Welcome to SCAM'22!

SCAM 2022 will be held in Limassol, Cyprus, co-located with ICSME 2022.

The aim of the International Working Conference on Source Code Analysis & Manipulation (SCAM) is to bring together researchers and practitioners working on theory, techniques and applications which concern analysis and/or manipulation of the source code of computer systems. While much attention in the wider software engineering community is properly directed towards other aspects of systems development and evolution, such as specification, design and requirements engineering, it is the source code that contains the only precise description of the behaviour of the system. The analysis and manipulation of source code thus remains a pressing concern.

Definition of ‘Source Code’

For the purpose of clarity ‘source code’ is taken to mean any fully executable description of a software system. It is therefore so-construed as to include machine code, very high level languages and executable graphical representations of systems. The term ‘analysis’ is taken to mean any automated or semi automated procedure which takes source code and yields insight into its meaning. The term ‘manipulation’ is taken to mean any automated or semi-automated procedure which takes and returns source code.

How to Submit to SCAM 2022

There are several tracks in the SCAM 2022 program. This page contains an overview for those tracks, and additional information required to submit. Each track has its own submission page and deadlines. Please consult the specific page of the track for all the relevant details.

The below table contains an overview of the tracks and links to their pages:

Track nameDeadlinesPage limitCall for paper
ResearchAbstract: June 17, 2022
Paper: June 23, 2022
12
EngineeringAbstract: July 1, 2022
Abstract + Paper: July 8, 2022
6
Replication and Negative Results (RENE)Abstract: July 1, 2022
Paper: July 8, 2022
12
New Ideas and Emerging Results (NIER)Abstract: July 1, 2022
Paper: July 8, 2022
5

Submission Guidelines

Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop.

Papers must not exceed 12 pages (the last 2 pages can be used for references only) and must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE's website. All submissions must be in English and should be submitted electronically in PDF format using EasyChair: https://easychair.org/conferences/?conf=icsme2022 (for this edition, all SCAM tracks are managed in EasyChair as tracks within ICSME).

All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.

Double-blind Review

We follow a double-blind reviewing process, and every submission must adhere to the following rules:

  • Author names and affiliations must be omitted. (The track co-chairs will check compliance before reviewing begins
  • References to authors' own related work must be in the third person. (For example, not "We build on our previous work..." but rather "We build on the work of...")

If the program chairs find that authors did not respect the rules of double-blind review they can decide to (desk) reject the paper.

Artifact Evaluation

This year, likewise past year, ICSME, SCAM, and VISSOFT have joined forces and present a single Artifact Evaluation Track for all three venues. Authors of (short and long) papers accepted in the SCAM 2022 are invited to submit their artifacts for evaluation to the ICSME 2022 Joint Artifact Evaluation Track.

Proceedings

All accepted papers, presented at the conference, will appear in the proceedings which will be available through the IEEE Digital Library.

Special Issue

Extended versions of papers accepted at one of the SCAM 2022 tracks will be invited for submission in Journal of Software: Evolution and Process, Wiley.

Call for Research Track Papers

The 22nd IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2022) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term "source code" refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term "analysis" refers to any (semi-)automated procedure that yields insight into source code, while "manipulation" refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Hence, the analysis and manipulation of source code remains a pressing concern for which SCAM 2022 solicits high quality paper submissions.

Covered Topics and Paper Formats

We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

  • abstract interpretation
  • bad smell detection
  • bug location and prediction
  • clone detection
  • concern, concept, and feature localization and mining
  • decompilation
  • energy efficient source code
  • natural language analysis of source code artifacts
  • program comprehension
  • program slicing
  • program transformation and refactoring
  • repository, revision, and change analysis
  • security vulnerability analysis
  • source level metrics
  • source level optimization
  • source-level testing and verification
  • static and dynamic analysis

SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop.

Papers must not exceed 12 pages (the last 2 pages can be used for references only) and must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE's website. All submissions must be in English and should be submitted electronically in PDF format. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must register for the conference and present the paper. All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.

Double-blind Review

We follow a double-blind reviewing process. Submitted papers must adhere to the following rules:

  • Author names and affiliations must be omitted. (The track co-chairs will check compliance before reviewing begins.)
  • References to authors' own related work must be in the third person. (For example, not "We build on our previous work..." but rather "We build on the work of...")

If the program chairs find that authors did not respect the rules of double-blind review they can decide to (desk) reject the paper.

Artifact Evaluation

This year, likewise past year, ICSME, SCAM, and VISSOFT have joined forces and present a single Artifact Evaluation Track for all three venues. Authors of (short and long) papers accepted in the SCAM 2022 are invited to submit their artifacts for evaluation to the ICSME 2022 Joint Artifact Evaluation Track.

Proceedings

All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library.

Special Issue

Extended versions of papers accepted at one of the SCAM 2022 tracks will be invited for submission in Journal of Software: Evolution and Process, Wiley.

Important Dates for Research Papers

All submission dates are at 23:59 AoE (Anywhere on Earth, UTC-12).

Abstract Submission: June 17th, 2022
Paper Submission: June 23th, 2022
Author Notification: July 25th, 2022
Camera Ready: August 1st, 2022

Call for Engineering Track Papers

The Engineering Track in the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM) looks for papers that discuss innovations and solutions to practical problems that researchers and practitioners face in source code analysis and manipulation of software systems. With the research advancements in source code analysis during the past decades, the industry has adopted many of the research ideas and built tools and techniques to solve real-world problems in daily jobs of software engineers. The Engineering Track provides an opportunity to discuss these important and often overlooked ideas and achievements so that software engineers and researchers can use them to improve their engineering development and produce high-quality software. This track aims at bringing researchers and software engineers to communicate and share their insights and collaborate on tools, libraries, and infrastructure for source code analysis.

