{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T03:55:01Z","timestamp":1771559701561,"version":"3.50.1"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T00:00:00Z","timestamp":1750377600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100023890","name":"Technische Universit\u00e4t Hamburg","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100023890","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2025,9]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>Architecture recovery tools help software engineers obtain an overview of the structure of their software systems during all phases of the software development life cycle. This is especially important for microservice applications because they consist of multiple interacting microservices, which makes it more challenging to oversee the architecture. Various tools and techniques for architecture recovery (also called architecture reconstruction) have been presented in academic and gray literature sources, but no overview and comparison of their accuracy exists. This paper presents the results of a multivocal literature review with the goal of identifying architecture recovery tools for microservice applications and a comparison of the identified tools\u2019 architectural recovery accuracy. We focused on static tools since they can be integrated into fast-paced CI\/CD pipelines. 13 such tools were identified from the literature and nine of them could be executed and compared on their capability of detecting different system characteristics. The best-performing tool exhibited an overall F1-score of 0.86. Additionally, the possibility of combining multiple tools to increase the recovery correctness was investigated, yielding a combination of four individual tools that achieves an F1-score of 0.91.<\/jats:p>","DOI":"10.1007\/s10664-025-10686-2","type":"journal-article","created":{"date-parts":[[2025,6,20]],"date-time":"2025-06-20T04:37:33Z","timestamp":1750394253000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Comparison of static analysis architecture recovery tools for microservice applications"],"prefix":"10.1007","volume":"30","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8605-615X","authenticated-orcid":false,"given":"Simon","family":"Schneider","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3513-7253","authenticated-orcid":false,"given":"Alexander","family":"Bakhtin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3767-2527","authenticated-orcid":false,"given":"Xiaozhou","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2435-3543","authenticated-orcid":false,"given":"Jacopo","family":"Soldani","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2048-2468","authenticated-orcid":false,"given":"Antonio","family":"Brogi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5882-5502","authenticated-orcid":false,"given":"Tomas","family":"Cerny","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3591-7671","authenticated-orcid":false,"given":"Riccardo","family":"Scandariato","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3210-3990","authenticated-orcid":false,"given":"Davide","family":"Taibi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,20]]},"reference":[{"key":"10686_CR1","doi-asserted-by":"crossref","unstructured":"Abdelfattah AS, Cerny T (1838) Roadmap to reasoning in microservice systems: A rapid review. Appl Sci 13(3):2023","DOI":"10.3390\/app13031838"},{"key":"10686_CR2","doi-asserted-by":"crossref","unstructured":"Abdelfattah A,\u00a0Schiewe M,\u00a0Curtis J,\u00a0Cerny T,\u00a0Song E (2023) Towards security-aware microservices: On extracting endpoint data access operations to determine access rights. In: 13th international conference on