Science topic

Static Analysis - Science topic

Explore the latest publications in Static Analysis, and find Static Analysis experts.
Filters
All publications are displayed by default. Use this filter to view only publications with full-texts.
Publications related to Static Analysis (10,000)
Sorted by most recent
Article
Full-text available
The paper further develops the method of matched sections as a new universal numerical technique. Like the finite element method, FEM, it supposes that: a) the domain is represented as a mesh of simple elements; b) algebraic relations between the main parameters are established from the governing differential equations; c) relationships from all el...
Article
Full-text available
Context Practitioners prefer to achieve performance without sacrificing productivity when developing scientific software. The Julia programming language is designed to develop performant computer programs without sacrificing productivity by providing a syntax that is scripting in nature. According to the Julia programming language website, the comm...
Article
Full-text available
This study presents a thorough investigation of the mechanical bending characteristics of functionally graded tapered porous rectangular plates (FGTPRP) subjected to bi-sinusoidal loading and an artificial-neural-network (ANN) model to predict the deformation behavior of the plate. This study fills a gap in the existing literature by examining the...
Article
Full-text available
Variable sharing is a fundamental property in the static analysis of logic programs, since it is instrumental for ensuring correctness and increasing precision while inferring many useful program properties. Such properties include modes, determinacy, non-failure, cost, etc. This has motivated significant work on developing abstract domains to impr...
Article
Full-text available
Power system state estimation is a critical task for ensuring stable grid operation and serves as the foundation of grid control and analysis. Conventional approaches largely involve field measurements, network topology, and manual anomaly detection, which present significant limitations, particularly while dealing with dynamic and complex power sy...
Preprint
Full-text available
Software vulnerabilities continue to be the main cause of occurrence for cyber attacks. In an attempt to reduce them and improve software quality, software code analysis has emerged as a service offered by companies specialising in software testing. However, this service requires software companies to provide access to their software's code, which...
Preprint
Full-text available
Advances in incremental Datalog evaluation strategies have made Datalog popular among use cases with constantly evolving inputs such as static analysis in continuous integration and deployment pipelines. As a result, new logic programming debugging techniques are needed to support these emerging use cases. This paper introduces an incremental debug...
Article
Full-text available
Academic research in static analysis produces software implementations. These implementations are time-consuming to develop and some need to be maintained in order to enable building further research upon the implementation. While necessary, these processes can be quickly challenging. This article documents the tools and techniques we have come up...
Preprint
Full-text available
Pandas is widely used for data science applications, but users often run into problems when datasets are larger than memory. There are several frameworks based on lazy evaluation that handle large datasets, but the programs have to be rewritten to suit the framework, and the presence of multiple frameworks complicates the life of a programmer. In t...
Article
Full-text available
Malware detection is a critical challenge in the evolving landscape of cybersecurity. This study explores the integration of static and dynamic analysis to enhance malware detection accuracy. Static analysis examines malware files without execution, providing insights into their metadata and structural attributes, while dynamic analysis observes be...
Preprint
Full-text available
Split Learning (SL) is a distributed deep learning approach enabling multiple clients and a server to collaboratively train and infer on a shared deep neural network (DNN) without requiring clients to share their private local data. The DNN is partitioned in SL, with most layers residing on the server and a few initial layers and inputs on the clie...
Article
Full-text available
Confined masonry combines concrete columns and beams with brick walls to form a building structural system. Confined masonry offers good seismic performance, easy construction, and component reuse, making it popular in earthquake-prone areas. Meanwhile, The N2 method is a nonlinear static analysis technique designed to assess the performance and lo...
Preprint
Full-text available
ArkTS is a new programming language dedicated to developing apps for the emerging OpenHarmony mobile operating system. Like other programming languages constantly suffering from performance-related code smells or vulnerabilities, the ArkTS programming language will likely encounter the same problems. The solution given by our research community is...
Article
Full-text available
Robot Operating System 2 (ROS 2) is the de-facto standard framework for developing distributed robotic applications. However, ensuring the correctness and security of these applications remains a significant challenge. This paper presents a novel approach to statically analyze ROS 2 applications using abstract interpretation. By extracting the arch...