This track welcomes six-page papers that report on the design and implementation of tools for source code analysis and manipulation, as well as libraries, infrastructure, and real-world studies. The papers are expected to discuss engineering work artifacts that have NOT been published before as the main contribution. We encourage submissions that accompany papers in the Research Track.

What artifacts qualify as Engineering Track material?

  • Tools: Software or hardware that facilitate source code analysis.
  • Libraries: Reusable APIs and frameworks.
  • Infrastructure: Projects that provide/facilitate access to data for reproducibility.
  • Data: Reusable datasets for other researchers to reproduce the results.
  • Real-world Studies: Studies that focus on how tools, libraries, infrastructure and data enable research.
  • Engineering challenges: Identifying engineering challenges that remain unresolved and have impact on research in source-code analysis.
Topics of interest include, but are not limited to:
  • Program transformation, refactoring, analysis, optimisation and measurement.
  • Mining repositories, revisions and changes.
  • Bad smell detection, clone management, and program comprehension.
  • Concern, concept and feature localization and mining.
  • Source-level testing, verification, bug detection and prediction, security vulnerability analysis.
  • Natural language analysis of source code artifacts.

The submission length has a limit of 6 pages, with the expectation that authors use the space to discuss artifact motivation, design, and use cases in detail.

Each submission will be reviewed by members of the Engineering Track program committee. Authors of accepted papers will be required to present their contributions at the conference. All accepted Engineering Track papers will be published in the conference proceedings. The key criterion for acceptance is that the paper should (a) follow the above mentioned guidelines and (b) make an original contribution that can benefit practitioners in the field now and/or others designing and building artifacts for source code analysis and manipulation. The artifacts can range from an early research prototype to a polished deployed product. Papers about commercial products are welcome, as long as the guidelines described above are followed.

Videos and other demo material may be taken into account by reviewers as they review the paper, but the paper should be self contained. In order to preserve the anonymity of the reviewers, such material should be hosted on an anonymous public source, or made available in such a way that the track chairs can download them once and redistribute them to reviewers.

Submission Instructions

Before submitting please follow the guidelines in How to Submit. The submissions must follow the rules of the double-blind reviewing process. Additionally, submissions must be original in the sense that the findings and writing have not been previously published or under consideration elsewhere. Papers must not exceed 6 pages, including figures, tables, appendices, and references. The paper must be marked as a SCAM Engineering track paper. The papers should be submitted electronically in PDF format via EasyChair. At least three program committee members will review each submission, judging its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must attend the conference and present the paper.

Proceedings

All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library. Follow the general SCAM instructions on How to Submit. Additionally, as in the previous year, ICSME, SCAM, and VISSOFT have joined forces and present a single Artifact Evaluation Track for all three venues. Authors of (short and long) papers accepted in the ICSME, SCAM, or VISSOFT 2022 Tracks are invited to submit their artifacts for evaluation to the ICSME 2022 Joint Artifact Evaluation Track.

Important Dates

All submission dates are at 23:59 AoE (Anywhere on Earth, UTC-12).

Abstract Submission: July 1st, 2022 Early abstract submission no longer required
Paper Submission: July 8th, 2022
Author Notification: July 26th, 2022
Camera Ready: August 2nd, 2022

Track co-chairs

Olga Baysal (Carleton University, Canada) – olga.baysal@carleton.ca
Sandro Schulze (University of Potsdam, Germany) – sanschul@iti.cs.uni-magdeburg.de

Call for Replication and Negative Results Papers

The 22nd IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM) will be hosting a Replication and Negative Result (RENE) track once again in 2022. This track provides a venue for researchers to submit papers reporting (1) replications of previous empirical studies (including controlled experiments, case studies, and surveys) and (2) important and relevant negative or null results (i.e., results that failed to show an effect, but help to eliminate useless hypotheses, therefore reorienting researchers on more promising research paths) related to source code analysis and manipulation (see list of topics in Technical Research Track).

Replications studies: The papers in this category must go beyond simply re-implementing an algorithm and/or re-running the artifacts provided by the original paper. Such submissions should apply the approach on at least a partially new data sets (open-source or proprietary). This also means that it is possible to use available infrastructures to conduct measurements and experiments but with different/extended datasets and different conditions, scenarios, etc. Replication studies can either strengthen the results of the original study by increasing external validity with additional data or provide new insights into the variables that may impact the results. A replication paper should clearly report on results that the authors were able to reproduce as well as on the aspects of the work that were irreproducible.

Negative results papers: In this category we seek papers that report on negative results. We seek negative results for all types of software engineering research related to source code and manipulation (qualitative, quantitative, case study, experiment, etc.). Negative results are important contributions to scientific knowledge because they allow us to prune our hypothesis space. As Walter Tichy writes, "Negative results, if trustworthy, are extremely important for narrowing down the search space. They eliminate useless hypotheses and thus reorient and speed up the search for better approaches."

Artifact Evaluation Track and ROSE Festival: Authors of accepted papers will have the option to submit to the Artifact Evaluation Track that will award badges that will be displayed in those papers based on their contributions to open science. For details about the evaluation criteria and the artifact badges please visit here.

Evaluation Criteria

Both Reproducibility Studies and Negative Results submissions will be evaluated according to the following standards:

  • Depth and breadth of the empirical studies.
  • Clarity of writing.
  • Appropriateness of conclusions.
  • Amount of useful, actionable insights.
  • Deep discussion regarding the implications of the negative results or new results obtained with reproducibility studies.
  • Availability of artifacts.
  • Underlying methodological rigor and detailed description of procedures. For example, a negative result due primarily to misaligned expectations or due to lack of statistical power (small samples) is not a good submission. The negative result should be a result of a lack of effect, not lack of methodological rigor.
  • Clear descriptions of the differences between the original setup and the one used in the study (for the case of reproducibility studies).

