{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:50:55Z","timestamp":1772938255366,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T00:00:00Z","timestamp":1472083200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970347","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T12:40:09Z","timestamp":1472215209000},"page":"332-343","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":172,"title":["What developers want and need from program analysis: an empirical study"],"prefix":"10.1145","author":[{"given":"Maria","family":"Christakis","sequence":"first","affiliation":[{"name":"Microsoft Research, USA"}]},{"given":"Christian","family":"Bird","sequence":"additional","affiliation":[{"name":"Microsoft Research, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BinSkim. https:\/\/github.com\/Microsoft\/binskim.  BinSkim. https:\/\/github.com\/Microsoft\/binskim."},{"key":"e_1_3_2_1_2_1","unstructured":"Checkmarx. https:\/\/www.checkmarx.com\/.  Checkmarx. https:\/\/www.checkmarx.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Checkstyle. http:\/\/checkstyle.sourceforge.net\/.  Checkstyle. http:\/\/checkstyle.sourceforge.net\/."},{"key":"e_1_3_2_1_4_1","unstructured":"ClangTidy. http:\/\/clang.llvm.org\/extra\/clang-tidy\/.  ClangTidy. http:\/\/clang.llvm.org\/extra\/clang-tidy\/."},{"key":"e_1_3_2_1_5_1","unstructured":"CodeRush. https:\/\/www.devexpress.com\/products\/coderush\/.  CodeRush. https:\/\/www.devexpress.com\/products\/coderush\/."},{"key":"e_1_3_2_1_6_1","unstructured":"Coverity. http:\/\/www.coverity.com\/.  Coverity. http:\/\/www.coverity.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Cppcheck. http:\/\/cppcheck.sourceforge.net\/.  Cppcheck. http:\/\/cppcheck.sourceforge.net\/."},{"key":"e_1_3_2_1_8_1","unstructured":"ErrorProne. https:\/\/github.com\/google\/error-prone.  ErrorProne. https:\/\/github.com\/google\/error-prone."},{"key":"e_1_3_2_1_9_1","unstructured":"FindBugs. http:\/\/findbugs.sourceforge.net\/.  FindBugs. http:\/\/findbugs.sourceforge.net\/."},{"key":"e_1_3_2_1_10_1","unstructured":"Fortify. http:\/\/www8.hp.com\/us\/en\/software-solutions\/ static-code-analysis-sast\/.  Fortify. http:\/\/www8.hp.com\/us\/en\/software-solutions\/ static-code-analysis-sast\/."},{"key":"e_1_3_2_1_11_1","unstructured":"FxCop. https: \/\/msdn.microsoft.com\/en-us\/library\/bb429476(v=vs.80).aspx.  FxCop. https: \/\/msdn.microsoft.com\/en-us\/library\/bb429476(v=vs.80).aspx."},{"key":"e_1_3_2_1_12_1","unstructured":"Infer. http:\/\/fbinfer.com\/.  Infer. http:\/\/fbinfer.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Klocwork. http:\/\/www.klocwork.com\/.  Klocwork. http:\/\/www.klocwork.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"PREfast. https:\/\/msdn.microsoft.com\/en-us\/library\/ms933794.aspx.  PREfast. https:\/\/msdn.microsoft.com\/en-us\/library\/ms933794.aspx."},{"key":"e_1_3_2_1_15_1","unstructured":"Pylint. https:\/\/www.pylint.org\/.  Pylint. https:\/\/www.pylint.org\/."},{"key":"e_1_3_2_1_16_1","unstructured":"ReSharper. https:\/\/www.jetbrains.com\/resharper\/.  ReSharper. https:\/\/www.jetbrains.com\/resharper\/."},{"key":"e_1_3_2_1_17_1","unstructured":"Security development lifecycle. https:\/\/www.microsoft.com\/en-us\/sdl\/.   Security development lifecycle. https:\/\/www.microsoft.com\/en-us\/sdl\/."},{"key":"e_1_3_2_1_18_1","unstructured":"SonarQube. http:\/\/www.sonarqube.org\/.  SonarQube. http:\/\/www.sonarqube.org\/."},{"key":"e_1_3_2_1_19_1","unstructured":"StyleCop. https:\/\/stylecop.codeplex.com\/.  StyleCop. https:\/\/stylecop.codeplex.com\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Tricorder. https:\/\/github.com\/google\/shipshape.  Tricorder. https:\/\/github.com\/google\/shipshape."