Preprint
Full-text available
Context. Developing secure and reliable software remains a key challenge in software engineering (SE). The ever-evolving technological landscape offers both opportunities and threats, creating a dynamic space where chaos and order compete. Secure software engineering (SSE) must continuously address vulnerabilities that endanger software systems and...
Article
Full-text available
Background This study focuses on Cerebral Autosomal Dominant Arteriopathy with Subcortical Infarcts and Leukoencephalopathy (CADASIL), a key model for studying arterial degradation and its impact on brain network communication. We explore functional network connectivity in CADASIL patients, shedding light on how arterial changes affect brain networ...
Article
Full-text available
The maximum transverse deflection responses of a multilayer sandwich panel (flat and curved) with cutouts under uniformly distributed load have been investigated in this work using a mathematical model. The mathematical model is developed using higher-order shear deformation theory combined with the finite element method. The governing equation for...
Article
Full-text available
Background This study focuses on Cerebral Autosomal Dominant Arteriopathy with Subcortical Infarcts and Leukoencephalopathy (CADASIL), a key model for studying arterial degradation and its impact on brain network communication. We explore functional network connectivity in CADASIL patients, shedding light on how arterial changes affect brain networ...
Article
Full-text available
Nonlinear pushover analysis involves an extremely iterative process necessary for satisfying the design requirements of performance-based codes. This analysis also demands significant computational resources and advanced scientific efforts. In this study, we introduce a computer-based method for 2D-braced steel buildings that incorporates pushover...
Article
Full-text available
Software verification aims to prove that a program satisfies some given properties for all its possible executions. Software evolved incredibly fast during the last century, exposing several challenges to this scientific discipline. The goal of the “Challenges of Software Verification Symposium” is to monitor the state-of-the-art in this field. Thi...
Article
Full-text available
Static analysis tools play a crucial role in software development by detecting bugs and vulnerabilities. However, running these tools separately from the code editing process often causes developers to switch contexts, which can reduce productivity. Previous work has shown how Reference Attribute Grammars (RAGs) can be used for declarative implemen...
Article
Full-text available
The investigation of wave propagation in the geological environment is warranted, and will ultimately help to provide a better understanding of the response of subsoil to excitation. Frequently utilized physical modeling represents a simplification of the global natural system for the needs of the investigation of static and dynamic phenomena with...
Article
Full-text available
This study evaluates the performance of a compressive-mode vibration energy harvester with a flextensional actuator from the viewpoint of global dynamics. According to static analysis of the energy harvester dynamic system, the monostable and bistable potential wells are configured under different values of the initial distance between the magnets....
Preprint
Full-text available
Software vulnerabilities continue to be ubiquitous, even in the era of AI-powered code assistants, advanced static analysis tools, and the adoption of extensive testing frameworks. It has become apparent that we must not simply prevent these bugs, but also eliminate them in a quick, efficient manner. Yet, human code intervention is slow, costly, an...
Poster
Full-text available
The paper [1] introduces a hybrid attention-based method for detecting software design patterns, emphasizing the importance of context in improving classification accuracy. By integrating behavioral and structural analysis, the proposed framework encodes source code into feature-rich sequential representations optimized for transformer models. It a...
Article
Full-text available
This article presents a novel method for detecting copied code fragments called clones, which is then utilized to identify known common vulnerabilities and exposures copies. The proposed method is versatile and applicable to both source and binary code. It overcomes the limitations of existing tools that typically focus on detecting entire function...
Article
Full-text available
Traditional static analysis cannot effectively explain the issue of the sealing performance of the premium connection being decreased due to the vibration of the tubing, leading to the failure of the connection sealing. In this paper, based on the energy dissipation theory and considering the influence of the micro contact slip of the sealing surfa...
Article
Full-text available
Mainstream serverless platforms follow opinionated, hardcoded scheduling policies to allocate functions on the available workers. Such policies may decrease the performance of the application due to locality issues (e.g., functions executed on workers far from the data they use). APP is a platform-agnostic declarative language that mitigates these...
