Default Cover Image

2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM)

Oct. 3 2022 to Oct. 3 2022

Limassol, Cyprus

ISBN: 978-1-6654-9609-4

Table of Contents

Title Page IFreely available from IEEE.pp. 1-1
Title Page IIIFreely available from IEEE.pp. 1-1
CopyrightFreely available from IEEE.pp. 1-1
Table of ContentsFreely available from IEEE.pp. v-viii
Pruning Boolean Expressions to Shorten Dynamic SlicesFull-text access may be available. Sign in or learn about subscription options.pp. 1-11
Benchmark Fuzzing for Android Taint AnalysesFull-text access may be available. Sign in or learn about subscription options.pp. 12-23
Plug and Analyze: Usable Dynamic Taint Tracker for Android AppsFull-text access may be available. Sign in or learn about subscription options.pp. 24-34
Test Transplantation through Dynamic Test SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 35-39
Assessing the Impact of Execution Environment on Observation-Based SlicingFull-text access may be available. Sign in or learn about subscription options.pp. 40-44
Semi-Automatic Refactoring to C++20 Modules: A Semi-Success StoryFull-text access may be available. Sign in or learn about subscription options.pp. 45-55
A preliminary evaluation on the relationship among architectural and test smellsFull-text access may be available. Sign in or learn about subscription options.pp. 66-70
N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution TracingFull-text access may be available. Sign in or learn about subscription options.pp. 83-93
Checking Refactoring Detection Results Using Code Changes Encoding for Improved AccuracyFull-text access may be available. Sign in or learn about subscription options.pp. 94-104
Removing dependencies from large software projects: are you really sure?Full-text access may be available. Sign in or learn about subscription options.pp. 105-115
Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERTFull-text access may be available. Sign in or learn about subscription options.pp. 116-120
Mining for Framework Instantiation Pattern InterplaysFull-text access may be available. Sign in or learn about subscription options.pp. 121-131
Multi-Modal Code Summarization with Retrieved SummaryFull-text access may be available. Sign in or learn about subscription options.pp. 132-142
CodeCV: Mining Expertise of GitHub Users from Coding ActivitiesFull-text access may be available. Sign in or learn about subscription options.pp. 143-147
Towards the Detection of Hidden Familial Type Correlations in Java CodeFull-text access may be available. Sign in or learn about subscription options.pp. 148-152
Don't DIY: Automatically transform legacy Python code to support structural pattern matchingFull-text access may be available. Sign in or learn about subscription options.pp. 164-169
Building LLVM and GCC, with AmakeFull-text access may be available. Sign in or learn about subscription options.pp. 170-175
On the Usage of Programming Languages in the iOS EcosystemFull-text access may be available. Sign in or learn about subscription options.pp. 176-180
Deriving Modernity Signatures for PHP Systems with Static AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 181-185
Summary-Based Compositional Analysis for Soft Contract VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 186-196
Classification and Ranking of Delta Static Analysis AlarmsFull-text access may be available. Sign in or learn about subscription options.pp. 197-207
An Empirical Assessment on Merging and Repositioning of Static Analysis AlarmsFull-text access may be available. Sign in or learn about subscription options.pp. 219-229
To what extent can we analyze Kotlin programs using existing Java taint analysis tools?Full-text access may be available. Sign in or learn about subscription options.pp. 230-235
An End-to-End Framework for Repairing Potentially Vulnerable Source CodeFull-text access may be available. Sign in or learn about subscription options.pp. 242-247
First Steps towards a Methodology for Unified Graph's Discrepancy AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 248-252
Improving Weighted-SBFL by Blocking SpectrumFull-text access may be available. Sign in or learn about subscription options.pp. 253-263
Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network DependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 264-275
Experimental Evaluation of A New Ranking Formula for Spectrum based Fault LocalizationFull-text access may be available. Sign in or learn about subscription options.pp. 276-280
Author IndexFreely available from IEEE.pp. 281-282
Showing 39 out of 39