In this session, I explained what is the use of findbugs, how to add Findbugs plugin to eclipse and how to analyze the java project code.
Views: 3372 Siva Reddy
This video covers what is sonarqube and how to configure Sonar Qube with JaCoCo Plugin and Sonar plugin for publishing reports to SonarQube. Slack Community: https://techprimers.slack.com Twitter: https://twitter.com/TechPrimers Facebook: http://fb.me/TechPrimers GitHub: https://github.com/TechPrimers or https://techprimers.github.io/ Video Editing: iMovie Background Music: Joakim Karud #SonarQube #Maven #TechPrimers
Views: 62629 Tech Primers
This video explain you what is sonar and how to get start with sonar | example (code quality and code coverage ) GitHub: https://github.com/Java-Techie-jt/sonar-example Blogs: https://javagyanmantra.wixsite.com/website Facebook Group : https://www.facebook.com/groups/919464521471923 Like & Subscribe
Views: 2400 Java Techie
Episode 2 of the free Java Clean Code Training Series. In this tutorial I show you how to download and install the static analysis tool FindBugs and run it against your Java Programs in Eclipse or Spring Tool Suite. Findbugs looks for and identifies bugs in Java Programs. It is based on the concept of bug patterns. A bug pattern is a code idiom that is often an error. Findbugs will search for over 200 bug patterns in your code. Bug patterns arise for a variety of reasons: - Difficult language features - Misunderstood API methods - Misunderstood invariants when code is modified during maintenance - Garden variety mistakes: typos, use of the wrong boolean operator, dead code etc FindBugs uses static analysis to inspect Java bytecode for occurrences of bug patterns. Static analysis means that FindBugs can find bugs by simply inspecting a program's code: executing the program is not necessary. This makes FindBugs very easy to use: in general, you should be able to use it to look for bugs in your code within a few minutes of downloading it. Running findbugs will certainly help you write cleaner code by helping to identify bugs, typos, dead code or simple generic coding mistakes. I treat static analysis tools as first class citizens and always execute on my code, regardless if its fun home code or serious production code. Why clean code? Simple. Clean code allows us to confidently make changes and deliver more features quickly to our customers. Don’t forget to subscribe for your regular dose of Java Tutorials! STOP THE ROT. See you in episode 3, Philip http://findbugs.sourceforge.net/factSheet.html
Views: 7550 Philip Starritt
"Tackling performance issues on modern hardware has become a complex activity due to new multicore topologies, varieties of cache systems, and advanced microarchitecture optimizations. The choice of a proper tool can be a key to resolving critical bottlenecks. Some of the issues can be identified only with specialized tools such as those that have access to processor events. This session gives an overview of existing performance analysis tools for Java and highlights the enhanced analysis capabilities of two advanced toolsets: Oracle Solaris Performance Analyzer and Intel VTune Amplifier XE. It covers features of each, shares analysis methodologies that use these toolsets, and provides real case examples based on the speakers' experience." Copyright © 2013 Oracle and/or its affiliates. Oracle® is a registered trademark of Oracle and/or its affiliates. All rights reserved. Oracle disclaims any warranties or representations as to the accuracy or completeness of this recording, demonstration, and/or written materials (the "Materials"). The Materials are provided "as is" without any warranty of any kind, either express or implied, including without limitation warranties of merchantability, fitness for a particular purpose, and non-infringement.
Views: 11611 Oracle Learning Library
Jendrik Johannes - DevBoost GmbH Today, Java code makes up a large part of many software systems. To keep these systems maintainable, extendable and flexible in the long run, constant checking of the consistency of code and other artefacts is necessary. Individual coding guidelines need to be followed, anti-patterns need to be avoided and interfaces need to be used correctly. To save costs and to prevent mistakes during theses tasks, a high degree of automation is desirable. JaMoPP - the Java Model Parser and Printer - addresses these challenges. JaMoPP automatically converts your Java code into an EMF-conformant model. This model can be processed by any EMF-based tool. Additionally, the model can be linked to other files and models for which EMF support exists. For example, BPMN or UML models, property or CSV files or data from databases. With JaMoPP, custom tools for Java code analysis and refactoring can be defined. This way, inconsistencies in the code or between code and other artifacts can be recognised instantly and, if required, repaired automatically. JaMoPP is integrated with Eclipse to provide instant feedback to developers but can also be utilised outside of Eclipse to run checks and refactorings in build scripts or on continuous integration systems. In this talk, we demonstrate the capabilities of JaMoPP and its integration with Eclipse and EMF on multiple practical examples.