Article
Full-text available
interpretation offers sound and decidable approximations for undecidable queries related to program behavior. The effectiveness of an abstract domain primarily relies on the abstract domain itself, and the worst-case scenario is when the abstract interpreter responds with “don’t know”, indicating that anything can happen during runtime. Conversely,...
Preprint
Full-text available
Coupling beams significantly influence the performance of coupled shear wall systems under lateral forces. To ensure adequate behavior under lateral load-induced deformations and stresses, coupling beams are typically reinforced with complex reinforcement configurations, such as diagonal bars and confinement reinforcement. However, these reinforcem...
Preprint
Full-text available
Privacy regulations mandate that developers must provide authentic and comprehensive privacy notices, e.g., privacy policies or labels, to inform users of their apps' privacy practices. However, due to a lack of knowledge of privacy requirements, developers often struggle to create accurate privacy notices, especially for sophisticated mobile apps...
Article
Full-text available
Software testing plays a critical role throughout the software development lifecycle. In modern development practices, frequent and incremental updates to code are common, and each update typically necessitates the generation of new test cases. While the generation of test cases can be automated, the creation and adjustment of test oracles (expecte...
Article
Full-text available
Egypt widely turned its planning approach from comprehensive to strategic planning without considering the characteristics of cities. One of the main characteristics is city dynamics which is used as a tool to assess the suitability of the urban planning approach. Eighteen indicators are extracted as dynamic indicators measured to cover the demogra...
Article
Full-text available
Due to the geological formation of Bangladesh, it is showing the threat of earthquakes. As the number of high-rise buildings is increasing daily, there is an urgent need to design structures considering seismic loading. During earthquakes, structures are subjected to lateral displacement. Most reinforced concrete structures are designed to resist g...
Article
Full-text available
A series of dynamic progressive collapse tests using the uniformly distributed load (UDL) was conducted, to analyze the robustness of three precast concrete (PC) beam-column assemblies using dry connections of top-and-seat angles (TSA-D), strengthened top-and-seat angles (STSA-D), and high-ductility reinforcement (DSTSA-D), under a middle column re...
Article
Full-text available
This paper investigates the natural frequency and static analysis of a sandwich annular sector plate with a core exhibiting a negative Poisson’s ratio lattice structure, along with facesheets reinforced with agglomerated graphene nanoplatelets (GPL). Both complete and partial agglomeration states are considered using the Eshelby–Mori–Tanaka microme...
Article
Full-text available
This paper presents a nonlinear finite element model analysis to effect of carbon fiber reinforced polymer (CFRP) strengthening of beams using ANSYS, Finite element software ANSYS 12.0 has been used for modeling the beams by conducting nonlinear static analysis. The SOLID 65 and SHELL 181, LINK180 elements have been used to, respectively; model the...
Article
Full-text available
There has been a proliferation of mobile apps in the Medical, as well as Health&Fitness categories. These apps have a wide audience, from medical providers, to patients, to end users who want to track their fitness goals. The low barrier to entry on mobile app stores raises questions about the diligence and competence of the developers who publish...
Article
Full-text available
This study investigates the relationship between leverage and stock earnings in the Abu Dhabi stock market from 2006 to 2015, employing a time series computed tomography (CT) scan methodology. The dependent variable, earnings per share (EPS), is analyzed concerning various leverage ratios, including the Debt-to-Assets Ratio (DA), Debt-to-Property R...
Article
Full-text available
Earthquakes present significant challenges to buildings contemporary, and the response of RC frame structures to seismic activity is influ-enced by various characteristics, including column section designs and orientation. The specific designs of column sections directly impact the lateral stiffness of the entire structure. Considering the weak sto...
Article
Full-text available
This study introduces a structural design and static analysis of a Mobile Battery Swap Station for electric motorcycles, powered by solar energy, to address the critical need for sustainable and off-grid charging infrastructure. As the adoption of electric motorcycles continues to grow, driven by the demand for eco-friendly transportation alternati...
