S. Allier, N. Anquetil, A. Hora, and S. Ducasse, A Framework to Compare Alert Ranking Algorithms, 2012 19th Working Conference on Reverse Engineering, 2012.
DOI : 10.1109/WCRE.2012.37

URL : https://hal.archives-ouvertes.fr/hal-00747817

C. Couto, J. E. Montandon, C. Silva, and M. T. Valente, Static correspondence and correlation between field defects and warnings reported by a bug finding tool, Software Quality Journal, vol.29, issue.4, pp.1-17, 2012.
DOI : 10.1007/s11219-011-9172-5

C. Couto, P. Pires, M. T. Valente, R. Bigonha, A. Hora et al., Bugmaps-granger: A tool for causality analysis between source code metrics and bugs, Proceedings of the 4th Brazilian Conference on Software: Theory and Practice (CBSoft'13), 2013.
URL : https://hal.archives-ouvertes.fr/hal-00854883

A. Hora, N. Anquetil, S. Ducasse, M. Bhatti, C. Couto et al., Bugmaps: A tool for the visual exploration and analysis of bugs, Proceedings of the 16th European Conference on Software Maintenance and Reengineering (CSMR'12) -Tool Demonstration TrackHora12a-Official-CSMR2012Tools-BugMaps.pdf, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00668397

A. Hora, A. Etien, N. Anquetil, S. Ducasse, and M. T. Valente, APIEvolutionMiner: Keeping API evolution under control, 2014 Software Evolution Week, IEEE Conference on Software Maintenance, Reengineering, and Reverse Engineering (CSMR-WCRE), pp.420-424, 2014.
DOI : 10.1109/CSMR-WCRE.2014.6747209

URL : https://hal.archives-ouvertes.fr/hal-00991722

B. Livshits and T. Zimmermann, DynaMine: Finding Common Error Patterns by Mining Software Revision Histories, European Software Engineering Conference and the ACM SIGSOFT Symposium on The foundations of Software Engineering, pp.296-305, 2005.

Y. M. Mileva, A. Wasylkowski, and A. Zeller, Mining Evolution of Object Usage, European Conference on Object-Oriented Programming, pp.105-129, 2011.
DOI : 10.1109/TSE.2005.63

M. Martinez and M. Monperrus, Mining software repair models for reasoning on the search space of automated program fixing, Empirical Software Engineering, vol.31, issue.6, pp.1-30, 2013.
DOI : 10.1007/s10664-013-9282-8

URL : https://hal.archives-ouvertes.fr/hal-00903804

W. R. Bush, J. D. Pincus, and D. J. Sielaff, A static analyzer for finding dynamic programming errors, Software: Practice and Experience, vol.4, issue.7, pp.775-802, 2000.
DOI : 10.1002/(SICI)1097-024X(200006)30:7<775::AID-SPE309>3.0.CO;2-H

C. Flanagan, K. R. Leino, M. Lillibridge, G. Nelson, J. B. Saxe et al., Extended Static Checking for Java, Conference on Programming language design and implementation, pp.234-245, 2002.

D. Evans and D. Larochelle, Improving security using extensible lightweight static analysis, IEEE Software, vol.19, issue.1, pp.42-51, 2002.
DOI : 10.1109/52.976940

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.8576

D. Reimer, E. Schonberg, K. Srinivas, H. Srinivasan, B. Alpern et al., SABER, ACM SIGSOFT Software Engineering Notes, vol.29, issue.4, pp.243-251, 2004.
DOI : 10.1145/1013886.1007545

A. Fehnker, R. Huuck, P. Jayet, M. Lussenburg, and F. Rauch, Goanna???A Static Model Checker, FMICS/PDMC, pp.297-300, 2006.
DOI : 10.1007/978-3-540-70952-7_20

D. Roberts, J. Brant, and R. Johnson, A refactoring tool for smalltalk, Theory and Practice of Object Systems, vol.3, issue.4, pp.253-263, 1997.
DOI : 10.1002/(SICI)1096-9942(1997)3:4<253::AID-TAPO3>3.0.CO;2-T

D. Hovemeyer and W. Pugh, Finding bugs is easy, SIGPLAN Notices, pp.92-106, 2004.
DOI : 10.1145/1052883.1052895

L. Renggli, S. Ducasse, T. Girba, and O. Nierstrasz, Domain-Specific Program Checking, Objects, pp.213-232, 2010.
DOI : 10.1007/978-3-642-13953-6_12

URL : https://hal.archives-ouvertes.fr/inria-00531509

A. Hora, N. Anquetil, S. Ducasse, and S. Allier, Domain specific warnings: Are they any better?, 2012 28th IEEE International Conference on Software Maintenance (ICSM), 2012.
DOI : 10.1109/ICSM.2012.6405305

