API Misuse Detection via Probabilistic Graphical Model
Abstract
References
Index Terms
- API Misuse Detection via Probabilistic Graphical Model
Recommendations
API-misuse detection driven by fine-grained API-constraint knowledge graph
ASE '20: Proceedings of the 35th IEEE/ACM International Conference on Automated Software EngineeringAPI misuses cause significant problem in software development. Existing methods detect API misuses against frequent API usage patterns mined from codebase. They make a naive assumption that API usage that deviates from the most-frequent API usage is a ...
Boosting API Misuse Detection via Integrating API Constraints from Multiple Sources
MSR '24: Proceedings of the 21st International Conference on Mining Software RepositoriesIn modern software development, developers access reusable functionality provided by third-party libraries through Application Programming Interfaces (APIs). However, using APIs requires developers to conform specific constraints and guidelines, ...
Poirot: Deep Learning for API Misuse Detection
ICSE-Companion '24: Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion ProceedingsAPI misuses refer to incorrect usages that violate the usage constraints of API elements, potentially leading to issues such as runtime errors, exceptions, program crashes, and security vulnerabilities. Existing mining-based approaches for API misuse ...
Comments
Information & Contributors
Information
Published In
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Natural Science Foundation of China
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsoft
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 218Total Downloads
- Downloads (Last 12 months)218
- Downloads (Last 6 weeks)34
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in