Article
Full-text available
The current research investigates the Welfare impact of SAFTA on the economy of Pakistan in general and South Asia in perspective. This research analyzes the potential economic costs and benefits of Pak-India trade in exporting various consumer goods. The first scenario is when normal trading relation with India will be restored; it means that both...
Article
Full-text available
Thread-modular approaches to static analysis help mitigate the state space explosion encountered when analyzing multi-threaded programs. This is enabled by abstracting away some aspects of interactions between threads. We propose the notion of concurrency-sensitivity, which determines how an analysis takes the computation history of a multi-threade...
Article
Full-text available
This research investigates the Globalization impact on the SMEs export by using Computable General Equilibrium model. The main objectives of this research are to provide detailed overview of economic reforms in the last decade by using the General Equilibrium Model. Data were collected from 300 SMEs business exports in Pakistan by using simple rand...
Article
Full-text available
The aim of this paper is to quantify and analyze the relative impact of South Asian Free Trade Agreement (SAFTA) over the global economic welfare. This research analyzes the potential economic costs and benefits of Pak-India trade in exporting various consumer goods. The first scenario is when normal trading relation with India will be restored; it...
Article
Full-text available
The spindle assembly of a metal cutting machine determines the accuracy and productivity of metalworking. The stiffness of the spindle assembly is estimated by the elastic movements of the spindle shaft under the influence of the working load. Correct modeling of bearing stiffness is necessary for obtaining reliable results during spindle stiffness...
Article
Full-text available
This research investigates the welfare effect of economic costs and benefits of Pak-India trade with exportingdried dates. The first scenario is when normal trading relation with India will be restored. It means that bothcountries will give the MFN status to each other. in the second scenario, the SAFA will be operative and therewill be free trade...
Preprint
Full-text available
Directed fuzzing performs best for targeted program testing via estimating the impact of each input in reaching predefined program points. But due to insufficient analysis of the program structure and lack of flexibility and configurability it can lose efficiency. In this paper, we enhance directed fuzzing with context weights for graph nodes and r...
Article
Full-text available
Binary code similarity detection (BCSD) is pivotal in system security including reverse engineering, vulnerability detection and software component analysis. Recent studies on BCSD have proliferated, yet they exhibit poor performance when confronting semantic alterations (e.g., function inlining) caused by compiler optimization. To tackle this chal...
Article
Full-text available
In order to explore the influence of the heel structure of men's shoes on the deformation of the outsole, and simulate the stress distribution and deformation of the outsole in different human states, taking the existing leisure men's shoes outsole as the research object, the "sole-ground" coupling finite element model was established through rever...
Article
Full-text available
Rectangular tanks are commonly used in various industries for storing materials and products. The design of reinforced concrete liquid tanks, which must be preceded by a static analysis, is a complex issue requiring specialized knowledge and engineering experience. All types of actions, design situations, and resulting load combinations must be con...
Article
Full-text available
The paper presents three methods of the numerical modeling of a 60 m long integral bridge structure resting on an elastic half-space. For the analysis, three bridge models were built using Abaqus FEA software. Models A and C represent complex three-dimensional numerical models consisting of the bridge structure and the soil layer beneath it. The so...
Preprint
Full-text available
Fill-in-the-Middle (FIM) models play a vital role in code completion tasks, leveraging both prefix and suffix context to provide more accurate and contextually relevant suggestions. This paper presents approaches to improve FIM code completion while addressing the challenge of maintaining low latency for real-time coding assistance. We enhance FIM...
Preprint
Full-text available
This paper presents the results of a linear static analysis conducted on a (B+G+4) story building using the static Analysis approach in four different zones in Bangladesh. An analytical 3D model of the building, including irregularities, was created and analyzed using the ETABS structural analysis software. This comprehensive model encompasses all...
Article
Full-text available
This comprehensive article explores the transformative impact of Artificial Intelligence on modern cybersecurity operations and security assurance practices. The article examines how AI integration has revolutionized various security aspects, including threat detection, code security, automated testing, vulnerability management, and future security...