Views: 1309 Eclipse Foundation
Recording brought to you by American Express https://americanexpress.io/kotlin-jobs When introducing Kotlin to a Java codebase one thing that is often missing from the picture are static analysis tools. Static Analysis suites can give an overview of a codebases health, point out potential issues to make the code safer and can help to keep the codebase in a uniform style. The Java ecosystem already has a broad selection of different static analysis tools each with a different focus. To cater for the different language features and concepts that Kotlin offers most Java focussed static analysis tools are not applicable to Kotlin code. This talk showcases static analysis tools written specifically to improve Kotlin code (and are mostly written in Kotlin themselves). Tools such as detekt, ktlint and Android Lint are introduced and explored for their use-cases and how they can complement each other. As Marvin is one of the maintainers of detekt he will also share in more detail how detekt works, what it aims to achieve and how the future roadmap looks like for detekt. About the Presenter: Marvin Ramin is a Software Engineer at Google where he is working on Android TV. Previously he was working on multiple Android applications focusing on making their codebases safer and easier to work with. Marvin is also contributing and collaborating on detekt, a Kotlin static analysis suite.
Views: 2698 JetBrainsTV
An overview for why you should measure and automate your code quality using static code analysis tools like Find Bugs, Check Style, and Sonar Lint / SonarQube / SonarCloud. Primarily focused on static analysis tools for Java developers.
Views: 271 Dev Playbook
References :  G. Chatzieleftheriou and P. Katsaros, -"Test-driving static analysis tools in search of C code vulnerabilities",- in 35th IEEE Annual Computer Software and Applications Conference Workshops, 2011, pp. 96-103.  R. Kannavara, -"Securing Opensource Code via StaticAnalysis",- in IEEE Fifth International Conference on Software Testing, Verification and Validation, 2012, pp. 429-436.  J. Novak, A. Krajnc and R. Žontar, -"Taxonomy of Static Code Analysis Tools",- inMIPRO, 2010 Proceedings of the 33rd International Convention, 2010, pp. 418 - 422.
Views: 10683 Satvik Andi
Static analysis tools range widely in scope. Narrower tools, including commercial tools like PC-lint and open-source tools like CPPcheck, can be used to find basic bugs in code, but they become apples to oranges when compared with advanced tools like CodeSonar.
Views: 300 GrammaTechVideos
Views: 1797 jquery
In this tutorial I show you how to use VisualVM to perform a Java Heap Dump snapshot in a live executing Java application in eclipse IDE. Ahem… Let me ask…First….What is Java VisualVM? Java VisualVM is a tool that provides a visual interface for viewing detailed information about Java applications while they are running on a Java Virtual Machine (JVM), and for troubleshooting and profiling these applications. This includes objects allocated on the Heap, Thread state, Execution environment information, Stack etc. Great for debugging dog slow applications!! Ok cool, now what is a Heap Dump? A heap dump is a snapshot of the memory of a Java Process at a single point in time. This contains data about Java objects, classes in the heap, class, fields, references, class loader names, static content, Thread Stacks etc. And... Why would I create a Heap Dump? There are many, but here are my two favourites. When performing performance analysis on an application, performing a heap dump during certain execution phases will provide you will critical information on the state of the Java Process, such as object allocation on the heap and thread states. Second, when an application crashes due to a Java java.lang.OutOfMemoryError, you can enforce the JVM to perform a snapshot and capture the application’s state via a heap dump. This heap dump will typically be placed into a java_pid*[id].hprof file. You can then load the heap dump file into a visualizer to understand the java applications state – this provides a good insight and clue into why the program crashed. Although if your application is running on a cloud based ephemeral file system this may be tricky. But the majority of applications that require a heap dump for analysis are most likely not in the cloud and rather dedicated high performance data centers. Last one… You mentioned compressed Oops, whats that? Ill create another video but read this for now chum. http://docs.oracle.com/javase/8/docs/technotes/guides/vm/performance-enhancements-7.html Don’t forget to subscribe for more tech content! Cheers! Philip Links Eclipse VisualVM Launcher Integration Set-up Guide https://www.youtube.com/watch?v=W60wvJ885iE VisualVM https://visualvm.github.io/ Eclipse Visual VM Integration https://visualvm.github.io/idesupport.html Java Profiling http://docs.oracle.com/javase/7/docs/technotes/guides/visualvm/profiler.html
