{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:14:38Z","timestamp":1760044478815,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Heinz Nixdorf Foundation"},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1318323"],"award-info":[{"award-number":["1318323"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fraunhofer ATTRACT"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3092703.3092705","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"307-317","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Just-in-time static analysis"],"prefix":"10.1145","author":[{"given":"Lisa Nguyen Quang","family":"Do","sequence":"first","affiliation":[{"name":"Fraunhofer IEM, Germany"}]},{"given":"Karim","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Alberta, Canada"}]},{"given":"Benjamin","family":"Livshits","sequence":"additional","affiliation":[{"name":"Imperial College London, UK"}]},{"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[{"name":"University of Paderborn, Germany \/ Fraunhofer IEM, Germany"}]},{"given":"Justin","family":"Smith","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]},{"given":"Emerson","family":"Murphy-Hill","sequence":"additional","affiliation":[{"name":"North Carolina State University, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814228.2814229"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594299"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555860.1555864"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831738"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"key":"e_1_3_2_2_6_1","volume-title":"Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles-Henri Gros, Asya Kamsky, Scott McPeak, and Dawson R. Engler.","author":"Bessey Al","year":"2010","unstructured":"Al Bessey , Ken Block , Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles-Henri Gros, Asya Kamsky, Scott McPeak, and Dawson R. Engler. 2010 . Al Bessey, Ken Block, Benjamin Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles-Henri Gros, Asya Kamsky, Scott McPeak, and Dawson R. Engler. 2010."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"e_1_3_2_2_9_1","first-page":"4","article-title":"SUS-A quick and dirty usability scale","volume":"189","author":"Brooke John","year":"1996","unstructured":"John Brooke and others. 1996 . SUS-A quick and dirty usability scale . Usability Evaluation in Industry 189 , 194 (1996), 4 \u2013 7 . John Brooke and others. 1996. SUS-A quick and dirty usability scale. Usability Evaluation in Industry 189, 194 (1996), 4\u20137.","journal-title":"Usability Evaluation in Industry"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H"},{"key":"e_1_3_2_2_11_1","unstructured":"Cheetah. 2017. https:\/\/blogs.uni-paderborn.de\/sse\/tools\/cheetah-just-in-timeanalysis\/. (2017).  Cheetah. 2017. https:\/\/blogs.uni-paderborn.de\/sse\/tools\/cheetah-just-in-timeanalysis\/. (2017)."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"Maria Christakis and Christian Bird. 2016 (to appear). What Developers Want and Need from Program Analysis: An Empirical Study. (2016 (to appear)).  Maria Christakis and Christian Bird. 2016 (to appear). What Developers Want and Need from Program Analysis: An Empirical Study. (2016 (to appear)).","DOI":"10.1145\/2970276.2970347"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Cristina Cifuentes. 2008. Parfait - A Scalable Bug Checker for C Code. In Source Code Analysis and Manipulation (SCAM). 263\u2013264. DOI:http:\/\/dx.  Cristina Cifuentes. 2008. Parfait - A Scalable Bug Checker for C Code. In Source Code Analysis and Manipulation (SCAM). 263\u2013264. DOI:http:\/\/dx.","DOI":"10.1109\/SCAM.2008.21"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.30"},{"key":"e_1_3_2_2_15_1","unstructured":"Coverity. 2017. http:\/\/www.coverity.com\/. (2017).  Coverity. 2017. http:\/\/www.coverity.com\/. (2017)."},{"volume-title":"International Conference on Software Engineering (ICSE). 422\u2013431","author":"Dyer Robert","key":"e_1_3_2_2_16_1","unstructured":"Robert Dyer , Hoan Anh Nguyen , Hridesh Rajan , and Tien N. Nguyen . 2013. Boa: a language and infrastructure for analyzing ultra-large-scale software repositories . In International Conference on Software Engineering (ICSE). 422\u2013431 . Robert Dyer, Hoan Anh Nguyen, Hridesh Rajan, and Tien N. Nguyen. 2013. Boa: a language and infrastructure for analyzing ultra-large-scale software repositories. In International Conference on Software Engineering (ICSE). 422\u2013431."},{"key":"e_1_3_2_2_17_1","volume-title":"Sheth","author":"Enck William","year":"2010","unstructured":"William Enck , Peter Gilbert , Byung-Gon Chun , Landon P. Cox , Jaeyeon Jung , Patrick McDaniel , and Anmol N . Sheth . 2010 . TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Operating Systems Design and Implementation (OSDI) . 393\u2013407. William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. 2010. TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones. In Operating Systems Design and Implementation (OSDI). 393\u2013407."},{"key":"e_1_3_2_2_18_1","unstructured":"F-Droid. 2017. Free and Open Source Android App Repository. https:\/\/f-droid.org. (2017).  F-Droid. 2017. Free and Open Source Android App Repository. https:\/\/f-droid.org. (2017)."},{"key":"e_1_3_2_2_19_1","unstructured":"FindBugs. 