Write a Blog >>
ICSE 2020
Wed 24 June - Thu 16 July 2020
Fri 10 Jul 2020 08:45 - 08:53 at Goguryeo - I23-Code Artifact Analysis Chair(s): Benoit Baudry

Diagnosis of memory and resource leaks is regarded as one of the most significant challenges for software developers [1]. Many academic studies, tools, and language features address this challenge and propose techniques for avoidance, diagnosis, and repair of leak-related bugs (with certain emphasis on memory leaks). Evaluation, comparison, and improvement of these techniques can be demanding due to the high effort of reproducing real-world bugs, lack of common benchmarks, and limited knowledge of the characteristics and the distribution of these issues. Thus, a comprehensive data set and empirically grounded understanding of the properties of leak-inducing defects, how the leaks manifest, and how they are repaired can greatly support the progress in this domain. To this end, we conducted a comprehensive empirical study on 491 real-world memory and resource leak defects collected from issue trackers of 15 open-source Java applications. We analyzed a large number of aspects of the collected issues and their repair patches ranging from distribution of leak types to common repair patterns found in patches. Our study significantly complements previous work [2, 3] and expands the research body of empirical studies in terms of detection types, root causes, and repair types of leak-related defects in Java. Our findings and conclusions can be of relevance for designing approaches and tools for diagnosis of leak-related defects, for debugging practices, and for automated repair approaches.

Fri 10 Jul
Times are displayed in time zone: (UTC) Coordinated Universal Time change

08:05 - 09:05: I23-Code Artifact AnalysisPaper Presentations / Journal First / Technical Papers at Goguryeo
Chair(s): Benoit BaudryKTH Royal Institute of Technology
08:05 - 08:17
Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical
Technical Papers
Qingkai ShiThe Hong Kong University of Science and Technology, Rongxin WuDepartment of Cyber Space Security, Xiamen University, Gang FanHong Kong University of Science and Technology, Charles ZhangThe Hong Kong University of Science and Technology
08:17 - 08:29
Pipelining Bottom-up Data Flow AnalysisTechnical
Technical Papers
Qingkai ShiThe Hong Kong University of Science and Technology, Charles ZhangThe Hong Kong University of Science and Technology
08:29 - 08:37
An Empirical Validation of Oracle ImprovementJ1
Journal First
Gunel JahangirovaUniversità della Svizzera italiana, David ClarkUniversity College London, Mark Harman, Paolo TonellaUniversità della Svizzera italiana
08:37 - 08:45
Is Static Analysis Able to Identify Unnecessary Source Code?J1
Journal First
Roman HaasCQSE GmbH, Rainer NiedermayrCQSE GmbH, Tobias RoehmCQSE GmbH, Sven ApelSaarland University
08:45 - 08:53
Memory and Resource Leak Defects and Their Repairs in Java ProjectsJ1
Journal First
Mohammadreza GhanavatiHeidelberg University, Diego CostaConcordia University, Canada, Janos SeboekHeidelberg University, David LoSingapore Management University, Artur AndrzejakHeidelberg University
08:53 - 09:01
Towards Understanding and Detecting Fake Reviews in App StoresJ1
Journal First
Daniel MartensUniversity of Hamburg, Walid MaalejUniversity of Hamburg