Static Analyzers and Potential Future Research Directions for Scala: an Overview
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Fortran Isolates the CSE Community
Fortran Isolates the CSE Community Roscoe A. Bartlett, Oak Ridge National Laboratory 10/08/2013 Introduction testing and test-driven development (TDD) by Fortran-only developers. While the research and The continued usage of Fortran as a dominant data supporting the effectiveness of unit testing and programming language isolates the computational TDD has been around for many years [10, 3, 12, 7], science & engineering (CSE) community and hinders the usage of these very successful approaches is very the learning and adoption of modern software low in the Fortran CSE development community. engineering methods. The issue is not primarily that This claim is backed up by personal experience, web Fortran is not suitable for developing many different posts, web searches, and observations by other types of software. Indeed, the are many examples of authors. One interesting data point is that a Google quality CSE software written in Fortran that can search of \Fortran Unit Test" (on 10/4/2013) brings legitimately be considered to be \self-sustaining up a limited number of relevant search results but software" (i.e. clean design and code, well tested, the top result is for the FRUIT Fortran Unit Test minimal controlled dependencies, etc., see [1]). framework [5] (written in Ruby). Right on the main The problem is that there are many CSE page for FRUIT is a quote from FRUIT's author development groups and communities that only Andrew Hang Chen which states: know Fortran and are therefore isolated from the broader software development community where Most of the FORTRAN are important Fortran usage is extremely low (ranked 24th in the in nature, used in nuclear and aerospace TIOBE Index from Nov. -
Write Your Own Rules and Enforce Them Continuously
Ultimate Architecture Enforcement Write Your Own Rules and Enforce Them Continuously SATURN May 2017 Paulo Merson Brazilian Federal Court of Accounts Agenda Architecture conformance Custom checks lab Sonarqube Custom checks at TCU Lessons learned 2 Exercise 0 – setup Open www.dontpad.com/saturn17 Follow the steps for “Exercise 0” Pre-requisites for all exercises: • JDK 1.7+ • Java IDE of your choice • maven 3 Consequences of lack of conformance Lower maintainability, mainly because of undesired dependencies • Code becomes brittle, hard to understand and change Possible negative effect • on reliability, portability, performance, interoperability, security, and other qualities • caused by deviation from design decisions that addressed these quality requirements 4 Factors that influence architecture conformance How effective the architecture documentation is Turnover among developers Haste to fix bugs or implement features Size of the system Distributed teams (outsourcing, offshoring) Accountability for violating design constraints 5 How to avoid code and architecture disparity? 1) Communicate the architecture to developers • Create multiple views • Structural diagrams + behavior diagrams • Capture rationale Not the focus of this tutorial 6 How to avoid code and architecture disparity? 2) Automate architecture conformance analysis • Often done with static analysis tools 7 Built-in checks and custom checks Static analysis tools come with many built-in checks • They are useful to spot bugs and improve your overall code quality • But they’re -
Python - the Most Attractive & Fastest-Growing Programming Language for Developers
Vol-6 Issue-5 2020 IJARIIE-ISSN(O)-2395-4396 Python - The Most Attractive & Fastest-growing Programming Language for Developers Vishwa Prakash (SRKUMTSE1804) M-Tech, Department of Software Engineering, R.K.D.F. Institute of Science & Technology, Bhopal, M.P., India ABSTRACT Python is a very suitable and easy language for both learning and real-world programming. It is a powerful and high-level object-oriented programming language and created by Guido van Rossum. It is a very good choice for those who are learning programming for the first time because of its simple syntax. It has various standard libraries so it using by a developer in vast range and its capacity to integrate with other languages and use their features attract developers too. In this paper, we describe the main characteristics and features of Python programming. We also discuss the reasons behind python being credited as the most fastest-growing high-level object orient language. We collected the contents of the research done over the articles procured from various magazines and popular websites. This paper then discusses applications of Python programming. To end with we will see a few good examples where python programming is being used. Keyword : - Python, programming languages, object-oriented, open-source, interoperability, Real-world. etc… 1. INTRODUCTION In the late 1980s, Python was conceived, while its implementation began in late 1989 by Guido van Rossum in the Netherlands atCWI (Centrum Wiskunde & Informatica). It was implemented as a successor of ABC language and capable of interfacing and exception handling with the operating system Amoeba. Author Van Rossum is Python's principal and his continuing central role in deciding the road to the development of Python. -
The First Programming Language and Freshman Year in Computer Science: Characterization and Tips for Better Decision Making
