Ralf Lämmel, Rocco Oliveto, Romain Robbes
Proceedings of the 20th Working Conference on Reverse Engineering
WCRE, 2013.
@proceedings{WCRE-2013, address = "Koblenz, Germany", editor = "Ralf Lämmel and Rocco Oliveto and Romain Robbes", publisher = "{IEEE}", title = "{Proceedings of the 20th Working Conference on Reverse Engineering}", year = 2013, }
Committee
Contents (60 items)
- WCRE-2013-HarmanLW #programming #reverse engineering #search-based
- Genetic programming for Reverse Engineering (MH, WBL, WW), pp. 1–10.
- WCRE-2013-MemonBNR #user interface
- The first decade of GUI ripping: Extensions, applications, and broader impacts (AMM, IB, BNN, BR), pp. 11–20.
- WCRE-2013-Lammel #industrial #reverse engineering
- Reverse Engineering in Industry (RL), p. 21.
- WCRE-2013-ChenSB #c #detection #memory management
- Who allocated my memory? Detecting custom memory allocators in C binaries (XC, AS, HB), pp. 22–31.
- WCRE-2013-HallerSB #c #c++ #data type #detection #named
- MemPick: High-level data structure detection in C/C++ binaries (IH, AS, HB), pp. 32–41.
- WCRE-2013-ClearyGVSSP #analysis #interactive #memory management #multi
- Reconstructing program memory state from multi-gigabyte instruction traces to support interactive analysis (BC, PG, EV, MADS, MS, FP), pp. 42–51.
- WCRE-2013-SmithsonEAKB #correctness #trade-off
- Static binary rewriting without supplemental information: Overcoming the tradeoff between coverage and correctness (MS, KE, KA, AK, RB), pp. 52–61.
- WCRE-2013-RaoMK #debugging #framework #incremental #library #locality #performance #retrieval
- An incremental update framework for efficient retrieval from software libraries for bug localization (SR, HM, ACK), pp. 62–71.
- WCRE-2013-XiaLWZ #debugging #developer #recommendation
- Accurate developer recommendation for bug resolution (XX, DL, XW, BZ), pp. 72–81.
- WCRE-2013-LiuTZ #debugging #question
- Has this bug been reported? (KL, HBKT, HZ), pp. 82–91.
- WCRE-2013-ThungLJ #automation
- Automatic recovery of root causes from bug-fixing changes (FT, DL, LJ), pp. 92–101.
- WCRE-2013-XingXJ #difference
- Distilling useful clones by contextual differencing (ZX, YX, SJ), pp. 102–111.
- WCRE-2013-ChatterjiCKH #case study #developer #maintenance
- Effects of cloned code on software maintainability: A replicated developer study (DC, JCC, NAK, JH), pp. 112–121.
- WCRE-2013-BaysalKHG #code review #overview #perspective
- The influence of non-technical factors on code review (OB, OK, RH, MWG), pp. 122–131.
- WCRE-2013-JiangZL #comprehension #social
- Understanding project dissemination on a social coding site (JJ, LZ, LL), pp. 132–141.
- WCRE-2013-LiXPZ #developer #how #question #what
- What help do developers seek, when and how? (HL, ZX, XP, WZ), pp. 142–151.
- WCRE-2013-SohKGA #comprehension #developer #how #maintenance #process #towards
- Towards understanding how developers spend their effort during maintenance activities (ZS, FK, YGG, GA), pp. 152–161.
- WCRE-2013-DaiMLC #component #precise #specification
- Leveraging specifications of subcomponents to mine precise specifications of composite components (ZD, XM, YL, LC), pp. 162–171.
- WCRE-2013-BernardiCL #approach #design pattern #detection #graph #modelling
- A model-driven graph-matching approach for design pattern detection (MLB, MC, GADL), pp. 172–181.
- WCRE-2013-ThungLL #automation #library #recommendation
- Automated library recommendation (FT, DL, JLL), pp. 182–191.
- WCRE-2013-TeytonFB #automation #library
- Automatic discovery of function mappings between similar libraries (CT, JRF, XB), pp. 192–201.
- WCRE-2013-TeytonFMB #library
- Find your library experts (CT, JRF, FM, XB), pp. 202–211.
- WCRE-2013-AbdeenSSAD #automation #design #towards
- Towards automatically improving package structure while respecting original design decisions (HA, HAS, OS, NA, SD), pp. 212–221.
- WCRE-2013-MaffortVBAH #architecture #heuristic
- Heuristics for discovering architectural violations (CAM, MTV, MAdSB, NA, AH), pp. 222–231.
- WCRE-2013-SalesTMV #dependence #recommendation #refactoring #set #using
- Recommending Move Method refactorings using dependency sets (VS, RT, LFM, MTV), pp. 232–241.
- WCRE-2013-YamashitaM #developer #overview #smell
- Do developers care about code smells? An exploratory survey (AFY, LM), pp. 242–251.
- WCRE-2013-DucheneRRG #black box #data flow #detection #modelling #named
- LigRE: Reverse-engineering of control and data flow models for black-box XSS detection (FD, SR, JLR, RG), pp. 252–261.
- WCRE-2013-AvanciniC #grammarware #named #testing #web
- Circe: A grammar-based oracle for testing Cross-site scripting in web applications (AA, MC), pp. 262–271.
- WCRE-2013-LeottaCRT #assessment #empirical #evolution #programmable #testing #web
- Capture-replay vs. programmable web testing: An empirical assessment during test case evolution (ML, DC, FR, PT), pp. 272–281.
- WCRE-2013-FryW #clustering #fault #maintenance #static analysis
- Clustering static analysis defect reports to reduce maintenance costs (ZPF, WW), pp. 282–291.
