This Is AuburnElectronic Theses and Dissertations

Browsing Auburn Theses and Dissertations by Author "Overbey, Jeffrey"

Now showing items 1-11 of 11

Augmenting Traditional Static Analysis With Commonly Available Metadata 

Cook, Devin (2015-01-20)
Developers and security analysts have been using static analysis for a long time to analyze programs for defects and vulnerabilities with some success. Generally a static analysis tool is run on the source code for a given ...

An Automated Rename Refactoring for Go 

Burgula, Venkatesh Reddy (2015-05-12)
Our work focuses on building an automated Rename refactoring for Go. We show that the tool is effective by testing with a suite of 75 manually written unit test cases and running it on 50 large, open source Go projects ...

Discovering Vulnerabilities In The Wild: An Empirical Study 

Fang, Ming (2014-12-11)
There is little or no information available on what actually happens when a software vulnerability is detected. We performed an empirical study on reporters of the three most prominent security vulnerabilities: buffer ...

Energy Profiles of Java Collections Classes 

Hasan, Samir (2016-04-22)
We created detailed profiles of the energy consumed by common operations done on Java List, Map, and Set abstractions. The results show that the alternative data types for these abstractions differ significantly in terms ...

An Extract Function Refactoring for the Go Language 

Gnanaprakasa, Steffi Mariya (2015-07-31)
Refactoring is a disciplined technique for restructuring an existing body of code, altering its internal code structure without changing its external behavior. Refactoring is specified as a parameterized program transformation ...

Go with the flow: Data Flow Analysis for Binary Differencing 

Denton, Benjamin (2014-07-30)
Differencing in computer science is often used to quickly determine differences between two files. While this works well for plain text files, such as source code, applying differencing to binary executable files is more ...

Implementation of Fork-Merge Parsing in OpenRefactory/C 

Krishnappa, Kavyashree (2015-05-04)
C preprocessor directives are extensively used in C programs. Due to this, performing advanced program transformations on C programs is difficult. To obtain correct transformations, all possible configurations have to be ...

A Model-Driven Engineering Framework for Computational Replicability and Reproducibility 

Ledet, Joseph (2016-02-11)
The scientific community currently suffers from a lack of verification of results obtained from many well-intentioned researchers. Part of the reason for this lack is the difficulty in reproducing experiments performed by ...

Odinn: An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud 

Harrison, Christopher (2014-06-18)
Cloud computing has emerged as the de facto service model for modern enterprises; however, security concerns remain a major impediment to full-scale adoption. Concurrent to this paradigm shift looms another concern that ...

A Survey of Web Vulnerabilities 

Fogel, Benjamin (2015-05-06)
This study tracked the patching characteristics of the top 100,000 sites to three vulnerabilities: the POODLE attack, the POODLE TLS attack, and the FREAK attack. The study also carried out a survey on top server administrators ...

Toward Automatic Translation: From OpenACC to OpenMP 4 

Sultana, Nawrin (2016-12-09)
For the past few years, OpenACC has been the primary directive-based API for programming accelerator devices like GPUs. OpenMP 4.0 is now a competitor in this space, with support from different vendors. In our work, we ...