Automatic construction of an effective training set for prioritizing static analysis warnings

@inproceedings{Liang2010AutomaticCO,
  title={Automatic construction of an effective training set for prioritizing static analysis warnings},
  author={Guangtai Liang and Ling Wu and Qian Wu and Qianxiang Wang and Tao Xie and Hong Mei},
  booktitle={ASE},
  year={2010}
}
In order to improve ineffective warning prioritization of static analysis tools, various approaches have been proposed to compute a ranking score for each warning. In these approaches, an effective training set is vital in exploring which factors impact the ranking score and how. While manual approaches to build a training set can achieve high effectiveness but suffer from low efficiency (i.e., high cost), existing automatic approaches suffer from low effectiveness. In this paper, we propose an… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 14 CITATIONS

User-Centric Static Analysis

VIEW 1 EXCERPT
CITES BACKGROUND

Survey of Approaches for Handling Static Analysis Alarms

  • 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM)
  • 2016
VIEW 1 EXCERPT
CITES METHODS

Trust-based fusion of classifiers for static code analysis

  • 17th International Conference on Information Fusion (FUSION)
  • 2014
VIEW 2 EXCERPTS
CITES RESULTS & BACKGROUND

Automated Classification of Static Code Analysis Alerts: A Case Study

  • 2013 IEEE International Conference on Software Maintenance
  • 2013
VIEW 2 EXCERPTS
CITES BACKGROUND

References

Publications referenced by this paper.
SHOWING 1-6 OF 6 REFERENCES

Prioritizing Warning Categories by Analyzing Software History

  • Fourth International Workshop on Mining Software Repositories (MSR'07:ICSE Workshops 2007)
  • 2007
VIEW 6 EXCERPTS
HIGHLY INFLUENTIAL

Which warnings should I fix first?

  • ESEC/SIGSOFT FSE
  • 2007
VIEW 15 EXCERPTS
HIGHLY INFLUENTIAL

Prioritizing Software Inspection Results using Static Profiling

  • 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation
  • 2006
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Automatic mining of source code repositories to improve bug finding techniques

  • IEEE Transactions on Software Engineering
  • 2005
VIEW 8 EXCERPTS
HIGHLY INFLUENTIAL