Most importantly, we expect that replication studies clearly point out the artifacts the study is built upon, and to provide the links to all the artifacts in the submission (the only exception will be given to those papers that reproduce the results on proprietary datasets that can not be publicly released).The paper should describe any changes to the original study design made during the replication, along with a justification for each change. The papers should contain a discussion section that compares the findings of the original and replication studies and describe the new knowledge gained from the replication along with any lessons learned from performing the replication. Partial replications are also welcome as long as the paper clearly states which parts of the study were replicated and which parts are new.

Submission Guidelines

Before submitting please follow the guidelines in How to Submit. Additionally, submissions must be original, in the sense that the findings and writing have not been previously published or under consideration elsewhere. Papers must not exceed 10 pages for the main text, inclusive of figures, tables, appendices; references only may be included on up to 2 additional pages. The paper must be clearly marked as a RENE paper. The papers should be submitted electronically in PDF format via EasyChair. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must attend the conference and present the paper.

Important Dates

All submission dates are at 23:59 AoE (Anywhere on Earth, UTC-12).

Abstract Submission: July 1st, 2022
Paper Submission: July 8th, 2022
Author Notification: July 26th, 2022
Camera Ready: August 2nd, 2022

Call for New Ideas and Emerging Results papers

After the successful edition of the New Ideas and Emerging Results (NIER) track at last year’s conference, the 22nd IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2022) will again host a NIER track. This track aims to provide a place for researchers and practitioners to present, discuss, and polish early-stage research. This early-stage research should be innovative with the potential to make a strong future impact on the research or practice of software engineering. However, as it concerns early-stage research, the NIER track does not require submissions to have a strong evaluation. Instead, submissions should contain preliminary results that indicate the future potential of the research as well as a discussion of the challenges which must be overcome in the pursuit of the given research goals. These challenges should act as both future research directions as well as topics which the authors feel require discussion within the community. The topics of interest for this track are the same as for the main research track and are listed below.

Topics of Interest

We welcome the submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

  • abstract interpretation
  • bad smell detection
  • bug location and prediction
  • clone detection
  • concern, concept, and feature localization and mining
  • decompilation
  • energy efficient source code
  • natural language analysis of source code artifacts
  • program comprehension
  • program slicing
  • program transformation and refactoring
  • repository, revision, and change analysis
  • security vulnerability analysis
  • source level metrics
  • source level optimization
  • source-level testing and verification
  • static and dynamic analysis

Submission Instructions

Before submitting please follow the guidelines in How to Submit. The submissions must follow the rules of the double-blind reviewing process. Additionally, submissions must be original in the sense that the findings and writing have not been previously published or under consideration elsewhere. Papers must not exceed 5 pages, including figures, tables, appendices, and references. The paper must be marked as a NIER track paper. The papers should be submitted electronically in PDF format via EasyChair. At least three program committee members will review each submission, judging its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must attend the conference and present the paper.

Evaluations

Submissions will be evaluated based on their originality, the importance of their contribution, the challenges highlighted, and their potential future significance. In addition, reviewers are asked to consider the soundness, overall quality, clarity and consistency of presentation, and whether the submission appropriately contextualizes itself with respect to related work. Again, the NIER track does not require a complete evaluation. Preliminary data and a discussion of the challenges and future research directions supported by this preliminary data are encouraged.

Artifact Evaluation

Authors of (short and long) papers accepted in the SCAM 2022 are also invited to submit their artifacts to the ICSME 2022 Joint Artifact Evaluation Track.

Best Paper Award and Special Issue

The NIER track chairs deserve the right to award the best paper(s) of the track. In any case, the best papers of the track will be invited for submission in the Journal of Software: Evolution and Process, Wiley. The extended papers must report a considerable amount of new material with respect to the NIER version. These will go through the reviewing process of the Journal and should meet its quality and novelty requirements for acceptance.

Important Dates

All submission dates are at 23:59 AoE (Anywhere on Earth, UTC-12).

Abstract Submission: July 1st, 2022
Paper Submission: July 8th, 2022
Author Notification: July 26th, 2022
Camera Ready: August 2nd, 2022

Track co-chairs

Csaba Nagy, Università della Svizzera Italiana (Switzerland) - csaba.nagy@usi.ch
Fabio Palomba, University of Salerno (Italy) - fpalomba@unisa.it

Artifact Evaluation

T.B.A.

Steering Committee

Charter

The International Working Conference on Source Code Analysis & Manipulation (SCAM) is governed by the steering committee following a community ratified steering committee charter (v1.2, adopted in 2012).

Organizing Committee

General Chair
Research Track Program Co-Chairs
Engineering Track Program Co-Chairs
RENE Track PC Co-chairs
New Ideas and Emerging Results (NIER) co-chairs
Most Influential Paper Co-chairs
Finance Chair
Proceeding chair
Social Media and Publicity Chair
Virtualization Co-chairs
Web Chair
Local Chair

Program Committees

This page contains all of the Program Committee members for the various tracks of SCAM.

Research Track

NameWebpageAffiliation
Christian NewmanRochester Institute of Technology
Eric J. RaposMiami University
Ali ShokriRochester Institute of Technology
Fabio PetrilloUniversite du Quebec a Chicoutimi
Siyuan JiangEastern Michigan University
Jeffrey SvajlenkoMicrosoft
Kaushik MadalaUL LLC
Andreea VescanBabes-Bolyai University, Cluj-Napoca
Haowei WuGoogle
Lingfeng BaoZhejiang University
Fabio PalombaUniversity of Salerno
Abu Naser MasudMälardalen University, Västerås, Sweden
Marie-Christine JakobsTU Darmstadt
Xiao ChenMonash University
Kecia FerreiraFederal Center for Technological Education of Minas Gerais
Dario Di NucciUniversity of Salerno
Kevin SchneiderUniversity of Saskatchewan
Tushar SharmaDalhousie University
Muhammad AsaduzzamanLakehead University
Mohammed SayaghQueen's University
Diego Elias Damasceno CostaConcordia University
Kirsten WinterThe University of Queensland
Michele PasquaUniversity of Verona - Dipartimento di Informatica
Foutse KhomhDGIGL, École Polytechnique de Montréal
Ameya KetkarOregon State University
Gias UddinUniversity of Calgary
Mohammad Masudur RahmanDalhousie University
Manishankar MondalUniversity of Saskatchewan
Bharti ChimdyalwarTata Consultancy Services Ltd.
Eunjong ChoiKyoto Institute of Technology
Hitesh SajnaniMicrosoft
Alexander JordanOracle Labs
Willian OizumiPUC-Rio
Mohammad Mehdi Pourhashem KallehbastiUniversity of Science and Technology of Mazandaran
Ravindra MettaTCS
Quentin StievenartVUB
Ewan TemperoThe University of Auckland
Timo KehrerUniversity of Bern