Article
Full-text available
This study presents the design and analysis of a proportional solenoid used in electro-pneumatic brake systems for heavy vehicles. The solenoid was designed using a traditional method, and its static and dynamic characteristics were investigated both theoretically and experimentally. ANSYS 2024 R1 Maxwell was employed for theoretical static analysi...
Chapter
Full-text available
Mobile applications (apps) facilitate the management of devices and sensors from mobile devices in IoE environments. However, their use carries risks for the privacy of their users: many of them manage personal data. The App-PI (App Privacy Impact) ecosystem analyzes the impact of apps on privacy, addressing the challenge of knowing, understanding...
Article
Full-text available
This study investigates the effects of concrete strength, lateral reinforcement detailing and design code on the seismic performance of reinforced concrete (RC) buildings representative of existing residential structures. A total of 48 nonlinear inelastic models of 2, 4, and 7 storey buildings, designed per the 1975 and 1998 Turkish seismic codes,...
Article
Full-text available
The topic of security for computers is of significant importance. Over the past decade, countless cybercrimes have been executed by exploiting software flaws. This issue has led to considerable social stress, substantial losses, and higher interest in security. Vulnerabilities in applications developed in various programming languages can be identi...
Article
Full-text available
The hip femoral stem is vital in ensuring patient support and mobility, and research into the femoral stem is critical for improving the durability and strength of orthopedic prostheses. Using the finite element method, this paper evaluates a femoral stem’s static, transient, and fatigue behaviors using three different materials: Ti-6Al-4V, CoCr al...
Preprint
Full-text available
Large Language Models (LLMs) are one of the most promising developments in the field of artificial intelligence, and the software engineering community has readily noticed their potential role in the software development life-cycle. Developers routinely ask LLMs to generate code snippets, increasing productivity but also potentially introducing own...
Preprint
Full-text available
The popularity of the Rust language continues to explode; yet, many critical codebases remain authored in C, and cannot be realistically rewritten by hand. Automatically translating C to Rust is thus an appealing course of action. Several works have gone down this path, handling an ever-increasing subset of C through a variety of Rust features, suc...
Preprint
Full-text available
Static analysis is essential for program optimization, bug detection, and debugging, but its reliance on compilation and limited customization hampers practical use. Advances in LLMs enable a new paradigm of compilation-free, customizable analysis via prompting. LLMs excel in interpreting program semantics on small code snippets and allow users to...
Article
Full-text available
Water pollution constitutes an increasingly urgent problem worldwide. This is particularly true for the African continent, which is experiencing high and increasing levels of water pollution. The continent holds great economic growth potential, making it imperative to understand the economic drivers of water pollution to ensure that African countri...
Thesis
Full-text available
Context: Developing secure and reliable software is an enduring challenge in software engineering (SE). The current evolving landscape of technology brings myriad opportunities and threats, creating a dynamic environment where chaos and order vie for dominance. Secure software engineering (SSE) faces the con- tinuous challenge of addressing vulnera...
Article
Full-text available
The article discusses the importance of identifying and removing dead code in .NET applications, defining it as unused code that can compromise readability, performance, and maintenance of the software. It highlights various techniques for its identification, including static analysis, test coverage monitoring, dependency analysis, code reviews, an...
Preprint
Full-text available
Despite their remarkable success, large language models (LLMs) have shown limited ability on applied tasks such as vulnerability detection. We investigate various prompting strategies for vulnerability detection and, as part of this exploration, propose a prompting strategy that integrates natural language descriptions of vulnerabilities with a con...
Conference Paper
Full-text available
High-rise structure construction is now common and popular in different cities of Bangladesh due to rapid urbanization and development. Proper structural design and analysis of multistoried structures are vital to secure structural safety. However multistoried structures in different cities are at significant risk due to the defective and inefficie...
Preprint
Full-text available
With the increased popularity of Deep Neural Networks (DNNs), increases also the need for tools to assist developers in the DNN implementation, testing and debugging process. Several approaches have been proposed that automatically analyse and localise potential faults in DNNs under test. In th