Identificação e Remoção de Dívidas Técnicas Congênitas

Authors

  • Aleson Teruji Makino IFPR – Campus Paranavaí Author
  • Helio Toshio Kamakawa IFPR – Campus Paranavaí Author
  • Willian Nalepa Oizumi IFPR – Campus Paranavaí Author

Keywords:

Dívidas Técnicas Congênitas, anomalias de código, vunerabilidades, qualidade de software

Abstract

This article presents tools that helps to identify code anomalies and vulnerabilities that can occur at the beginning of the development of a system. A first stable version of a law firm software was used the Open Source FindBugs, JDeodorant and Owasp Zap tools, with which tests were performed to analyze the possible occurrence of technical debt. It is concluded that the tools can raise important information in order to avoid the incidence of technical debt early in the life of the software. With the achievements of the tests, significant actions can be taken to increase the quality of software.

References

Cunningham, W. (1992), The WyCash Potfolio Management System.

Kruchten, Philippe. Nord, Robert L. e Ozkaya, Ipek. (2012), Technical debt: From metaphor to theory and practice.

E. Allman.(2012), Managing technical debt. Communications of the ACM.

Zazworka, N. (2013), A case study on effectively identifying technical debt. In:Proceedings of the 17th International Conference on Evaluation and Assessment in Software Engineering. (New York, NY, USA: ACM), Disponível em: <http://doi.acm.org/10.1145/2460999.2461005>. Acessado em 08 junho de 2018.

Oizumi W, Garcia A, Souza, A, S, Cafeo B, e Zao Y. (2016), “Code anomalies flock together: exploring code anomaly agglomerations for locating design problems”. In Proceedings of the 38th International Conference on Software Enginer (ICSE ́16) (New York, New York, USA). 2016.

Tsantalis, N. (2018), Jdeodorant. Disponível em: <https://users.encs.concordia.ca/~nikolaos/jdeodorant/>. Acessado em 16 de junho de 2018. IBM. (2004), Findbugs part 1: Improve the quality of your code. Disponivel em: <http://www.ibm.com/developerworks/java/library/j-findbug1/>. Acessado em 12 de junho de 2018.

Maltempi, Marcus Vinicius(2000), Construção de páginas WEB: Depuração e especificação de um ambiente de aprendizagem. Disponível em: <http://www.rc.unesp.br/igce/demac/maltempi/tese.pdf> Acessado em: 20/07/2018.

Owasp Zap. (2018), OWASP Zed Attack Proxy Project. Disponível em: <https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project>. Acessado em 4 de junho de 2018.

Costa, Gustavo. (2017), Automatizando Testes de Vulnerabilidades em Aplicações Web com o Owasp Zap e Python. Disponível em: <https://medium.com/@gustavoh/automatizando-testes-de-vulnerabilidade-em-aplica%C3%A7%C3%B5es-web-com-o-owasp-zap-e-python-fdcdcf78b587>. Acessado em 8 de junho de 2018.

Bennetts, S. (2018), Owasp Zed Attack Proxy Project. Disponível em: <https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project>. Acessado em 8 de junho de 2018.

Meucci, M. (2008), Owasp testing guide version 3.0. Owasp Foundation.

Fowler, Martin (2000), Refactoring: Improving the Design of Existing Code.

Schneier, Bruce (2000). Secrets and lies: digital security in a networked world

Koscianski A, Soares M. (2006), Qualidade de Software, Novatec.

Glass, R. L. (2001), Frequently Forgotten Fundamentals Facts about Software Engineering. IEEE Software.

Easterbrook, Steve et al. (2008), “Selecting empirical methods for software engineering research”. In: Guide to advanced empirical software engineering. Springer London.

Pressman, Roger S. (2005), Software engineering: a practitioner's approach.

Pressman, R. S. (2006), “Engenharia de software”. São Paulo: McGraw-Hill.

Sommerville, Ian. (2010), Software engineering. New York: Addison-Wesley.

Harrold, M. J. (2000), Testing: A roadmap. In The Future of Software Engineering.

Goncalves, Antonio. (2013), Beginning Java EE 7. Sonatype. (2008), Maven: the definitive guide.

Schmid, K. (2013), “On the limits of the technical debt metaphor some guidance on going beyond”. In:4th International Workshop on Managing Technical Debt, MTD 2013–Proceedings.

Kniberg, Henrik. (2008), Scrum e XP direto das Trincheiras.

OWASP (2018a), Clickjacking. Disponível em: <https://www.owasp.org/index.php/Clickjacking>. Acessado em 17 de junho de 2018.

OWASP (2018b), Cross-site Scripting (XSS). Disponível em: <https://www.owasp.org/index.php/Cross-site_Scripting_(XSS)>. Acessado em 17 de junho de 2018.

OWASP (2018c), Disponível em: <https://www.owasp.org/index.php/Sniffing_application_traffic_attack>. Acessado em 17 de junho de 2018.

Published

2018-12-12

How to Cite

Identificação e Remoção de Dívidas Técnicas Congênitas. (2018). Information Technology Week, 1(1). https://tecnoif.com.br/periodicos/index.php/setif/article/view/41

Similar Articles

1-10 of 16

You may also start an advanced similarity search for this article.