Mining Fix Patterns for FindBugs Violations

Cited 73 time in webofscience Cited 25 time in scopus
  • Hit : 292
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorLiu, Kuiko
dc.contributor.authorKim, Dongsunko
dc.contributor.authorBissyande, Tegawende F.ko
dc.contributor.authorYoo, Shinko
dc.contributor.authorLe Traon, Yvesko
dc.date.accessioned2021-02-09T02:10:10Z-
dc.date.available2021-02-09T02:10:10Z-
dc.date.created2019-01-29-
dc.date.created2019-01-29-
dc.date.issued2021-01-
dc.identifier.citationIEEE TRANSACTIONS ON SOFTWARE ENGINEERING, v.47, no.1, pp.165 - 188-
dc.identifier.issn0098-5589-
dc.identifier.urihttp://hdl.handle.net/10203/280670-
dc.description.abstractSeveral static analysis tools, such as Splint or FindBugs, have been proposed to the software development community to help detect security vulnerabilities or bad programming practices. However, the adoption of these tools is hindered by their high false positive rates. If the false positive rate is too high, developers may get acclimated to violation reports from these tools, causing concrete and severe bugs being overlooked. Fortunately, some violations are actually addressed and resolved by developers. We claim that those violations that are recurrently fixed are likely to be true positives, and an automated approach can learn to repair similar unseen violations. However, there is lack of a systematic way to investigate the distributions on existing violations and fixed ones in the wild, that can provide insights into prioritizing violations for developers, and an effective way to mine code and fix patterns which can help developers easily understand the reasons of leading violations and how to fix them.-
dc.languageEnglish-
dc.publisherIEEE COMPUTER SOC-
dc.titleMining Fix Patterns for FindBugs Violations-
dc.typeArticle-
dc.identifier.wosid000607376900008-
dc.identifier.scopusid2-s2.0-85058135808-
dc.type.rimsART-
dc.citation.volume47-
dc.citation.issue1-
dc.citation.beginningpage165-
dc.citation.endingpage188-
dc.citation.publicationnameIEEE TRANSACTIONS ON SOFTWARE ENGINEERING-
dc.identifier.doi10.1109/tse.2018.2884955-
dc.contributor.localauthorYoo, Shin-
dc.contributor.nonIdAuthorLiu, Kui-
dc.contributor.nonIdAuthorKim, Dongsun-
dc.contributor.nonIdAuthorBissyande, Tegawende F.-
dc.contributor.nonIdAuthorLe Traon, Yves-
dc.description.isOpenAccessN-
dc.type.journalArticleArticle-
dc.subject.keywordAuthorfindbugs violation-
dc.subject.keywordAuthorFix pattern-
dc.subject.keywordAuthorpattern mining-
dc.subject.keywordAuthorprogram repair-
dc.subject.keywordAuthorunsupervised learning-
Appears in Collection
CS-Journal Papers(저널논문)
Files in This Item
There are no files associated with this item.
This item is cited by other documents in WoS
⊙ Detail Information in WoSⓡ Click to see webofscience_button
⊙ Cited 73 items in WoS Click to see citing articles in records_button

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0