Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering 2016
DOI: 10.1145/2950290.2950312
|View full text |Cite
|
Sign up to set email alerts
|

Call graph construction for Java libraries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 35 publications
(17 citation statements)
references
References 29 publications
0
17
0
Order By: Relevance
“…Therefore, static analysis on those applications, such as taint analysis [16] and permission investigation [47], can employ ORTA for constructing the call graphs from those entry methods. Another example is the static analysis on Java libraries, such as dead method detection [15]. ORTA reduces the cost of analysing reachable methods from the public methods of the library similar to the process of constructing the one-to-one matched call graphs on ORTA-based separateRTS.…”
Section: Use Of Orta For Other Purposesmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, static analysis on those applications, such as taint analysis [16] and permission investigation [47], can employ ORTA for constructing the call graphs from those entry methods. Another example is the static analysis on Java libraries, such as dead method detection [15]. ORTA reduces the cost of analysing reachable methods from the public methods of the library similar to the process of constructing the one-to-one matched call graphs on ORTA-based separateRTS.…”
Section: Use Of Orta For Other Purposesmentioning
confidence: 99%
“…2. Although this approach has been used in existing studies where multiple entry points exist [11, 15, 16], this approach tends to overestimate which entry points are influenced by modified code. For example, assume that the coloured node in Fig.…”
Section: Proposed Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…It has been shown that associating a distinct set of types with each method in a class has a significantly greater impact on precision than using a distinct set for each field in a class. Reif et al [14] study the construction of call graphs for Java libraries that abstract over all potential library usages, in a so-called open world approach. They invented two concrete call graph algorithms for libraries based on adaptations of the CHA algorithm, to be used for software quality and security issues.…”
Section: Related Workmentioning
confidence: 99%
“…In total, our study compares 54 unique TCP technique instantiations. Research has shown that the studied dimensions affect TCP effectiveness and coverage precision (Rothermel et al 2001;Elbaum et al 2002;Hao et al 2014;Henard et al 2016;Luo et al 2016;Luo et al 2019;Reif et al 2016;Reif et al 2019).…”
Section: Introductionmentioning
confidence: 99%