Engineering Track

NameWebpageAffiliation
Jochen QuanteRobert Bosch GmbH
Ana-Maria OprescuUniversity of Amsterdam, Netherlands
Joanna Cecilia da Silva SantosRochester Institute of Technology, USA
Wolfram Fenskepure-systems GmbH
Johan FabryRaincode Labs
Shivali AgarwalIBM, India Research Lab
Ali OuniETS Montreal, Canada
Daniel Izquierdo-CortazarBitergia
Latifa GuerroujETS, Montreal, Canada
Hironori WashizakiWaseda University, Japan

RENE Track

NameWebpageAffiliation
Fiorella ZampettiUniversity of Sannio
Maleknaz NayebiYork University
Xiao ChenMonash University
Mark HillsEast Carolina University
Lingfeng BaoZhejiang University
Bonita SharifUniversity of Nebraska - Lincoln
Anthony VentresqueLero@UCD, School of Computer Science, University College Dublin
Andrea StoccoUniversità della Svizzera italiana (USI)
Ezekiel SoremekunSaarland University
Vassilis ZafeirisAthens University of Economics And Business
Jeongju SohnUniversity of Luxembourg
Gilles PerrouinUniversity of Namur

NIER Track

NameWebpageAffiliation
Péter HegedűsUniversity of Szeged
Zhe YuRochester Institute of Technology
Valeria PontilloUniversity of Salerno
Luca PascarellaUniversità della Svizzera Italiana (USI)
Christian MachoUniversity of Klagenfurt
Foutse KhomhDGIGL, École Polytechnique de Montréal
Ana-Maria OprescuUniversity of Amsterdam
Gordana RakicFaculty of Science, Novi Sad
Gias UddinUniversity of Calgary
Eleni ConstantinouEindhoven University of Technology
Simone ScalabrinoUniversity of Molise
Jesus M. Gonzalez-BarahonaUniversidad Rey Juan Carlos
Fabiano PecorelliTampere University
Anthony CleveUniversity of Namur
Mohammed SayaghQueen's University
Christian NewmanRochester Institute of Technology
László VidácsUniversity of Szeged
Giulia SellittoUniversity of Salerno
Xiaozhou LiTampere University
Andrea JanesUniversity of Bozen-Bolzano
Francesco LomioTampere University
Stefano LambiaseUniversity of Salerno

Registration

To register for SCAM 2022 please see the Registration page at the ICSME site here.

Scholarships

Thanks to generous support from Meta and Grammatech, SCAM is happy to offer reduced student registration fees to the first 20 participants registering as a student. Register today!

The discounted registration fees are:

Advanced registration
IEEE Student Member Fee € 100.00
Student Non-Member Fee € 175.00

Late/on-site registration
IEEE Student Member Fee € 200.00
Student Non-Member Fee € 275.00

Accepted Papers for the Research Track

  • Title: BoostNSift: A Query Boosting and Code Sifting Technique for Method Level Bug Localization by: Abdul Razzaq, Jim Buckley, James Patten, Muslim Chochlov and Ashish Rajendra Sai
  • Title: How does Migrating to Kotlin Impact the Run-time Efficiency of Android Apps? by: Michael Peters, Gian Luca Scoccia and Ivano Malavolta
  • Title: Jicer: Simplifying Cooperative Android App Analysis Tasks by: Felix Pauck and Heike Wehrheim
  • Title: D-REX: Static Detection of Relevant Runtime Exceptions with Location Aware Transformer by: Farima Farmahinifarahani, Yadong Lu, Vaibhav Saini, Pierre Baldi and Cristina Lopes
  • Title: A Precise Framework for Source-Level Control-Flow Analysis by: Idriss Riouak, Christoph Reichenbach, Görel Hedin, and Niklas Fors
  • Title: Formal Definition and Automatic Generation of Semantic Metrics: An Empirical Study on Bug Prediction by: Ting Hu, Ran Mo, Pu Xiong, Zengyang Li and Qiong Feng
  • Title: Fex: Assisted Extraction of Domain Features from C Programs by: Patrick Müller, Krishna Narasimhan and Mira Mezini
  • Title: Improving Readability of Scratch Programs with Search-based Refactoring by: Felix Adler, Gordon Fraser, Eva Gründinger, Nina Körber, Simon Labrenz, Jonas Lerchenberger, Stephan Lukasczyk and Sebastian Schweikl
  • Title: Empirical Comparison of Black-box Test Case Generation Tools for RESTful APIs by: Davide Corradini, Amedeo Zampieri, Michele Pasqua and Mariano Ceccato
  • Title: Measuring source code conciseness across programming languages using compression by: Lodewijk Bergmans, Xander Schrijen, Edwin Ouwehand and Magiel Bruntink
  • Title: Leveraging Unsupervised Learning to Summarize APIs Discussed in Stack Overflow by: Amirhossein Naghshzan, Latifa Guerrouj and Olga Baysal
  • Title: Method Calls Frequency-Based Tie-Breaking Strategy For Software Fault Localization by: Qusay Idrees Sarhan, Béla Vancsics and Árpád Beszédes
  • Title: What do Developers Discuss about Code Comments? by: Pooja Rani, Mathias Birrer, Sebastiano Panichella, Mohammad Ghafari and Oscar Nierstrasz
  • Title: Towards Understanding Developers’ Machine-Learning Challenges: A Multi-Language Study on Stack Overflow by: Alaleh Hamidi, Giuliano Antoniol, Foutse Khomh, Massimiliano Di Penta and Mohammad Hamidi

