Explore chapters and articles related to this topic
Sound and Precise Analysis of Web Applications for Injection Vulnerabilities
Published in Abid Hussain, Garima Tyagi, Sheng-Lung Peng, IoT and AI Technologies for Sustainable Living, 2023
Chitsutha Soomlek, Krit Kamtuo, Ekkarat Boonchieng
Once a SQL statement is detected in a source code, the syntax of the statement is validated. Next, the parameters in the validated SQL statement are extracted. The extracted parameters will be sent to the analytics web services, which already include the trained and evaluated machine learning models. In case that a SQL injection flaw is detected, the prediction result will be reported to the IDE in order to suggest the possibility of having an injection vulnerability to a developer. Meanwhile, the modified Roslyn will ask the IDE to use the results of SQL syntax validation and injection vulnerability detection to check for the need of code refactoring. Shortly thereafter, the IDE will inform a developer about the flaw and the need of code refactoring. Code refactoring would help a developer to fix the flaw found in their source code at the early stage of software development and, therefore, support SQL injection prevention and code quality improvement.
Advances in Ultra-Low-Power Miniaturized Applications for Health Care and Sports
Published in Laurent A. Francis, Krzysztof Iniewski, Novel Advances in Microsystems Technologies and Their Applications, 2017
Miguel Hernandez-Silveira, Su-Shin Ang, Alison Burdett
After passing these rigorous evaluations, the next step was to incorporate the whole dataset (or part of it) as testing vectors in an automated unit test, as it provides software developers with tools to retest the code during the code refactoring and system integration processes. Our experience suggests the implementation of this ‘developer’s testing unit’ in standard C, so that it can be ported to most platforms (e.g. PC and embedded software). If the performance of the algorithm falls short of expectations, further adaptation or optimization would be necessary. Another important step to follow after passing in-house evaluation is code refactoring and verification, in order to ensure it complies with industrial standards, such as Misra C [12] (standard used in safety critical industries).
Deep Learning-Based Code Refactoring: A Review of Current Knowledge
Published in Journal of Computer Information Systems, 2023
Purnima Naik, Salomi Nelaballi, Venkata Sai Pusuluri, Dae-Kyoo Kim
Code refactoring is a software development practice that involves restructuring code to enhance its quality without altering the software’s external behavior.2 The process of code refactoring typically involves (i) identifying refactoring opportunities, (ii) determining the appropriate refactoring technique to use, (iii) analyzing the behaviors to preserve, (iv) applying the chosen refactoring technique, (v) assessing the preservation of behaviors and targeted qualities after refactoring, and (vi) maintaining consistency between the refactored artifacts and other artifacts.21 Refactoring techniques can be classified by the level at which they are applied, including class-level, method-level, and variable-level. Class-level refactorings include techniques such as Inline Class, Collapse Hierarchy, and Extract Superclass, while method-level refactorings include Rename Method, Move Method, and Extract Method. Variable-level refactorings include Encapsulate Field, Move Field, and Pull Up Field. Recently, code refactoring has also been used for converting monolithic applications into microservices,22–24 in which classes in the application are grouped to form microservices.