Filters








4,873 Hits in 1.2 sec

Code Duplication on Stack Overflow [article]

Sebastian Baltes, Christoph Treude
2020 pre-print
Despite the unarguable importance of Stack Overflow (SO) for the daily work of many software developers and despite existing knowledge about the impact of code duplication on software maintainability,  ...  In this paper, we motivate why studies on code duplication within SO are needed and how existing studies on code reuse differ from this new research direction.  ...  We outlined the two cases presented in Sections 2.1 and 2.2 using examples from our preliminary analysis and asked the community: How to handle code clones on Stack Overflow?  ... 
doi:10.1145/3377816.3381744 arXiv:2002.01275v1 fatcat:niuminmctbbkhopqlnvrlljkxq

Question Relatedness on Stack Overflow: The Task, Dataset, and Corpus-inspired Models [article]

Amirreza Shirani, Bowen Xu, David Lo, Thamar Solorio, Amin Alipour
2019 arXiv   pre-print
Stack Overflow is one of the most popular communities that is being used by millions of programmers.  ...  In this paper, we analyze the problem of predicting knowledge unit (question thread) relatedness in Stack Overflow.  ...  Conclusion This paper presents the task along with a large-scale dataset for identifying relatedness of knowledge unit (question thread) pairs in Stack Overflow.  ... 
arXiv:1905.01966v2 fatcat:mi3numellnbuxhizbq6kdd3a2e

Fit or Unfit : Analysis and Prediction of 'Closed Questions' on Stack Overflow [article]

Denzil Correa, Ashish Sureka
2013 arXiv   pre-print
To the best of our knowledge, this is the first experimental study to analyze and predict 'closed' questions on Stack Overflow.  ...  Questions posted on Stack Overflow which are not related to programming topics, are marked as 'closed' by experienced users and community moderators.  ...  Content Analysis We now characterize the content of 'closed' questions on Stack Overflow based on question tittle, question content, code snippets and topics. Question Title, Body and Code Snippet.  ... 
arXiv:1307.7291v1 fatcat:rsdj2mbjs5cudfzlltxszpggy4

A software approach for stack memory protection based on duplication and randomisation

Sahel Alouneh, Mazen Kharbutli, Rana AlQurem
2016 International Journal of Internet Technology and Secured Transactions  
., Kharbutli, M. and AlQurem, R. (2016) 'A software approach for stack memory protection based on duplication and randomisation', Int.  ...  The results of our implementation show high protection against integer overflow and buffer overflow attacks.  ...  Now, overflowing the old base pointer to point to a fake stack frame with a return address pointing to an attack code is one form of stack buffer overflow vulnerabilities.  ... 
doi:10.1504/ijitst.2016.082982 fatcat:ffk5uk6trzhrnko3datazpx3za

Neural Code Search Revisited: Enhancing Code Snippet Retrieval through Natural Language Intent [article]

Geert Heyman, Tom Van Cutsem
2020 arXiv   pre-print
On three benchmark datasets, we investigate how code retrieval systems can be improved by leveraging descriptions to better capture the intents of code snippets.  ...  Building on recent progress in transfer learning and natural language processing, we create a domain-specific retrieval model for code annotated with a natural language description.  ...  as Stack Overflow.  ... 
arXiv:2008.12193v1 fatcat:5iyktr2rpbb2bmqqw23yve7jwq

Stack Memory Buffer Overflow Protection based on Duplication and Randomization

Sahel Alouneh, Mazen Kharbutli, Rana AlQurem
2013 Procedia Computer Science  
The results of our implementation show high protection against integer overflow and buffer overflow attacks.  ...  Vulnerabilities in the program's stack are commonly exploited by attackers in the form of stack-based attacks.  ...  Mainly, our solution depends on duplication and randomization of the new stack locations where the return addresses will be stored and checked.  ... 
doi:10.1016/j.procs.2013.09.033 fatcat:dlzd66pf7necdc6rixt6bz4bhq

On the similarity of software development documentation

Mathias Ellmann
2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017  
Software developers can search within Stack Overflow for duplicates or similar posts.  ...  Software developers spent 20% of their time on information seeking on Stack Overflow, YouTube or an API reference documentation.  ...  Software developers spent 20% of their time on searching for information [20, 36] on websites as Stack Overflow or others.  ... 
doi:10.1145/3106237.3119875 dblp:conf/sigsoft/Ellmann17 fatcat:wtlxnxpc5rhgjmnhfpuwhrkmiy

Using faults for buffer overflow effects

Pierre-Alain Fouque, Delphine Leresteux, Frédéric Valette
2012 Proceedings of the 27th Annual ACM Symposium on Applied Computing - SAC '12  
In this short paper, we demonstrate by using one example that countermeasures against buffer overflow must also be used for software running on embedded processors.  ...  Here, we show that they can be exploited to make more damage, taking the control of a machine as buffer overflow attacks do for instance.  ...  Second countermeasure duplicates stack pointer in a variable, in a register, in other part of the stack or in another duplicated stack like Stack Shield [2] .  ... 
doi:10.1145/2245276.2232038 dblp:conf/sac/FouqueLV12 fatcat:lyi5zksrw5frnabtqjkfzbndvy

