SCAM 2025
Sun 7 - Fri 12 September 2025 Auckland, New Zealand
co-located with ICSME 2025
Dates
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 8 Sep

Displayed time zone: Auckland, Wellington change

08:30 - 09:00
SCAM openingPlenary Events / Research Track at OGGB5 260-051
Chair(s): Cristina Cifuentes Oracle Software Assurance, Jens Dietrich Victoria University of Wellington, Alexander Jordan Oracle Labs, Austria, Sukyoung Ryu KAIST, Tushar Sharma Dalhousie University
08:30
30m
Day opening
Welcome to SCAM 2025
Plenary Events

09:00 - 10:00
SCAM/VISSOFT Keynote: Robert O’CallahanPlenary Events / Research Track at OGGB5 260-051
Chair(s): Cristina Cifuentes Oracle Software Assurance
09:00
60m
Keynote
Visualizing Program State in the Pernosco Debugger
Plenary Events
File Attached
10:00 - 10:30
10:00
30m
Coffee break
Coffee Break
Catering

10:30 - 12:00
Analysis 1Research Track / Engineering Track at OGGB5 260-051
Chair(s): Banani Roy University of Saskatchewan
10:30
22m
Research paper
Detecting Exception-Related Behavioural Breaking Changes with UnCheckGuard
Research Track
Vinayak Sharma University of Waterloo, Patrick Lam University of Waterloo
Pre-print
10:52
22m
Research paper
Handling Cyclic Reinforcement of Lattice Values in Incremental Dependency-driven Static Analysis
Research Track
Jens Van der Plas Software Languages Lab, Vrije Universiteit Brussel, Quentin Stiévenart Université du Québec à Montréal, Coen De Roover Vrije Universiteit Brussel
Pre-print File Attached
11:15
22m
Research paper
Refactoring-Aware Patch Integration Across Structurally Divergent Java Forks
Research Track
Daniel Ogenrwot University of Nevada Las Vegas, John Businge University of Antwerp; Flanders Make; University of Nevada at Las Vegas
Link to publication DOI Pre-print Media Attached
11:37
22m
Research paper
Insights into Optimizing Research Software: A Case of an Architecture-Smell Detection Tool.
Engineering Track
Philipp Gnoyke , Sandro Schulze University of Magdeburg, Germany, Jacob Krüger Eindhoven University of Technology
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:30 - 15:00
LLMsResearch Track at OGGB5 260-051
Chair(s): Jens Dietrich Victoria University of Wellington
13:30
22m
Research paper
Exploring the Potential of Large Language Models in Fine-Grained Review Comment Classification
Research Track
Linh Nguyen The University of Melbourne, Chunhua Liu The University of Melbourne, Hong Yi Lin The University of Melbourne, Patanamon Thongtanunam University of Melbourne
Pre-print
13:52
22m
Research paper
Language-Agnostic Generation of Header Comments using Large Language Models
Research Track
Nathanael Yao Queen's University, Juergen Dingel Queen's University, Ali Tizghadam TELUS, Ibrahim Amer Queen's University
14:15
22m
Research paper
Smelling Secrets: Leveraging Machine Learning and Language Models for Sensitive Parameter Detection in Ansible Security Analysis
Research Track
Ruben Opdebeeck Vrije Universiteit Brussel, Valeria Pontillo Gran Sasso Science Institute, Camilo Velázquez-Rodríguez Vrije Universiteit Brussel, Wolfgang De Meuter Vrije Universiteit Brussel, Coen De Roover Vrije Universiteit Brussel
Pre-print File Attached
14:37
22m
Research paper
Testing the Untestable? An Empirical Study on the Testing Process of LLM-Powered Software Systems
Research Track
Cleyton V. C. de Magalhaes CESAR School, Italo Santos University of Hawai‘i at Mānoa, Brody Stuart-Verner University of Calgary, Ronnie de Souza Santos University of Calgary
Pre-print
15:00 - 15:30
15:00
30m
Coffee break
Coffee Break
Catering