cloud computing and services science (CLOSER 2023)","DOI":"10.5220\/0011707500003488"},{"key":"10686_CR3","doi-asserted-by":"crossref","unstructured":"Akkaya K,\u00a0Ovatman T (2022) A comparative study of meta-data-based microservice extraction tools. IJSSMET","DOI":"10.4018\/IJSSMET.298677"},{"key":"10686_CR4","doi-asserted-by":"crossref","unstructured":"Alshuqayran N,\u00a0Ali N,\u00a0Evans R (2016) A systematic mapping study in microservice architecture. In: 2016 IEEE 9th international conference on service-oriented computing and applications (SOCA). IEEE, pp. 44\u201351","DOI":"10.1109\/SOCA.2016.15"},{"key":"10686_CR5","doi-asserted-by":"crossref","unstructured":"Alshuqayran N,\u00a0Ali N,\u00a0Evans R (2018) Towards micro service architecture recovery: An empirical study. In: ICSA","DOI":"10.1109\/ICSA.2018.00014"},{"issue":"6","key":"10686_CR6","first-page":"365","volume":"32","author":"E Arisholm","year":"2006","unstructured":"Arisholm E, Briand LC, Hove SE, Labiche Y (2006) The impact of uml documentation on software maintenance: an experimental evaluation. TSE 32(6):365\u2013381","journal-title":"TSE"},{"key":"10686_CR7","doi-asserted-by":"crossref","unstructured":"Bakhtin A,\u00a0Al\u00a0Maruf A,\u00a0Cerny T,\u00a0Taibi D (2022) Survey on tools and techniques detecting microservice api patterns. In: SCC","DOI":"10.1109\/SCC55611.2022.00018"},{"key":"10686_CR8","doi-asserted-by":"crossref","unstructured":"Bakhtin A,\u00a0Li X,\u00a0Soldani J,\u00a0Brogi A,\u00a0Cerny T,\u00a0Taibi D (2024) Tools reconstructing microservice architecture: A systematic mapping study. In: Software Architecture. ECSA 2023 Tracks, Workshops, and Doctoral Symposium, B.\u00a0Tekinerdo\u011fan, R.\u00a0Spalazzese, H.\u00a0S\u00f6zer, S.\u00a0Bonfanti, and D.\u00a0Weyns, Eds. Cham: Springer Nature Switzerland, pp. 3\u201318","DOI":"10.1007\/978-3-031-66326-0_1"},{"key":"10686_CR9","doi-asserted-by":"crossref","unstructured":"Bambhore\u00a0Tukaram A,\u00a0Schneider S, D\u00edaz\u00a0Ferreyra NE,\u00a0Simhandl G, Zdun U,\u00a0Scandariato R (2022) Towards a security benchmark for the architectural design of microservice applications. In: ARES. New York, NY, USA: ACM","DOI":"10.1145\/3538969.3543807"},{"key":"10686_CR10","doi-asserted-by":"crossref","unstructured":"Budgen D, Burn AJ,\u00a0Brereton P, Kitchenham AB,\u00a0Pretorius R (2011) Empirical evidence about the uml: a systematic literature review. Software: Practice and Experience 41(4): 363-392","DOI":"10.1002\/spe.1009"},{"issue":"17","key":"10686_CR11","doi-asserted-by":"publisher","first-page":"7856","DOI":"10.3390\/app11177856","volume":"11","author":"V Bushong","year":"2021","unstructured":"Bushong V, Abdelfattah AS, Maruf AA, Das D, Lehman A, Jaroszewski E, Coffey M, Cerny T, Frajtak K, Tisnovsky P, Bures M (2021) On microservice analysis and architecture evolution: A systematic mapping study. Appl Sci 11(17):7856","journal-title":"Appl Sci"},{"key":"10686_CR12","doi-asserted-by":"crossref","unstructured":"Bushong V,\u00a0Das D,\u00a0Al\u00a0Maruf A,\u00a0Cerny T (2021) Using static analysis to address microservice architecture reconstruction. In: ASE","DOI":"10.1109\/ASE51524.2021.9678749"},{"key":"10686_CR13","doi-asserted-by":"crossref","unstructured":"Cao C,\u00a0Schneider S,\u00a0Diaz\u00a0Ferreyra N,\u00a0Verweer S,\u00a0Panichella A, Scandariato R (2024) Catma: Conformance analysis tool for microservice applications. In: ICSE-Companion","DOI":"10.1145\/3639478.3640022"},{"key":"10686_CR14","doi-asserted-by":"crossref","unstructured":"Cerny T, Abdelfattah AS,\u00a0Bushong V,\u00a0Al\u00a0Maruf A,\u00a0Taibi D (2022) Microservice architecture reconstruction and visualization techniques: A review. In: SOSE","DOI":"10.1109\/SOSE55356.2022.00011"},{"key":"10686_CR15","doi-asserted-by":"crossref","unstructured":"Christakis M,\u00a0Bird C (2016) What developers want and need from program analysis: an empirical study. