Programming the Perl DBI
Predicting Fault Incidence Using Software Change History
IEEE Transactions on Software Engineering
The SLAM project: debugging system software via static analysis
POPL '02 Proceedings of the 29th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
A method for detecting faulty code violating implicit coding rules
Proceedings of the International Workshop on Principles of Software Evolution
Mysql Reference Manual
A practical flow-sensitive and context-sensitive C and C++ memory leak detector
PLDI '03 Proceedings of the ACM SIGPLAN 2003 conference on Programming language design and implementation
Using Programmer-Written Compiler Extensions to Catch Security Holes
SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy
CVSSearch: Searching through Source Code using CVS Comments
ICSM '01 Proceedings of the IEEE International Conference on Software Maintenance (ICSM'01)
Analyzing and Relating Bug Report Data for Feature Tracking
WCRE '03 Proceedings of the 10th Working Conference on Reverse Engineering
Identification of Software Instabilities
WCRE '03 Proceedings of the 10th Working Conference on Reverse Engineering
ISSTA '04 Proceedings of the 2004 ACM SIGSOFT international symposium on Software testing and analysis
Extracting Facts from Open Source Software
ICSM '04 Proceedings of the 20th IEEE International Conference on Software Maintenance
Predicting Change Propagation in Software Systems
ICSM '04 Proceedings of the 20th IEEE International Conference on Software Maintenance
An Empirical Study of Fine-Grained Software Modifications
ICSM '04 Proceedings of the 20th IEEE International Conference on Software Maintenance
OOPSLA '04 Companion to the 19th annual ACM SIGPLAN conference on Object-oriented programming systems, languages, and applications
Journal of Software Maintenance and Evolution: Research and Practice - Analyzing the Evolution of Large-Scale Software
Project history as a group memory: learning from the past
Project history as a group memory: learning from the past
Checking system rules using system-specific, programmer-written compiler extensions
OSDI'00 Proceedings of the 4th conference on Symposium on Operating System Design & Implementation - Volume 4
Using The Gnu Compiler Collection: A Gnu Manual For Gcc Version 4.3.3
Using The Gnu Compiler Collection: A Gnu Manual For Gcc Version 4.3.3
Z-ranking: using statistical analysis to counter the impact of static analysis approximations
SAS'03 Proceedings of the 10th international conference on Static analysis
DynaMine: finding common error patterns by mining software revision histories
Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on Foundations of software engineering
Mining eclipse for cross-cutting concerns
Proceedings of the 2006 international workshop on Mining software repositories
An empirical study of fine-grained software modifications
Empirical Software Engineering
Identifying domain-specific defect classes using inspections and change history
Proceedings of the 2006 ACM/IEEE international symposium on Empirical software engineering
Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering
Understanding component co-evolution with a study on Linux
Empirical Software Engineering
Change propagations in the maintenance of kernel-based software with a study on Linux
ACM-SE 45 Proceedings of the 45th annual southeast regional conference
Finding what's not there: a new approach to revealing neglected conditions in software
Proceedings of the 2007 international symposium on Software testing and analysis
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Mining API patterns as partial orders from source code: from usage scenarios to specifications
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Which warnings should I fix first?
Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Journal of Software Maintenance and Evolution: Research and Practice
Mining software repositories for comprehensible software fault prediction models
Journal of Systems and Software
Branching and merging in the repository
Proceedings of the 2008 international working conference on Mining software repositories
Mining usage expertise from version archives
Proceedings of the 2008 international working conference on Mining software repositories
Predicting fault-prone modules based on metrics transitions
DEFECTS '08 Proceedings of the 2008 workshop on Defects in large software systems
Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement
Toward an understanding of bug fix patterns
Empirical Software Engineering
Graph-based mining of multiple object usage patterns
Proceedings of the the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering
Information Technology and Management
Empirical Evaluation of Hunk Metrics as Bug Predictors
IWSM '09 /Mensura '09 Proceedings of the International Conferences on Software Process and Product Measurement
Fault-prone module detection using large-scale text features based on spam filtering
Empirical Software Engineering
Recurring bug fixes in object-oriented programs
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1
Automatic construction of an effective training set for prioritizing static analysis warnings
Proceedings of the IEEE/ACM international conference on Automated software engineering
Detection of recurring software vulnerabilities
Proceedings of the IEEE/ACM international conference on Automated software engineering
A graph-based approach to API usage adaptation
Proceedings of the ACM international conference on Object oriented programming systems languages and applications
Detecting missing method calls in object-oriented software
ECOOP'10 Proceedings of the 24th European conference on Object-oriented programming
MACs: Mining API code snippets for code reuse
Expert Systems with Applications: An International Journal
Information and Software Technology
Continual monitoring of code quality
Proceedings of the 4th India Software Engineering Conference
Evolutionary repair of faulty software
Applied Soft Computing
Dealing with noise in defect prediction
Proceedings of the 33rd International Conference on Software Engineering
Vulnerability extrapolation: assisted discovery of vulnerabilities using machine learning
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Mining evolution of object usage
Proceedings of the 25th European conference on Object-oriented programming
Inferring specifications for resources from natural language API documentation
Automated Software Engineering
Information Sciences: an International Journal
Graph-based pattern-oriented, context-sensitive source code completion
Proceedings of the 34th International Conference on Software Engineering
Generalized vulnerability extrapolation using abstract syntax trees
Proceedings of the 28th Annual Computer Security Applications Conference
Detecting missing method calls as violations of the majority rule
ACM Transactions on Software Engineering and Methodology (TOSEM)
Predicting OSS Development Success: A Data Mining Approach
International Journal of Information System Modeling and Design
Assistance in computer programming learning using educational data mining and learning analytics
Proceedings of the 18th ACM conference on Innovation and technology in computer science education
Reference representation techniques for large models
Proceedings of the Workshop on Scalability in Model Driven Engineering
A comparative evaluation of static analysis actionable alert identification techniques
Proceedings of the 9th International Conference on Predictive Models in Software Engineering
Chucky: exposing missing checks in source code for vulnerability discovery
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Comparison and evaluation of source code mining tools and techniques: A qualitative approach
Intelligent Data Analysis
Hi-index | 0.01 |
We describe a method to use the source code change history of a software project to drive and help to refine the search for bugs. Based on the data retrieved from the source code repository, we implement a static source code checker that searches for a commonly fixed bug and uses information automatically mined from the source code repository to refine its results. By applying our tool, we have identified a total of 178 warnings that are likely bugs in the Apache Web server source code and a total of 546 warnings that are likely bugs in Wine, an open-source implementation of the Windows API. We show that our technique is more effective than the same static analysis that does not use historical data from the source code repository.