Views: 8183 Philip Starritt
Learn more about the different types of static analysis tools: lint tools, bug catchers & automatic code inspection. This short video is part of the presentation "MISRA vs CERT®", which has been originally presented at the seminar "Secure Coding Best Practices for Automotive" in Detroit, MI, October 2015. Find out more about this talk at http://www.programmingresearch.com/news-events/events/secure-coding-seminar-automotive/
Views: 359 PRQA
Authors: Brittany Johnson, Yoonki Song, Emerson Murphy-Hill, and Robert Bowdidge (ICSE 2013). Abstract: Using static analysis tools for automating code inspections can be beneficial for software engineers. Such tools can make finding bugs, or software defects, faster and cheaper than manual inspections. Despite the benefits of using static analysis tools to find bugs, research suggests that these tools are underused. In this paper, we investigate why developers are not widely using static analysis tools and how current tools could potentially be improved. We conducted interviews with 20 developers and found that although all of our participants felt that use is beneficial, false positives and the way in which the warnings are presented, among other things, are barriers to use. We discuss several implications of these results, such as the need for an interactive mechanism to help developers fix defects.
Views: 757 yoonki7
SonarQube is an open source static code analyzer and code review tool. It is one of the best continuous inspection of code quality platform. sonar-project.properties file content in video: sonar.projectKey=my:project sonar.projectName=My project sonar.projectVersion=1.0 sonar.sources=./src
Views: 3547 Information Technologies
Subscribe to Devoxx on YouTube @ https://bit.ly/devoxx-youtube Like Devoxx on Facebook @ https://www.facebook.com/devoxxcom Follow Devoxx on Twitter @ https://twitter.com/devoxx After writing "Java Performance Tuning" and founding JavaPerformanceTuning.com, I wrote a newsletter every month for the last 15 years. In that period I've listed at least 10,000 Java performance tips and hundreds of Java performance tools. Here's what I can tell you in under an hour about the most common issues and how to solve them. Jack Shirazi - Head of Engineering for Nexmo, the Vonage API Java Champion since 2005 Founder of javaperformancetuning.com Author of Java Performance Tuning (O'Reilly) Researched Black Hole Thermodynamics & Protein Structure Prediction
Views: 28129 Devoxx
Martin Mwebesa's presentation at the 10th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2010), September 13 2010, Timişoara, Romania. More Information: http://faculty.uoit.ca/bradbury/sqrg/papers/SCAM2010.html Abstract: Detecting bugs in concurrent software is challenging due to the many different thread interleavings. Dynamic analysis and testing solutions to bug detection are often costly as they need to provide coverage of the interleaving space in addition to traditional black box or white box coverage. An alternative to dynamic analysis detection of concurrency bugs is the use of static analysis. This paper examines the use of three static analysis tools (FindBugs, JLint and Chord) in order to assess each tool's ability to find concurrency bugs and to identify the percentage of spurious results produced. The empirical data presented is based on an experiment involving 12 concurrent Java programs.
Views: 694 Software Quality Research Lab
Spoon - Source Code Analysis and Transformation for Java. Tool's presentation, usages and collaborative development.
Views: 482 OW2
David Svoboda, CERT® Software Security Engineer demonstrates the Source Code Analysis Laboratory (SCALe): Running Fortify. We do research and development to create tools to support creation of secure code right from the start, and analytical tools to detect code vulnerabilities. We also work with the software development and security communities to research and develop secure coding standards for commonly used programming languages and for smartphone platforms (Android, iOS, Win8). http://www.sei.cmu.edu/legal/index.cfm
A Java source-code analysis system.
