In keeping with the spirit and format of a working conference, SCAM will have a highly discursive nature, with theme-based discussion tracks and a keynote presentation, aimed at structuring and stimulating discussion.

Authors will have a 15 minute slot to present their work. This is 10 minutes (maximum) for talking with 5 minutes (minimum) for questions. Authors are encouraged not to attempt to present the details of their paper in this time. Rather, respecting the discussion-centered goal of SCAM, authors are encouraged to use a few slides to present points, claims, issues and topics for discussion and to use their time allocation to attempt to set the agenda for the ensuing discussions.

Each session has a specifically allocated discussion time at the end of the presentations to allow for this.

Sunday 23rd September

09:00 - 09:15 Welcome, Introduction – General and Program Chairs

09:15 - 10:30 Keynote - Session Chair: Jim Cordy
  • Tao Xie: Cooperative Testing and Analysis: Human-Tool, Tool-Tool, and Human-Human Cooperations to Get Things Done [Presentation Slides]

10:30 – 11:00 Coffee break

11:00 – 12:30 Session 1: Static Analysis - Session Chair: Sibylle Schupp
  • Tobias Gutzmann, Jonas Lundberg, Welf Löwe: Collections Frameworks for Points-To Analysis [Presentation Slides]
  • Edward Aftandilian, Raluca Sauciuc, Siddharth Priya, Sundaresan Krishnan: Building Useful Program Analysis Tools Using an Extensible Java Compiler
  • Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy: Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit [Presentation Slides]
[Session 1 discussion slides]

12:30 - 14:00 Lunch

14:00 - 15:30 Session 2: Security and Validation - Session Chair: Jurgen Vinju
  • Germán Vidal: Closed Symbolic Execution for Verifying Program Termination [Presentation Slides]
  • François Gauthier, Ettore Merlo: Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications [Presentation Slides]
  • Jun Yuan, Rob Johnson: CAWDOR: Compiler Assisted Worm Defense
[Session 2 discussion slides]

15:30 - 16:00 Coffee break

16:00 - 17:00 Session 3: Clone Detection - Session Chair: Jens Krinke
  • Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto: Folding Repeated Instructions for Improving Token-Based Code Clone Detection [Presentation Slides]
  • Saman Bazrafshan: Evolution of Near-Miss Clones [Presentation Slides]
[Session 3 discussion slides]

Evening: Social Event

Monday 24th September

09:00 - 10:30 Session 4: Metrics and Models - Session Chair: Leon Moonen
  • Malcom Gethers, Amir Aryani, Denys Poshyvanyk: Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies [Presentation Slides]
  • Jurgen J. Vinju, Michael W. Godfrey: What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity Metric [Presentation Slides]
  • John Businge, Alexander Serebrenik, Mark van den Brand: Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases [Presentation Slides]
[Session 4 discussion slides]

10:30 - 11:00 Coffee break

11:00 - 12:30 Session 5: Tools - Session Chair: Chanchal Roy
  • Andrea Zambon: Aucsmith-Like Obfuscation of Java Bytecode
  • Christian Zoller, Axel Schmolitzky: AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems [Presentation Slides]
  • Mihai T. Lazarescu, Luciano Lavagno: Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs
  • Hariharan Thiagarajan, John Hatcliff, Jason Belt, Robby: Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARK
  • Ulf Kargén, Nahid Shahmehri: InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries
[Session 5 discussion slides]

12:30 – 14:00 Lunch

14:00 - 15:30 Session 6: Transformation and Refactoring - Session Chair: Thomas Dean
  • Chris Wilcox, Michelle Mills Strout, James M. Bieman: Optimizing Expression Selection for Lookup Table Program Transformation [Presentation Slides]
  • Philip Mayer, Andreas Schroeder: Cross-Language Code Analysis and Refactoring [Presentation Slides]
  • Gabriele Bavota, Bernardino De Carluccio, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Orazio Strollo: When Does a Refactoring Induce Bugs? An Empirical Study [Presentation Slides]
[Session 6 discussion slides]

15:30 – 16:00 Coffee break

16:00 – 17:00 Session 7: Bug Location - Session Chair: Massimiliano Di Penta
  • Nasir Ali, Aminata Sabané, Yann-Gaël Guéhéneuc, Giuliano Antoniol: Improving Bug Location Using Binary Class Relationships
  • Emily Hill, Shivani Rao, Avinash Kak: On the Use of Stemming for Concern Location and Bug Localization in Java [Presentation Slides]
[Session 7 discussion slides]

17:00 – 17:10 Closing

17:10 – 17:40 Open Steering Committee Meeting