Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Open access

Uprooting Software Defects at the Source: Source code analysis is an emerging technology in the software industry that allows critical source code defects to be detected before a program runs.

Published: 01 November 2003 Publication History

Abstract

Although the concept of detecting programming errors at compile time is not new, the technology to build effective tools that can process millions of lines of code and report substantive defects with only a small amount of noise has long eluded the market. At the same time, a different type of solution is needed to combat current trends in the software industry that are steadily diminishing the effectiveness of conventional software testing and quality assurance.

References

[1]
1. Tassey, G. The Economic Impacts of Inadequate Infrastructure for Software Testing. Planning Report 02-3. Prepared by RTI for the National Institute of Standards and Technology (NIST), May 2002: see http: //www.nist.gov/director/prog-ofc/report02-3.pdf (membership required).
[2]
2. Cisco Systems. Economic Impact of Network Security Threats. Cisco White Paper. Dec. 2002: see http: //www.cisco.com/warp/public/cc/so/neso/sqso/ roi1_wp.pdf.
[3]
3. Oracle: see http://www.oracle.com/oramag/oracle/02- mar/index.html?o22break.html.
[4]
4. Tassey, G. The Economic Impacts of Inadequate Infrastructure for Software Testing. Planning Report 02-3. Prepared by RTI for the National Institute of Standards and Technology (NIST), May 2002: see http: //www.nist.gov/director/prog-ofc/report02-3.pdf (membership required).
[5]
5. Tassey, G. The Economic Impacts of Inadequate Infrastructure for Software Testing. Planning Report 02-3. Prepared by RTI for the National Institute of Standards and Technology (NIST), May 2002: see http: //www.nist.gov/director/prog-ofc/report02-3.pdf (membership required).
[6]
6. Engler, D., Chelf, B., Chou, A., and Hallem, S. Checking system rules using system-specific, programmer-written compiler extensions, Proceedings of Operating Systems Design and Implementation (Sept. 2002):see also http: //metacomp.stanford.edu/osdi2000/paper.html.
[7]
7. Johnson, S. C. Lint, a C program checker. Unix Programmer's Manual, 1978: see http://plan9.belllabs.com/7thEdMan/vol2/lint.

Cited By

View all
  • (2020)Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence PatternsInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402050025430:05(695-719)Online publication date: 26-Jun-2020
  • (2011)A self-management approach for service developers of PaaSProceedings of the Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System Engineering10.1109/SOSE.2011.6139096(85-92)Online publication date: 12-Dec-2011
  • (2010)Embedded Clarity in Filmification of MethodsProceedings of the 2010 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the 9th SoMeT_1010.5555/1860875.1860881(70-82)Online publication date: 6-Aug-2010
  • Show More Cited By

Index Terms

  1. Uprooting Software Defects at the Source: Source code analysis is an emerging technology in the software industry that allows critical source code defects to be detected before a program runs.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image Queue
          Queue  Volume 1, Issue 8
          Instant Messaging
          November 2003
          65 pages
          ISSN:1542-7730
          EISSN:1542-7749
          DOI:10.1145/966712
          Issue’s Table of Contents
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 01 November 2003
          Published in QUEUE Volume 1, Issue 8

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Research-article
          • Popular
          • Editor picked

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • Downloads (Last 12 months)1,781
          • Downloads (Last 6 weeks)225
          Reflects downloads up to 12 Nov 2024

          Other Metrics

          Citations

          Cited By

          View all
          • (2020)Software Crucial Functions Ranking and Detection in Dynamic Execution Sequence PatternsInternational Journal of Software Engineering and Knowledge Engineering10.1142/S021819402050025430:05(695-719)Online publication date: 26-Jun-2020
          • (2011)A self-management approach for service developers of PaaSProceedings of the Proceedings of 2011 IEEE 6th International Symposium on Service Oriented System Engineering10.1109/SOSE.2011.6139096(85-92)Online publication date: 12-Dec-2011
          • (2010)Embedded Clarity in Filmification of MethodsProceedings of the 2010 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the 9th SoMeT_1010.5555/1860875.1860881(70-82)Online publication date: 6-Aug-2010
          • (2009)Static Code Analysis to Detect Software Security Vulnerabilities - Does Experience Matter?2009 International Conference on Availability, Reliability and Security10.1109/ARES.2009.163(804-810)Online publication date: Mar-2009
          • (2008)Static analysis of medical device software using CodeSonarProceedings of the 2008 workshop on Static analysis10.1145/1394504.1394507(22-29)Online publication date: 12-Jun-2008
          • (2008)Using Static Analysis to Find BugsIEEE Software10.1109/MS.2008.13025:5(22-29)Online publication date: 1-Sep-2008
          • (2008)Defect Prevention and Detection in Software for Automated Test EquipmentIEEE Instrumentation & Measurement Magazine10.1109/MIM.2008.457926711:4(16-23)Online publication date: Aug-2008
          • (2007)Defect prevention and detection in software for automated test equipment2007 IEEE Autotestcon10.1109/AUTEST.2007.4374223(224-233)Online publication date: Sep-2007
          • (2006)Algorithmic CyberFilm LanguageProceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology10.1109/FCST.2006.8(178-188)Online publication date: 17-Nov-2006
          • (2005)A searching method based on problem description and algorithmic featuresProceedings of the 4th international conference on Databases in Networked Information Systems10.1007/978-3-540-31970-2_11(138-149)Online publication date: 28-Mar-2005
          • Show More Cited By

          View Options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Magazine Site

          View this article on the magazine site (external)

          Magazine Site

          Get Access

          Login options

          Full Access

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media