Automatic extraction of security-rich dataflow diagrams for microservice applications written in Java

S Schneider, R Scandariato - Journal of Systems and Software, 2023 - Elsevier
Dataflow diagrams (DFDs) are a valuable asset for securing applications, as they are the
starting point for many security assessment techniques. Their creation, however, is often …

Featracer: Locating features through assisted traceability

M Mukelabai, K Hermann, T Berger… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Locating features is one of the most common software development activities. It is typically
done during maintenance and evolution, when developers need to identify the exact places …

Visualization of object-oriented software in a city metaphor: Comprehending the implemented variability and its technical debt

J Mortara, P Collet, AM Dery-Pinna - Journal of Systems and Software, 2024 - Elsevier
While many large-scale software systems intensively implement variability to reuse software
and speed up development, they often do not document it, hampering its comprehension …

Featurevista: Interactive feature visualization

A Bergel, R Ghzouli, T Berger… - Proceedings of the 25th …, 2021 - dl.acm.org
Comprehending and characterizing the spread and interaction of features in a software
system is know to be difficult and error-prone. This paper presents FeatureVista, a …

FM-PRO: A Feature Modeling Process

J Martinson, W Mahmood, J Gyimah… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Almost any software system needs to exist in multiple variants. While branching or forking—
aka clone & own—are simple and inexpensive strategies, they do not scale well with the …

Virtual Platform: Effective and Seamless Variability Management for Software Systems

W Mahmood, G Çalıklı, D Strüber… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Customization is a general trend in software engineering, demanding systems that support
variable stakeholder requirements. Two opposing strategies are commonly used to create …

A Taxonomy of Functional Security Features and How They Can Be Located

K Hermann, S Schneider, C Tony, A Yardim… - arxiv preprint arxiv …, 2025 - arxiv.org
Security must be considered in almost every software system. Unfortunately, selecting and
implementing security features remains challenging due to the variety of security threats and …

An IDE Plugin for Clone Management

A Al Shihabi, J Sollmann, J Martinson… - Proceedings of the 28th …, 2024 - dl.acm.org
Development and maintenance in variant-rich systems often involves the replication of
specific software code, known as software cloning. This process allows for code reuse but …

[PDF][PDF] Cost and Benefit of Tracing Features with Embedded Annotations

T Berger, W Mahmood, RA Zahra, I Vassilevski… - 2024 - researchgate.net
Features are commonly used by developers and users to describe the functional and non-
functional characteristics of software. Especially agile development methods, such as …

Facilitating Feature-Oriented Quality Assurance in Low-Maturity Variant-Rich Systems

M Mukelabai - 2022 - gupea.ub.gu.se
Context: Many software systems exist in several variants customized for specific stakeholder
requirements, such as different market segments or hardware constraints. This …