The aim of the International Working Conference on Source Code Analysis & Manipulation (SCAM) is to bring together researchers and practitioners working on theory, techniques and applications which concern analysis and/or manipulation of the source code of computer systems. While much attention in the wider software engineering community is properly directed towards other aspects of systems development and evolution, such as specification, design and requirements engineering, it is the source code that contains the only precise description of the behaviour of the system. The analysis and manipulation of source code thus remains a pressing concern.
Please check back later for updates, and follow us on Twitter to keep informed.
Session Chair: David Lo
|Matthieu Jimenez, Mike Papadakis and Yves Le Traon.||Vulnerability Prediction Models: A case study on the Linux Kernel|
|Alessio Viticchie, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella and Roberto Tiella.||Assessment of Source Code Obfuscation Techniques|
|Marco di Biase, Magiel Bruntink and Alberto Bacchelli.||A security perspective on code review: The case of Chromium|
Session Chair: Leon Moonen
|Xueliang Li and John P. Gallagher.||A Source-level Energy Optimization Framework for Mobile Applications|
|Maurício Aniche, Christoph Treude, Andy Zaidman, Arie van Deursen and Marco Gerosa.||SATT: Tailoring Code Metric Thresholds for Different Software Architectures|
|Andrea D'Souza, Di Yang and Cristina Lopes.||Collective Intelligence for Smarter API Recommendations in Python|
|Jiang Ming, Dinghao Wu.||BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling|
|Allan Blanchard, Nikolai Kosmatov, Matthieu Lemerre, Frederic Loulergue.||CONC2SEQ : A FRAMA-C Plugin for Verification of Parallel Compositions of C Programs|
|Tushar Sharma, Girish Suryanarayana.||Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact Analysis|
|Benjamin Holland, Ganesh Ram Santhanam, Payas Awadhutkar, Suraj Kothari.||Statically-informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities|
|Quentin Stiévenart, Maarten Vandercammen, Wolfgang De Meuter, Coen De Roover.||SCALA-AM: A Modular Static Analysis Framework|
|Jochen Quante.||A Generic Program Interpreter for Arbitrary Abstractions|
Session Chair: Árpád Beszédes
|Vincenzo Musco, Martin Monperrus and Philippe Preux.||Mutation-Based Graph Inference for Fault Localization|
|Adriano de Paula, Eduardo Guerra, Hitesh Sajnani, Cristina Lopes and Otavio Lemos.||An Exploratory Study of Interface Redundancy in Code Repositories|
|Chaiyong Ragkhitwetsagul, Jens Krinke and David Clark.||Similarity of Source Code in the Presence of Pervasive Modifications|
Session Chair: Mariano Ceccato
|Min Gao, Lei He, Rupak Majumdar and Zilong Wang.||llsplat: Improving Concolic Testing by Bounded Model Checking|
|Gergő Balogh, Tamás Gergely, Árpád Beszédes and Tibor Gyimóthy.||Are My Unit Tests in the Right Package?|
|Marinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis and Nicos Malevris.||Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study|
Session Chair: Andrea Mocci
|Tukaram Muske and Alexander Serebrenik.||Survey of Approaches for Handling Static Analysis Alarms|
|Nelson Lossing, Pierre Guillou and Francois Irigoin.||Effects Dependence Graph: A Key Data Concept for C Source-to-Source Compilers|
|Gábor Antal, Dávid Havas, István Siket, Árpád Beszédes, Rudolf Ferenc and József Mihalicza.||Transforming C++11 Code to C++03 to Support Legacy Compilation Environments|
Session Chair: Alexander Serebrenik
|Dave Binkley and Dawn Lawrie.||A Case for Software Specific Natural Language Techniques|
|Stefan Fischer, Lukas Linsbauer, Roberto Erick Lopez-Herrejon and Alexander Egyed.||A Source Level Empirical Study of Features and Their Interactions in Variable Software|
|Leon Moonen, Stefano Di Alesio, Thomas Rolfsnes and Dave Binkley.||Exploring the Effects of History Length and Age on Mining Software Change Impact|
The 17th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2017) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term "source code" refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term "analysis" refers to any (semi-)automated procedure that yields insight into source code, while "manipulation" refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2017 solicits high quality paper submissions.
We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:
SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop. Papers must not exceed 10 pages including all text, references, appendices and figures and must conform to the IEEE proceedings paper format guidelines and must be clearly marked as a research paper. Templates in Latex and Word are available on IEEE's website. All submissions must be in English.
The papers should be submitted electronically in PDF format via EasyChair at https://easychair.org/conferences/?conf=scam2017. submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must attend the conference and present the paper.
SCAM 2017 also features an engineering paper track for papers that report on the design and implementation of tools for source code analysis and manipulation.
In addition to the research track (see separate CFP), the 17th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2017) will also feature an Engineering Track. This track welcomes six-page papers that report on the design and implementation of tools for source code analysis and manipulation, as well as libraries, infrastructure, and the real world studies enabled by these advances. To be clear, this is not the addition of a new track to SCAM, which will remain a two track conference, but a significant expansion to the scope of the tools track of previous SCAMs.
What artefacts qualify as “engineering track” material?
A successful SCAM engineering track paper should:
Optionally (and encouraged):
Note that the submission length has a limit of six pages, compared to the two to four pages of traditional tool demo papers. This gives authors enough space to discuss artefact motivation, design, and use cases in much more detail. For example, a use case would be well illustrated by a demo scenario with screenshots. The papers should be submitted electronically via the conference web site.
Each submission will be reviewed by at least three members of the engineering track program committee. Authors of accepted papers will be required to present their artefacts at the conference. All accepted engineering track papers will be published in the conference proceedings. The key criterion for acceptance is that the paper should (a) follow the above mentioned guidelines and (b) make an original contribution that can benefit practitioners in the field now and/or others designing and building artefacts for source code analysis and manipulation. The artefacts can be in an early research prototype or a polished product ready for deployment. Papers about commercial products are allowed, as long as the guidelines described above are followed.
Videos and other demo material may be taken into account by reviewers as they review the paper. However, such material will not become part of the permanent record of the conference, so the paper should be self contained. In order to preserve the anonymity of the reviewers, such material should be hosted on an anonymous public source (e.g., youtube), or made available in such a way that the tools chair can download them once and redistribute them to reviewers.
All accepted papers will appear in the proceedings which will be published by the IEEE Computer Society Press.
Six pages IEEE format and can be submitted via EasyChair. Please use the IEEE templates in preparing your manuscripts:
Shanghai is a large, modern, and vibrant city and is considered a center of innovation. It has population greater than 24 million. Shanghai is situated in the Yangtze River delta next to the East China Sea.
As one of the largest cities in Asia, Shanghai has rich cultural relics. You can not only experience a modern trip including the Bund, Xintiandi, the Oriental Pearl TV Tower and World Financial Center, but also explore an ancient journey by visiting the Yuyuan Garden, Jade Buddha Temple and Zhujiajiao Ancient Town. Nearby Suzhou and Hangzhou, you can easily visit some ancient water towns in Jiangsu and Zhejiang Provinces from Shanghai (a detailed travel guide can be found here).
SCAM'17 will take place at the presteigous Fudan University. Fudan University is ranked as one of the top universities in the world. It has a high-level research faculty of over 2,600 full-time teachers and researchers, including 1,350 professors and associate professors.