The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017), The Kyushu University, November 5-8, 2017, Fukuoka, Japan. Complex computer systems are common in many sectors, such as manufacturing, communications, defense, transportation, aerospace, hazardous environments, energy, and health care. These systems are frequently distributed over heterogeneous networks, and are driven by many diverse requirements on performance, real-time behavior, fault tolerance, security, adaptability, development time and cost, long life concerns, and other areas. Such requirements frequently conflict, and their satisfaction therefore requires managing the trade-off among them during system development and throughout the entire system life. The goal of this conference is to bring together industrial, academic, and government experts, from a variety of user domains and software disciplines, to determine how the disciplines' problems and solution techniques interact within the whole system. Researchers, practitioners, tool developers and users, and technology transition experts are all welcome. The scope of interest includes long-term research issues, near-term complex system requirements and promising tools, existing complex systems, and commercially available tools.
Session Chair: David Lo
|Matthieu Jimenez, Mike Papadakis and Yves Le Traon.||Vulnerability Prediction Models: A case study on the Linux Kernel|
|Alessio Viticchie, Leonardo Regano, Marco Torchiano, Cataldo Basile, Mariano Ceccato, Paolo Tonella and Roberto Tiella.||Assessment of Source Code Obfuscation Techniques|
|Marco di Biase, Magiel Bruntink and Alberto Bacchelli.||A security perspective on code review: The case of Chromium|
Session Chair: Leon Moonen
|Xueliang Li and John P. Gallagher.||A Source-level Energy Optimization Framework for Mobile Applications|
|Maurício Aniche, Christoph Treude, Andy Zaidman, Arie van Deursen and Marco Gerosa.||SATT: Tailoring Code Metric Thresholds for Different Software Architectures|
|Andrea D'Souza, Di Yang and Cristina Lopes.||Collective Intelligence for Smarter API Recommendations in Python|
|Jiang Ming, Dinghao Wu.||BinCFP: Efficient Multi-threaded Binary Code Control Flow Profiling|
|Allan Blanchard, Nikolai Kosmatov, Matthieu Lemerre, Frederic Loulergue.||CONC2SEQ : A FRAMA-C Plugin for Verification of Parallel Compositions of C Programs|
|Tushar Sharma, Girish Suryanarayana.||Augur: Incorporating Hidden Dependencies and Variable Granularity in Change Impact Analysis|
|Benjamin Holland, Ganesh Ram Santhanam, Payas Awadhutkar, Suraj Kothari.||Statically-informed Dynamic Analysis Tools to Detect Algorithmic Complexity Vulnerabilities|
|Quentin Stiévenart, Maarten Vandercammen, Wolfgang De Meuter, Coen De Roover.||SCALA-AM: A Modular Static Analysis Framework|
|Jochen Quante.||A Generic Program Interpreter for Arbitrary Abstractions|
Session Chair: Árpád Beszédes
|Vincenzo Musco, Martin Monperrus and Philippe Preux.||Mutation-Based Graph Inference for Fault Localization|
|Adriano de Paula, Eduardo Guerra, Hitesh Sajnani, Cristina Lopes and Otavio Lemos.||An Exploratory Study of Interface Redundancy in Code Repositories|
|Chaiyong Ragkhitwetsagul, Jens Krinke and David Clark.||Similarity of Source Code in the Presence of Pervasive Modifications|
Session Chair: Mariano Ceccato
|Min Gao, Lei He, Rupak Majumdar and Zilong Wang.||llsplat: Improving Concolic Testing by Bounded Model Checking|
|Gergő Balogh, Tamás Gergely, Árpád Beszédes and Tibor Gyimóthy.||Are My Unit Tests in the Right Package?|
|Marinos Kintis, Mike Papadakis, Andreas Papadopoulos, Evangelos Valvis and Nicos Malevris.||Analysing and Comparing the Effectiveness of Mutation Testing Tools: A Manual Study|
Session Chair: Andrea Mocci
|Tukaram Muske and Alexander Serebrenik.||Survey of Approaches for Handling Static Analysis Alarms|
|Nelson Lossing, Pierre Guillou and Francois Irigoin.||Effects Dependence Graph: A Key Data Concept for C Source-to-Source Compilers|
|Gábor Antal, Dávid Havas, István Siket, Árpád Beszédes, Rudolf Ferenc and József Mihalicza.||Transforming C++11 Code to C++03 to Support Legacy Compilation Environments|
Session Chair: Alexander Serebrenik
|Dave Binkley and Dawn Lawrie.||A Case for Software Specific Natural Language Techniques|
|Stefan Fischer, Lukas Linsbauer, Roberto Erick Lopez-Herrejon and Alexander Egyed.||A Source Level Empirical Study of Features and Their Interactions in Variable Software|
|Leon Moonen, Stefano Di Alesio, Thomas Rolfsnes and Dave Binkley.||Exploring the Effects of History Length and Age on Mining Software Change Impact|
Over the past several years, we have seen a rapid rising emphasis on design, implement and manage complex computer systems which are present in every aspect of human activities, such as manufacturing, communications, defense, transportation, aerospace, hazardous environments, energy, and health care. The complex computer systems are frequently distributed over heterogeneous networks and processing large amount data. Complexity arises from many factors, including the dynamic environments and scenarios these systems operate in; demanding and sometimes conflicting requirements in functionality, efficiency, scalability, security, dependability and adaptability; as well as the large variation in development methodology, programming languages and implementation details. The key issues in these systems include performance, real-time behavior, fault tolerance, security, adaptability, development time and cost, and long life concerns.