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, ser. ASE \u201916. New York, NY, USA: Association for Computing Machinery, p. 332\u2013343","DOI":"10.1145\/2970276.2970347"},{"key":"10686_CR16","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.376","volume":"7","author":"D Das","year":"2021","unstructured":"Das D, Walker A, Bushong V, Svacina J, Cerny T, Matyas V (2021) On automated RBAC assessment by constructing a centralized perspective for microservice mesh. PeerJ Computer Science 7:e376","journal-title":"PeerJ Computer Science"},{"key":"10686_CR17","first-page":"77","volume":"150","author":"P Di Francesco","year":"2019","unstructured":"Di Francesco P, Lago P, Malavolta I (2019) Architecting with microservices: A systematic mapping study. JSS 150:77\u201397","journal-title":"JSS"},{"issue":"3","key":"10686_CR18","doi-asserted-by":"publisher","first-page":"835","DOI":"10.1109\/TSE.2020.3004525","volume":"48","author":"LNQ Do","year":"2022","unstructured":"Do LNQ, Wright JR, Ali K (2022) Why do software developers use static analysis tools? a user-centered study of developer needs and motivations. IEEE Trans Software Eng 48(3):835\u2013847","journal-title":"IEEE Trans Software Eng"},{"key":"10686_CR19","volume-title":"Microservices: yesterday, today, and tomorrow","author":"N Dragoni","year":"2016","unstructured":"Dragoni N, Giallorenzo S, Lluch-Lafuente A, Mazzara M, Montesi F, Mustafin R, Safina L (2016) Microservices: yesterday, today, and tomorrow. Springer International Publishing, Berlin"},{"key":"10686_CR20","doi-asserted-by":"crossref","unstructured":"Emam KE (1999) Benchmarking kappa: Interrater agreement in software processassessments. EMSE","DOI":"10.1023\/A:1009820201126"},{"key":"10686_CR21","doi-asserted-by":"crossref","unstructured":"Fang A,\u00a0Zhou R,\u00a0Tang X,\u00a0He P (2023) Rpcover: Recovering grpc dependency in multilingual projects. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2023, pp. 1930\u20131939","DOI":"10.1109\/ASE56229.2023.00108"},{"key":"10686_CR22","doi-asserted-by":"crossref","unstructured":"Fritzsch J,\u00a0Bogner J,\u00a0Zimmermann A,\u00a0Wagner S (2019) From monolith to microservices: A classification of refactoring approaches. In: Software Engineering Aspects of Continuous Development and New Paradigms of Software Production and Deployment. Cham: Springer International Publishing","DOI":"10.1007\/978-3-030-06019-0_10"},{"key":"10686_CR23","doi-asserted-by":"crossref","unstructured":"Garcia J,\u00a0Ivkovic I,\u00a0Medvidovic N (2013) A comparative analysis of software architecture recovery techniques. In: 2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 486\u2013496","DOI":"10.1109\/ASE.2013.6693106"},{"key":"10686_CR24","first-page":"101","volume":"106","author":"V Garousi","year":"2019","unstructured":"Garousi V, Felderer M, M\u00e4ntyl\u00e4 MV (2019) Guidelines for including grey literature and conducting multivocal literature reviews in software engineering. IST 106:101\u2013121","journal-title":"IST"},{"key":"10686_CR25","doi-asserted-by":"crossref","unstructured":"Giamattei L,\u00a0Guerriero A,\u00a0Pietrantuono R,\u00a0Russo S,\u00a0Malavolta I,\u00a0Islam T, D\u00eenga M,\u00a0Koziolek A,\u00a0Singh S,\u00a0Armbruster M,\u00a0Gutierrez-Martinez J, Caro-Alvaro S,\u00a0Rodriguez D,\u00a0Weber S,\u00a0Henss J, Vogelin EF, Panojo FS (2024) Monitoring tools for devops and microservices: A systematic grey literature review. JSS","DOI":"10.1016\/j.jss.2023.111906"},{"key":"10686_CR26","doi-asserted-by":"crossref","unstructured":"Gortney