Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Permanent URI for this collectionhttps://hdl.handle.net/11147/7148
Browse
18 results
Search Results
Now showing 1 - 10 of 18
Article Citation - WoS: 7Citation - Scopus: 8Tracking Code Bug Fix Ripple Effects Based on Change Patterns Using Markov Chain Models(Institute of Electrical and Electronics Engineers Inc., 2022) Ufuktepe, Ekincan; Tuğlular, Tuğkan; Palaniappan, KanappanChange impact analysis evaluates the changes that are made in the software and finds the ripple effects, in other words, finds the affected software components. Code changes and bug fixes can have a high impact on code quality by introducing new vulnerabilities or increasing their severity. A recent high-visibility example of this is the code changes in the log4j web software CVE-2021-45105 to fix known vulnerabilities by removing and adding method called change types. This bug fix process exposed further code security concerns. In this article, we analyze the most common set of bug fix change patterns to have a better understanding of the distribution of software changes and their impact on code quality. To achieve this, we implemented a tool that compares two versions of the code and extracts the changes that have been made. Then, we investigated how these changes are related to change impact analysis. In our case study, we identified the change types for bug-inducing and bug fix changes using the Quixbugs dataset. Furthermore, we used 13 of the projects and 621 bugs from Defects4J to identify the common change types in bug fixes. Then, to find the change types that cause an impact on the software, we performed an impact analysis on a subset of projects and bugs of Defects4J. The results have shown that, on average, 90% of the bug fix change types are adding a new method declaration and changing the method body. Then, we investigated if these changes cause an impact or a ripple effect in the software by performing a Markov chain-based change impact analysis. The results show that the bug fix changes had only impact rates within a range of 0.4-5%. Furthermore, we performed a statistical correlation analysis to find if any of the bug fixes have a significant correlation with the impact of change. The results have shown that there is a negative correlation between caused impact with the change types adding new method declaration and changing method body. On the other hand, we found that there is a positive correlation between caused impact and changing the field type.Editorial Message From Tain Symposium Organizing Committee(Institute of Electrical and Electronics Engineers Inc., 2015) Tuğlular, Tuğkan; Cai, Y.; Dustdar, S.; Yamazaki, K.It is a pleasure to welcome you to COMPSAC 2015 Symposium on Technologies and Applications of the Internet (TAIN). This year, first time in its history, COMPSAC is organized as a series of symposiums under the main theme of “Mobile and Cloud Systems – Challenges and Applications”. TAIN Symposium providing a forum to share latest innovations on Internet technologies and applications perfectly matches with the main theme. Topics of interest for TAIN include all types of networks with their architectures and applications as well as their management, performance, and security. Moreover, TAIN Symposium addresses Internet of things (IoT), machine-to-machine (M2M) and peer-to-peer (P2P) communications, content distribution networks (CDN) and also emerging network technologies such as software defined networks (SDN). A vast array of challenges for Internet technologies and applications and proposals for solutions will be discussed in TAIN Symposium.Conference Object Event Sequence Graph-Based Feature-Oriented Testing: a Preliminary Study(Institute of Electrical and Electronics Engineers Inc., 2018) Tuğlular, TuğkanThis paper proposes a model-based approach for feature-oriented testing using event sequence graphs (ESGs). ESGs are used to generate test cases automatically for positive and negative testing. To fit ESG models to feature-oriented testing, two new improvements on ESGs are proposed. The first improvement is on repetitive use of refinement ESG and the second improvement is saving state in an ESG and passing it to the following ESG. This is a work towards communicating hierarchical ESGs. The preliminary results demonstrate the feasibility of the proposed approach. The proposed approach improves testability of features.Conference Object Citation - WoS: 8Citation - Scopus: 9A Program Slicing-Based Bayesian Network Model for Change Impact Analysis(Institute of Electrical and Electronics Engineers Inc., 2018) Ufuktepe, Ekincan; Tuğlular, TuğkanChange impact analysis plays an important role in identifying potential affected areas that are caused by changes that are made in a software. Most of the existing change impact analysis techniques are based on architectural design and change history. However, source code-based change impact analysis studies are very few and they have shown higher precision in their results. In this study, a static method-granularity level change impact analysis, that uses program slicing and Bayesian Network technique has been proposed. The technique proposes a directed graph model that also represents the call