UWSpace will be migrating to a new version of its software from July 29th to August 1st. UWSpace will be offline for all UW community members during this time.
Browsing Theses by Supervisor "Nagappan, Meiyappan"
Now showing items 1-20 of 20
-
Adaptive Cross-Project Bug Localization with Graph Learning
(University of Waterloo, 2022-06-07)Bug localization is the process of identifying the source code files associated with a bug report. This is important because it allows developers to focus their efforts on fixing the bugs than finding the root cause of ... -
An Analysis of Human Aspects of Collaborative Group Members in OSS development
(University of Waterloo, 2021-04-23)Open Source Software development is a collective activity that involves different software developers who may differ from each other. Although, previous researchers have focused on technical aspects like code factors, ... -
Android Access Control Recommendation as a Deep Learning Task
(University of Waterloo, 2023-09-25)Android enforces access control checks to protect sensitive framework APIs. If not properly protected, framework APIs can open the door for malicious apps to access sensitive resources without having the necessary privileges. ... -
API Parameter Recommendation Based on Documentation Analysis
(University of Waterloo, 2020-01-20)Application Programming Interfaces (APIs) are widely used in today's software development, as they provide a easy and safe way to build more powerful applications with less code. However, learning how to use an API function ... -
Classifying Code as Human Authored or GPT-4 Generated
(University of Waterloo, 2024-05-09)Artificial intelligence (AI) assistants such as GitHub Copilot and ChatGPT, built on large language models like GPT-4, are revolutionizing how programming tasks are performed, raising questions about whether generative AI ... -
Detecting Exploitable Vulnerabilities in Android Applications
(University of Waterloo, 2021-05-27)The world is moving towards remote-first and giving rise to many mobile tools and applications to get the work done. As more applications are moving towards the cloud and therefore require remote access, the attack surface ... -
Detecting Vulnerable JavaScript Libraries in Hybrid Android Applications
(University of Waterloo, 2019-02-15)Smartphone devices are very popular. There are a lot of devices being sold, a lot of applications that are created and a lot of people using those applications. However, mobile applications could only be created in the ... -
Discovering Play Store Reviews Related to Specific Android App Issues
(University of Waterloo, 2018-09-20)Mobile App reviews may contain information relevant to developers. Developers can investigate these reviews to see what users of their apps are complaining about. However, the huge volume of incoming reviews is impractical ... -
Effects of Personality Traits and Emotional Factors in Pull Request Acceptance.
(University of Waterloo, 2019-08-26)Social interactions in the form of discussion are an indispensable part of collaborative software development. The discussions are essential for developers to share their views and to form a strong relationship with other ... -
Evaluating Deep Learning-based Vulnerability Detection Models on Realistic Datasets
(University of Waterloo, 2023-05-23)The impact of software vulnerabilities on daily-used software systems is alarming. Despite numerous proposed deep learning-based models to automate vulnerability detection, the detection of software vulnerabilities remains ... -
Evaluating the Effectiveness of Code2Vec for Bug Prediction When Considering That Not All Bugs Are the Same
(University of Waterloo, 2020-09-21)Bug prediction is an area of research focused on predicting where in a software project future bugs will occur. The purpose of bug prediction models is to help companies spend their quality assurance resources more ... -
Exploiting Token and Path-based Representations of Code for Identifying Security-Relevant Commits
(University of Waterloo, 2020-07-15)Public vulnerability databases such as CVE and NVD account for only 60% of security vulnerabilities present in open-source projects and are known to suffer from inconsistent quality. Over the last two years, there has been ... -
The Impact of Code Ownership of DevOps Artefacts on the Outcome of DevOps CI Builds
(University of Waterloo, 2023-12-22)This study focuses on factors that may influence the outcomes of CI builds triggered by commits modifying and/or adding DevOps artefacts to the projects, i.e., DevOps-related CI builds. In particular, code ownership of ... -
JITGNN: A Deep Graph Neural Network for Just-In-Time Bug Prediction
(University of Waterloo, 2022-05-10)Just-In-Time (JIT) bug prediction is the problem of predicting software failure immediately after a change is submitted to the code base. JIT bug prediction is often preferred to other types of bug prediction (subsystem, ... -
Measuring the Performance of Code Produced with GitHub Copilot
(University of Waterloo, 2022-12-22)GitHub Copilot is an artificially intelligent programming assistant used by many developers. While a few studies have evaluated the security risks of using Copilot, there has not been any study to show if it aids developers ... -
On the Relationship Between the Developer’s Perceptible Ethnicity and the Evaluation of Contributions in GitHub
(University of Waterloo, 2020-08-28)Context: Open Source Software (OSS) projects are typically the result of collective efforts performed by developers with different backgrounds. Although the quality of developers' contributions should be the only factor ... -
Parallel Paths Analysis Using Function Call Graphs
(University of Waterloo, 2019-09-23)Call graphs have been used widely in different software engineering areas. Since call graphs provide us with detailed information about the structure of software elements and components and how they are connected with each ... -
Security Evaluations of GitHub's Copilot
(University of Waterloo, 2023-08-11)Code generation tools driven by artificial intelligence have recently become more popular due to advancements in deep learning and natural language processing that have increased their capabilities. The proliferation of ... -
Semantic code search using Code2Vec: A bag-of-paths model
(University of Waterloo, 2020-05-14)The world is moving towards an age centered around digital artifacts created by individuals, not only are the digital artifacts being created at an alarming rate, also the software to manage such artifacts is increasing ... -
Towards Better Static Analysis Security Testing Methodologies
(University of Waterloo, 2020-09-24)Software vulnerabilities have been a significant attack surface used in cyberattacks, which have been escalating recently. Software vulnerabilities have caused substantial damage, and thus there are many techniques to ...