Accepted Papers

Research track

  • Thomas Hirsch and Birgit Hofer. “Pruning Boolean Expressions to Shorten Dynamic Slices”
  • Haruka Yoshioka, Yoshiki Higo and Shinji Kusumoto. “Improving Weighted-SBFL by Blocking Spectrum”
  • Stefan Schott and Felix Pauck. “Benchmark Fuzzing for Android Taint Analyses”
  • Mohammed Latif Siddiq, Shafayat Hossain Majumder, Maisha Rahman Mim, Sourov Jajodia and Joanna C. S. Santos. “An Empirical Study of Code Smells in Transformer-based Code Generation Techniques”
  • Riley Vandonge and Naser Ezzati-Jivan. “N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing”
  • Boladji Vinny Adjibi, Fatou N'Diaye Mbodji, Kevin Allix, Jacques Klein and Tegawendé F. Bissyandé. “The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android”
  • Liang Tan and Christoph Bockisch. “Checking Refactoring Detection Results Using Code Changes Encoding for Improved Accuracy”
  • Hiroki Inayoshi, Shohei Kakei and Shoichi Saito. “Plug and Analyze: Usable Dynamic Taint Tracker for Android Apps”
  • Bram Vandenbogaerde, Quentin Stiévenart and Coen De Roover. “Summary-Based Compositional Analysis for Soft Contract Verification”
  • Yunior Pacheco, Ahmed Zerouali and Coen De Roover. “Mining for Framework Instantiation Pattern Interplays”
  • Ching-Chi Chuang, Luís Cruz, Robbert van Dalen, Vladimir Mikovski and Arie van Deursen. “Removing dependencies from large software projects: are you really sure?”
  • Tukaram Muske and Alexander Serebrenik. “Classification and Ranking of Delta Static Analysis Alarms”
  • Naelson Douglas, Márcio Ribeiro, Rodrigo Bonifácio, Rohit Gheyi, Igor Wiese and Baldoino Fonseca. “Lint-Based Warnings in Python Code: Frequency, Awareness and Refactoring”
  • Niloofar Mansoor, Tukaram Muske, Alexander Serebrenik and Bonita Sharif. “An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms”
  • Jens Dietrich, Shawn Rasheed and Amjed Tahir. “Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network Dependencies”
  • Richárd Szalay and Zoltán Porkoláb. “Semi-Automatic Refactoring to C++20 Modules: A Semi-Success Story”
  • Lile Lin, Zhiqiu Huang, Yaoshen Yu and Yapeng Liu. “Multi-Modal Code Summarization with Retrieved Summary”

 

Engineering track

  • Ranjith Krishnamurthy, Goran Piskachev and Eric Bodden “To what extent can we analyze Kotlin programs using existing Java taint analysis tools?”
  • Idriss Riouak, Christoph Reichenbach, Gorel Hedin and Niklas Fors “JFeature: Know Your Corpus”
  • Judit Jász, Péter Hegedűs, Ákos Milánkovich and Rudolf Ferenc “An End-to-End Framework for Repairing Potentially Vulnerable Source Code”
  • Balázs Rózsa, Gábor Antal and Rudolf Ferenc “Don’t DIY: Automatically transform legacy Python code to support structural pattern matching”
  • James Buffenbarger “Building LLVM and GCC, with Amake



Replication and Negative Results track

  • Aurel Ikama, Philippe Belias, Vincent Du, Biruk Asmare Muse, Foutse Khomh and Mohammad Hamdaqa “Revisiting the Impact of Anti-patterns on Fault-Proneness: A Differentiated Replication”

 

New Ideas and Emerging Results track

  • Anushka Bhave and Roopak Sinha, “Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERT”
  • Gergő Balogh and István Baráth, “First Steps towards a Methodology for Unified Graph's Discrepancy Analysis”
  • Mehrdad Abdi and Serge Demeyer, “Test Transplantation through Dynamic Test Slicing”
  • Qusay Idrees Sarhan and Árpád Beszédes, “Experimental Evaluation of A New Ranking Formula for Spectrum based Fault Localization”
  • Daniel Atzberger, Nico Scordialo, Tim Cech, Willy Scheibel, Matthias Trapp and Jürgen Döllner, “CodeCV: Mining Expertise of GitHub Users from Coding Activities”
  • Alin-Petru Roșu and Petru F. Mihancea, “Towards the Detection of Hidden Familial Type Correlations in Java Code”
  • Dave Binkley and Leon Moonen, “Assessing the Impact of Execution Environments on Observational Slicing”
  • Daniel Domínguez-Álvarez, Alessandra Gorla and Juan Caballero, “On the Usage of Programming Languages in the iOS Ecosystem”
  • Wouter van den Brink, Marcus Gerhold and Vadim Zaytsev, “Deriving Modernity Signatures for PHP Systems with Static Analysis”
  • Manuel De Stefano, Fabiano Pecorelli, Dario Di Nucci and Andrea De Lucia, “A preliminary evaluation on the relationship among architectural and test smells”

Accepted Papers for the RENE Track

  • Title: An Experimental Analysis of Graph-Distance Algorithms for Comparing API Usages by: Sebastian Nielebock, Paul Blockhaus, Jacob Krüger and Frank Ortmeier