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.130"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390817.1390819"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7%3C775::AID-SPE309%3E3.0.CO;2-H"},{"key":"e_1_3_2_1_25_1","series-title":"LNCS","first-page":"465","volume-title":"NFM","author":"Calcagno C.","unstructured":"C. Calcagno and D. Distefano . Infer: An automatic program verifier for memory safety of C programs . In NFM , volume 6617 of LNCS , pages 459\u2013 465 . Springer, 2011. C. Calcagno and D. Distefano. Infer: An automatic program verifier for memory safety of C programs. In NFM, volume 6617 of LNCS, pages 459\u2013465. Springer, 2011."},{"key":"e_1_3_2_1_26_1","series-title":"LNCS","first-page":"11","volume-title":"NFM","author":"Calcagno C.","unstructured":"C. Calcagno , D. Distefano , J. Dubreil , D. Gabi , P. Hooimeijer , M. Luca , P. W. O\u2019Hearn , I. Papakonstantinou , J. Purbrick , and D. Rodriguez . Moving fast with software verification . In NFM , volume 9058 of LNCS , pages 3\u2013 11 . Springer, 2015. C. Calcagno, D. Distefano, J. Dubreil, D. Gabi, P. Hooimeijer, M. Luca, P. W. O\u2019Hearn, I. Papakonstantinou, J. Purbrick, and D. Rodriguez. Moving fast with software verification. In NFM, volume 9058 of LNCS, pages 3\u201311. Springer, 2015."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1406221"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46081-8_19"},{"key":"e_1_3_2_1_29_1","unstructured":"J. Constine. Monoidics. http:\/\/techcrunch.com\/2013\/07\/18\/facebook-monoidics\/.  J. Constine. Monoidics. http:\/\/techcrunch.com\/2013\/07\/18\/facebook-monoidics\/."},{"key":"e_1_3_2_1_30_1","volume-title":"Statistics for research","author":"Dowdy S.","year":"2011","unstructured":"S. Dowdy , S. Wearden , and D. Chilko . Statistics for research , volume 512 . John Wiley & amp; Sons, 2011 . S. Dowdy, S. Wearden, and D. Chilko. Statistics for research, volume 512. John Wiley &amp; Sons, 2011."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889222"},{"key":"e_1_3_2_1_32_1","series-title":"LNCS","first-page":"30","volume-title":"FoVeOOS","author":"F\u00e4hndrich M.","unstructured":"M. F\u00e4hndrich and F. Logozzo . Static contract checking with abstract interpretation . In FoVeOOS , volume 6528 of LNCS , pages 10\u2013 30 . Springer, 2010. M. F\u00e4hndrich and F. Logozzo. Static contract checking with abstract interpretation. In FoVeOOS, volume 6528 of LNCS, pages 10\u201330. Springer, 2010."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_1_34_1","volume-title":"Survey research methods","author":"Fowler F. J.","year":"2013","unstructured":"F. J. Fowler Jr . Survey research methods . Sage publications, 2013 . F. J. Fowler Jr. Survey research methods. Sage publications, 2013."},{"key":"e_1_3_2_1_35_1","volume-title":"The qualitative report, 8(4):597\u2013606","author":"Golafshani N.","year":"2003","unstructured":"N. Golafshani . Understanding reliability and validity in qualitative research. The qualitative report, 8(4):597\u2013606 , 2003 . N. Golafshani. Understanding reliability and validity in qualitative research. The qualitative report, 8(4):597\u2013606, 2003."},{"key":"e_1_3_2_1_36_1","volume-title":"LLC","author":"Gwet K. L.","year":"2014","unstructured":"K. L. Gwet . Handbook of inter-rater reliability: The definitive guide to measuring the extent of agreement among raters. Advanced Analytics , LLC , 2014 . K. L. Gwet. Handbook of inter-rater reliability: The definitive guide to measuring the extent of agreement among raters. Advanced Analytics, LLC, 2014."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414013"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297964"},{"key":"e_1_3_2_1_39_1","first-page":"681","volume-title":"ICSE","author":"Johnson B.","unstructured":"B. Johnson , Y. Song , E. R. Murphy-Hill , and R. W. Bowdidge . Why don\u2019t software developers use static analysis tools to find bugs ? In ICSE , pages 672\u2013 681 . ACM, 2013. B. Johnson, Y. Song, E. R. Murphy-Hill, and R. W. Bowdidge. Why don\u2019t software developers use static analysis tools to find bugs? In ICSE, pages 672\u2013681. ACM, 2013."