ME, Harris PE,\u00a0Cerny T, Maruf AA,\u00a0Bures M,\u00a0Taibi D, Tisnovsky P (2022) Visualizing microservice architecture in the dynamic perspective: A systematic mapping study. IEEE Access","DOI":"10.1109\/ACCESS.2022.3221130"},{"key":"10686_CR27","doi-asserted-by":"crossref","unstructured":"Granchelli G,\u00a0Cardarelli M,\u00a0Di\u00a0Francesco P,\u00a0Malavolta I,\u00a0Iovino L, Di\u00a0Salle A (2017) Towards recovering the software architecture of microservice-based systems. In: ICSAW","DOI":"10.1109\/ICSAW.2017.48"},{"key":"10686_CR28","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.jvlc.2014.12.004","volume":"28","author":"C Gravino","year":"2015","unstructured":"Gravino C, Scanniello G, Tortora G (2015) Source-code comprehension tasks supported by uml design models: Results from a controlled experiment and a differentiated replication. Journal of Visual Languages & Computing 28:23\u201338","journal-title":"Journal of Visual Languages & Computing"},{"key":"10686_CR29","doi-asserted-by":"crossref","unstructured":"Gravino C,\u00a0Tortora G,\u00a0Scanniello G (2010) An empirical investigation on the relation between analysis models and source code comprehension. In: SAC. ACM","DOI":"10.1145\/1774088.1774576"},{"key":"10686_CR30","doi-asserted-by":"crossref","unstructured":"Habib A,\u00a0Pradel M (2018) How many of all bugs do we find? a study of static bug detectors. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ser. ASE \u201918. New York, NY, USA: Association for Computing Machinery, p. 317\u2013328","DOI":"10.1145\/3238147.3238213"},{"key":"10686_CR31","doi-asserted-by":"crossref","unstructured":"Hutcheson R,\u00a0Blanchard A,\u00a0Lambaria N,\u00a0Hale J, David\u00a0Kozak, AE, Cerny T (2024) Software architecture reconstruction for microservice systems using static analysis via graalvm native image. In: SANER 2024, ser. SANER. Institute of Electrical and Electronics Engineers","DOI":"10.1109\/SANER60148.2024.00008"},{"key":"10686_CR32","doi-asserted-by":"crossref","unstructured":"Ibrahim A,\u00a0Bozhinoski S,\u00a0Pretschner A (2019) Attack graph generation for microservice architecture. In: Symposium on Applied Computing. ACM","DOI":"10.1145\/3297280.3297401"},{"key":"10686_CR33","unstructured":"JetBrains (2022) The state of developer ecosystem 2022,\u201d JetBrains, Tech. Rep. Sccessed on 09.02.2024. [Online]. Available: https:\/\/www.jetbrains.com\/lp\/devecosystem-2022\/microservices\/"},{"key":"10686_CR34","doi-asserted-by":"crossref","unstructured":"Johnson B,\u00a0Song Y,\u00a0Murphy-Hill E,\u00a0Bowdidge R (2013) Why don\u2019t software developers use static analysis tools to find bugs?. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 672\u2013681","DOI":"10.1109\/ICSE.2013.6606613"},{"key":"10686_CR35","unstructured":"JRebel (2022) 2022 java developer productivity report. JRebel, Tech. Rep. accessed on 09.02.2024. [Online]. Available: https:\/\/www.jrebel.com\/resources\/java-developer-productivity-report-2022"},{"key":"10686_CR36","unstructured":"Kitchenham B (2004) Procedures for performing systematic reviews. Keele Univ., vol, Keele, UK, p 33"},{"key":"10686_CR37","unstructured":"Kitchenham B,\u00a0Charters S (2007) Guidelines for performing systematic literature reviews in software engineering vol.