Accepted Papers for the Engineering Track

  • Title: Modeling the Effects of Global Variables in Data-Flow Analysis for C/C++ by: Philipp Dominik Schubert, Florian Sattler, Fabian Schiebel, Ben Hermann and Eric Bodden
  • Title: Into the Woods: Experiences from Building a Dataflow Analysis Framework for C/C++ by: Philipp Dominik Schubert, Ben Hermann, Eric Bodden and Richard Leer
  • Title: SecuCheck: Engineering configurable taint analysis for software developers by: Goran Piskachev, Ranjith Krishnamurthy and Eric Bodden
  • Title: CharmFL: A Fault Localization Tool for Python by: Qusay Idrees Sarhan, Attila Szatmári, Rajmond Toth and Árpád Beszédes
  • Title: Unambiguity of Python Language Elements for Static Analysis by: Bence Nagy, Tibor Brunner and Zoltan Porkolab
  • Title: eNYPD---Entry Point Detector by: Rodrigue Wete Nguempnang, Bernhard J. Berger and Karsten Sohr
  • Title: SootFX: A Static Code Feature Extraction Tool for Java and Android by: Kadiray Karakaya and Eric Bodden
  • Title: PyRef: Refactoring Detection in Python Projects by: Hassan Atwi, Bin Lin, Nikolaos Tsantalis, Yutaro Kashiwa, Yasutaka Kamei, Naoyasu Ubayashi, Gabriele Bavota and Michele Lanza

Keynote

We are proud to announce the following keynote for SCAM 2022:

Title: When the rubber hits the road: an exciting journey from an academic analysis framework to a SAST product in industry

Abstract: For decades now, static-analysis researchers have sought to solve the daunting triad between precision, coverage, and performance. Using frameworks such as Soot, Doop, WALA, FlowDroid, Phasar, and the like, the community has prototyped many promising data structures and algorithms that improve towards this goal - and with success: lab experiments now frequently achieve low analysis runtimes with excellent signal-to-noise ratio. Bringing these advances into commercial static-analysis products is challenging, however, because this would generally involve radical, incompatible changes to the product’s solver. Hence we felt very fortunate when in 2020, Contrast Security gave us the opportunity to jointly realize a brand-new, developer-centric static application security testing (SAST) product using our latest technology and applying our research results. For us researchers, this was - and continues to be - an exciting journey, with many unknowns: Would our lab results hold up in practice? What additional tricks are needed to make it all work? How (not) to compose the development team? How would end-users react to the solution? And how to make this a win-win situation for everybody?

Eric Bodden (https://www.bodden.de) is one of the leading experts on secure software engineering, with a specialty in building highly precise tools for automated program analysis. He is Professor for Secure Software Engineering at Paderborn University and director for Software Engineering and IT-Security at Fraunhofer IEM, where he is collaborating with the leading national and international software development companies.
Prof. Bodden's research was awarded numerous times. 2019, Bodden was named ACM Distinguished Member. At the German IT-Security Price, his group scored 1st place in 2016 and 2nd place in 2014. In 2014, the DFG awarded Bodden the Heinz Maier-Leibnitz-Preis, Germany's highest honor for young scientists. Prof. Bodden's research has received five ACM Distinguished Paper Awards in different communities. Prof. Bodden is a member of the editorial boards of ACM Transactions on Software Engineering and Methodology (TOSEM) and Springer Empirical Software Engineering (EMSE). In 2020, Bodden was elected into the Working Group 2.4 Software Implementation Technology of the International Federation for Information Processing (IFIP).

Most Influential Paper award

SCAM 2021 is happy to announce that the most influencial paper award goes to "Lightweight Transformation and Fact Extraction with the srcML Toolkit" by Michael Collard, Michael Decker, and Jonathan Maletic originally published in SCAM 2011. The srcML toolkit is a widely-used fact extraction and source-code transformation toolkit, which continues to have a large impact on the software engineering research community because it is easy to use and continues to be maintained and updated. The first paper on the tool was published at SCAM 2011 and since then it has fostered a wide range of research innovations throughout software engineering and been awarded the Mining Software Repositories 2020 Foundational Contribution Award. Many SCAMers have used the tool in their own research, making this paper well deserving of the MIP award.

The Most Influential Paper Co-chairs are Arpad Beszedes and Dawn Lawrie.

Program

The below table contains the program of SCAM 2022. Note that the times are shown in the local time zone of Cyprus (UTC+3).

October 3, 2022

9:00-10:30

Opening and SCAM Keynote

 9:00-9:30

Opening: Mariano Ceccato, Mohammad Ghafari and Banani Roy

 9:30-10:30

SCAM Keynote

(Session chair: Mohammad Ghafari)

Eric Bodden “When the rubber hits the road: an exciting journey from an academic analysis framework to a SAST product in industry”

10:30-11:00

Coffee/Tea Break

11:00-12:30

 Dynamic Analysis

 Session chair: Csaba Nagy

Research

Thomas Hirsch and Birgit Hofer. “Pruning Boolean Expressions to Shorten Dynamic Slices”

Research

Stefan Schott and Felix Pauck. “Benchmark Fuzzing for Android Taint Analyses”

Research

Hiroki Inayoshi, Shohei Kakei and Shoichi Saito. “Plug and Analyze: Usable Dynamic Taint Tracker for Android Apps”

NIER

Mehrdad Abdi and Serge Demeyer, “Test Transplantation through Dynamic Test Slicing”

NIER

Dave Binkley and Leon Moonen, “Assessing the Impact of Execution Environment on Observation-Based Slicing

 

12:30-13:30

Lunch Break  

13:30-15:30

Smell and Refactoring-1 and VISSOFT Keynote

Session chair: Foutse Khomh

 13:30-14:30

Research

Richárd Szalay and Zoltán Porkoláb. “Semi-Automatic Refactoring to C++20 Modules: A Semi-Success Story”

 

RENE

Aurel Ikama, Vincent Du, Philippe Belias, Biruk Asmare Muse, Foutse Khomh and Mohammad Hamdaqa “Revisiting the Impact of Anti-patterns on Fault-Proneness: A Differentiated Replication”

 

