{"id":"https://openalex.org/W6906663102","doi":"https://doi.org/10.18420/se2025-28","title":"Total Recall? How Good Are Static Call Graphs Really?","display_name":"Total Recall? How Good Are Static Call Graphs Really?","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W6906663102","doi":"https://doi.org/10.18420/se2025-28"},"language":"en","primary_location":{"id":"doi:10.18420/se2025-28","is_oa":true,"landing_page_url":"https://doi.org/10.18420/se2025-28","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.18420/se2025-28","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Helm, Dominik","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Helm, Dominik","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Keidel, Sven","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Keidel, Sven","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Kampk\u00f6tter, Anemone","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kampk\u00f6tter, Anemone","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"D\u00fcsing, Johannes","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"D\u00fcsing, Johannes","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Roth, Tobias","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Roth, Tobias","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Hermann, Ben","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hermann, Ben","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Mezini, Mira","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Mezini, Mira","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.41283525,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":true,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.4970000088214874,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.4970000088214874,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.23929999768733978,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10126","display_name":"Logic, programming, and type systems","score":0.12300000339746475,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5824999809265137},{"id":"https://openalex.org/keywords/call-graph","display_name":"Call graph","score":0.5785999894142151},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5593000054359436},{"id":"https://openalex.org/keywords/measure","display_name":"Measure (data warehouse)","score":0.544700026512146},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5022000074386597},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.48739999532699585},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.46209999918937683},{"id":"https://openalex.org/keywords/field","display_name":"Field (mathematics)","score":0.4595000147819519},{"id":"https://openalex.org/keywords/extension","display_name":"Extension (predicate logic)","score":0.43939998745918274}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7287999987602234},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5824999809265137},{"id":"https://openalex.org/C102379954","wikidata":"https://www.wikidata.org/wiki/Q2589940","display_name":"Call graph","level":2,"score":0.5785999894142151},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5593000054359436},{"id":"https://openalex.org/C2780009758","wikidata":"https://www.wikidata.org/wiki/Q6804172","display_name":"Measure (data warehouse)","level":2,"score":0.544700026512146},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5022000074386597},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.48739999532699585},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.46209999918937683},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4595000147819519},{"id":"https://openalex.org/C2778029271","wikidata":"https://www.wikidata.org/wiki/Q5421931","display_name":"Extension (predicate logic)","level":2,"score":0.43939998745918274},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4339999854564667},{"id":"https://openalex.org/C2164484","wikidata":"https://www.wikidata.org/wiki/Q5170150","display_name":"Core (optical fiber)","level":2,"score":0.426800012588501},{"id":"https://openalex.org/C146849305","wikidata":"https://www.wikidata.org/wiki/Q370766","display_name":"Ground truth","level":2,"score":0.41589999198913574},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.40799999237060547},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.40790000557899475},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.3930000066757202},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.38350000977516174},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.36480000615119934},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.36239999532699585},{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.34709998965263367},{"id":"https://openalex.org/C98183937","wikidata":"https://www.wikidata.org/wiki/Q2112188","display_name":"Program analysis","level":2,"score":0.30250000953674316},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.29910001158714294},{"id":"https://openalex.org/C37404715","wikidata":"https://www.wikidata.org/wiki/Q380679","display_name":"Dynamic programming","level":2,"score":0.2784999907016754},{"id":"https://openalex.org/C3020493868","wikidata":"https://www.wikidata.org/wiki/Q55631277","display_name":"Real world data","level":2,"score":0.27070000767707825},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.25949999690055847},{"id":"https://openalex.org/C24756922","wikidata":"https://www.wikidata.org/wiki/Q1757694","display_name":"Data quality","level":3,"score":0.25839999318122864},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.2563000023365021},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.18420/se2025-28","is_oa":true,"landing_page_url":"https://doi.org/10.18420/se2025-28","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"}],"best_oa_location":{"id":"doi:10.18420/se2025-28","is_oa":true,"landing_page_url":"https://doi.org/10.18420/se2025-28","pdf_url":null,"source":{"id":"https://openalex.org/S7407052918","display_name":"Gesellschaft f\u00fcr Informatik (GI)","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Static":[0],"call":[1,153],"graphs":[2],"are":[3,30],"a":[4,43,130],"fundamental":[5],"building":[6],"block":[7],"of":[8,19,34,68,77,103,137,146,148],"program":[9,139],"analysis.":[10],"However,":[11],"differences":[12],"in":[13],"callgraph":[14],"construction":[15],"and":[16,26,36,63,87,106,123],"the":[17,78,135,144],"use":[18,55,84],"specific":[20],"language":[21],"features":[22],"can":[23],"yield":[24],"unsoundness":[25],"imprecision.":[27],"Call-graph":[28],"analyses":[29],"evaluated":[31],"using":[32,108],"measures":[33],"precision":[35],"recall,":[37],"but":[38],"this":[39,69],"is":[40,49,72],"hard":[41],"when":[42],"ground":[44,79],"truth":[45],"for":[46,90],"real-world":[47,110],"programs":[48],"generally":[50],"unobtainable.":[51],"We":[52,83,113,128],"propose":[53],"to":[54,125,133],"dynamic":[56,70,97],"baselines":[57],"based":[58],"on":[59],"fixed":[60],"entry":[61],"points":[62],"input":[64,93],"corpora.":[65,94],"The":[66],"creation":[67],"baseline":[71],"posed":[73],"as":[74,141],"an":[75],"approximation":[76],"truth\u2014an":[80],"optimization":[81],"problem.":[82],"manual":[85],"extension":[86],"coverage-guided":[88],"fuzzing":[89],"creating":[91],"suitable":[92],"With":[95],"these":[96],"baselines,":[98],"we":[99,142],"study":[100],"call-graph":[101,121],"quality":[102,122],"multiple":[104],"algorithms":[105],"implementations":[107],"four":[109],"Java":[111],"programs.":[112],"find":[114],"that":[115],"our":[116],"methodology":[117,132],"provides":[118],"insights":[119],"into":[120],"how":[124],"measure":[126],"it.":[127],"provide":[129],"novel":[131],"advance":[134],"field":[136],"static":[138],"analysis":[140],"assess":[143],"computation":[145],"one":[147],"its":[149],"core":[150],"data":[151],"structures\u2014the":[152],"graph.":[154]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
