Filters








21 Hits in 4.5 sec

Software bertillonage

Julius Davies, Daniel M. German, Michael W. Godfrey, Abram Hindle
2011 Proceeding of the 8th working conference on Mining software repositories - MSR '11  
In this work, we motivate the need for the recovery of the provenance of software entities by a broad set of techniques that could include signature matching, source code fact extraction, software clone  ...  We liken our provenance goals to that of Bertillonage, a simple and approximate forensic analysis technique based on bio-metrics that was developed in 19 th century France before the advent of fingerprints  ...  Anton Chuvakin of Security Warrior Consulting (www.chuvakin.org) for his advice on PCI DSS.  ... 
doi:10.1145/1985441.1985468 dblp:conf/msr/DaviesGGH11 fatcat:pj7gvwacmvcbld662ayu4uzyue

Software Bertillonage

Julius Davies, Daniel M. German, Michael W. Godfrey, Abram Hindle
2012 Empirical Software Engineering  
In this work, we motivate the need for the recovery of the provenance of software entities by a broad set of techniques that could include signature matching, source code fact extraction, software clone  ...  We liken our provenance goals to that of Bertillonage, a simple and approximate forensic analysis technique based on bio-metrics that was developed in 19 th century France before the advent of fin-  ...  Anton Chuvakin of Security Warrior Consulting (www.chuvakin.org) for his advice on PCI DSS.  ... 
doi:10.1007/s10664-012-9199-7 fatcat:zgmfhgbiefdedfblbnyudkmkv4

Understanding software artifact provenance

Michael W. Godfrey
2015 Science of Computer Programming  
In this brief paper, we sketch some of the dimensions of the broad problem of extracting and reasoning about the provenance of software development artifacts.  ...  That is, we would like to examine the provenance of an artifact to understand its history and why it is where it is within the current design of the system.  ...  Analyzing software entity provenance: Moving forward The question of provenance within the context of software development has been around in various guises for a long time.  ... 
doi:10.1016/j.scico.2013.11.021 fatcat:av44oamuujac7kx4kle44oda3m

Introduction to the special issue on mining software repositories

Tao Xie, Thomas Zimmermann, Arie van Deursen
2013 Empirical Software Engineering  
Acknowledgments We are grateful to the continuous support and encouragement offered by the Editorial board for the Journal of Empirical Software Engineering and by the Editor-in-Chief Lionel Briand.  ...  This issue is the result of a great deal of effort by the reviewers, authors, and attendees of MSR 2011.  ...  In the paper "Software Bertillonage", Davies, German, Godfrey, and Hindle recover the provenance of software entities with a fast, simple, and approximate technique.  ... 
doi:10.1007/s10664-013-9273-9 fatcat:t7g7y3ownrdh7clchs5g2r5wii

『オープンソースソフトウェア工学』シリーズ オープンソースライセンスへのソフトウェア工学からのアプローチ
Approach to Open Source Software License in Software Engineering

Yuki MANABE
2017 Konpyuta sofutowea  
and Hindle, A.: Software bertillonage: Finding the Provenance of an Entity, in Proceeding of the 8th working conference on Mining software repositories -MSR '11, 2011, p. 183.  ...  M., Guéhéneuc, Y.- G. and Antoniol, G.: An exploratory study of the evolution of software licensing, in Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering -ICSE '10, Vol  ... 
doi:10.11309/jssst.34.3_59 fatcat:qgn6lot3pjgmhhartun4zn7piq

Auditing and Maintaining Provenance in Software Packages [chapter]

Quan Pham, Tanu Malik, Ian Foster
2015 Lecture Notes in Computer Science  
In this work, we propose software provenance to be included as part of CDE so that resulting provenance-included CDE packages can be easily used for creating software pipelines.  ...  We experimentally evaluate the overhead of auditing and maintaining provenance and compare with heavy weight approaches for reproducibility such as virtualization.  ...  The authors would like to thank the following participants in the RDCEP Center, in particular, Neil Best, Joshua Elliott and Justin Wozniak at The University of Chicago, Columbia University, and Argonne  ... 
doi:10.1007/978-3-319-16462-5_8 fatcat:66vjpldjm5ah5akn76oq4qnt4i

A survey and taxonomy of approaches for mining software repositories in the context of software evolution

Huzefa Kagdi, Michael L. Collard, Jonathan I. Maletic
2007 Journal of Software Maintenance and Evolution Research and Practice  
A comprehensive literature survey on approaches for mining software repositories (MSR) in the context of software evolution is presented.  ...  A taxonomy is derived from the analysis of this literature and presents the work via four dimensions: the type of software repositories mined (what), the purpose (why), the adopted/invented methodology  ...  The results obtained from ACKNOWLEDGEMENTS We thank the reviewers for their detailed comments and suggestions. These were instrumental in helping us improve the presentation of the survey.  ... 
doi:10.1002/smr.344 fatcat:zri7uxf7aba6forbe77gkmw2ru