dependencies between methods. In this study, an open source Java project with 8999 to 9445 lines of code and from 505 to 528 methods have been analyzed through 32 commits it went. Recall and f-measure metrics have been used for evaluation of the precision of the proposed method, where each software commit has been analyzed separately.Editorial Message From the Nciw Program Co-Chairs(Institute of Electrical and Electronics Engineers Inc., 2017) Tuğlular, Tuğkan; Yamazaki, KatsuyukiIt is our pleasure to welcome you to COMPSAC 2017 Symposium on Networks, Communications, Internet & Web Technologies (NCIW). Our Symposium provides a forum to share latest innovations on all types of networks with their architectures and applications as well as their management, performance, and security. Moreover, NCIW addresses Internet of things (IoT), machine-to-machine (M2M) and peer-to-peer (P2P) communications, content distribution networks (CDN), and emerging network technologies such as software defined networks (SDN). A vast array of challenges for network technologies and applications and proposals for solutions will be discussed in the symposium.Conference Object Citation - WoS: 1Citation - Scopus: 5Automation Architecture for Bayesian Network Based Test Case Prioritization and Execution(Institute of Electrical and Electronics Engineers Inc., 2016) Ufuktepe, Ekincan; Tuğlular, TuğkanAn automation architecture for Bayesian Network based test case prioritization is designed for software written in Java programming language following the approach proposed by Mirarab and Tahvildari [2]. The architecture is implemented as an integration of a series of tools and called Bayesian Network based test case prioritization and execution platform. The platform is triggered by a change in the source code, then it collects necessary information to be supplied to Bayesian Network and uses Bayesian Network evaluation results to run high priority unit tests.Editorial Compsac 2016 Symposium on Technologies and Applications of the Internet (tain): Message From the Program Co-Chairs(Institute of Electrical and Electronics Engineers Inc., 2016) Tuğlular, Tuğkan; Cai, Ying; Dustdar, Schahram; Yamazaki, KatsuyukiIt is our pleasure to welcome you to COMPSAC 2016 Symposium on Technologies and Applications of the Internet (TAIN). Our Symposium provides a forum to share latest innovations on Internet technologies and applications, which perfectly matches with the main theme of COMPSAC this year. Topics of interest for TAIN include all types of networks with their architectures and applications as well as their management, performance, and security. Moreover, TAIN addresses Internet of things (IoT), machine-tomachine (M2M) and peer-to-peer (P2P) communications, content distribution networks (CDN) and also emerging network technologies such as software defined networks (SDN). A vast array of challenges for Internet technologies and applications and proposals for solutions will be discussed in TAIN Symposium.Editorial Message From the Mvv Workshop Chairs: the Fourth International Workshop on Model-Based Verification & Validation(Institute of Electrical and Electronics Engineers Inc., 2012) Tuğlular, Tuğkan; Linschulte, MichaelWelcome to MVV 2012 – The Fourth International Workshop on Model-Based Verification & Validation, which is to be held in conjunction with The Sixth International Conference on Software Security and Reliability (SERE 2012) in Washington, D.C. USA from 20-22 June, 2012.Conference Object Citation - Scopus: 1Mutation-Based Evaluation of Weighted Test Case Selection for Firewall Testing(Institute of Electrical and Electronics Engineers Inc., 2011) Tuğlular, Tuğkan; Gerçek, GürcanAs part of network security testing an administrator needs to know whether the firewall enforces the security policy as expected or not. In this setting black-box testing and evaluation methodologies can be helpful. In this paper we employ a simple mutation operation namely flipping a bit to generate mutant firewall policies and use them to evaluate our previously proposed weighted test case selection method for firewall testing. In the previously proposed firewall testing approach abstract test cases that are automatically generated from firewall decision diagrams are instantiated by selecting test input values from different test data pools for each field of firewall policy. Furthermore a case study is presented to validate the proposed approach. © 2011 IEEEConference Object Citation - Scopus: 2Towards Test Case Generation for Synthesizable Vhdl Programs Using Model Checker(Institute of Electrical and Electronics Engineers Inc., 2010) Ayav, Tolga; Tuğlular, Tuğkan; Belli, FevziVHDL programs are often tested by means of simulations, relying on test benches written intuitively. In this paper, we propose a formal approach to construct test benches from system specification. To consider the real-time properties of VHDL programs, we first transform them to timed automata and then perform model checking against the properties designated from the specification. Counterexamples returned from the model checker serve as a basis of test cases, i.e. they are used to form a test bench. The approach is demonstrated and complemented by a simple case study.