Views: 632 Victor Winter
This screencast demonstrates a new static code analysis feature introduced into the NetBeans IDE 7.2 Beta Java Editor. The screencast shows how to perform static analysis of your Java code using FindBugs and NetBeans Java Hints without actually running your applications. Related Links: Download video on NB.org: http://netbeans.org/kb/docs/java/code-inspect-screencast.html NetBeans Java Hints: http://wiki.netbeans.org/Java_Hints NetBeans Java Hint Module Tutorial: http://platform.netbeans.org/tutorials/nbm-java-hint.html
Views: 7476 NetBeansVideos
VB2013 presentation by Xinran Wang Java vulnerability is becoming the most popular exploit vector in the wild. Three zero-day Java vulnerabilities were found in the wild in just the first two months of 2013. Due to the wide deployment of Java in browsers and the high reliability of Java vulnerability, Java exploits are heavily used in numerous infamous exploit kits such as Blackhole and Redkit. According to VirusTotal, the number of Java exploit samples submitted have increased from 8,000 at the beginning of this year to 300,000 at the beginning of March. It is very challenging to accurately identify the vulnerabilities, if any, used in the Java exploit samples. This is not only because of the huge volume of exploit samples, but also the advanced obfuscation technique used. In this paper, we first explain the Java security model and demonstrate several recent zero-day exploits, and show why Java vulnerability is much more reliable than buffer overflow. Several Java exploit samples from popular exploit kits are dissected. We analyse common obfuscation techniques used and show why static analysis is ineffective for analysing Java exploits. Then, we present a dynamic analysis tool. The tool records calls to the Java Core API during the execution of a Java exploit. The recorded API traces are used to identify known vulnerabilities. Furthermore, we propose several heuristics in the tool used to identify zero-day exploits. Finally, we report the results of an experiment based on over 5,000 Java exploit codes and 5,000 benign Java applets collected in the wild. The results shows that the tool identified known vulnerabilities of exploit code with very few positives and false negatives.
Views: 564 Virus Bulletin
Reflection, which is widely used in practice, poses a significant obstacle to program analysis. Reflective calls can be analyzed statically or dynamically. Static analysis can be more sound, but may introduce many false reflective targets and thus sometimes make it unscalable. In contrast, dynamic analysis can be precise, but may miss many true reflective targets due to low code coverage. Jie introduces Mirror, the first automatic reflection analysis for Java that reaps the benefits of both worlds. In it's static analysis, a novel reflection-oriented slicing technique is applied to identify a small number of small path-based slices for a reflective call so that different reflective targets are likely exercised along these different paths. This preserves the soundness of pure static reflection analysis as much as possible, improves its scalability, and reduces substantially its false positive rate. In its dynamic analysis, these slices are executed with automatically generated test cases to report the reflective targets accessed. This significantly improves the code coverage of pure dynamic analysis. Jie discusses how the team evaluated Mirror against a state-of-the-art dynamic reflection analysis tool, Tamiflex, by using a set of 10 large real-world Java applications. Mirror detects 12.5% - 933.3% more reflective targets efficiently (in 362.8 seconds on average) without producing any false positives. These new targets enable 5 - 174949 call-graph edges to be reachable in the application code. With Mirror, more reflective targets can be resolved precisely and quickly, rendering a larger part of the codebase to be visible to many analysis tools such as bug detectors and security analyzers. Bio: Jie liu is a PhD student supervised by Prof. Jingling Xue at School of Computer Science and Engineering, University of New South Wales (UNSW). Jie received his B.Eng degree in Software Engineering from Northwestern Polytechnical University (NPU) in 2014. Before joining UNSW, Jie studied in Fudan University as a postgraduate student from 2014 to 2015. Jie started pursuing his PhD in February 2016. Jie's research interests are program analysis, software engineering and programming languages. Jie Liu - http://www.cse.unsw.edu.au/~jieliu/ Oracle Labs Australia - http://labs.oracle.com/locations/australia
Views: 316 Oracle Labs Australia