The first programming language and freshman year in computer science: characterization and tips for better decision making Sónia Rolland Sobral [0000-0002-5041-3597] 1 REMIT, Universidade Portucalense, Porto, Portugal [email protected] Abstract. The ability to program is the “visible” competency to acquire in an introductory unit in com- puter science. However, before a student is able to write a program, he needs to understand the problem: before formalizing, the student must have to (be able) to think, (be able) to solve and (be able) to define. At an early stage of learning there are no significant differences between programming languages. The discussion of the early programming language continues: probably never will be a consensus among academics. The Association for Computing Machinery (ACM) and Institute of Electrical and Electronics Engineers (IEEE) computer science curriculum recommendations haven't clearly defined which programming language to adopt: it is the course directors and teachers who must make this choice, consciously and not only following the trends. This article presents a set of items that should be considered when you make a programming lan- guage choice for the first programming unit in higher education computer science courses. Keywords: Programming Languages, Undergraduate Studies; Introduction to Programming. 1 Introduction Programmability is the “visible” skill to be acquired in an introductory unit in computer science. Program- ming can be considered an art [1], a science [2], a discipline [3] or even the science of abstraction [4]. However, using a programming language is no more than a method for the programmer can communicate instructions to the computer. -
Empirical Study of Vulnerability Scanning Tools for Javascript Work in Progress
Empirical Study of Vulnerability Scanning Tools for JavaScript Work In Progress Tiago Brito, Nuno Santos, José Fragoso INESC-ID Lisbon 2020 Tiago Brito, GSD Meeting - 30/07/2020 Purpose of this WIP presentation ● Current work is to be submitted this year ● Goal: gather feedback on work so far ● Focus on presenting the approach and preliminary results Tiago Brito, GSD Meeting - 30/07/2020 2 Motivation ● JavaScript is hugely popular for web development ○ For both client and server-side (NodeJS) development ● There are many critical vulnerabilities reported for software developed using NodeJS ○ Remote Code Executions (Staicu NDSS’18) ○ Denial of Service (Staicu Sec’18) ○ Small number of packages, big impact (Zimmermann Sec’19) ● Developers need tools to help them detect problems ○ They are pressured to focus on delivering features Tiago Brito, GSD Meeting - 30/07/2020 3 Problem Previous work focused on: ● Tools for vulnerability analysis in Java or PHP code (e.g. Alhuzali Sec’18) ● Studying very specific vulnerabilities in Server-side JavaScript ○ ReDos, Command Injections (Staicu NDSS’18 and Staicu Sec’18) ● Studying vulnerability reports on the NodeJS ecosystem (Zimmermann Sec’19) So, it is still unknown which, and how many, of these tools can effectively detect vulnerabilities in modern JavaScript. Tiago Brito, GSD Meeting - 30/07/2020 4 Goal Our goal is to assess the effectiveness of state-of-the-art vulnerability detection tools for JavaScript code by performing a comprehensive empirical study. Tiago Brito, GSD Meeting - 30/07/2020 5 Research Questions 1. [Tools] Which tools exist for JavaScript vulnerability detection? 2. [Approach] What’s the approach these tools use and their main challenges for detecting vulnerabilities? 3. -
The Power of Interoperability: Why Objects Are Inevitable
The Power of Interoperability: Why Objects Are Inevitable Jonathan Aldrich Carnegie Mellon University Pittsburgh, PA, USA [email protected] Abstract 1. Introduction Three years ago in this venue, Cook argued that in Object-oriented programming has been highly suc- their essence, objects are what Reynolds called proce- cessful in practice, and has arguably become the dom- dural data structures. His observation raises a natural inant programming paradigm for writing applications question: if procedural data structures are the essence software in industry. This success can be documented of objects, has this contributed to the empirical success in many ways. For example, of the top ten program- of objects, and if so, how? ming languages at the LangPop.com index, six are pri- This essay attempts to answer that question. After marily object-oriented, and an additional two (PHP reviewing Cook’s definition, I propose the term ser- and Perl) have object-oriented features.1 The equiva- vice abstractions to capture the essential nature of ob- lent numbers for the top ten languages in the TIOBE in- jects. This terminology emphasizes, following Kay, that dex are six and three.2 SourceForge’s most popular lan- objects are not primarily about representing and ma- guages are Java and C++;3 GitHub’s are JavaScript and nipulating data, but are more about providing ser- Ruby.4 Furthermore, objects’ influence is not limited vices in support of higher-level goals. Using examples to object-oriented languages; Cook [8] argues that Mi- taken from object-oriented frameworks, I illustrate the crosoft’s Component Object Model (COM), which has unique design leverage that service abstractions pro- a C language interface, is “one of the most pure object- vide: the ability to define abstractions that can be ex- oriented programming models yet defined.” Academ- tended, and whose extensions are interoperable in a ically, object-oriented programming is a primary focus first-class way. -
Comparing Languages for Engineering Server Software: Erlang, Go, and Scala with Akka
