Accepted Papers

A list of accepted papers, together with their full text (based on the permission of authors) and pointers to the authors home page (where available) will be posted here. This information is provided to maximize the chances for useful interactions at the working conference. (Incidentally, there is no significance in the order in which these papers appear on this page.)

     Program Analysis I

  1. Some Assembly Required - Program Analysis of Embedded System Code
    Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seefried
  2. User-Input Dependence Analysis via Graph Reachability
    Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes
  3. TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor’s Behaviors
    Katsuhiko Gondow, Hayato Kawashima, Takashi Imaizumi

    Empirical Study I

  4. An Empirical Study of Function Overloading in C++
    Cheng Wang, Daqing Hou
  5. Is Cloned Code More Stable than Non-Cloned Code?
    Jens Krinke
  6. Exploiting the Correspondence between Micro Patterns and Class Names
    Jeremy Singer, Chris Kirkham

    Program Analysis II

  7. On the Use of Data Flow Analysis in Static Profiling
    Cathal Boogerd, Leon Moonen
  8. The Semantics of Abstract Program Slicing
    Damiano Zanardini

    Empirical Study II

  9. The Evolution and Decay of Statically Detected Source Code Vulnerabilities
    Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano
  10. From Indentation Shapes to Code Structure
    Abram Hindle, Michael Godfrey, Richard C. Holt
  11. Evaluating Key Statements Analysis
    Dave Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi

    Pointer Analysis

  12. Fast and Precise Points-to Analysis
    Jonas Lundberg, Tobias Gutzmann, and Welf Löwe
  13. Aspect-Aware Points-to Analysis
    Qiang Sun, Jianjun Zhao
  14. Automatic Generation of Pointer-Cognizant Data-Flow Analysis Implementations
    Andrew Stone, Michelle Strout, Shweta Behere

    Defect Detection

  15. Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking
    Lei Wang, Qiang Zhang, PengChao Zhao
  16. Analysis and Transformations for Efficient Query-Based Debugging
    Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu
  17. Determining the Impact of Prior Code Changes
    Daniel M. German, Gregorio Robles, Ahmed E. Hassan

    Reengineering

  18. Using Program Transformations to Add Structure to a Legacy Data Model
    Mariano Ceccato, Thomas Dean, Paolo Tonella
  19. Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering
    Petru Florin Mihancea
  20. Extraction of XML services from JSP Web Pages
    Jason Chu, Thomas Dean

    Code Manipulation

  21. Beyond Annotations: A Proposal for Extensible Java (XJ)
    Tony Clark, Paul Sammut, James Willans
  22. Modular Decompilation of Low-Level Code by Partial Evaluation
    Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla
  23. Constructing Subtle Faults Using Higher Order Mutation Testing
    Yue Jia, Mark Harman

    Tool Demonstrations

  24. Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software
    Raffi Khatchadourian, Awais Rashid
  25. Parfait - A Scalable Bug Checker for C Code
    Cristina Cifuentes
  26. CoordInspector: A Tool for Extracting Coordination Data from Legacy Code
    Nuno F. Rodrigues, Luis S. Barbosa
  27. Precise Analysis of Java Programs using JOANA
    Dennis Giffhorn, Christian Hammer
  28. DTS - A Software Defects Testing System
    Yang Zhao Hong, Gong Yun Zhan, Xiao Qing, Wang Ya Wen