15:30 - 16:30
Anniversary TriviaPlenary Events / Research Track at OGGB5 260-051
Chair(s): Tushar Sharma Dalhousie University
15:30
60m
Social Event
Anniversary trivia
Plenary Events

18:30 - 20:00
Social event (SCAM/VISSOFT) - The Wharfside Function CentrePlenary Events / Research Track at The Wharfside Function Centre
18:30
90m
Social Event
Social event (SCAM/VISSOFT) - The Wharfside Function Centre
Plenary Events

Tue 9 Sep

Displayed time zone: Auckland, Wellington change

09:00 - 10:00
Keynote 2: Leon MoonenPlenary Events / Research Track at OGGB5 260-051
Chair(s): Cristina Cifuentes Oracle Software Assurance
09:00
60m
Keynote
It's the end of source code analysis as we know it (and we'll be fine)
Plenary Events
Leon Moonen Simula Research Laboratory
File Attached
10:00 - 10:30
10:00
30m
Coffee break
Coffee Break
Catering

10:30 - 12:00
Analysis 2Engineering Track / Research Track at OGGB5 260-051
Chair(s): Patrick Lam University of Waterloo
10:30
22m
Research paper
On the need to perform comprehensive evaluations of automatic program repair benchmarks: Sorald case study
Research Track
Sumudu Liyanage University of Otago, Sherlock A. Licorish University of Otago, Markus Wagner Monash University, Australia, Stephen MacDonell Victoria University of Wellington
Pre-print
10:52
22m
Research paper
Static Analysis as a Feedback Loop: Enhancing LLM-Generated Code Beyond Correctness
Research Track
Scott Blyth Monash University, Sherlock A. Licorish University of Otago, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia
Pre-print
11:15
22m
Research paper
FaaSGuard: Secure CI/CD for Serverless Applications – An OpenFaaS Case Study
Engineering Track
Amine Barrak Oakland University, USA, Emna Ksontini University of Michigan, Ridouane Atike , Fehmi Jaafar Université du Québec à Chicoutimi
Pre-print
11:37
22m
Research paper
llvm-dimeta: A library for extracting source-level type information in LLVM IR using debug metadata.
Engineering Track
Alexander Hück Scientific Computing, TU Darmstadt, Sebastian Kreutzer TU Darmstadt, Christian Bischof Scientific Computing, TU Darmstadt
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:30 - 14:30
Analysis 3Research Track at OGGB5 260-051
Chair(s): Coen De Roover Vrije Universiteit Brussel
13:30
20m
Research paper
Configurable Ensembles for Software Similarity: Challenging the Notion of Universal Metrics
Research Track
Shujun Huang Software Engineering Research Group (SERG), TU Delft, Sebastian Proksch Delft University of Technology
Pre-print
13:50
20m
Research paper
Challenging Bug Prediction and Repair Models with Synthetic Bugs
Research Track
Ali Reza Ibrahimzada University of Illinois Urbana-Champaign, Yang Chen University of Illinois at Urbana-Champaign, Ryan Rong Stanford University, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign
DOI Pre-print Media Attached
14:10
20m
Research paper
Plaintext in the Wild: Investigating Secure Connection Label Accuracy for Android Apps
Research Track
Yusei Sakuraba Okayama University, Hiroki Inayoshi Okayama University, Shoichi Saito Nagoya Institute of Technology, Akito Monden Okayama University
File Attached
14:30 - 15:00
ClosingPlenary Events / Research Track at OGGB5 260-051
Chair(s): Mariano Ceccato University of Verona, Cristina Cifuentes Oracle Software Assurance, Coen De Roover Vrije Universiteit Brussel, Johan Fabry Raincode Labs, Belgium, Alessandra Gorla IMDEA Software Institute, Leon Moonen Simula Research Laboratory, Banani Roy University of Saskatchewan, Tushar Sharma Dalhousie University
14:30
30m
Day closing
Closing
Plenary Events

