Powered by
Conference Publishing Consulting

2013 20th Working Conference on Reverse Engineering (WCRE), October 14-17, 2013, Koblenz, Germany

WCRE 2013 – Proceedings

Contents - Abstracts - Authors

Main Research Track

Binary Reverse Engineering

Who Allocated My Memory? Detecting Custom Memory Allocators in C Binaries
Xi Chen, Asia Slowinska, and Herbert Bos
(VU University Amsterdam, Netherlands)
MemPick: High-Level Data Structure Detection in C/C++ Binaries
Istvan Haller, Asia Slowinska, and Herbert Bos
(VU University Amsterdam, Netherlands)
Reconstructing Program Memory State from Multi-gigabyte Instruction Traces to Support Interactive Analysis
Brendan Cleary, Patrick Gorman, Eric Verbeek, Margaret-Anne Storey, Martin Salois, and Frederic Painchaud
(University of Victoria, Canada; Defence R&D Canada, Canada)
Static Binary Rewriting without Supplemental Information: Overcoming the Tradeoff between Coverage and Correctness
Matthew Smithson, Khaled ElWazeer, Kapil Anand, Aparna Kotha, and Rajeev Barua
(University of Maryland at College Park, USA)

Bug Management

An Incremental Update Framework for Efficient Retrieval from Software Libraries for Bug Localization
Shivani Rao, Henry Medeiros, and Avinash Kak
(Purdue University, USA)
Accurate Developer Recommendation for Bug Resolution
Xin Xia, David LoORCID logo, Xinyu Wang, and Bo Zhou
(Zhejiang University, China; Singapore Management University, Singapore)
Has This Bug Been Reported?
Kaiping Liu, Hee Beng Kuan Tan, and Hongyu ZhangORCID logo
(Nanyang Technological University, Singapore; Tsinghua University, China)
Automatic Recovery of Root Causes from Bug-Fixing Changes
Ferdian Thung ORCID logo, David LoORCID logo, and Lingxiao Jiang ORCID logo
(Singapore Management University, Singapore)

Clones

Distilling Useful Clones by Contextual Differencing
Zhenchang Xing, Yinxing Xue, and Stanislaw Jarzabek
(Nanyang Technological University, Singapore; National University of Singapore, Singapore)
Effects of Cloned Code on Software Maintainability: A Replicated Developer Study
Debarshi Chatterji, Jeffrey C. Carver, Nicholas A. Kraft, and Jan Harder
(University of Alabama, USA; University of Bremen, Germany)

Human Studies

The Influence of Non-technical Factors on Code Review
Olga Baysal, Oleksii Kononenko, Reid Holmes, and Michael W. GodfreyORCID logo
(University of Waterloo, Canada)
Understanding Project Dissemination on a Social Coding Site
Jing Jiang, Li Zhang, and Lei Li
(Beihang University, China)
What Help Do Developers Seek, When and How?
Hongwei Li, Zhenchang Xing, Xin Peng ORCID logo, and Wenyun Zhao
(Fudan University, China; Nanyang Technological University, Singapore)
Towards Understanding How Developers Spend Their Effort during Maintenance Activities
Zéphyrin Soh, Foutse KhomhORCID logo, Yann-Gaël Guéhéneuc, and Giuliano Antoniol
(Polytechnique Montréal, Canada)

Re-documenting Legacy Code

Leveraging Specifications of Subcomponents to Mine Precise Specifications of Composite Components
Ziying Dai, Xiaoguang Mao ORCID logo, Yan Lei, and Liqian Chen
(National University of Defense Technology, China)
A Model-Driven Graph-Matching Approach for Design Pattern Detection
Mario Luca Bernardi, Marta Cimitile, and Giuseppe Antonio Di Lucca
(University of Sannio, Italy; Unitelma Sapienza University, Italy)

Recommendation Systems

Automated Library Recommendation
Ferdian Thung ORCID logo, David LoORCID logo, and Julia Lawall
(Singapore Management University, Singapore; INRIA, France)
Automatic Discovery of Function Mappings between Similar Libraries
Cédric Teyton, Jean-Rémy Falleri, and Xavier Blanc
(University of Bordeaux, France)
Find Your Library Experts
Cédric Teyton, Jean-Rémy Falleri, Floréal Morandat, and Xavier Blanc
(University of Bordeaux, France)

