By Topic

Seventh IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2007)

Date Sept. 30 2007-Oct. 1 2007

Filter Results

Displaying Results 1 - 25 of 33
  • Seventh IEEE International Working Conference on Source Code Analysis and Manipulation - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (669 KB)
    Freely Available from IEEE
  • Seventh IEEE International Working Conference on Source Code Analysis and Manipulation-Title

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (119 KB)
    Freely Available from IEEE
  • Seventh IEEE International Working Conference on Source Code Analysis and Manipulation-Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (54 KB)
    Freely Available from IEEE
  • Seventh IEEE International Working Conference on Source Code Analysis and Manipulation - TOC

    Publication Year: 2007, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (81 KB)
    Freely Available from IEEE
  • Message from the Chairs

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (39 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Steering Committee

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (35 KB)
    Freely Available from IEEE
  • Program Committee

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2007, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Keynote Address: .QL for Source Code Analysis

    Publication Year: 2007, Page(s):3 - 16
    Cited by:  Papers (6)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB) | HTML iconHTML

    Many tasks in source code analysis can be viewed as evaluating queries over a relational representation of the code. Here we present an object-oriented query language, named .QL, and demonstrate its use for general navigation, bug finding and enforcing coding conventions. We then focus on the particular problem of specifying metrics as queries. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Evaluation of Slicing Algorithms for Concurrent Programs

    Publication Year: 2007, Page(s):17 - 26
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (255 KB) | HTML iconHTML

    Program slicing is a program-reduction technique for extracting statements that may influence other statements. While there exist efficient algorithms to slice sequential programs precisely, there are only two algorithms for precise slicing of concurrent interprocedural programs with recursive procedures. We implemented both algorithms for Java, applied several new optimizations and examined their... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Barrier Slicing for Remote Software Trusting

    Publication Year: 2007, Page(s):27 - 36
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (300 KB) | HTML iconHTML

    Remote trusting aims at verifying the "healthy" execution of a program running on an untrusted client that communicates with a trusted server via network connection. After giving a formal definition of the remote trusting problem and a test to determine whether an attack against a given remote trusting scheme is successful or not, we propose a protection against malicious modification of the clien... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Statement-Level Cohesion Metrics and their Visualization

    Publication Year: 2007, Page(s):37 - 48
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (295 KB) | HTML iconHTML

    Slice-based metrics for cohesion have been defined and examined for years. However, if a module with low cohesion has been identified, the metrics cannot help the maintainer to restructure the module to improve the cohesion. This work presents statement-level cohesion metrics based on slices and chops. When visualized, the statement-level cohesion metrics can show which parts of a module have a lo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Temporal Path Conditions in Dependence Graphs

    Publication Year: 2007, Page(s):49 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    Program dependence graphs are a well-established device to represent possible information flow in a program. Path conditions in dependence graphs have been proposed to express more detailed circumstances of a particular flow; they provide precise necessary conditions for information flow along a path or chop in a dependence graph. Ordinary Boolean path conditions however cannot express temporal pr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards Path-Sensitive Points-to Analysis

    Publication Year: 2007, Page(s):59 - 68
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (362 KB) | HTML iconHTML

    Points-to analysis is a static program analysis aiming at analyzing the reference structure of dynamically allocated objects at compile-time. It constitutes the basis for many analyses and optimizations in software engineering and compiler construction. Sparse program representations, such as Whole Program Points-to Graph (WPP2G) and Points-to SSA (P2SSA), represent only dataflow that is directly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Extending Attribute Grammars with Collection Attributes--Evaluation and Applications

    Publication Year: 2007, Page(s):69 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (302 KB) | HTML iconHTML

    Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-reference like properties such as callee sets, subclass sets, and sets of variable uses. We have implemented collection attributes in our declarative meta programming system JastAdd, and used them for a variety of applications including devitalization analysis, metrics, and flow analysis. We pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward an Implementation of the "Form Template Method" Refactoring

    Publication Year: 2007, Page(s):81 - 90
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (319 KB) | HTML iconHTML

