User-centered tool design for data-flow analysis / Lisa Nguyen Quang Do ; Advisors: Prof. Dr. Eric Bodden, Prof. Dr. Karim Ali. Paderborn, 2019
Inhalt
- Introduction
- Motivation and Research Question
- Contributions and Structure of the Dissertation
- Publications Details
- Background
- Identifying Tool Requirements for Analysis Developers
- Related Work
- Survey: Debugging Tools for Static Analysis
- Usage Context and Developer Motivation
- Desirable Features for Debugging Static Analysis
- Debugging Tools Used by Analysis Developers
- User-Experience Issues with Current Debugging Tools
- Tool Features for Debugging Analysis Code
- Limitations and Threats to Validity
- Summary
- Debugging Data-Flow Analysis
- VisuFlow, a Debugging Environment for Data-Flow Analysis
- Evaluation
- Limitations and Threats to Validity
- Summary
- Identifying Tool Requirements for Software Developers
- Related Work
- Study: Developer Behavior and Motivation
- Usage Context of Static Analysis Tools
- Developer Motivations and Strategies
- Desirable Features of Static Analysis Tools
- Limitations and Threats to Validity
- Summary
- Just-in-Time Analysis for Responsiveness
- Related Work
- Responsiveness of Static Analysis
- Warning Prioritization
- Integration of Developer-Specific Knowledge in the Analysis Tool
- The Just-in-Time Analysis Concept
- Cheetah, a JIT Taint Analysis for Android Applications
- Evaluation
- Empirical Evaluation: Responsiveness, Understandability, Precision
- Evaluation Results
- User Study: Usability of Cheetah
- Study Results
- Limitations and Threats to Validity
- Summary
- Rule Graphs for Analysis Configuration
- Motivating Example
- Related Work
- Rule Graphs
- Applications of Rule Graphs
- Warning Understandability
- Warning Classification
- Identification of Weak Analysis Patterns
- Identification of Missing Analysis Patterns
- Implementation Details
- Evaluation
- User Study: Warning Understandability
- Study Results
- Empirical Evaluation: Warning Classification and Pattern Detection
- Evaluation Results
- Limitations and Threats to Validity
- Summary
- Conclusion and Future Work
- Bibliography
- Appendices