2017. http:\/\/findbugs.sourceforge.net. (2017).  FindBugs. 2017. http:\/\/findbugs.sourceforge.net. (2017)."},{"key":"e_1_3_2_2_20_1","unstructured":"HP Fortify. 2017. http:\/\/www8.hp.com\/us\/en\/software-solutions\/ static-code-analysis-sast\/. (2017).  HP Fortify. 2017. http:\/\/www8.hp.com\/us\/en\/software-solutions\/ static-code-analysis-sast\/. (2017)."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.45"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771803"},{"volume-title":"International Conference on Software Engineering (ICSE). 672\u2013681","author":"Johnson Brittany","key":"e_1_3_2_2_23_1","unstructured":"Brittany Johnson , Yoonki Song , Emerson R. Murphy-Hill , and Robert W. Bowdidge . 2013. Why don\u2019t software developers use static analysis tools to find bugs? . In International Conference on Software Engineering (ICSE). 672\u2013681 . http:\/\/dl.acm.org\/citation.cfm?id=2486877 Brittany Johnson, Yoonki Song, Emerson R. Murphy-Hill, and Robert W. Bowdidge. 2013. Why don\u2019t software developers use static analysis tools to find bugs?. In International Conference on Software Engineering (ICSE). 672\u2013681. http:\/\/dl.acm.org\/citation.cfm?id=2486877"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512488"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287633"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124831"},{"volume-title":"International Conference on Software Engineering (ICSE). 372\u2013381","author":"Lewis Chris","key":"e_1_3_2_2_27_1","unstructured":"Chris Lewis , Zhongpeng Lin , Caitlin Sadowski , Xiaoyan Zhu , Rong Ou , and E. James Whitehead Jr . 2013. Does bug prediction support human developers? Findings from a Google case study . In International Conference on Software Engineering (ICSE). 372\u2013381 . http:\/\/dl.acm.org\/citation.cfm?id=2486838 Chris Lewis, Zhongpeng Lin, Caitlin Sadowski, Xiaoyan Zhu, Rong Ou, and E. James Whitehead Jr. 2013. Does bug prediction support human developers? Findings from a Google case study. In International Conference on Software Engineering (ICSE). 372\u2013381. http:\/\/dl.acm.org\/citation.cfm?id=2486838"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.22"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"crossref","unstructured":"Tukaram Muske and Alexander Serebrenik. 2016. Survey of Approaches for Handling Static Analysis Alarms. In Source Code Analysis and Manipulation (SCAM). http:\/\/www.win.tue.nl\/~aserebre\/SCAM2016.pdf  Tukaram Muske and Alexander Serebrenik. 2016. Survey of Approaches for Handling Static Analysis Alarms. In Source Code Analysis and Manipulation (SCAM). http:\/\/www.win.tue.nl\/~aserebre\/SCAM2016.pdf","DOI":"10.1109\/SCAM.2016.25"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491460"},{"volume-title":"Usability Engineering","author":"Nielsen Jakob","key":"e_1_3_2_2_32_1","unstructured":"Jakob Nielsen . 1994. Usability Engineering . Elsevier . Jakob Nielsen. 1994. Usability Engineering. Elsevier."},{"key":"e_1_3_2_2_33_1","unstructured":"PREfast. 2017. https:\/\/msdn.microsoft.com\/en-us\/library\/ms933794.aspx. (2017).  PREfast. 2017. https:\/\/msdn.microsoft.com\/en-us\/library\/ms933794.aspx. (2017)."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23039"},{"key":"e_1_3_2_2_35_1","first-page":"46","article-title":"The one number you need to grow","volume":"81","author":"Reichheld Frederick F","year":"2003","unstructured":"Frederick F Reichheld . 2003 . The one number you need to grow . Harvard Business Review 81 , 12 (2003), 46 \u2013 55 . Frederick F Reichheld. 2003. The one number you need to grow. Harvard Business Review 81, 12 (2003), 46\u201355.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818828"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.51"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786812"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542486"},{"key":"e_1_3_2_2_41_1","unstructured":"Raja Vall\u00e9e-Rai Etienne Gagnon Laurie J. Hendren Patrick Lam Patrice Pominville and Vijay Sundaresan. 2000.  Raja Vall\u00e9e-Rai Etienne Gagnon Laurie J. Hendren Patrick Lam Patrice Pominville and Vijay Sundaresan. 2000."},{"key":"e_1_3_2_2_42_1","unstructured":"Optimizing Java Bytecode Using the Soot Framework: Is It Feasible?. In Compiler Construction (CC). 18\u201334. DOI: http:\/\/dx.  Optimizing Java Bytecode Using the Soot Framework: Is It Feasible?. In Compiler Construction (CC). 18\u201334. DOI: http:\/\/dx."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786816"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2531602.2531722"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208665"}],"event":{"name":"ISSTA '17: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Santa Barbara CA USA","acronym":"ISSTA '17"},"container-title":["Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092705","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092703.3092705","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092703.3092705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:26Z","timestamp":1750217846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092705"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":45,"alternative-id":["10.1145\/3092703.3092705","10.1145\/3092703"],"URL":"https:\/\/doi.org\/10.1145\/3092703.3092705","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}