\u00a02"},{"key":"10686_CR38","doi-asserted-by":"crossref","unstructured":"Kleehaus M, Uludag\u00d6,\u00a0Sch\u00e4fer P,\u00a0Matthes F (2018) Microlyze: A framework for recovering the software architecture in microservice-based environments,\u201d in Information Systems in the Big Data Era. Springer International Publishing","DOI":"10.1007\/978-3-319-92901-9_14"},{"issue":"1","key":"10686_CR39","doi-asserted-by":"publisher","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis JR, Koch GG (1977) The measurement of observer agreement for categorical data. Biometrics 33(1):159\u2013174","journal-title":"Biometrics"},{"key":"10686_CR40","doi-asserted-by":"crossref","unstructured":"Lelovic L,\u00a0Huzinga A,\u00a0Goulis G,\u00a0Kaur A,\u00a0Boone R,\u00a0Muzrapov U, Abdelfattah AS,\u00a0Cerny T (2024) Change impact analysis in microservice systems: A systematic literature review. Journal of Systems and Software, p. 112241","DOI":"10.1016\/j.jss.2024.112241"},{"key":"10686_CR41","doi-asserted-by":"crossref","unstructured":"Lenarduzzi V,\u00a0Pecorelli F,\u00a0Saarimaki N,\u00a0Lujan S,\u00a0Palomba (2023) F A critical comparison on six static analysis tools: Detection, agreement, and precision. JSS","DOI":"10.2139\/ssrn.4044439"},{"key":"10686_CR42","unstructured":"Lewis J,\u00a0Fowler M (2014) Microservices: a definition of this new architectural term. [Online]. Available: https:\/\/martinfowler.com\/articles\/microservices.html"},{"key":"10686_CR43","doi-asserted-by":"crossref","unstructured":"Li K,\u00a0Chen S,\u00a0Fan L,\u00a0Feng R,\u00a0Liu H,\u00a0Liu C,\u00a0Liu Y,\u00a0Chen Y (2023) \u201cComparison and evaluation on static application security testing (sast) tools for java,\u201d in Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ser. ESEC\/FSE 2023. New York, NY, USA: Association for Computing Machinery, p. 921\u2013933","DOI":"10.1145\/3611643.3616262"},{"key":"10686_CR44","doi-asserted-by":"crossref","unstructured":"Liu H,\u00a0Chen S,\u00a0Feng R,\u00a0Liu C,\u00a0Li K,\u00a0Xu Z,\u00a0Nie L,\u00a0Liu Y,\u00a0Chen Y. (2023) \u201cA comprehensive study on quality assurance tools for java. In: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, ser. ISSTA 2023. New York, NY, USA: Association for Computing Machinery, p. 285\u2013297","DOI":"10.1145\/3597926.3598056"},{"key":"10686_CR45","doi-asserted-by":"crossref","unstructured":"Lutellier T,\u00a0Chollak D,\u00a0Garcia J,\u00a0Tan L,\u00a0Rayside D,\u00a0Medvidovic N,\u00a0Kroeger R (2015) Comparing software architecture recovery techniques using accurate dependencies. In: 2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering, vol.\u00a02, pp. 69\u201378","DOI":"10.1109\/ICSE.2015.136"},{"issue":"2","key":"10686_CR46","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/TSE.2017.2671865","volume":"44","author":"T Lutellier","year":"2018","unstructured":"Lutellier T, Chollak D, Garcia J, Tan L, Rayside D, Medvidovi\u0107 N, Kroeger R (2018) Measuring the impact of code dependencies on software architecture recovery techniques. IEEE Trans Software Eng 44(2):159\u2013181","journal-title":"IEEE Trans Software Eng"},{"key":"10686_CR47","doi-asserted-by":"crossref","unstructured":"Mantere M,\u00a0Uusitalo I,\u00a0Roning J (2009) Comparison of static code analysis tools. In: SECURWARE","DOI":"10.1109\/SECURWARE.2009.10"},{"key":"10686_CR48","unstructured":"Moreschini S,\u00a0Recupito G,\u00a0Lenarduzzi V,\u00a0Palomba F,\u00a0H\u00e4stbacka D, Taibi D (2023) Toward end-to-end mlops tools map: A preliminary study based on a multivocal literature review ArXiv"},{"key":"10686_CR49","doi-asserted-by":"crossref","unstructured":"Muntoni G,\u00a0Soldani J,\u00a0Brogi A (2021) Mining the architecture of microservice-based applications from their kubernetes deployment. In: Advances in Service-Oriented and Cloud Computing. Cham: Springer International Publishing","DOI":"10.1007\/978-3-030-71906-7_9"},{"key":"10686_CR50","doi-asserted-by":"crossref","unstructured":"Neri D,\u00a0Soldani J,\u00a0Zimmermann O,\u00a0Brogi A (2020) Design principles, architectural smells and refactorings for