Accepted Papers

Title
Challenging Bug Prediction and Repair Models with Synthetic Bugs
Research Track
DOI Pre-print Media Attached
Configurable Ensembles for Software Similarity: Challenging the Notion of Universal Metrics
Research Track
Pre-print
Detecting Exception-Related Behavioural Breaking Changes with UnCheckGuard
Research Track
Pre-print
Exploring the Potential of Large Language Models in Fine-Grained Review Comment Classification
Research Track
Pre-print
Handling Cyclic Reinforcement of Lattice Values in Incremental Dependency-driven Static Analysis
Research Track
Pre-print File Attached
Language-Agnostic Generation of Header Comments using Large Language Models
Research Track
On the need to perform comprehensive evaluations of automatic program repair benchmarks: Sorald case study
Research Track
Pre-print
Plaintext in the Wild: Investigating Secure Connection Label Accuracy for Android Apps
Research Track
File Attached
Refactoring-Aware Patch Integration Across Structurally Divergent Java Forks
Research Track
Link to publication DOI Pre-print Media Attached
Smelling Secrets: Leveraging Machine Learning and Language Models for Sensitive Parameter Detection in Ansible Security Analysis
Research Track
Pre-print File Attached
Static Analysis as a Feedback Loop: Enhancing LLM-Generated Code Beyond Correctness
Research Track
Pre-print
Testing the Untestable? An Empirical Study on the Testing Process of LLM-Powered Software Systems
Research Track
Pre-print

Call for papers

The 25th IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2025) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term “source code” refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term “analysis” refers to any (semi-)automated procedure that yields insight into source code, while “manipulation” refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Thus, the analysis and manipulation of source code remains a critical area of research from which SCAM 2025 solicits high-quality submissions.

Covered Topics and Paper Formats

We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

  • abstract interpretation
  • bad smell detection
  • bug location and prediction
  • clone detection
  • concern, concept, and feature localization and mining
  • decompilation
  • energy efficient source code
  • natural language analysis of source code artifacts
  • program comprehension
  • program slicing
  • program transformation and refactoring
  • repository, revision, and change analysis
  • security vulnerability analysis
  • source level metrics
  • source level optimization
  • source-level testing and verification
  • static and dynamic analysis

SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop.

Papers must not exceed 12 pages (the last 2 pages can be used for references only) and must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE’s website. All submissions must be in English and should be submitted electronically in PDF format. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must register for the conference and present the paper. All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.

Submission guidelines

All submissions must be in English and should be submitted electronically in PDF format using EasyChair.

  • Papers must not exceed 12 pages, and the last 2 pages can be used for references only.
  • Papers must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE’s website.
  • All submissions must be in English and should be submitted electronically in PDF format.
  • Submissions will be reviewed by at least three members of the program committee, judging the paper on its novelty, presentation quality, importance, soundness, and the quality of its evaluation.
  • If the paper is accepted, at least one author must register for the conference and present the paper.
  • All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.
Double-blind Review

We follow a double-blind reviewing process. Submitted papers must adhere to the following rules:

  • Author names and affiliations must be omitted. (The track co-chairs will check compliance before reviewing begins.)
  • References to authors’ own related work must be in the third person. (For example, not “We build on our previous work…” but rather “We build on the work of…”)

If the program chairs find that the authors did not respect the rules of double-blind review they can decide to (desk) reject the paper.

Artifact Evaluation

ICSME, VISSOFT, and SCAM have joined once more forces and present a single Artifact Evaluation Track for the three venues. We invite authors of any paper accepted to SCAM 2025 to submit artifacts associated with their papers for evaluation. Papers with artifacts that meet the review criteria will be awarded badges, noting their contributions to open science in software engineering.

More information on the Call for Papers of the Joint Artifact Evaluation Track will be available at the ICSME 2025 web page (https://conf.researchr.org/home/icsme-2025).

Proceedings

All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library.