Speakers: Arshan Dabirsiaghi. Aspect Security | Matthew Paisner, Aspect Security | Alex Emsellem, Intern Software Engineer, Aspect Security Attacks such as Cross-Site Scripting, HTTP header injection, and SQL injection take advantage of weaknesses in the way some web applications handle incoming character strings. One technique for defending against injection vulnerabilities is to sanitize untrusted strings using encoding methods. These methods convert the reserved characters in a string to an inert representation which prevents unwanted side effects. However, encoding methods which are insufficiently thorough or improperly integrated into applications can pose a significant security risk. This paper will outline an algorithm for identifying encoding methods through automated analysis of Java bytecode. The approach combines an efficient heuristic search with selective rebuilding and execution of likely candidates. This combination provides a scalable and accurate technique for identifying and profiling code that could constitute a serious weakness in an application. For more information visit: http://bit.ly/AppSec12_USA_information To download the video visit: http://bit.ly/AppSec12_USA_videos Playlist OWASP AppSec USA 2011: http://bit.ly/AppSec12_USA_playlist
Views: 388 Christiaan008
Jenkins SonarQube Integration for CI CD in DevOps
Views: 95284 Self Learning
Code lines are added at high speed? Too many developers? How do you see the big picture? What processes are going on with your large code base? This presentation will show how to leverage existing code analysis tools (Cloc, Structure101, SonarQube) and combine them with data storage (ElasticSearch, Neo4j) and visualization tools (Gource, D3, Inkscape, Kibana) to at least make some sense out of millions of code lines and their history. During his consulting work, author often meets unfamiliar and at the same time large Java code bases that need quick analysis and input for decision making. That’s where visualizations come to into play by helping mining important knowledge directly from the code statistics.
Views: 670 jeeconf
This video explain you how to check code coverage using jacoco and how to generate code coverage report #JavaTechie #Maven #Jacoco GitHub: https://github.com/Java-Techie-jt/jacoco-codecoverage Blogs: https://javagyanmantra.wixsite.com/website Facebook: https://www.facebook.com/groups/919464521471923 guys if you like this video please do subscribe now and press the bell icon to not miss any update from Java Techie
Views: 2251 Java Techie
For any java/devops/developer/lead position related interview assistance/guidance/help, you can reach out me @ [email protected] In this vedio, I have explained how to setup SonarQube on computer and analyze sonarqube report for Basic Java Project SonarQube server download url: https://sonarsource.bintray.com/Distribution/sonarqube/sonarqube-5.4.zip scanners download URL: https://sonarsource.bintray.com/Distribution/sonar-scanner-cli/sonar-scanner-2.6.1.zip
Views: 114424 Siva Reddy
DURGASOFT is INDIA's No.1 Software Training Center offers online training on various technologies like JAVA, .NET , ANDROID,HADOOP,TESTING TOOLS , ADF, INFORMATICA,TALLEAU,IOS,OBIEE,ANJULAR JA, SAP... courses from Hyderabad & Bangalore -India with Real Time Experts. Mail us your requirements to [email protected] so that our Supporting Team will arrange Demo Sessions. Ph:Call +91-8885252627,+91-7207212428,+91-7207212427,+91-8096969696. http://durgasoft.com http://durgasoftonlinetraining.com https://www.facebook.com/durgasoftware http://durgajobs.com https://www.facebook.com/durgajobsinfo......
Views: 6313 Durga Software Solutions
In this video tutorial I will explain you about Jdeps-Java class dependency analyzer tool in java 8, using a demo project. Below is the GitHub link to download source code: https://github.com/kishanjavatrainer/ZipFileStreamDemo.git
Views: 1094 KK JavaTutorials
Java developers want to write code, and security testers want to break it. The problem is that security testers need to know more about code to do better testing and developers need to be able to quickly address problems found by testers. This presentation looks at both groups and their toolsets and explores ways they can help each other out. Using open source examples built on OWASP ZAP, ThreadFix, and Eclipse, it walks through the process of seeding web application scans with knowledge gleaned from code analysis as well as the mapping of dynamic scan results to specific lines of code in Java developers’ IDEs. Author: Dan Cornell Dan Cornell has over fifteen years of experience architecting and developing web-based software systems. As CTO of Denim Group, he leads the organization’s technology team overseeing methodology development and project execution for Denim Group’s customers. He also heads the Denim Group security research team, investigating the application of secure coding and development techniques to the improvement of web-based software development methodologies. Dan Cornell has performed as