Proceedings of the 16th International Working Conference on Source Code Analysis and Manipulation
SCAM, 2016.
Contents (24 items)
- SCAM-2016-JimenezPT #case study #kernel #linux #modelling #predict
- Vulnerability Prediction Models: A Case Study on the Linux Kernel (MJ, MP, YLT), pp. 1–10.
- SCAM-2016-ViticchieRTBCTT #assessment #obfuscation #source code
- Assessment of Source Code Obfuscation Techniques (AV, LR, MT, CB, MC, PT, RT), pp. 11–20.
- SCAM-2016-BiaseBB #code review #overview #security
- A Security Perspective on Code Review: The Case of Chromium (MdB, MB, AB), pp. 21–30.
- SCAM-2016-0002G #energy #framework #mobile #optimisation
- A Source-Level Energy Optimization Framework for Mobile Applications (XL0, JPG), pp. 31–40.
- SCAM-2016-AnicheTZDG #architecture #metric #named
- SATT: Tailoring Code Metric Thresholds for Different Software Architectures (MFA, CT, AZ, AvD, MAG), pp. 41–50.
- SCAM-2016-DSouzaYL #api #python #recommendation
- Collective Intelligence for Smarter API Recommendations in Python (ARD, DY, CVL), pp. 51–60.
- SCAM-2016-MingW #concurrent #control flow #multi #named #performance #profiling #thread
- BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling (JM0, DW), pp. 61–66.
- SCAM-2016-BlanchardKLL #c #composition #named #parallel #plugin #source code #verification
- Conc2Seq: A Frama-C Plugin for Verification of Parallel Compositions of C Programs (AB, NK, ML, FL), pp. 67–72.
- SCAM-2016-SharmaS #dependence #impact analysis #named
- Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact Analysis (TS, GS), pp. 73–78.
- SCAM-2016-HollandSAK #algorithm #complexity #detection #dynamic analysis #tool support
- Statically-Informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities (BH, GRS, PA, SK), pp. 79–84.
- SCAM-2016-StievenartVMR #composition #framework #named #static analysis
- Scala-AM: A Modular Static Analysis Framework (QS, MV, WDM, CDR), pp. 85–90.
- SCAM-2016-Quante #abstraction #framework #interpreter
- A Program Interpreter Framework for Arbitrary Abstractions (JQ), pp. 91–96.
- SCAM-2016-MuscoMP #fault #graph #locality
- Mutation-Based Graph Inference for Fault Localization (VM, MM, PP), pp. 97–106.
- SCAM-2016-PaulaGLSL #case study #interface #repository
- An Exploratory Study of Interface Redundancy in Code Repositories (ACdP, EG, CVL, HS, OALL), pp. 107–116.
- SCAM-2016-Ragkhitwetsagul #pervasive #similarity #source code
- Similarity of Source Code in the Presence of Pervasive Modifications (CR, JK, DC), pp. 117–126.
- SCAM-2016-GaoHMW #bound #model checking #named #testing
- LLSPLAT: Improving Concolic Testing by Bounded Model Checking (MG0, LH, RM, ZW), pp. 127–136.
- SCAM-2016-BaloghGBG #question #testing
- Are My Unit Tests in the Right Package? (GB, TG, ÁB, TG), pp. 137–146.
- SCAM-2016-KintisPPVM #effectiveness #mutation testing #testing #tool support
- Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study (MK, MP, AP, EV, NM), pp. 147–156.
- SCAM-2016-MuskeS #overview #static analysis
- Survey of Approaches for Handling Static Analysis Alarms (TM, AS), pp. 157–166.
- SCAM-2016-LossingGI #c #compilation #concept #dependence #graph #text-to-text
- Effects Dependence Graph: A Key Data Concept for C Source-to-Source Compilers (NL, PG, FI), pp. 167–176.
- SCAM-2016-AntalHSBFM #compilation #legacy
- Transforming C++11 Code to C++03 to Support Legacy Compilation Environments (GA, DH, IS, ÁB, RF, JM), pp. 177–186.
- SCAM-2016-BinkleyL #natural language
- A Case for Software Specific Natural Language Techniques (DWB, DJL), pp. 187–196.
- SCAM-2016-0006LLE #empirical #interactive
- A Source Level Empirical Study of Features and Their Interactions in Variable Software (SF0, LL, RELH, AE), pp. 197–206.
- SCAM-2016-MoonenARB #impact analysis #mining
- Exploring the Effects of History Length and Age on Mining Software Change Impact (LM, SDA, TR, DWB), pp. 207–216.