Machine learning techniques for code smells detection: a systematic mapping study

FL Caram, BRDO Rodrigues… - … Journal of Software …, 2019 - World Scientific
Code smells or bad smells are an accepted approach to identify design flaws in the source
code. Although it has been explored by researchers, the interpretation of programmers is …

TaintBench: Automatic real-world malware benchmarking of Android taint analyses

L Luo, F Pauck, G Piskachev, M Benz… - Empirical Software …, 2022 - Springer
Due to the lack of established real-world benchmark suites for static taint analyses of
Android applications, evaluations of these analyses are often restricted and hard to …

Addressing problems with replicability and validity of repository mining studies through a smart data platform

F Trautsch, S Herbold, P Makedonski… - Empirical Software …, 2018 - Springer
The usage of empirical methods has grown common in software engineering. This trend
spawned hundreds of publications, whose results are helping to understand and improve …

Call graph construction for java libraries

M Reif, M Eichberg, B Hermann, J Lerch… - Proceedings of the 2016 …, 2016 - dl.acm.org
Today, every application uses software libraries. Yet, while a lot of research exists wrt
analyzing applications, research that targets the analysis of libraries independent of any …

Lossless, persisted summarization of static callgraph, points-to and data-flow analysis

PD Schubert, B Hermann… - 35th European Conference …, 2021 - drops.dagstuhl.de
Static analysis is used to automatically detect bugs and security breaches, and aids compiler
optimization. Whole-program analysis (WPA) can yield high precision, however causes long …

A qualitative analysis of android taint-analysis results

L Luo, E Bodden, J Späth - 2019 34th IEEE/ACM International …, 2019 - ieeexplore.ieee.org
In the past, researchers have developed a number of popular taint-analysis approaches,
particularly in the context of Android applications. Numerous studies have shown that …

Is static analysis able to identify unnecessary source code?

R Haas, R Niedermayr, T Roehm, S Apel - ACM Transactions on …, 2020 - dl.acm.org
Grown software systems often contain code that is not necessary anymore. Such
unnecessary code wastes resources during development and maintenance, for example …

Systematic evaluation of the unsoundness of call graph construction algorithms for java

M Reif, F Kübler, M Eichberg, M Mezini - Companion Proceedings for the …, 2018 - dl.acm.org
Call graphs are at the core of many static analyses ranging from the detection of unused
methods to advanced control-and data-flow analyses. Therefore, a comprehensive …

Hermes: assessment and creation of effective test corpora

M Reif, M Eichberg, B Hermann, M Mezini - … Workshop on State Of the Art …, 2017 - dl.acm.org
An integral part of developing a new analysis is to validate the correctness of its
implementation and to demonstrate its usefulness when applied to real-world code. As a …

Toward an automated benchmark management system

LNQ Do, M Eichberg, E Bodden - Proceedings of the 5th ACM SIGPLAN …, 2016 - dl.acm.org
The systematic evaluation of program analyses as well as software-engineering tools
requires benchmark suites that are representative of real-world projects in the domains for …