microservices: a multivocal review. SICS","DOI":"10.1007\/s00450-019-00407-8"},{"key":"10686_CR51","first-page":"137","volume":"1","author":"C Pahl","year":"2016","unstructured":"Pahl C, Jamshidi P (2016) Microservices: A systematic mapping study. CLOSER 1:137\u2013146","journal-title":"CLOSER"},{"key":"10686_CR52","volume":"136","author":"S Peltonen","year":"2021","unstructured":"Peltonen S, Mezzalira L, Taibi D (2021) Motivations, benefits, and issues for adopting micro-frontends: A multivocal literature review. IST 136:106571","journal-title":"IST"},{"key":"10686_CR53","volume":"192","author":"F Ponce","year":"2022","unstructured":"Ponce F, Soldani J, Astudillo H, Brogi A (2022) Smells and refactorings for microservices security: A multivocal literature review. JSS 192:111393","journal-title":"JSS"},{"key":"10686_CR54","doi-asserted-by":"crossref","unstructured":"Qu\u00e9val P-J,\u00a0Zdun U (2023) Extracting the architecture of microservices: An approach for explainability and traceability. In: ECSA. Cham: Springer Nature Switzerland","DOI":"10.1007\/978-3-031-42592-9_24"},{"key":"10686_CR55","unstructured":"Rahman MI,\u00a0Panichella S,\u00a0Taibi D (2019) A curated dataset of microservices-based systems"},{"key":"10686_CR56","unstructured":"Ralph P, Ali NB,\u00a0Baltes S,\u00a0Bianculli D,\u00a0Diaz J,\u00a0Dittrich Y,\u00a0Ernst N, Felderer M,\u00a0Feldt R,\u00a0Filieri A et\u00a0al (2020) Empirical standards for software engineering research. arXiv:2010.03525"},{"key":"10686_CR57","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2024.107590","volume":"177","author":"AM Saucedo","year":"2024","unstructured":"Saucedo AM, Rodr\u00edguez G, Rocha FG, dos Santos RP (2024) Migration of monolithic systems to microservices: A systematic mapping study. Inf Softw Technol 177:107590","journal-title":"Inf Softw Technol"},{"key":"10686_CR58","doi-asserted-by":"crossref","unstructured":"Schiewe M,\u00a0Curtis J,\u00a0Bushong V,\u00a0Cerny T (2022) Advancing static code analysis with language-agnostic component identification. IEEE Access 10:30\u00a0743\u201330\u00a0761","DOI":"10.1109\/ACCESS.2022.3160485"},{"key":"10686_CR59","doi-asserted-by":"crossref","unstructured":"Schneider S,\u00a0Bakhtin A,\u00a0Li X,\u00a0Soldani J,\u00a0Brogi A,\u00a0Cerny T, Scandariato R,\u00a0Taibi D (2024) Comparison of static analysis architecture recovery tools for microservice applications. [Online]. Available: https:\/\/arxiv.org\/abs\/2403.06941","DOI":"10.1007\/s10664-025-10686-2"},{"key":"10686_CR60","doi-asserted-by":"crossref","unstructured":"Schneider S, Diaz\u00a0Ferreyra NE, Queval P-J,\u00a0Simhandl G,\u00a0Zdun U, Scandariato R (2024) How dataflow diagrams impact software security analysis: an empirical experiment. In: SANER","DOI":"10.1109\/SANER60148.2024.00103"},{"key":"10686_CR61","doi-asserted-by":"crossref","unstructured":"Schneider S,\u00a0\u00d6zen T,\u00a0Chen M,\u00a0Scandariato R (2023) microsecend: A dataset of security-enriched dataflow diagrams for microservice applications. In: MSR","DOI":"10.1109\/MSR59073.2023.00030"},{"key":"10686_CR62","doi-asserted-by":"crossref","unstructured":"Schneider S,\u00a0Scandariato R (2023) Automatic extraction of security-rich dataflow diagrams for microservice applications written in java. JSS","DOI":"10.1016\/j.jss.2023.111722"},{"issue":"3","key":"10686_CR63","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/s42979-023-01721-4","volume":"4","author":"J Soldani","year":"2023","unstructured":"Soldani J, Khalili J, Brogi A (2023) Offline mining of microservice-based architectures (extended version). SN Comput. Sci. 4(3):304","journal-title":"SN Comput. Sci."