- AUETD Home
- Browsing Auburn Theses and Dissertations by Author
Browsing Auburn Theses and Dissertations by Author "Overbey, Jeffrey"
Now showing items 1-11 of 11
- Sort by:
- title
- issue date
- submit date
- Order:
- ascending
- descending
- Results:
- 5
- 10
- 20
- 40
- 60
- 80
- 100
Augmenting Traditional Static Analysis With Commonly Available Metadata
Cook, Devin (2015-01-20)
Developers and security analysts have been using static analysis for a long time to analyze programs for defects and vulnerabilities with some success. Generally a static analysis tool is run on the source code for a given ...
An Automated Rename Refactoring for Go
Burgula, Venkatesh Reddy (2015-05-12)
Our work focuses on building an automated Rename refactoring for Go. We show that the tool is effective by testing with a suite of 75 manually written unit test cases and running it on 50 large, open source Go projects ...
Discovering Vulnerabilities In The Wild: An Empirical Study
Fang, Ming (2014-12-11)
There is little or no information available on what actually happens when a software vulnerability is detected. We performed an empirical study on reporters of the three most prominent security vulnerabilities: buffer ...
Energy Profiles of Java Collections Classes
Hasan, Samir (2016-04-22)
We created detailed profiles of the energy consumed by common operations done on Java List, Map, and Set abstractions. The results show that the alternative data types for these abstractions differ significantly in terms ...
An Extract Function Refactoring for the Go Language
Gnanaprakasa, Steffi Mariya (2015-07-31)
Refactoring is a disciplined technique for restructuring an existing body of code, altering its internal code structure without changing its external behavior. Refactoring is specified as a parameterized program transformation ...
Go with the flow: Data Flow Analysis for Binary Differencing
Denton, Benjamin (2014-07-30)
Differencing in computer science is often used to quickly determine differences between two files. While this works well for plain text files, such as source code, applying differencing to binary executable files is more ...
Implementation of Fork-Merge Parsing in OpenRefactory/C
Krishnappa, Kavyashree (2015-05-04)
C preprocessor directives are extensively used in C programs. Due to this, performing advanced program transformations on C programs is difficult. To obtain correct transformations, all possible configurations have to be ...
A Model-Driven Engineering Framework for Computational Replicability and Reproducibility
Ledet, Joseph (2016-02-11)
The scientific community currently suffers from a lack of verification of results obtained from many well-intentioned researchers. Part of the reason for this lack is the difficulty in reproducing experiments performed by ...
Odinn: An In-Vivo Hypervisor-based Intrusion Detection System for the Cloud
Harrison, Christopher (2014-06-18)
Cloud computing has emerged as the de facto service model for modern enterprises;
however, security concerns remain a major impediment to full-scale adoption. Concurrent
to this paradigm shift looms another concern that ...
A Survey of Web Vulnerabilities
Fogel, Benjamin (2015-05-06)
This study tracked the patching characteristics of the top 100,000 sites to three vulnerabilities: the POODLE attack, the POODLE TLS attack, and the FREAK attack. The study also carried out a survey on top server administrators ...
Toward Automatic Translation: From OpenACC to OpenMP 4
Sultana, Nawrin (2016-12-09)
For the past few years, OpenACC has been the primary directive-based API for programming accelerator devices like GPUs. OpenMP 4.0 is now a competitor in this space, with support from different vendors. In our work, we ...