2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM) 2016
DOI: 10.1109/scam.2016.25
|View full text |Cite
|
Sign up to set email alerts
|

Survey of Approaches for Handling Static Analysis Alarms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
38
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 52 publications
(38 citation statements)
references
References 93 publications
0
38
0
Order By: Relevance
“…Subsequently, it classifies and groups warnings 4 by applying the GDC 5 on them. Next, it writes out the result files for the visualizer 6 . Finally, UAV opens the user's web browser and runs the visualizer 7 .…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Subsequently, it classifies and groups warnings 4 by applying the GDC 5 on them. Next, it writes out the result files for the visualizer 6 . Finally, UAV opens the user's web browser and runs the visualizer 7 .…”
Section: Methodsmentioning
confidence: 99%
“…By contrast, existing research has tackled the problem of how to deal with a flood of warnings mainly by prioritizing them. Muske and Serebrenik give a comprehensive overview of the approaches that have been suggested so far [6].…”
Section: B User Workflowmentioning
confidence: 99%
“…As we explain in § IV and § VI, we use simple heuristics to match the location contained in the tool's warning with the location of the known bug and determine that the correct bug has been identified if the bug types match and the locations are within a certain maximum distance. We could refine this heuristic by using more sophisticated matching techniques from related work on the issue of deduplicating and/or clustering tool warning reports [53], [54].…”
Section: Limitations and Future Workmentioning
confidence: 99%
“…There have been an increasing number of approaches for handling static analysis alarms, and the approaches are categorized in a few literature reviews (Heckman and Williams 2011;Muske and Serebrenik 2016). One of the promising approaches is in a position to simplify the inspection effort by designing a set of features from the related information of source codes and reported alarms for clustering, ranking schemes and classification tasks.…”
Section: Related Workmentioning
confidence: 99%
“…To mitigate the effort of manual inspection, efficient defect identification techniques for handling static analysis alarms have been put forward by numerous studies and summarized in a few literature reviews (Heckman and Williams 2011;Muske and Serebrenik 2016). One of the promising approaches addressing the problem is to come up with a set of artifact characteristics for classifying alarms as actionable and unactionable, probability-based ranking of each alarm being true, and clustering by the similarity of alarms.…”
Section: Introductionmentioning
confidence: 99%