2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE) 2019
DOI: 10.1109/issre.2019.00040
|View full text |Cite
|
Sign up to set email alerts
|

How Do Developers Act on Static Analysis Alerts? An Empirical Study of Coverity Usage

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
4
1

Relationship

1
8

Authors

Journals

citations
Cited by 23 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…Research have shown that the structural modeling methodology, "classical" higher mathematics, the "soft" computing's theory for a classes of problems and models wide range solving are described in sufficient detail in the scientists works. So, for example, it is described in the works devoted to the DSS systems software creation [7,8], the calculations general mathematical methods development in the decision support interests [4], and mathematical modeling interests [17,18]. Despite the rather long history and these methods variety, their improvement and use will allow one to fulfill a particular scientific tasks number of increasing software security.…”
Section: Fig 7 the Reducing Uncertainties Methods Classificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Research have shown that the structural modeling methodology, "classical" higher mathematics, the "soft" computing's theory for a classes of problems and models wide range solving are described in sufficient detail in the scientists works. So, for example, it is described in the works devoted to the DSS systems software creation [7,8], the calculations general mathematical methods development in the decision support interests [4], and mathematical modeling interests [17,18]. Despite the rather long history and these methods variety, their improvement and use will allow one to fulfill a particular scientific tasks number of increasing software security.…”
Section: Fig 7 the Reducing Uncertainties Methods Classificationmentioning
confidence: 99%
“…Open sources information research [1,8,16] made it possible to present the most common vulnerabilities types. The software security threats classification is presented in Fig.…”
Section: The Requirements and Security Risks Analysis Of Computer Sysmentioning
confidence: 99%
“…Looking at SAT notification information specifically, notification content can be confusing and require a search engine to understand the words used [53]. Empirically, developers also require an unexpectedly large amount of time to fix low-complexity SAT-identified issues [46] suggesting that comprehending and applying the notification content was not straight-forward. Google had its own developers use a SAT and found that 75% of the bugs they reported were related to misunderstandings of the notification content [83].…”
Section: Communicating With Developersmentioning
confidence: 99%
“…It is important to highlight that SDP is not the only method that can be used to find defects in software systems. For instance, model checking [50] and static code analysis (e.g., Coverity [51]) can be deployed to find defects in software systems. The duo of model checking and static analysis are conventional methods of finding defects in software systems and are based on fault localization.…”
Section: Related Workmentioning
confidence: 99%