Comparing Languages for Engineering Server Software: Erlang, Go, and Scala with Akka Ivan Valkov, Natalia Chechina, and Phil Trinder School of Computing Science, University of Glasgow G12 8RZ, United Kingdom [email protected], {Natalia.Chechina, Phil.Trinder}@glasgow.ac.uk Abstract functional or object-oriented, with high-level coordination models, Servers are a key element of current IT infrastructures, and must e.g. actors as in Erlang [2] or a process algebra as in Go [6]. Indeed, often deal with large numbers of concurrent requests. The program- the success of some server-based companies is even attributed to ming language used to construct the server has an important role their use of specific languages. As examples WhatsApp’s success in engineering efficient server software, and must support massive is attributed to their use of Erlang [27]; the video streaming leader concurrency on multicore machines with low communication and Twitch uses Go to serve millions of users a day [13]. Research synchronisation overheads. contributions of this paper include the following: This paper investigates 12 highly concurrent programming lan- • A survey of programming language characteristics relevant for guages suitable for engineering servers, and analyses three repre- servers (Section 2.1). sentative languages in detail: Erlang, Go, and Scala with Akka. • The design and implementation of three benchmarks to analyse We have designed three server benchmarks that analyse key per- the multicore server capabilities of Erlang, Go, and Scala with formance characteristics of the languages. The benchmark results Akka (Section 3). suggest that where minimising message latency is crucial, Go and Erlang are best; that Scala with Akka is capable of supporting the • An evaluation of Erlang, Go, and Scala with Akka for key largest number of dormant processes; that for servers that frequently server capabilities, i.e. -
Programming Languages: a Survey
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 5 Issue: 5 307 – 313 _______________________________________________________________________________________________ Programming Languages: A Survey Krishan Kumar1, Sonal Dahiya2 Assistant professor, ASET, Amity University Haryana, Gurgaon, Haryana, India1,2 [email protected], [email protected] Abstract— The world of Programming Languages is very dynamic. Every company is launching their own programming language which can cater their specific demand and requirement. In this paper, we discussed various popular rankings proposed by different organizations to decide most popular language on basis of various factors like number of Google Trends searches, number of job advertisements, and number of books sold for that language and many more factors. Keywords— Java Programming, Python, Ruby, C. __________________________________________________*****_________________________________________________ I. INTRODUCTION It is difficult to decide which programming languages are most widely used. One language may occupy the greater number of programmer hours, a different one have more lines of code, a third may utilize the most CPU time, and so on. Some languages are very popular for particular kind of applications. For example, COBOL is still strong in the corporate data center, often on large mainframes; FORTRAN in engineering applications; C in embedded applications and operating systems; and other languages are regularly used to write much different kind of applications. Various methods of measuring language popularity has been used, i.e; A. Counting the number of times the language name is mentioned in web searches, such as is done by Google Trends. B. counting the number of job advertisements that mention the language [1][2] C. -
Guidelines on Minimum Standards for Developer Verification of Software
Guidelines on Minimum Standards for Developer Verification of Software Paul E. Black Barbara Guttman Vadim Okun Software and Systems Division Information Technology Laboratory July 2021 Abstract Executive Order (EO) 14028, Improving the Nation’s Cybersecurity, 12 May 2021, di- rects the National Institute of Standards and Technology (NIST) to recommend minimum standards for software testing within 60 days. This document describes eleven recommen- dations for software verification techniques as well as providing supplemental information about the techniques and references for further information. It recommends the following techniques: • Threat modeling to look for design-level security issues • Automated testing for consistency and to minimize human effort • Static code scanning to look for top bugs • Heuristic tools to look for possible hardcoded secrets • Use of built-in checks and protections • “Black box” test cases • Code-based structural test cases • Historical test cases • Fuzzing • Web app scanners, if applicable • Address included code (libraries, packages, services) The document does not address the totality of software verification, but instead recom- mends techniques that are broadly applicable and form the minimum standards. The document was developed by NIST in consultation with the National Security Agency. Additionally, we received input from numerous outside organizations through papers sub- mitted to a NIST workshop on the Executive Order held in early June, 2021 and discussion at the workshop as well as follow up with several of the submitters. Keywords software assurance; verification; testing; static analysis; fuzzing; code review; software security. Disclaimer Any mention of commercial products or reference to commercial organizations is for infor- mation only; it does not imply recommendation or endorsement by NIST, nor is it intended to imply that the products mentioned are necessarily the best available for the purpose. -
