Write a Blog >>
ICSE 2020
Wed 24 June - Thu 16 July 2020
Fri 10 Jul 2020 08:45 - 08:53 at Goguryeo - I23-Code Artifact Analysis Chair(s): Benoit Baudry

Diagnosis of memory and resource leaks is regarded as one of the most significant challenges for software developers [1]. Many academic studies, tools, and language features address this challenge and propose techniques for avoidance, diagnosis, and repair of leak-related bugs (with certain emphasis on memory leaks). Evaluation, comparison, and improvement of these techniques can be demanding due to the high effort of reproducing real-world bugs, lack of common benchmarks, and limited knowledge of the characteristics and the distribution of these issues. Thus, a comprehensive data set and empirically grounded understanding of the properties of leak-inducing defects, how the leaks manifest, and how they are repaired can greatly support the progress in this domain. To this end, we conducted a comprehensive empirical study on 491 real-world memory and resource leak defects collected from issue trackers of 15 open-source Java applications. We analyzed a large number of aspects of the collected issues and their repair patches ranging from distribution of leak types to common repair patterns found in patches. Our study significantly complements previous work [2, 3] and expands the research body of empirical studies in terms of detection types, root causes, and repair types of leak-related defects in Java. Our findings and conclusions can be of relevance for designing approaches and tools for diagnosis of leak-related defects, for debugging practices, and for automated repair approaches.

Fri 10 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

08:05 - 09:05
I23-Code Artifact AnalysisJournal First / Technical Papers at Goguryeo
Chair(s): Benoit Baudry KTH Royal Institute of Technology
08:05
12m
Talk
Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical
Technical Papers
Qingkai Shi The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Gang Fan Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology
08:17
12m
Talk
Pipelining Bottom-up Data Flow AnalysisTechnical
Technical Papers
Qingkai Shi The Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology
08:29
8m
Talk
An Empirical Validation of Oracle ImprovementJ1
Journal First
Gunel Jahangirova Università della Svizzera italiana, David Clark University College London, Mark Harman , Paolo Tonella Università della Svizzera italiana
08:37
8m
Talk
Is Static Analysis Able to Identify Unnecessary Source Code?J1
Journal First
Roman Haas CQSE GmbH, Rainer Niedermayr CQSE GmbH, Tobias Roehm CQSE GmbH, Sven Apel Saarland University
Pre-print
08:45
8m
Talk
Memory and Resource Leak Defects and Their Repairs in Java ProjectsJ1
Journal First
Mohammadreza Ghanavati Heidelberg University, Diego Costa Concordia University, Canada, Janos Seboek Heidelberg University, David Lo Singapore Management University, Artur Andrzejak Heidelberg University
08:53
8m
Talk
Towards Understanding and Detecting Fake Reviews in App StoresJ1
Journal First
Daniel Martens University of Hamburg, Walid Maalej University of Hamburg