| 2012 | 12th IEEE International Working Conference on Source Code Analysis and Manipulation, SCAM 2012, Riva del Garda, Italy, September 23-24, 2012 |
| 2012 | AccessAnalysis: A Tool for Measuring the Appropriateness of Access Modifiers in Java Systems. Christian Zoller, Axel Schmolitzky |
| 2012 | Alias-Aware Propagation of Simple Pattern-Based Properties in PHP Applications. François Gauthier, Ettore Merlo |
| 2012 | Aucsmith-Like Obfuscation of Java Bytecode. Andrea Zambon |
| 2012 | Bakar Alir: Supporting Developers in Construction of Information Flow Contracts in SPARK. Hariharan Thiagarajan, John Hatcliff, Jason Belt, Robby |
| 2012 | Building Useful Program Analysis Tools Using an Extensible Java Compiler. Edward Aftandilian, Raluca Sauciuc, Siddharth Priya, Sundaresan Krishnan |
| 2012 | CAWDOR: Compiler Assisted Worm Defense. Jun Yuan, Rob Johnson |
| 2012 | Closed Symbolic Execution for Verifying Program Termination. Germán Vidal |
| 2012 | Collections Frameworks for Points-To Analysis. Tobias Gutzmann, Jonas Lundberg, Welf Löwe |
| 2012 | Combining Conceptual and Domain-Based Couplings to Detect Database and Code Dependencies. Malcom Gethers, Amir Aryani, Denys Poshyvanyk |
| 2012 | Compatibility Prediction of Eclipse Third-Party Plug-ins in New Eclipse Releases. John Businge, Alexander Serebrenik, Mark van den Brand |
| 2012 | Cooperative Testing and Analysis: Human-Tool, Tool-Tool and Human-Human Cooperations to Get Work Done. Tao Xie |
| 2012 | Cross-Language Code Analysis and Refactoring. Philip Mayer, Andreas Schroeder |
| 2012 | Dynamic Trace-Based Data Dependency Analysis for Parallelization of C Programs. Mihai T. Lazarescu, Luciano Lavagno |
| 2012 | Evolution of Near-Miss Clones. Saman Bazrafshan |
| 2012 | Folding Repeated Instructions for Improving Token-Based Code Clone Detection. Hiroaki Murakami, Keisuke Hotta, Yoshiki Higo, Hiroshi Igaki, Shinji Kusumoto |
| 2012 | Impact Analysis in the Presence of Dependence Clusters Using Static Execute after in WebKit. Lajos Schrettner, Judit Jász, Tamás Gergely, Árpád Beszédes, Tibor Gyimóthy |
| 2012 | Improving Bug Location Using Binary Class Relationships. Nasir Ali, Aminata Sabané, Yann-Gaël Guéhéneuc, Giuliano Antoniol |
| 2012 | InputTracer: A Data-Flow Analysis Tool for Manual Program Comprehension of x86 Binaries. Ulf Kargén, Nahid Shahmehri |
| 2012 | On the Use of Stemming for Concern Location and Bug Localization in Java. Emily Hill, Shivani Rao, Avinash C. Kak |
| 2012 | Optimizing Expression Selection for Lookup Table Program Transformation. Chris Wilcox, Michelle Mills Strout, James M. Bieman |
| 2012 | What Does Control Flow Really Look Like? Eyeballing the Cyclomatic Complexity Metric. Jurgen J. Vinju, Michael W. Godfrey |
| 2012 | When Does a Refactoring Induce Bugs? An Empirical Study. Gabriele Bavota, Bernardino De Carluccio, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, Orazio Strollo |