},{"key":"10686_CR64","volume-title":"The mtosca toolchain: Mining, analyzing, and refactoring microservice-based architectures","author":"J Soldani","year":"2021","unstructured":"Soldani J, Muntoni G, Neri D, Brogi A (2021) The mtosca toolchain: Mining, analyzing, and refactoring microservice-based architectures. Practice and Experience, Software"},{"key":"10686_CR65","first-page":"215","volume":"146","author":"J Soldani","year":"2018","unstructured":"Soldani J, Tamburri DA, Van Den Heuvel W-J (2018) The pains and gains of microservices: A systematic grey literature review. JSS 146:215\u2013232","journal-title":"JSS"},{"key":"10686_CR66","doi-asserted-by":"crossref","unstructured":"Taibi D,\u00a0Lenarduzzi V,\u00a0Pahl C (2020) Microservices Anti-patterns: A Taxonomy Cham: Springer International Publishing","DOI":"10.1007\/978-3-030-31646-4_5"},{"key":"10686_CR67","doi-asserted-by":"publisher","unstructured":"Thung F, Lucia,\u00a0Lo D,\u00a0Jiang L,\u00a0Rahman F, Devanbu PT (2015) To what extent could we detect field defects? an extended empirical study of false negatives in static bug-finding tools. Automated Software Engineering, vol.\u00a022, no.\u00a04, pp. 561\u2013602. [Online]. Available: https:\/\/doi.org\/10.1007\/s10515-014-0169-8","DOI":"10.1007\/s10515-014-0169-8"},{"key":"10686_CR68","doi-asserted-by":"crossref","unstructured":"Tomassi DA (2018) Bugs in the wild: examining the effectiveness of static analyzers at finding real-world bugs. In: Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ser. ESEC\/FSE 2018. New York, NY, USA: Association for Computing Machinery, p. 980\u2013982","DOI":"10.1145\/3236024.3275439"},{"key":"10686_CR69","doi-asserted-by":"publisher","unstructured":"Vassallo C,\u00a0Panichella S,\u00a0Palomba F,\u00a0Proksch S, Gall HC,\u00a0Zaidman A (2020) \u201cHow developers engage with static analysis tools in different contexts,\u201d Empirical Software Engineering, vol.\u00a025, no.\u00a02, pp. 1419\u20131457, Mar. [Online]. Available: https:\/\/doi.org\/10.1007\/s10664-019-09750-5","DOI":"10.1007\/s10664-019-09750-5"},{"key":"10686_CR70","doi-asserted-by":"crossref","unstructured":"Wang Y,\u00a0Bornais S,\u00a0Rubin J (2024) Microservice decomposition techniques: An independent tool comparison. In: Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering, pp. 1295\u20131307","DOI":"10.1145\/3691620.3695504"},{"key":"10686_CR71","doi-asserted-by":"crossref","unstructured":"Wohlin C (2014) Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: EASE. ACM","DOI":"10.1145\/2601248.2601268"},{"key":"10686_CR72","doi-asserted-by":"publisher","unstructured":"Zenodo (2025) Replication package of this article. [Online]. Available: https:\/\/doi.org\/10.5281\/zenodo.14179612","DOI":"10.5281\/zenodo.14179612"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10686-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-025-10686-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-025-10686-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,13]],"date-time":"2025-09-13T08:53:38Z","timestamp":1757753618000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-025-10686-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,20]]},"references-count":72,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9]]}},"alternative-id":["10686"],"URL":"https:\/\/doi.org\/10.1007\/s10664-025-10686-2","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,20]]},"assertion":[{"value":"3 June 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed Consent"}},{"value":"The authors declare that they have no conflict of interest.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of Interest"}},{"value":"Not applicable.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Clinical Trial Number"}}],"article-number":"128"}}