- WCRE-2013-DuranBS #agile
- Lehman’s laws in agile and non-agile projects (KD, GB, PS), pp. 292–300.
- WCRE-2013-WalkinshawTD #finite #modelling #state machine
- Inferring Extended Finite State Machine models from software executions (NW, RT, JD), pp. 301–310.
- WCRE-2013-BantelayZK #commit #interactive
- Comparing and combining evolutionary couplings from interactions and commits (FB, MBZ, HHK), pp. 311–320.
- WCRE-2013-NayrollesMV #detection #execution #mining
- Improving SOA antipatterns detection in Service Based Systems by mining execution traces (MN, NM, PV), pp. 321–330.
- WCRE-2013-HoraADV #mining
- Mining system specific rules from change patterns (AH, NA, SD, MTV), pp. 331–340.
- WCRE-2013-BandiWA #empirical
- Empirical evidence of code decay: A systematic mapping study (AB, BJW, EBA), pp. 341–350.
- WCRE-2013-JaafarGHK #anti #dependence #mining
- Mining the relationship between anti-patterns dependencies and fault-proneness (FJ, YGG, SH, FK), pp. 351–360.
- WCRE-2013-AliJH #co-evolution #requirements #traceability
- Leveraging historical co-change information for requirements traceability (NA, FJ, AEH), pp. 361–370.
- WCRE-2013-KomondoorBDK #domain model #modelling #using
- Using relationships for matching textual domain models with existing code (RK, IB, DD, SK), pp. 371–380.
- WCRE-2013-IshioHKO #automation #effectiveness #feature model #on the
- On the effectiveness of accuracy of automated feature location technique (TI, SH, HK, TO), pp. 381–390.
- WCRE-2013-SohKGAA #maintenance #on the
- On the effect of program exploration on maintenance tasks (ZS, FK, YGG, GA, BA), pp. 391–400.
- WCRE-2013-MontandonBFV #api #framework #lessons learnt #platform
- Documenting APIs with examples: Lessons learned with the APIMiner platform (JEM, HB, DF, MTV), pp. 401–408.
- WCRE-2013-CosentinoCABP #cobol #framework #modelling
- Extracting business rules from COBOL: A model-based framework (VC, JC, PA, PB, JP), pp. 409–416.
- WCRE-2013-AversanoMT #architecture
- Evaluating architecture stability of software projects (LA, MM, MT), pp. 417–424.
- WCRE-2013-KhadkaSJHH #challenge #legacy #lessons learnt #migration #scalability
- Migrating a large scale legacy application to SOA: Challenges and lessons learned (RK, AS, SJ, JH, GPH), pp. 425–432.
- WCRE-2013-SchoenmakersBNVS #complexity
- Assessing the complexity of upgrading software modules (BS, NvdB, IN, BV, AS), pp. 433–440.
- WCRE-2013-AeschlimannLNW #case study #ecosystem #experience #legacy #pl-i
- Analyzing PL/1 legacy ecosystems: An experience report (EA, ML, ON, CFW), pp. 441–448.
- WCRE-2013-DurfinaKZ #case study #decompiler
- PsybOt malware: A step-by-step decompilation case study (LD, JK, PZ), pp. 449–456.
- WCRE-2013-IshiharaHHK #reuse
- Reusing reused code (TI, KH, YH, SK), pp. 457–461.
- WCRE-2013-Pichler #execution #specification #symbolic computation
- Specification extraction by symbolic execution (JP), pp. 462–466.
- WCRE-2013-RahmanYR #ide
- An IDE-based context-aware meta search engine (MMR, SY, CKR), pp. 467–471.
- WCRE-2013-AntonyAC #approach #behaviour #clone detection #detection #modelling
- An approach to clone detection in behavioural models (EPA, MHA, JRC), pp. 472–476.
- WCRE-2013-ChenSB13a #c #detection #memory management #named
- MemBrush: A practical tool to detect custom memory allocators in C binaries (XC, AS, HB), pp. 477–478.
- WCRE-2013-HallerSB13a #data type #detection #named
- MemPick: A tool for data structure detection (IH, AS, HB), pp. 479–480.
- WCRE-2013-SaeidiHKJ #analysis #legacy #modelling #named #tool support
- Gelato: GEneric language tools for model-driven analysis of legacy software systems (AS, JH, RK, SJ), pp. 481–482.
- WCRE-2013-CosentinoCABP13a #cobol #modelling
- Extracting business rules from COBOL: A model-based tool (VC, JC, PA, PB, JP), pp. 483–484.
- WCRE-2013-SutiiRS #dependence #detection #enterprise #java
- Detecting dependencies in Enterprise JavaBeans with SQuAVisiT (AS, SAR, AS), pp. 485–486.
- WCRE-2013-HayashiTS #difference #java #named #refactoring
- REdiffs: Refactoring-aware difference viewer for java (SH, ST, MS), pp. 487–488.
- WCRE-2013-KrutzS #clone detection #detection #named
- CCCD: Concolic code clone detection (DEK, ES), pp. 489–490.
- WCRE-2013-BaggeZ #problem
- Workshop on open and original problems in software language engineering (AHB, VZ), pp. 493–494.
10 ×#detection
8 ×#modelling
8 ×#named
5 ×#automation
5 ×#developer
4 ×#library
4 ×#maintenance
3 ×#c
3 ×#case study
3 ×#debugging
8 ×#modelling
8 ×#named
5 ×#automation
5 ×#developer
4 ×#library
4 ×#maintenance
3 ×#c
3 ×#case study
3 ×#debugging