Static Analysis

Automated Detection of Client-State Manipulation Vulnerabilities

Author(s): Anders Møller, Mathias Schwarz
Venue: Transactions on Software Engineering and Methodology
Date: August 2014

5
Quality

Local versus Global Lessons for Defect Prediction and Effort Estimation

Author(s): Tim Menzies, Andrew Butcher, David Cok, Andrian Marcus, Lucas Layman, Forrest Shull, Burak Turhan, Thomas Zimmermann
Venue: Transactions on Software Engineering
Date: 2013

5
Quality

It’s not a Bug, it’s a Feature: How Misclassification Impacts Bug Prediction

Author(s): Kim Herzig, Sascha Just, Andreas Zeller
Venue: International Conference on Software Engineering
Date: 2013

5
Quality

How We Refactor, and How We Know It

Author(s): Emerson Murphy-Hill, Chris Parnin, and Andrew P. Black
Venue: IEEE transactions on software engineering
Date: 2012

4
Quality

What developers want and need from program analysis: An empirical study

Author(s): Maria Christakis, Christian Bird
Venue: Automated Software Engineering (ASE), 2016 31st IEEE/ACM International Conference
Date: 06 October 2016

4
Quality

Tricorder: building a program analysis ecosystem

Author(s): C. Sadowski, J. van Gogh, C. Jaspan, E. Soderberg, C. Winter
Venue: International Conference on Software Engineering
Date: 2015

4
Quality

AppHolmes: Detecting and Characterizing App Collusion among Third-Party Android Markets

Author(s): Mengwei Xu, Yun Ma, Xuanzhe Liu, Felix Xiaozhu Lin, Yunxin Liu
Venue: International Conference on World Wide Web
Date: April 2017

4
Quality

Automated Bug Neighborhood Analysis for Identifying Incomplete Bug Fixes

Author(s): Mijung Kim, Saurabh Sinha, Carsten G¨org, Hina Shah, Mary Jean Harrold, and Mangala Gowri Nanda
Venue: 2010 Third International Conference on Software Testing, Verification and Validation
Date: 2010

4
Quality

Extending static analysis by mining project-specific rules

Author(s): Boya Sun, Gang Shu, Andy Podgurski, Brain Robinson
Venue: International Conference on Software Engineering
Date: 2012

4
Quality

Statically Detecting Likely Buffer Overflow Vulnerabilities

Author(s): David Larochelle, David Evans
Venue: USENIX Security Symposium
Date: 2001

3
Quality