NIER

Manuel De Stefano, Fabiano Pecorelli, Dario Di Nucci and Andrea De Lucia, “A preliminary evaluation on the relationship among architectural and test smells”

 14:30-15:30

VISSOFT Keynote

Oscar Nierstrasz, Making Systems Explainable

15:30-16:00

Coffee/Tea Break

16:00-17:30

Smell and Refactoring 2

Session chair: Tushar Sharma

Research

Mohammed Latif Siddiq, Shafayat Hossain Majumder, Maisha Rahman Mim, Sourov Jajodia and Joanna C. S. Santos. “An Empirical Study of Code Smells in Transformer-based Code Generation Techniques”

Research

Riley VanDonge and Naser Ezzati-Jivan. “N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing”

Research

Liang Tan and Christoph Bockisch. “Checking Refactoring Detection Results Using Code Changes Encoding for Improved Accuracy”

Research

Ching-Chi Chuang, Luís Cruz, Robbert van Dalen, Vladimir Mikovski and Arie van Deursen. “Removing dependencies from large software projects: are you really sure?”

NIER

Anushka Bhave and Roopak Sinha, “Deep Multimodal Architecture for Detection of Long Parameter List and Switch Statements using DistilBERT”

 

17:30-18:30

Open Steering Committee Meeting

19:00-21:00

Conference Banquet

 

October 04, 2022

9:00-10:30

Most Influential Paper and Program Comprehension

 9:00-9:30

Most Influential Paper award from SCAM 2012

Session chair: Mariano Ceccato

 9:30-10:30

Program Comprehension

Session Chair: Banani Roy

Research

Yunior Pacheco, Ahmed Zerouali and Coen De Roover. “Mining for Framework Instantiation Pattern Interplays”

Research

Lile Lin, Zhiqiu Huang, Yaoshen Yu and Yapeng Liu. “Multi-Modal Code Summarization with Retrieved Summary”

NIER

Daniel Atzberger, Nico Scordialo, Tim Cech, Willy Scheibel, Matthias Trapp and Jürgen Döllner, “CodeCV: Mining Expertise of GitHub Users from Coding Activities”

NIER

Alin-Petru Roșu and Petru-Florin Mihancea, “Towards the Detection of Hidden Familial Type Correlations in Java Code”

 

10:30-11:00

Coffee/Tea Break

11:00-12:30

Studies on Programming Languages

Session chair: Fabio Petrillo

Research

Boladji Vinny Adjibi, Fatou Ndiaye Mbodji, Kevin Allix, Jacques Klein and Tegawendé F. Bissyandé. “The Devil is in the Details: Unwrapping the Cryptojacking Malware Ecosystem on Android”

Engineering

Balázs Rózsa, Gábor Antal and Rudolf Ferenc “Don’t DIY: Automatically transform legacy Python code to support structural pattern matching”

Engineering

Jim Buffenbarger “Building LLVM and GCC, with Amake

NIER

Daniel Domínguez-Álvarez, Alessandra Gorla and Juan Caballero, “On the Usage of Programming Languages in the iOS Ecosystem”

NIER

Wouter van den Brink, Marcus Gerhold and Vadim Zaytsev, “Deriving Modernity Signatures for PHP Systems with Static Analysis”

 

12:30-13:30

Lunch Break

13:30-15:30

Static Analysis

Session chairs: Quentin Stiévenart and Banani Roy

Research

Bram Vandenbogaerde, Quentin Stiévenart and Coen De Roover. “Summary-Based Compositional Analysis for Soft Contract Verification”

Research

Niloofar Mansoor, Tukaram Muske, Alexander Serebrenik and Bonita Sharif. “An Empirical Assessment on Merging and Repositioning of Static Analysis Alarms

Research

Naelson Oliveira, Márcio Ribeiro, Rodrigo Bonifácio, Rohit Gheyi, Igor Wiese and Baldoino Fonseca. “Lint-Based Warnings in Python Code: Frequency, Awareness and Refactoring”

Research

Tukaram Muske and Alexander Serebrenik. “Classification and Ranking of Delta Static Analysis Alarms”

Engineering

Ranjith Krishnamurthy, Goran Piskachev and Eric Bodden “To what extent can we analyze Kotlin programs using existing Java taint analysis tools?”

Engineering

Idriss Riouak, Görel Hedin, Christoph Reichenbach and Niklas Fors “JFeature: Know Your Corpus”

Engineering

Judit Jász, Péter Hegedűs, Ákos Milánkovich and Rudolf Ferenc “An End-to-End Framework for Repairing Potentially Vulnerable Source Code”

NIER

Gergő Balogh and István Baráth, “First Steps towards a Methodology for Unified Graph's Discrepancy Analysis”

 

15:30-16:00

Coffee/Tea Break

16:00-17:30

Quality Assurance

Session chair: Massimiliano di Penta

Research

Haruka Yoshioka, Yoshiki Higo and Shinji Kusumoto. “Improving Weighted-SBFL by Blocking Spectrum”

Research

Jens Dietrich, Shawn Rasheed and Amjed Tahir. “Flaky Test Sanitisation via On-the-Fly Assumption Inference for Tests with Network Dependencies”

NIER

Qusay Idrees Sarhan and Árpád Beszédes, “Experimental Evaluation of A New Ranking Formula for Spectrum based Fault Localization”

 

 17:30-18:00

Closing

with Mariano Ceccato, Banani Roy, Mohammad Ghafari, the Steering Committee and next year’s organizers



Fun

SCAM has always maintained the tradition of giving participants a special SCAM mug. You can see the mugs of some of the past editions in the slideshow below.

Skit

Scene:    A long line in an official-looking hall, leading to a desk.    At the desk is a SECRETARY; a MAN and his WIFE are at the front of the line.    Somewhere in the line is a group of VIKINGS.

 

MAN:    ’Morning!

 

SECRETARY:    ’Morning..    What conference package would you like to sign up for?