the CTO of BrandDefense, as founder and Vice President of Engineering for Atension prior to its acquisition by Rare Medium, Inc. and as the Vice President, Global Competency Leader for Rare Medium’s Java and Unix Competency Center. Cornell has also developed simulation applications for the Air Force with Southwest Research Institute. In March 1999, Texas Monthly Magazine named Cornell and his partners, Sheridan Chambers and Tyson Weihs, to its list of 30 Multimedia Whizzes Under Thirty doing business in Texas. He has published papers on topics ranging from data security to high-end graphical simulations, as well as an IBM Redbook on building server-side Java applications for the Linux platform. He has also been published by the Association of Computing Machinery, and the Society of Computing Simulation International. Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and is currently the San Antonio Open Web Application Security Project (OWASP) chapter leader. Dan also serves on the advisory board of Trinity University’s Department of Computer Science. He is a recognized expert in the area of web application security for SearchSoftwareQuality.com and the original author of ThreadFix, Denim Group's open source application vulnerability management platform. Dan holds a Bachelor of Science degree with Honors in Computer Science and graduated Magna Cum Laude from Trinity University. View more trainings by Dan Cornell at https://www.parleys.com/author/dan-cornell Find more related tutorials at https://www.parleys.com/category/developer-training-tutorials
Views: 152 Oracle Developers
This paper was presented at VB2014 in Seattle, WA, USA. With Android being the fastest-growing mobile OS and with a rapidly increasing number of Android malware samples, it is important to acknowledge the risk of exploitation of security vulnerabilities by malware. According to Common Vulnerabilities and Exposures (CVE) data, over the past few years the total number of documented Android vulnerabilities has reached 30, with seven of them discovered in the last year. The most serious of the recent ones is the so-called 'MasterKey' vulnerability (CVE-2013-4787), which is reported to have affected 99 per cent of devices, compromising the APK signature validation process. With the total number of Android samples in our database exceeding 700,000, and 2,000 new Android malware samples discovered every day, we estimate that approximately 10 per cent of the samples exploit some vulnerability, and of this, one tenth will be a 'MasterKey' exploit. In this paper we will investigate recent Android malware that attempts to exploit vulnerabilities, and identify the most relevant threat families. By using static analysis tools we will show how these malware families exploit vulnerabilities in order to compromise devices. The research will reveal the evolution of the threat families. Additionally, we will provide an evaluation of the various analysis tools that are currently available, exploring their successes and failures, and highlighting the differences between them. These results will be used to identify the best approach for future automated analysis, to ensure it keeps up with the rapid development of Android malware, and increasing sophistication of device exploitation. https://www.virusbtn.com/conference/vb2014/abstracts/SzalayChandraiah.xml
Views: 220 Virus Bulletin
Streaming APIs are pervasive in mainstream Object-Oriented languages and platforms. For example, the Java 8 Stream API allows for functional-like, MapReduce-style operations in processing both finite, e.g., collections, and infinite data structures. However, using this API efficiently involves subtle considerations like determining when it is best for stream operations to run in parallel, when running operations in parallel can actually be less efficient, and when it is safe to run in parallel due to possible lambda expression side-effects. In this paper, we describe the engineering aspects of an open source automated refactoring tool called Optimize Streams that assists developers in writing optimal stream software in a semantics-preserving fashion. Based on a novel ordering and typestate analysis, the tool is implemented as a plug-in to the popular Eclipse IDE, using both the WALA and SAFE frameworks. The tool was evaluated on 11 Java projects consisting of ∼642 thousand lines of code, where we found that 36.31% of candidate streams we refactorable, and an average speedup of 1.55 on a performance suite was observed. We also describe experiences gained from integrating three very different static analysis frameworks to provide developers with an easy-to-use interface for optimizing their stream code to its full potential. This video demonstrates the tool on a motivating example. Some of the sequences have been shortened for presentational purposes.
