Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SCAM
SCAM 2022
Generate Citations
2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM)
Oct. 3 2022 to Oct. 3 2022
Limassol, Cyprus
ISBN: 978-1-6654-9609-4
Table of Contents
Title Page I
Freely available from IEEE.
pp. 1-1
Title Page III
Freely available from IEEE.
pp. 1-1
Copyright
Freely available from IEEE.
pp. 1-1
Table of Contents
Freely available from IEEE.
pp. v-viii
Message from the General Chair and Program Co-Chairs SCAM 2022
Freely available from IEEE.
pp. ix-x
by
Mariano Ceccato
,
Banani Roy
,
Mohammad Ghafari
Pruning Boolean Expressions to Shorten Dynamic Slices
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-11
by
Thomas Hirsch
,
Birgit Hofer
Benchmark Fuzzing for Android Taint Analyses
Full-text access may be available. Sign in or learn about subscription options.
pp. 12-23
by
Stefan Schott
,
Felix Pauck
Plug and Analyze: Usable Dynamic Taint Tracker for Android Apps
Full-text access may be available. Sign in or learn about subscription options.
pp. 24-34
by
Hiroki Inayoshi
,
Shohei Kakei
,
Shoichi Saito
Test Transplantation through Dynamic Test Slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 35-39
by
Mehrdad Abdi
,
Serge Demeyer
Assessing the Impact of Execution Environment on Observation-Based Slicing
Full-text access may be available. Sign in or learn about subscription options.
pp. 40-44
by
David Binkley
,
Leon Moonen
Semi-Automatic Refactoring to C++20 Modules: A Semi-Success Story
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-55
by
Richárd Szalay
,
Zoltán Porkoláb
Revisiting the Impact of Anti-patterns on Fault-Proneness: A Differentiated Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 56-65
by
Aurel Ikama
,
Vincent Du
,
Philippe Belias
,
Biruk Asmare Muse
,
Foutse Khomh
,
Mohammad Hamdaqa
A preliminary evaluation on the relationship among architectural and test smells
Full-text access may be available. Sign in or learn about subscription options.
pp. 66-70
by
Manuel De Stefano
,
Fabiano Pecorelli
,
Dario Di Nucci
,
Andrea De Lucia
An Empirical Study of Code Smells in Transformer-based Code Generation Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 71-82
by
Mohammed Latif Siddiq
,
Shafayat H. Majumder
,
Maisha R. Mim
,
Sourov Jajodia
,
Joanna C. S. Santos
N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing
Full-text access may be available. Sign in or learn about subscription options.
pp. 83-93
by
Riley VanDonge
,
Naser Ezzati-Jivan
Checking Refactoring Detection Results Using Code Changes Encoding for Improved Accuracy
Full-text access may be available. Sign in or learn about subscription options.
pp. 94-104
by
Liang Tan
,
Christoph Bockisch
Removing dependencies from large software projects: are you really sure?
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-115
by
Ching-Chi Chuang
,
Luís Cruz
,
Robbert van Dalen
,
Vladimir Mikovski
,
Arie van Deursen
Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERT
Full-text access may be available. Sign in or learn about subscription options.
pp. 116-120
by
Anushka Bhave
,
Roopak Sinha
Mining for Framework Instantiation Pattern Interplays
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-131
by
Yunior Pacheco
,
Ahmed Zerouali
,
Coen De Roover
Multi-Modal Code Summarization with Retrieved Summary
Full-text access may be available. Sign in or learn about subscription options.
pp. 132-142
by
Lile Lin
,
Zhiqiu Huang
,
Yaoshen Yu
,
Yapeng Liu
CodeCV: Mining Expertise of GitHub Users from Coding Activities
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-147
by
Daniel Atzberger
,
Nico Scordialo
,
Tim Cech
,
Willy Scheibel
,
Matthias Trapp
,
Jürgen Döllner
Towards the Detection of Hidden Familial Type Correlations in Java Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-152
by
Alin-Petru Roşu
,
Petru-Florin Mihancea
The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-163
by
Boladji Vinny Adjibi
,
Fatou Ndiaye Mbodji
,
Tegawendé F. Bissyandé
,
Kevin Allix
,
Jacques Klein
Don't DIY: Automatically transform legacy Python code to support structural pattern matching
Full-text access may be available. Sign in or learn about subscription options.
pp. 164-169
by
Balázs Rózsa
,
Gábor Antal
,
Rudolf Ferenc
Building LLVM and GCC, with Amake
Full-text access may be available. Sign in or learn about subscription options.
pp. 170-175
by
Jim Buffenbarger
On the Usage of Programming Languages in the iOS Ecosystem
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-180
by
Daniel Domínguez-Álvarez
,
Alessandra Gorla
,
Juan Caballero
Deriving Modernity Signatures for PHP Systems with Static Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-185
by
Wouter Van den Brink
,
Marcus Gerhold
,
Vadim Zaytsev
Summary-Based Compositional Analysis for Soft Contract Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 186-196
by
Bram Vandenbogaerde
,
Quentin Stiévenart
,
Coen De Roover
Classification and Ranking of Delta Static Analysis Alarms
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-207
by
Tukaram Muske
,
Alexander Serebrenik
Lint-Based Warnings in Python Code: Frequency, Awareness and Refactoring
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-218
by
Naelson Oliveira
,
Márcio Ribeiro
,
Rodrigo Bonifácio
,
Rohit Gheyi
,
Igor Wiese
,
Baldoino Fonseca
An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms
Full-text access may be available. Sign in or learn about subscription options.
pp. 219-229
by
Niloofar Mansoor
,
Tukaram Muske
,
Alexander Serebrenik
,
Bonita Sharif
To what extent can we analyze Kotlin programs using existing Java taint analysis tools?
Full-text access may be available. Sign in or learn about subscription options.
pp. 230-235
by
Ranjith Krishnamurthy
,
Goran Piskachev
,
Eric Bodden
JFeature: Know Your Corpus
Freely available from IEEE.
pp. 236-241
by
Idriss Riouak
,
Görel Hedin
,
Christoph Reichenbach
,
Niklas Fors
An End-to-End Framework for Repairing Potentially Vulnerable Source Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-247
by
Judit Jász
,
Péter Hegedűs
,
Ákos Milánkovich
,
Rudolf Ferenc
First Steps towards a Methodology for Unified Graph's Discrepancy Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 248-252
by
Gergő Balogh
,
István Baráth
Improving Weighted-SBFL by Blocking Spectrum
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-263
by
Haruka Yoshioka
,
Yoshiki Higo
,
Shinji Kusumoto
Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network Dependencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 264-275
by
Jens Dietrich
,
Shawn Rasheed
,
Amjed Tahir
Experimental Evaluation of A New Ranking Formula for Spectrum based Fault Localization
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-280
by
Qusay Idrees Sarhan
,
Árpád Beszédes
Author Index
Freely available from IEEE.
pp. 281-282
Showing 39 out of 39