URL : https://hal.archives-ouvertes.fr/hal-00848830

J. Zheng, L. Williams, N. Nagappan, W. Snipes, J. P. Hudepohl et al., On the value of static analysis for fault detection in software, IEEE Transactions on Software Engineering, vol.32, issue.4, pp.240-253, 2006.
DOI : 10.1109/TSE.2006.38

S. Heckman and L. Williams, On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques, Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement, ESEM '08, pp.41-50, 2008.
DOI : 10.1145/1414004.1414013

S. Kim and M. D. Ernst, Which warnings should I fix first?, Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering , ESEC-FSE '07, pp.45-54, 2007.
DOI : 10.1145/1287624.1287633

T. Kremenek and D. Engler, Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations, International Conference on Static Analysis, pp.295-315, 2003.
DOI : 10.1007/3-540-44898-5_16

C. Boogerd and L. Moonen, Prioritizing Software Inspection Results using Static Profiling, 2006 Sixth IEEE International Workshop on Source Code Analysis and Manipulation, pp.149-160, 2006.
DOI : 10.1109/SCAM.2006.22

URL : http://arxiv.org/abs/cs/0607063

M. U. Bhatti, N. Anquetil, and S. Ducasse, An environment for dedicated software analysis tools, ERCIM News, vol.88, pp.12-13, 2012.

P. Louridas, D. Spinellis, and V. Vlachos, Power laws in software, ACM Transactions on Software Engineering and Methodology, vol.18, issue.1, pp.1-26, 2008.
DOI : 10.1145/1391984.1391986

A. Lozano, G. Arévalo, and K. Mens, Co-occurring code critics, " in SATToSE 2014?Pre-proceedings, V. Zaytsev, pp.10-13, 2014.

M. Martinez, L. Duchien, and M. Monperrus, Automatically Extracting Instances of Code Change Patterns with AST Analysis, 2013 IEEE International Conference on Software Maintenance, 1309.
DOI : 10.1109/ICSM.2013.54

URL : https://hal.archives-ouvertes.fr/hal-00861883

S. Heckman and L. Williams, A systematic literature review of actionable alert identification techniques for automated static code analysis, Information and Software Technology, vol.53, issue.4, pp.363-387, 2011.
DOI : 10.1016/j.infsof.2010.12.007

C. Boogerd and L. Moonen, Assessing the value of coding standards: An empirical study, 2008 IEEE International Conference on Software Maintenance, pp.277-286, 2008.
DOI : 10.1109/ICSM.2008.4658076

W. Basalaj and F. Van-den-beuken, Correlation between coding standards compliance and software quality, Embedded Systems Conference ESS2005 Incorporating the IEE FPGA Developers Forum, 2006.
DOI : 10.1049/ic:20050677

S. Wagner, F. Deissenboeck, M. Aichner, J. Wimmer, and M. Schwalb, An Evaluation of Two Bug Pattern Tools for Java, 2008 International Conference on Software Testing, Verification, and Validation, pp.248-257, 2008.
DOI : 10.1109/ICST.2008.63

D. B. Tracy, M. Zhang, and H. Y. Sun, Some code smells have a significant but small effect on faults, ACM Trans. Softw. Eng. Methodol, vol.23, issue.4, p.33, 2014.

A. Arcuri, Evolutionary repair of faulty software, Applied Soft Computing, vol.11, issue.4, pp.3494-3514, 2011.
DOI : 10.1016/j.asoc.2011.01.023

S. Staber, B. Jobstmann, and R. Bloem, Finding and Fixing Faults, Proceedings of the 13 IFIP WG 10.5 International Conference on Correct Hardware Design and Verification Methods, ser. CHARME'05, pp.35-49, 2005.
DOI : 10.1007/11560548_6

W. Weimer, T. Nguyen, C. L. Goues, and S. Forrest, Automatically finding patches using genetic programming, 2009 IEEE 31st International Conference on Software Engineering, pp.364-374, 2009.
DOI : 10.1109/ICSE.2009.5070536

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.8995

J. A. Jones, Semi-automatic fault localization, p.3308774, 2008.

B. Demsky, M. D. Ernst, P. J. Guo, S. Mccamant, J. H. Perkins et al., Inference and enforcement of data structure consistency specifications, Proceedings of the 2006 international symposium on Software testing and analysis , ISSTA'06, pp.233-244, 2006.
DOI : 10.1145/1146238.1146266

R. L. Alexey, S. Tzi-cker, and . Chiueh, PASAN: Automatic patch and signature generation for buffer overflow attacks, Systems and Information Security, pp.165-170, 2006.

E. Bassem, . Sarfraz, and . Juzi, A tool for repairing complex data structures, International Conference on Software Engineering, pp.855-858, 2008.

T. Nguyen, W. Weimer, C. L. Goues, and S. Forrest, Using Execution Paths to Evolve Software Patches, 2009 International Conference on Software Testing, Verification, and Validation Workshops, pp.1-4, 2009.
DOI : 10.1109/ICSTW.2009.35

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.155.4989