Views: 222 Raffi Khatchadourian
Join Capers Jones and Tom McCabe as they show you the metrics that prove that when used together, static analysis and code review find more bugs and inconsistencies than either technique alone. Learn more about code review here: https://smartbear.com/learn/code-review/why-review-code/ Let's face it, we all know that fixing issues early is better—it's easier and less expensive. That's why we do developer test. But some developers think that static analysis tools are less of a hassle than code review and will find enough of the bugs anyway. While static analysis tools are great at automatically checking code against pre-defined criteria, they only find certain kinds of violations of good coding practice. Peer code review finds additional classes of defects, the kinds of problems that only skilled humans excel at finding. Subscribe to all SmartBear videos here: https://www.youtube.com/user/smartbearsoftware?sub_confirmation=1
Views: 1704 SmartBear
DIY : Java Static Analysis by Nicolas Peru (french talk) L’analyse statique permet de detecter des bugs et des problèmes dans votre code sans l’executer. Cette présentation vous promet, en toute simplicité, d’ecrire votre propre analyseur pour Java basé sur SonarQube. Pour y arriver il faudra comprendre les challenges d’analyse du langage, du parsing à l’execution symbolique, pour pouvoir coder des vérifications specifiques à vos projets ! Improve your tests quality with Mutation Testing by Nicolas Fränkel and Evgeny Mandrikov (english talk) Unit testing ensures your production code is relevant. But what does ensure your testing code is relevant? Come discover mutation testing and make sure your never forget another assert again. In the realm of testing, the code coverage metrics is the most often talked about. However, it doesn’t mean that the test has been useful or even that an assert has been coded. Mutation testing is a strategy to make sure that the test code is relevant. In this talk, we will explain how Code Coverage is computed and what its inherent flaw is. Afterwards, we will describe how Mutation Testing work and how it helps pointing out code that is tested but leave out corner cases. We will also demo PIT, a Java production-grade framework that enables Mutation Testing on a simple code base. If time allows, a demo will also show how PIT can be integrated with SonarQube. As usual, this session will end up with a buffet provided by our sponsors Hortis | OOSphere | Qim Info | Serial ilem | Kalyss | Sopra Steria
Views: 189 GenevaJUG
Spoon is an open-source library to analyze, rewrite, transform, transpile Java source code. It parses source files to build a well-designed AST with powerful analysis and transformation API. It fully supports Java 8 and supports Java 9 modules. Spoon provides a complete and fine-grained Java metamodel where any program element (classes, methods, fields, statements, expressions...) can be accessed both for reading and modification. Spoon takes as input source code and produces transformed source code ready to be compiled. Spoon can be integrated in Maven and Gradle. (Simon Urli, INRIA)
Views: 684 OW2
https://media.ccc.de/v/950-static-code-analysis-for-all-languages-coala coala provides a common command-line interface for linting and fixing all your code, regardless of the programming languages you use. It supports way over 30 languages in addition to language independent routines. So, instead of building new analysis tools from scratch you can now build logic only and let coala deal with the user. This talk features a short introduction into the thoughts behind coala, it's ability to speed up research as well as increase productivity. Lasse Schuirmann
Views: 268 openSUSE
Tools like `go package` provide static analysis. This session shows step by step how to use it. This session makes you that you can start to use static analysis for creating tools which are useful for your daily development, such as a linter and a refactoring tool which can be customized for your project.
Views: 2848 GopherCon UK
Leverage Blu Age Analyzer to unlock the value in your legacy business-critical applications. The IT Application Portfolio of any enterprise represents a significant historical investment and provides an essential foundation for current and future business activities. This investment requires continual analysis, classification and optimization in order to maintain alignment to business needs, manage costs, improve services and deliver appropriate value. Blu Age Analyzer provides a complete ecosystem of analysis, exploration, visualization and reporting tools designed for any COBOL, PL/I, RPG 400… application. Within few minutes, Blu Age Analyzer enables developers, analysts, and executives to achieve a deep understanding of the application portfolio providing business and technical insights. Retail, leisure, financial services or manufacturing ... From critical batch processing to complex user interfaces, we cover any type of use case. Get in Touch With Us - We’re here to provide more information, answer any questions you may have, and help you thrive in the Right-Now Economy: [email protected] More details about us : www.bluage.com
Views: 197 Blu Age
Parasoft's Static Analysis tools help developers prevent and eliminate defects—using thousands of rules tuned to find code patterns that lead to reliability, performance, and security problems. Parasoft provides pattern-based static code analysis, flow-based static analysis, and code metrics analysis. For more information about Parasoft's Static Analysis tools, see http://www.parasoft.com/jsp/capabilities/static_analysis.jsp?itemId=547
Views: 585 StaticAnalysisTools