Incremental origin analysis of source code files

Daniela Steidl, Benjamin Hummel, Elmar Juergens
2014 Proceedings of the 11th Working Conference on Mining Software Repositories - MSR 2014  
The history of software systems tracked by version control systems is often incomplete because many file movements are not recorded.  ...  In this paper, we show that up to 38.9% of the files in open source systems have an incomplete history, and we propose an incremental, commit-based approach to reconstruct the history based on clone information  ...  Code Provenance Code provenance and bertillonage [6, 11] constitute another form of origin analysis: It also determines where a code artifact stems from, but either for copyright reasons (such as illegally  ... 
doi:10.1145/2597073.2597111 dblp:conf/msr/SteidlHJ14 fatcat:nmabbikoejam7eeeqyge67otbu

Where does this code come from and where does it go? — Integrated code history tracker for open source systems

Katsuro Inoue, Yusuke Sasaki, Pei Xia, Yuki Manabe
2012 2012 34th International Conference on Software Engineering (ICSE)  
When we reuse a code fragment in an open source system, it is very important to know the history of the code, such as the code origin and evolution.  ...  These case studies show the ancestors and descendents of the code, and we can recognize their evolution history.  ...  (Founding Ambient Information Society Infrastructure), and also by Mext for the Development of Next Generation IT Infrastructure (the Stage Project).  ... 
doi:10.1109/icse.2012.6227181 dblp:conf/icse/InoueSXM12 fatcat:gibr6dqwx5di7dpqnkoiu6yjse

Development of a Code Clone Search Tool for Open Source Repositories

Pei Xia, Yuki Manabe, Norihiro Yoshida, Katsuro Inoue
2012 Information and Media Technologies  
Finding code clones in the open source systems is important for efficient and safe reuse of existing open source software.  ...  These case studies show the applicability of our system.  ...  Davies et al. propose Software Bertillonage for determining the origin of code entities with anchored signature matching method [8] . These studies are closely related to our work.  ... 
doi:10.11185/imt.7.1370 fatcat:4tfa7eis7jgs7lkzl6u6xakv5e

An integrated approach for studying architectural evolution

Qiang Tu, M.W. Godfrey
Proceedings 10th International Workshop on Program Comprehension  
This paper introduces an approach to studying software evolution that integrates the use of metrics, software visualization, and origin analysis, which is a set of techniques for reasoning about structural  ...  In this paper, we use the evolution of GCC as an example to demonstrate the uses of various functionalities of BEAGLE, a prototype implementation of the proposed environment.  ...  We used the term "Bertillonage" as it is an approximate technique.  ... 
doi:10.1109/wpc.2002.1021334 dblp:conf/iwpc/TuG02 fatcat:by4maqvpojh2fe3ohf4n5y64te

Biometric template security

Abhishek Nagar
2009 SPIE Newsroom  
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  This dissertation provides a thorough analysis of the vulnera-  ...  An attacker can also leverage any algorithmic loopholes in the software.  ... 
doi:10.1117/2.1200911.001590 fatcat:3uykbccxwnfcpcodymfook557y

Biometric Template Security

Anil K Jain, Karthik Nandakumar, Abhishek Nagar
2008 EURASIP Journal on Advances in Signal Processing  
Biometric Template Security By Abhishek Nagar With the proliferation of biometric recognition systems, an attacker's benefit in staging a system compromise is also increasing and thus is the need to ensure  ...  This dissertation provides a thorough analysis of the vulnera-  ...  An attacker can also leverage any algorithmic loopholes in the software.  ... 
doi:10.1155/2008/579416 fatcat:rrogtu2eh5d3dpyftnwm5dd2m4

Minimal-invasive provenance integration into data-intensive systems [article]

Martin Schäler, Universitäts- Und Landesbibliothek Sachsen-Anhalt, Martin-Luther Universität, Gunter Saake
2018
Consequently, provenance is considered as an integral part of these approaches that can hardly be adjusted for new requirements.  ...  The purpose of provenance is to determine origin and derivation history of data. Thus, provenance is used, for instance, to validate and explain computation results.  ...  A provenance concern refers to the requirements of an application, software system, or program with respect to provenance.  ... 
doi:10.25673/4172 fatcat:yjelbov74zajlkuwvknoiljs3y

Results of SEI Line-Funded Exploratory New Starts Projects

Len Bass, Nanette Brown, Gene M Cahill, William Casey, Sagar Chaki, Corey Cohen, Dionisio De Niz, David French, Arie Gurfinkel, Rick Kazman, Edwin J. Morris, Brad Myers (+7 others)
2018
sufficient value in eventually funding the feasibility study work as an SEI initiative.  ...  The Software Engineering Institute (SEI) annually undertakes several line-funded exploratory new starts (LENS) projects.  ...  resources such as hardware, software, documents, databases, data, and other entities.  ... 
doi:10.1184/r1/6583433.v1 fatcat:6px2kvwcvvb4jhxlwz7syyrflq
« Previous Showing results 1 — 15 out of 21 results