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512488"},{"key":"e_1_3_2_1_41_1","volume-title":"Springer","author":"Kitchenham B. A.","year":"2008","unstructured":"B. A. Kitchenham and S. L. Pfleeger . Personal opinion surveys. In Guide to Advanced Empirical Software Engineering, pages 63\u201392 . Springer , 2008 . B. A. Kitchenham and S. L. Pfleeger. Personal opinion surveys. In Guide to Advanced Empirical Software Engineering, pages 63\u201392. Springer, 2008."},{"key":"e_1_3_2_1_42_1","first-page":"381","volume-title":"ICSE","author":"Lewis C.","unstructured":"C. Lewis , Z. Lin , C. Sadowski , X. Zhu , R. Ou , and E. J. Whitehead Jr . Does bug prediction support human developers? Findings from a Google case study . In ICSE , pages 372\u2013 381 . ACM, 2013. C. Lewis, Z. Lin, C. Sadowski, X. Zhu, R. Ou, and E. J. Whitehead Jr. Does bug prediction support human developers? Findings from a Google case study. In ICSE, pages 372\u2013381. ACM, 2013."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781483348957"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2644805"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594326"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509515"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810310"},{"key":"e_1_3_2_1_48_1","first-page":"88","volume-title":"Empirical Software Engineering, 2003. ISESE 2003. Proceedings. 2003 International Symposium on","author":"Punter T.","unstructured":"T. Punter , M. Ciolkowski , B. Freimut , and I. John . Conducting on-line surveys in software engineering . In Empirical Software Engineering, 2003. ISESE 2003. Proceedings. 2003 International Symposium on , pages 80\u2013 88 . IEEE, 2003. T. Punter, M. Ciolkowski, B. Freimut, and I. John. Conducting on-line surveys in software engineering. In Empirical Software Engineering, 2003. ISESE 2003. Proceedings. 2003 International Symposium on, pages 80\u201388. IEEE, 2003."},{"key":"e_1_3_2_1_49_1","first-page":"608","volume-title":"ICSE","author":"Sadowski C.","unstructured":"C. Sadowski , J. van Gogh , C. Jaspan , E. S\u00f6derberg , and C. Winter . Tricorder: Building a program analysis ecosystem . In ICSE , pages 598\u2013 608 . IEEE Computer Society, 2015. C. Sadowski, J. van Gogh, C. Jaspan, E. S\u00f6derberg, and C. Winter. Tricorder: Building a program analysis ecosystem. In ICSE, pages 598\u2013608. IEEE Computer Society, 2015."},{"key":"e_1_3_2_1_50_1","first-page":"19","volume-title":"Software Engineering (ICSE), 2015 IEEE\/ACM 37th IEEE International Conference on","volume":"1","author":"Siegmund J.","unstructured":"J. Siegmund , N. Siegmund , and S. Apel . Views on internal and external validity in empirical software engineering . In Software Engineering (ICSE), 2015 IEEE\/ACM 37th IEEE International Conference on , volume 1 , pages 9\u2013 19 . IEEE, 2015. J. Siegmund, N. Siegmund, and S. Apel. Views on internal and external validity in empirical software engineering. In Software Engineering (ICSE), 2015 IEEE\/ACM 37th IEEE International Conference on, volume 1, pages 9\u201319. IEEE, 2015."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/CHASE.2013.6614738"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02729815"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","location":"Singapore Singapore","acronym":"ASE'16","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970347","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:01Z","timestamp":1750218601000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":52,"alternative-id":["10.1145\/2970276.2970347","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970347","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}