    This paper presents an implementation of the "form template method" refactoring. This transformation has not been automated yet, but has many similarities with other transformations such as clone detection and removal or method extraction. Forming a template method is a difficult process because it has to deal with code statements directly. Few abstractions and algorithms have been investigated ye... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reengineering Standard Java Runtime Systems through Dynamic Bytecode Instrumentation

    Publication Year: 2007, Page(s):91 - 100
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (243 KB) | HTML iconHTML

    Java bytecode instrumentation is a widely used technique, especially for profiling purposes. In order to ensure the instrumentation of all classes in the system, including dynamically generated or downloaded code, instrumentation has to be performed at runtime. The standard JDK offers some mechanisms for dynamic instrumentation, which however either require the use of native code or impose severe ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Integrated Crosscutting Concern Migration Strategy and its Application to JHOTDRAW

    Publication Year: 2007, Page(s):101 - 110
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    In this paper we propose a systematic strategy for migrating crosscutting concerns in existing object-oriented systems to aspect-based solutions. The proposed strategy consists of four steps: mining, exploration, documentation and refactoring of crosscutting concerns. We discuss in detail a new approach to aspect refactoring that is fully integrated with our strategy, and apply the whole strategy ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fast Approximate Matching of Programs for Protecting Libre/Open Source Software by Using Spatial Indexes

    Publication Year: 2007, Page(s):111 - 122
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB) | HTML iconHTML

    To encourage open source/libre software development, it is desirable to have tools that can help to identify open source license violations. This paper describes the implementation of a tool that matches open source programs embedded inside pirate programs. The problem of binary program matching can be approximated by analyzing the similarity of program fragments generated from low-level instructi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SUDS: An Infrastructure for Creating Bug Detection Tools

    Publication Year: 2007, Page(s):123 - 132
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (334 KB) | HTML iconHTML

    SUDS is a powerful infrastructure for creating dynamic bug detection tools. It contains phases for both static analysis and dynamic instrumentation allowing users to create tools that take advantage of both paradigms. The results of static analysis phases can be used to improve the quality of dynamic bug detection tools created with SUDS and could be expanded to find defects statically. The instru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Finding Inputs that Reach a Target Expression

    Publication Year: 2007, Page(s):133 - 142
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB) | HTML iconHTML

    We present an automated program analysis, called Reach, to compute program inputs that cause evaluation of explicitly-marked target expressions. Reach has a range of applications including property refutation, assertion breaking, program crashing, program covering, program understanding, and the development of customised data generators. Reach is based on lazy narrowing, a symbolic evaluation stra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Static Resolution of Dynamic Class Loading in Java

    Publication Year: 2007, Page(s):143 - 154
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (235 KB) | HTML iconHTML

    Modern applications are becoming increasingly more dynamic and flexible. In Java software, one important flexibility mechanism is dynamic class loading. Unfortunately, the vast majority of static analyses for Java handle this feature either unsoundly or overly conservatively. We present a set of techniques for static resolution of dynamic-class-loading sites in Java software. Previous work has use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SQuAVisiT: A Software Quality Assessment and Visualisation Toolset

    Publication Year: 2007, Page(s):155 - 156
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (571 KB) | HTML iconHTML

    Software quality assessment of large COBOL industrial legacy systems, both for maintenance or migration purposes, mounts a serious challenge. We present the software quality assessment and visualisation toolset (SQuAVisiT), which assists users in performing the above task. First, it allows a fully automatic extraction of metrics, call information, and code duplication from COBOL source code. This ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DATES: Design Analysis Tool for Enterprise Systems

    Publication Year: 2007, Page(s):157 - 158
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (397 KB) | HTML iconHTML

    In the current demonstration we present a new tool which increases the level of understanding and the accuracy of design quality assessment within enterprise systems. This is performed by providing its users with information specific to this type of systems (e.g., accessed tables from a class). In order to validate its usefulness, we perform some experiments on a suite of enterprise systems whose ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.