Refactoring and Re-modularization

Towards Automatically Improving Package Structure while Respecting Original Design Decisions
Hani Abdeen, Houari Sahraoui ORCID logo, Osama Shata, Nicolas Anquetil, and Stéphane DucasseORCID logo
(Qatar University, Qatar; Université de Montréal, Canada; INRIA, France)
Heuristics for Discovering Architectural Violations
Cristiano Maffort, Marco Tulio Valente, Mariza Bigonha, Nicolas Anquetil, and André Hora
(UFMG, Brazil; INRIA, France)
Info
Recommending Move Method Refactorings using Dependency Sets
Vitor Sales, Ricardo Terra, Luis Fernando Miranda, and Marco Tulio Valente
(UFMG, Brazil; UFSJ, Brazil)
Info
Do Developers Care about Code Smells? An Exploratory Survey
Aiko Yamashita and Leon MoonenORCID logo
(Mesan, Norway; Simula Research Laboratory, Norway)
Info

Security and Testing

LigRE: Reverse-Engineering of Control and Data Flow Models for Black-Box XSS Detection
Fabien Duchène, Sanjay Rawat, Jean-Luc Richier, and Roland Groz
(LIG, France; Ensimag, France)
Info
Circe: A Grammar-Based Oracle for Testing Cross-Site Scripting in Web Applications
Andrea Avancini and Mariano Ceccato
(Fondazione Bruno Kessler, Italy)
Capture-Replay vs. Programmable Web Testing: An Empirical Assessment during Test Case Evolution
Maurizio Leotta ORCID logo, Diego Clerissi, Filippo Ricca ORCID logo, and Paolo Tonella
(University of Genova, Italy; Fondazione Bruno Kessler, Italy)

Software Maintenance

Clustering Static Analysis Defect Reports to Reduce Maintenance Costs
Zachary P. Fry and Westley Weimer
(University of Virginia, USA)
Lehman's Laws in Agile and Non-agile Projects
Kelley Duran, Gabbie Burns, and Paul Snell
(Rochester Institute of Technology, USA)
Inferring Extended Finite State Machine Models from Software Executions
Neil Walkinshaw, Ramsay Taylor, and John Derrick
(University of Leicester, UK; University of Sheffield, UK)
Comparing and Combining Evolutionary Couplings from Interactions and Commits
Fasil Bantelay, Motahareh Bahrami Zanjani, and Huzefa Kagdi
(Wichita State University, USA)

Software Quality

Improving SOA Antipatterns Detection in Service Based Systems by Mining Execution Traces
Mathieu Nayrolles, Naouel Moha, and Petko Valtchev
(Université du Québec à Montréal, Canada)
Video Info
Mining System Specific Rules from Change Patterns
André Hora, Nicolas Anquetil, Stéphane DucasseORCID logo, and Marco Tulio Valente
(INRIA, France; University of Lille, France; UFMG, Brazil)
Empirical Evidence of Code Decay: A Systematic Mapping Study
Ajay Bandi, Byron J. Williams, and Edward B. Allen
(Mississippi State University, USA)
Mining the Relationship between Anti-patterns Dependencies and Fault-Proneness
Fehmi Jaafar, Yann-Gaël Guéhéneuc, Sylvie Hamel, and Foutse KhomhORCID logo
(Polytechnique Montréal, Canada; Université de Montréal, Canada)

Traceability and Feature Location

Leveraging Historical Co-change Information for Requirements Traceability
Nasir Ali, Fehmi Jaafar, and Ahmed E. Hassan ORCID logo
(Queen's University, Canada; Université de Montréal, Canada)
Using Relationships for Matching Textual Domain Models with Existing Code
Raghavan Komondoor, Indrajit Bhattacharya, Deepak D'Souza, and Sachin Kale
(Indian Institute of Science, India; IBM Research, India)
On the Effectiveness of Accuracy of Automated Feature Location Technique
Takashi Ishio, Shinpei Hayashi, Hiroshi Kazato, and Tsuyoshi Oshima
(Osaka University, Japan; Tokyo Institute of Technology, Japan; NTT Data Intellilink, Japan; NTT, Japan)
Info
On the Effect of Program Exploration on Maintenance Tasks
Zéphyrin Soh, Foutse KhomhORCID logo, Yann-Gaël Guéhéneuc, Giuliano Antoniol, and Bram Adams
(Polytechnique Montréal, Canada)

proc time: 0.04