Toxic Code Snippets on Stack Overflow

Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixao, Giuseppe Bianco, Rocco Oliveto
2019 IEEE Transactions on Software Engineering  
We present a study of online code clones on Stack Overflow and their toxicity by incorporating two developer surveys and a large-scale code clone detection.  ...  Our clone detection found online clone pairs between 72,365 Java code snippets on Stack Overflow and 111 open source projects in the curated Qualitas corpus.  ...  Cristina Lopes and Di Yang from University of California, Irvine for their help in running SourcererCC clone detector and implementing a custom tokeniser for Stack Overflow snippets.  ... 
doi:10.1109/tse.2019.2900307 fatcat:wjnlucsfwvevpazvghafosiy6m

Detecting Duplicate Posts in Programming QA Communities via Latent Semantics and Association Rules

Wei Emma Zhang, Quan Z. Sheng, Jey Han Lau, Ermyas Abebe
2017 Proceedings of the 26th International Conference on World Wide Web - WWW '17  
As a product of one of the proposed features, the association score feature, we have mined a set of associated phrases from duplicate questions on Stack Overflow and open the dataset to the public.  ...  To tackle this problem, Stack Overflow provides a mechanism for reputable users to manually mark duplicate questions.  ...  These questions are manually marked as duplicates by reputable users on Stack Overflow.  ... 
doi:10.1145/3038912.3052701 dblp:conf/www/ZhangSLA17 fatcat:7pxytsaa2ncjtipqlfgcuabgdm

Finding the Duplicate Questions in Stack Overflow using Word Embeddings

Jameer Babu, Thara S
2020 Procedia Computer Science  
For this purpose, Word Embeddings are used on questions asked in Stack Overflow.  ...  For this purpose, Word Embeddings are used on questions asked in Stack Overflow.  ...  Authors in [6] describes two methods to detect duplicates in stack overflow one is breaking body into distinct types of data and using word-embedding method to treat vagueness in a word that is not found  ... 
doi:10.1016/j.procs.2020.04.296 fatcat:zvyijkv4uzfrfbvbdcvzyx4djq

Stack Overflow: A Code Laundering Platform? [article]

Le An, Ons Mlouki, Foutse Khomh, Giuliano Antoniol
2017 arXiv   pre-print
code from Stack Overflow or posting code to Stack Overflow.  ...  Although all Stack Overflow posts are free to access, code examples on Stack Overflow are governed by the Creative Commons Attribute-ShareAlike 3.0 Unported license that developers should obey when reusing  ...  We use a state-of-the-art clone detection tool [6] NiCad [7] , to identify duplicate code between the two studied datasets (i.e., Apps' code and Stack Overflow posts).  ... 
arXiv:1703.03897v1 fatcat:jbps6jsj65hm7geq65ecigts44

What do practitioners ask about code clone? a preliminary investigation of stack overflow

Eunjong Choi, Norihiro Yoshida, Raula Gaikovina Kula, Katsuro Inoue
2015 2015 IEEE 9th International Workshop on Software Clones (IWSC)  
We present a preliminary investigation of Stack Overflow to reveal practitioner's interests about code clones. We then discuss possible future directions of research on code clones.  ...  The chosen keywords are code clone, code cloning, code redundancy, code duplicate, code duplication, duplicate code, and duplicated code.  ...  Recently, several studies have investigated practitioner's interest by mining Q&As in Stack Overflow (SO) [2] , [3] , [4] .  ... 
doi:10.1109/iwsc.2015.7069890 dblp:conf/iwsc/ChoiYKI15 fatcat:w6iwrxykirb4lax4cg7dzxopbi

Duplicate Question Detection with Deep Learning in Stack Overflow

Liting Wang, Li Zhang, Jing Jiang
2020 IEEE Access  
INDEX TERMS Stack overflow, duplicate question detection, deep learning.  ...  Therefore, we construct three deep learning approaches WV-CNN, WV-RNN and WV-LSTM, which are based on Word2Vec, CNN, RNN and LSTM, to detect duplicate questions in Stack Overflow.  ...  DUPLICATE QUESTIONS Stack Overflow is one of the most popular CQA based on the software programming.  ... 
doi:10.1109/access.2020.2968391 fatcat:3bgk747gtza43acssqtgnxkghu

PIFT

Juan Carlos Martinez Santos, Yunsi Fei, Zhijie Jerry Shi
2009 Proceedings of the 4th Workshop on Embedded Systems Security - WESS '09  
In this paper, we propose a flexible, efficient, and light-weight approach to perform DIFT based on secure page allocation, PIFT.  ...  Figure 2 :Figure 3 : 23 Program vulnerable to stack buffer overflow Detail of stack buffer overflow Figure 6 : 6 Detail of heap corruption attack Table 1 : 1 Memory overhead due to function duplication  ...  ., misused to perform a buffer overflow attack). They should be placed on the untrusted stack.  ... 
doi:10.1145/1631716.1631722 dblp:conf/cases/SantosFS09 fatcat:6pfqnalvjna5zmjo3xk6bvczpa
« Previous Showing results 1 — 15 out of 4,873 results