CBSD) in the software engineering undergraduate curriculum to deepen and broaden student comprehension of component software. All hands-on lab practices are designed with open-source software tools. The course endows students the precious experiences of making design decisions via comparative study, risk analysis,...
Software security testing tools and methodologies are presently abundant, and the question no longer seems to be "if to test" for security, but rather "where and when to test" and "then what?". In this paper we present a review of security testing literature, and propose a software security testing scheme that exploits an intra-organisational repository of discovered...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.