Programming Language Trends in Open Source Development: an Evaluation Using Data from All Production Phase Sourceforge Projects
Programming Language Trends in Open Source Development: An Evaluation Using Data from All Production Phase SourceForge Projects Daniel P. Delorey Charles D. Knutson C. Giraud-Carrier Brigham Young University Brigham Young University Brigham Young University TMCB 2230 TMCB 2214 TMCB 3326 Provo, UT 84602 Provo, UT 84602 Provo, UT 84602 [email protected] [email protected] [email protected] ABSTRACT for natural language like those studied by Sapir, but for pro- In this work, we analyze data collected from the CVS repos- gramming languages as well. itories of 9,997 Open Source projects hosted on SourceForge in an effort to understand trends in programming language A tendency to hesitate in adopting new programming lan- usage in the Open Source community between 2000 and guages, however, may stifle creativity as the limited features 2005. The trends we consider include: 1) the relative popu- of an out-dated language prevent developers from conceiv- larity of the ten most popular programming languages over ing of novel solutions. To quote a well-worn cliche,“When all time, 2) the use of multiple programming languages by indi- you have is a hammer, everything looks like a nail.” Nielson vidual programmers and by individual projects, and 3) the [5] has demonstrated that developers hesitate to use multi- programming languages most often used in combination. paradigm features even after migrating to a new language opting instead to program as if they were using their old Categories and Subject Descriptors language. D.2.8 [Software Engineering]: Metrics—Performance Mea- sures, Process Metrics, Product Metrics In this paper, we use data gathered from the CVS reposito- ries of Open Source projects hosted on SourceForge to eval- Keywords uate trends in programming language usage among Open Source developers. -
Efficient Feature Selection for Static Analysis Vulnerability Prediction
sensors Article Efficient Feature Selection for Static Analysis Vulnerability Prediction Katarzyna Filus 1 , Paweł Boryszko 1 , Joanna Doma ´nska 1,* , Miltiadis Siavvas 2 and Erol Gelenbe 1 1 Institute of Theoretical and Applied Informatics, Polish Academy of Sciences, Baltycka 5, 44-100 Gliwice, Poland; kfi[email protected] (K.F.); [email protected] (P.B.); [email protected] (E.G.) 2 Information Technologies Institute, Centre for Research & Technology Hellas, 6th km Harilaou-Thermi, 57001 Thessaloniki, Greece; [email protected] * Correspondence: [email protected] Abstract: Common software vulnerabilities can result in severe security breaches, financial losses, and reputation deterioration and require research effort to improve software security. The acceleration of the software production cycle, limited testing resources, and the lack of security expertise among programmers require the identification of efficient software vulnerability predictors to highlight the system components on which testing should be focused. Although static code analyzers are often used to improve software quality together with machine learning and data mining for software vulnerability prediction, the work regarding the selection and evaluation of different types of relevant vulnerability features is still limited. Thus, in this paper, we examine features generated by SonarQube and CCCC tools, to identify those that can be used for software vulnerability prediction. We investigate the suitability of thirty-three different features to train thirteen distinct machine learning algorithms to design vulnerability predictors and identify the most relevant features that should be used for training. Our evaluation is based on a comprehensive feature selection process based on the correlation analysis of the features, together with four well-known feature selection techniques. -
End to End Quality Sonar Ecosystem Water Leak Metaphor
End to End Quality with the Sonar Ecosystem and the Water Leak Metaphor G. Ann Campbell @GAnnCampbell | [email protected] @SonarLint | @SonarQube | @SonarSource SonarLint Leak Period Quality Gate 20+ Languages The <3 of the ecosystem Static Analysis What is Static Analysis? Analyzing code, without executing it! A Means to an End Detecting Bugs, Vulnerabilities, and Code Smells Why use Static Analysis Catch new problems ASAP ● the longer it takes to catch a bug, the more it costs ● no one writes perfect code every time ● rule description and precise issue location cut research time Why use Static Analysis Changing A might have added bugs in B ● peer review misses new issues in untouched code ● static analysis is machine-assisted code review; it looks at every file every time Why use Static Analysis Provide coaching ● language best practices ● team coding style SonarSource’s Toolbox Lexical Analysis Only two things are infinite, the universe and human stupidity, and I am not sure about the former. Syntactic Analysis Only two things are infinite, the universe and human stupidity, and I am not sure about the former. Subjects Verbs Albert E. Semantic Analysis Only two things are infinite, the universe and human stupidity, and I am not sure about the former. Albert E. Semantic Analysis Only two things are infinite, the universe and human stupidity, and I am not sure about the former. Albert E. Beyond Semantic: Symbolic Execution Object myObject = new Object(); if(a) { myObject = null; } ... if( !a ) { ... } else { myObject.toString(); } Beyond Semantic: Symbolic Execution Object myObject = new Object(); if(a) { myObject = null; } ..