| 2008 | 90% Perspiration: Engineering Static Analysis Techniques for Industrial Applications. Paul Anderson |
| 2008 | An Empirical Study of Function Overloading in C++. Cheng Wang, Daqing Hou |
| 2008 | Analysis and Transformations for Efficient Query-Based Debugging. Michael Gorbovitski, K. Tuncay Tekle, Tom Rothamel, Scott D. Stoller, Yanhong A. Liu |
| 2008 | Aspect-Aware Points-to Analysis. Qiang Sun, Jianjun Zhao |
| 2008 | Automated Detection of Code Vulnerabilities Based on Program Analysis and Model Checking. Lei Wang, Qiang Zhang, Pengchao Zhao |
| 2008 | Automated Migration of List Based JSP Web Pages to AJAX. Jason Chu, Thomas R. Dean |
| 2008 | Automatic Determination of May/Must Set Usage in Data-Flow Analysis. Andrew Stone, Michelle Strout, Shweta Behere |
| 2008 | Beyond Annotations: A Proposal for Extensible Java (XJ). Tony Clark, Paul Sammut, James S. Willans |
| 2008 | Change Impact Graphs: Determining the Impact of Prior Code Changes. Daniel M. Germán, Gregorio Robles, Ahmed E. Hassan |
| 2008 | Constructing Subtle Faults Using Higher Order Mutation Testing. Yue Jia, Mark Harman |
| 2008 | CoordInspector: A Tool for Extracting Coordination Data from Legacy Code. Nuno F. Rodrigues, Luís Soares Barbosa |
| 2008 | DTS - A Software Defects Testing System. Zhaohong Yang, Yunzhan Gong, Qing Xiao, Yawen Wang |
| 2008 | Eighth IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM 2008), 28-29 September 2008, Beijing, China |
| 2008 | Evaluating Key Statements Analysis. David W. Binkley, Nicolas Gold, Mark Harman, Zheng Li, Kiarash Mahdavi |
| 2008 | Exploiting the Correspondence between Micro Patterns and Class Names. Jeremy Singer, Chris C. Kirkham |
| 2008 | Fast and Precise Points-to Analysis. Jonas Lundberg, Tobias Gutzmann, Welf Löwe |
| 2008 | From Indentation Shapes to Code Structures. Abram Hindle, Michael W. Godfrey, Richard C. Holt |
| 2008 | Is Cloned Code More Stable than Non-cloned Code? Jens Krinke |
| 2008 | Modular Decompilation of Low-Level Code by Partial Evaluation. Miguel Gómez-Zamalloa, Elvira Albert, Germán Puebla |
| 2008 | On the Use of Data Flow Analysis in Static Profiling. Cathal Boogerd, Leon Moonen |
| 2008 | Parfait - A Scalable Bug Checker for C Code. Cristina Cifuentes |
| 2008 | Precise Analysis of Java Programs Using JOANA. Dennis Giffhorn, Christian Hammer |
| 2008 | Rejuvenate Pointcut: A Tool for Pointcut Expression Recovery in Evolving Aspect-Oriented Software. Raffi Khatchadourian, Awais Rashid |
| 2008 | Some Assembly Required - Program Analysis of Embedded System Code. Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seefried |
| 2008 | TBCppA: A Tracer Approach for Automatic Accurate Analysis of C Preprocessor's Behaviors. Katsuhiko Gondow, Hayato Kawashima, Takashi Imaizumi |
| 2008 | The Evolution and Decay of Statically Detected Source Code Vulnerabilities. Massimiliano Di Penta, Luigi Cerulo, Lerina Aversano |
| 2008 | The Semantics of Abstract Program Slicing. Damiano Zanardini |
| 2008 | Type Highlighting: A Client-Driven Visual Approach for Class Hierarchies Reengineering. Petru Florin Mihancea |
| 2008 | User-Input Dependence Analysis via Graph Reachability. Bernhard Scholz, Chenyi Zhang, Cristina Cifuentes |
| 2008 | Using Program Transformations to Add Structure to a Legacy Data Model. Mariano Ceccato, Thomas Roy Dean, Paolo Tonella |