The goal of this conference is to bring together industrial, academic, and government experts, from a variety of application domains and software disciplines, to discuss how the disciplines' problems and solution techniques interact within the whole system. Researchers, practitioners, tool developers and users, and technology transfer experts are all welcome. The scope of interest includes long-term research issues; near-term requirements and challenges; established complex systems; emerging promising tools; and retrospective and prospective reflections of research and development into complex systems.
Authors are invited to submit papers describing original, unpublished research results, case studies and toolsed research results, case studies and tools. Papers are solicited in all areas related to complex computer-based systems, including the causes of complexity and means of avoiding, controlling, or coping with complexity. Topic areas include, but are not limited to:
Different kinds of contributions are sought, including novel research, lessons learned, experience reports, and discussions of practical problems faced by industry and user domains. The ultimate goal is to build a rich and comprehensive conference program that can fit the interests and needs of different classes of attendees: professionals, researchers, managers, and students. A program goal is to organize several sessions that include both academic and industrial papers on a given topic and culminate panels to discuss relationships between industrial and academic research.
The conference proceedings will be published by Conference Publishing Services (CPS) and submitted for EI indexing.
The 22nd International Conference on Engineering of Complex Computer Systems (ICECCS 2017) is calling for proposals for workshops to be held in conjunction with the main conference. ICECCS workshops provide a forum for scientific and industrial communities to discuss topics in Engineering of Complex Computer Systems. If you would like to bring together researchers on a specific topic related to ICECCS, you should consider submitting a workshop proposal.
Workshop papers will be published in a companion proceeding of ICECCS by Conference Publishing Services and submitted for EI indexing. The tentative length of workshop papers is up to 4 pages.
In addition to the research track (see separate CFP), the 16th IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2016) will also feature an Engineering Track. This track welcomes six-page papers that report on the design and implementation of tools for source code analysis and manipulation, as well as libraries, infrastructure, and the real world studies enabled by these advances. To be clear, this is not the addition of a new track to SCAM, which will remain a two track conference, but a significant expansion to the scope of the tools track of previous SCAMs.
What artefacts qualify as “engineering track” material?
A successful SCAM engineering track paper should:
Optionally (and encouraged):
Note that the submission length has a limit of six pages, compared to the two to four pages of traditional tool demo papers. This gives authors enough space to discuss artefact motivation, design, and use cases in much more detail. For example, a use case would be well illustrated by a demo scenario with screenshots. The papers should be submitted electronically via the conference web site.
Each submission will be reviewed by at least three members of the engineering track program committee. Authors of accepted papers will be required to present their artefacts at the conference. All accepted engineering track papers will be published in the conference proceedings. The key criterion for acceptance is that the paper should (a) follow the above mentioned guidelines and (b) make an original contribution that can benefit practitioners in the field now and/or others designing and building artefacts for source code analysis and manipulation. The artefacts can be in an early research prototype or a polished product ready for deployment. Papers about commercial products are allowed, as long as the guidelines described above are followed.
Videos and other demo material may be taken into account by reviewers as they review the paper. However, such material will not become part of the permanent record of the conference, so the paper should be self contained. In order to preserve the anonymity of the reviewers, such material should be hosted on an anonymous public source (e.g., youtube), or made available in such a way that the tools chair can download them once and redistribute them to reviewers.
All accepted papers will appear in the proceedings which will be published by the IEEE Computer Society Press.
Six pages IEEE format and can be submitted via EasyChair. Please use the IEEE templates in preparing your manuscripts:
ICECCS 2017 will take place at the Nishijin Plaza of Kyushu University, Fukuoka, Japan.
2-16-23 Nishijin, Sawara-ku, Fukuoka-shi, Fukuoka-ken
Online registration will start on August 15, 2017, and end on October 15, 2017.
Routing is at the heart of the Internet and has been a continual source of security problems since its expansion in the 1980s. SCION is a new approach to the Internet, which offers dramatically better security properties than we currently have. We describe a collaborative effort, the Verified Scion Project, at ETH Zurich that aims to verify Scion, going the full distance from high-level network-wide properties down to the code running on SCION routers. We will explain the issues involved, the approach we take, the progress we have made, and perspectives for the future.
The work reported on is joint work between three groups at ETH Zurich: my Information Security Group, the Network Security Group of Adrian Perrig, and the Programming Methodology Group of Peter Mueller.
Code clone analysis is an activity to find similar code snippets in source code. Nowadays it becomes one of popular analyses characterizing redundancy and maintainability of source code. It has been studied for more than 20 years, and it is still a very active and attractive research field in Software Engineering. In this talk, we will present history and evolution of our research activities on code clone and related areas. Starting from an industry request for code maintenance, we have developed various tools and applied them to various fields. We will show also our current and future direction toward identifying code provenance in huge and complex ecosystem of Open Source Software.
Dr Liu Yang graduated in 2005 with a Bachelor of Computing (Honours) in the National University of Singapore (NUS). In 2010, he obtained his PhD and started his post doctoral work in NUS, MIT and SUTD. In 2011, Dr Liu is awarded the Temasek Research Fellowship at NUS to be the Principal Investigator in the area of Cyber Security. In 2012 fall, he joined Nanyang Technological University as a Nanyang Assistant professor. He is currently the director of the cybersecurity lab in NTU.
Dr. Liu specializes in software verification, security and software engineering. His research has bridged the gap between the theory and practical usage of formal methods and program analysis to evaluate the design and implementation of software for high assurance and security. His work led to the development of a state-of-the-art model checker, Process Analysis Toolkit (PAT). This tool is used by research institutions in over 80 countries for research and education. By now, he has more than 150 publications in top tier conferences and journals and is leading an active research team working on various cybersecurity problems.