 

MAN:    Well, what’ve you got?

 

SECRETARY:    Well, there’s ICSE and SCAM; ICSME and SCAM; GECCO, WSE, SCAM, and ISSTA; SCAM, WSE, PLDI, SCAM, and SCAM; SCAM, ICPC, SCAM, SCAM, SANER, SCAM, ICST, and SCAM…

 

VIKINGS:    (starting to chant) SCAM SCAM SCAM SCAM…

 

SECRETARY:    SCAM, SCAM, SCAM, SCAM, ICSE, SCAM, SCAM, and SCAM…

 

VIKINGS:    (singing) Lovely SCAM!    Lovely SCAM!

 

SECRETARY:    ...or partying in the colorful Limassol carnival, take a picture of the Aphrodite’s Rock, Zenobia wreck diving, followed by a tasting of Haloumi cheese paired with Commandaria wine, and SCAM.

 

WIFE:    Have you got anything without SCAM?

 

SECRETARY:    (flipping papers) Well, there’s SCAM, ICSE, GECCO, and SCAM; that’s not got much SCAM in it….

 

WIFE:    I don’t want any SCAM!

 

MAN:    Why can’t she go to ISSTA, CSM, ICSM, ICSME, and SCAM?

 

WIFE:    That’s got SCAM in it!

 

MAN:    Hasn’t got as much SCAM as SCAM, ICSE, GECCO, and SCAM, has it?

 

VIKINGS:    SCAM SCAM SCAM SCAM, SCAM SCAM SCAM SCAM…

 

WIFE:    Could you put us down for ISSTA, ICSE, and SCAM without the SCAM then?

 

SECRETARY:    (shudders) Ugggh…

 

WIFE:    What do you mean “ugggh”?    I don’t want to go to SCAM!

 

VIKINGS:    Lovely SCAM!    Wonderful SCAM!

SECRETARY:    (to VIKINGS) Shaddup!

 

VIKINGS:    Lovely SCAM!    Wonderful SCAM!

 

SECRETARY:    Shaddup!    (aside) Bloody Vikings…You can’t go to ISSTA, ICSE, and SCAM without the SCAM!

 

WIFE:    (shriek) I don’t want to go to SCAM!

 

MAN:    Ssssh, dear, don’t cause a fuss.    I’ll attend your SCAM.    I love it!    I’m signing up for SCAM, SCAM, SCAM, SCAM, SCAM, SCAM, GECCO, SCAM, SCAM, and SCAM!

 

VIKINGS:    (singing) SCAM SCAM SCAM SCAM, SCAM SCAM SCAM SCAM!    Lovely SCAM!    Wonderful SCAM!

 

SECRETARY:    (to VIKINGS) Shut up! (to MAN) GECCO’s full up.

 

MAN:    Well, could I go to her SCAM instead of GECCO then?

 

SECRETARY:    You mean you’re going to SCAM SCAM SCAM SCAM…

 

VIKINGS:    (join in with the SECRETARY and start singing)

SCAM SCAM SCAM SCAM.

Lovely SCAM! Wonderful SCAM!

Lovely SCAM! Wonderful SCAM –

SCA-A-A-A-AM SCA-A-A-A-AM SCA-A-A-A-AM SCA-A-A-A-AM –

Lovely SCAM! (Lovely SCAM!)

Lovely SCAM! (Lovely SCAM!)

Lovely SCAM!

SCAM, SCAM, SCAM,

SCAAAAAAAAM!



Supporters

For SCAM 2022 we are proud to have the support of two leading companies in Software Engineering, GrammaTech and Facebook. We would like to thank both GrammaTech and Facebook for their support, as they make it possible to host SCAM!

About GrammaTech

GrammaTech is a small company that was originally founded in Ithaca New York in 1988 as a spin-off of Cornell University. We do both contract research and develop commercial products. Our team of researchers comprises 20 PhD-qualified scientists who conduct research projects that are mostly funded by various US government agencies. These are primarily oriented towards cybersecurity, and touch on software analysis, transformation, monitoring and autonomic functions. Our most successful commercial product to date is CodeSonar, an advanced static analysis tool for finding serious software defects that is sold mostly to customers in embedded safety-critical industries. A new product named CodeSentry is a SaaS product to find N-day security vulnerabilities in software binaries. GrammaTech welcomes inquiries from those interested in joining our team; see the following page.

About Facebook

At Facebook, our mission of giving people the power to build community and bring the world closer together requires constant innovation. That’s where research comes in.

We believe the most interesting research questions are derived from real-world problems. Our expert teams of scientists and engineers work quickly and collaboratively to build smarter, more meaningful experiences on a global scale by solving the most challenging technology problems, as well as look toward the future.

SCAM Author Scholarships

Thanks to generous support from Grammatech and Facebook, SCAM is pleased to offer scholarships for authors who are (a) undergraduate and graduate students, (b) participants from low- or lower-middle income countries, (c) first-time participants, and (d) members of groups traditionally underrepresented in the SCAM community.

  • The list of low- and lower-middle income countries is available here.
  • Such groups as women, blacks, an LGBTIQ+ have traditionally been underrepresented in computing in general, and in the SCAM community, in particular. This list is not and cannot be exhaustive.

Applications for the author scholarships are closed, and the notifications have been sent.

SCAM Participation Scholarships

Thanks to generous support from Grammatech and Facebook, SCAM is pleased to offer scholarships for participants who are (a) undergraduate and graduate students, (b) participants from low- or lower-middle income countries, (c) first-time participants, and (d) members of groups traditionally underrepresented in the SCAM community.

  • The list of low- and lower-middle income countries is available here.
  • Such groups as women, blacks, an LGBTIQ+ have traditionally been underrepresented in computing in general, and in the SCAM community, in particular. This list is not and cannot be exhaustive.

Please apply for the scholarship on EasyChair. Deadline is September 20th and notifications will be sent by September 22nd.