2015
DOI: 10.1007/s10664-015-9376-6
|View full text |Cite
|
Sign up to set email alerts
|

The impact of tangled code changes on defect prediction models

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
50
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 71 publications
(51 citation statements)
references
References 28 publications
1
50
0
Order By: Relevance
“…There is a potential bias in bug-fix commits, such that along with fixing relevant parts of the functionality, developers may introduce irrelevant changes (e.g., refactor some unrelated code). Kawrykow and Robillard [47], and Herzig et al [21] explored to what extent bug-fix commits may include changes irrelevant to the original purpose of the fix: while they show that there may be significant amount of irrelevant changes for general bugs, Nguyen et al [20] observed that for the majority of security fixes this was not the case -this is also supported by our findings of very "local" changes ( Figure 5). The subset of vulnerabilities that we checked manually did not contain such refactorings.…”
Section: Threats To Validitysupporting
confidence: 79%
See 2 more Smart Citations
“…There is a potential bias in bug-fix commits, such that along with fixing relevant parts of the functionality, developers may introduce irrelevant changes (e.g., refactor some unrelated code). Kawrykow and Robillard [47], and Herzig et al [21] explored to what extent bug-fix commits may include changes irrelevant to the original purpose of the fix: while they show that there may be significant amount of irrelevant changes for general bugs, Nguyen et al [20] observed that for the majority of security fixes this was not the case -this is also supported by our findings of very "local" changes ( Figure 5). The subset of vulnerabilities that we checked manually did not contain such refactorings.…”
Section: Threats To Validitysupporting
confidence: 79%
“…We selected the FOSS projects based on the needs of our industrial partner, i.e., we selected the most often used components across a wide spectrum of enterprise applications and frameworks developed by our partner. First, we performed a manual validation to determine the potential error rate of different screening criteria, and, second, we did a large scale empirical analysis of the underlying assumptions (e.g., security fixes in our projects are mostly local as in [20], in contrast to what is found on normal bugs [21]), as well as the trade-offs between the likelihood that an older version is affected by a newly disclosed vulnerability and the maintenance effort required for upgrading, showing that the approach scales to thousands of revisions and MLoCs.…”
Section: Of Determining These Properties By Sound (Or Complete) Statimentioning
confidence: 99%
See 1 more Smart Citation
“…The purpose of such analysis could be, on the one hand, of observing the evolution of software projects, and on the other hand of building different forms of recommenders to support software engineering in their activities.This special section features three mining software repository papers dealing with one very important aspect of software evolution, i.e., software defects, and specifically their prediction, localization, and triaging.In the paper "The Impact of Tangled Code Changes on Bug Defect Prediction Models" (Herzig et al 2015) study the impact of tangled changes on defect prediction models. Tangled changes occur when developers commit together unrelated code changes within a single transaction.…”
mentioning
confidence: 99%
“…In the paper "The Impact of Tangled Code Changes on Bug Defect Prediction Models" (Herzig et al 2015) study the impact of tangled changes on defect prediction models. Tangled changes occur when developers commit together unrelated code changes within a single transaction.…”
mentioning
confidence: 99%