SCAM: Source Code Analysis and Manipulation

FacebookTwitterLinkedInGoogle

 

Past:   Proceedings on DBLP

Future:  Post a CFP for 2025 or later   |   Invite the Organizers Email

 
 

All CFPs on WikiCFP

Event When Where Deadline
SCAM 2024 Source Code Analysis and Manipulation
Oct 7, 2024 - Oct 8, 2024 Flagstaff Jun 21, 2024 (Jun 17, 2024)
SCAM 2023 23nd IEEE International Working Conference on Source Code Analysis and Manipulation (SCAM)
Oct 2, 2023 - Oct 3, 2023 Bogota, Colombia Jul 6, 2023 (Jun 29, 2023)
SCAM 2022 22nd IEEE International Working Conference on Source Code Analysis and Manipulation
Oct 3, 2022 - Oct 4, 2022 Limassol, Cyprus Jun 23, 2022 (Jun 17, 2022)
SCAM 2021 21st IEEE International Working Conference on Source Code Analysis and Manipulation
Sep 27, 2021 - Sep 28, 2021 Virtual Jun 30, 2021 (Jun 24, 2021)
SCAM 2019 Source Code Analysis and Manipulation
Sep 30, 2019 - Oct 1, 2019 Cleveland, USA TBD
SCAM 2018 Source Code Analysis and Manipulation
Sep 23, 2018 - Sep 24, 2018 Madrid, Spain Jun 15, 2018 (Jun 8, 2018)
SCAM 2017 International Working Conference on Source Code Analysis and Manipulation
Sep 17, 2017 - Sep 18, 2017 China Jun 19, 2017 (Jun 15, 2017)
SCAM 2016 16th International Working Conference on Source Code Analysis and Manipulation
Oct 2, 2016 - Oct 3, 2016 Raleigh, USA Jun 26, 2016 (Jun 20, 2016)
SCAM 2015 15th IEEE International Working Conference on Source Code Analysis and Manipulation
Sep 27, 2015 - Sep 28, 2015 Bremen, Germany Jun 26, 2015 (Jun 19, 2015)
SCAM 2013 13th IEEE International Working Conference on Source Code Analysis and Manipulation
Sep 20, 2013 - Sep 21, 2013 Eindhoven, The Netherlands May 8, 2013 (May 5, 2013)
SCAM 2012 12th IEEE Working Conference on Source Code Analysis and Manipulation
Sep 23, 2012 - Sep 24, 2012 Riva del Garda, Italy May 4, 2012 (Apr 29, 2012)
SCAM 2011 11th IEEE Working Conference on Source Code Analysis and Manipulation
Sep 25, 2011 - Sep 26, 2011 Williamsburg, USA Apr 22, 2011 (Apr 15, 2011)
SCAM 2010 Tenth IEEE International Working Conference on Source Code Analysis and Manipulation
Sep 12, 2010 - Sep 13, 2010 Timisoara, Romania Apr 30, 2010 (Apr 23, 2010)
SCAM 2008 8th IEEE International Working Conference on Source Code Analysis and Manipulation
Sep 28, 2008 - Sep 29, 2008 Beijing, China Apr 28, 2008 (Apr 21, 2008)
 
 

Present CFP : 2024

The 24th IEEE International Conference on Source Code Analysis and Manipulation (SCAM 2024) aims to bring together researchers and practitioners working on theory, techniques, and applications that concern analysis and/or manipulation of the source code of software systems. The term “source code” refers to any fully executable description of a software system, such as machine code, (very) high-level languages, and executable graphical representations of systems. The term “analysis” refers to any (semi-)automated procedure that yields insight into source code, while “manipulation” refers to any automated or semi-automated procedure that takes and returns source code. While much attention in the wider software engineering community is directed towards other aspects of systems development and evolution, such as specification, design, and requirements engineering, it is the source code that contains the only precise description of the behavior of a system. Thus, the analysis and manipulation of source code remains a critical area of research from which SCAM 2024 solicits high-quality submissions.

Covered Topics and Paper Formats

We welcome submission of papers that describe original and significant work in the field of source code analysis and manipulation. Topics of interest include, but are not limited to:

abstract interpretation
bad smell detection
bug location and prediction
clone detection
concern, concept, and feature localization and mining
decompilation
energy efficient source code
natural language analysis of source code artifacts
program comprehension
program slicing
program transformation and refactoring
repository, revision, and change analysis
security vulnerability analysis
source level metrics
source level optimization
source-level testing and verification
static and dynamic analysis
SCAM explicitly solicits results from any theoretical or technological domain that can be applied to these and similar topics. Submitted papers should describe original, unpublished, and significant work and must not have been previously accepted for publication nor be concurrently submitted for review in another journal, book, conference, or workshop.

Papers must not exceed 12 pages (the last 2 pages can be used for references only) and must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE’s website. All submissions must be in English and should be submitted electronically in PDF format. Submission will be reviewed by at least three members of the program committee, judging the paper on its novelty, quality, importance, evaluation, and scientific rigor. If the paper is accepted, at least one author must register for the conference and present the paper. All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.

Submission guidelines

All submissions must be in English and should be submitted electronically in PDF format using EasyChair.

Papers must not exceed 12 pages, and the last 2 pages can be used for references only.
Papers must conform to the IEEE proceedings paper format guidelines. Templates in Latex and Word are available on IEEE’s website.
All submissions must be in English and should be submitted electronically in PDF format.
Submissions will be reviewed by at least three members of the program committee, judging the paper on its novelty, presentation quality, importance, soundness, and the quality of its evaluation.
If the paper is accepted, at least one author must register for the conference and present the paper.
All authors, reviewers, and organizers are expected to uphold the IEEE Code of Conduct. Failure to do so may lead to a (desk) rejection of the paper.
Double-blind Review

We follow a double-blind reviewing process. Submitted papers must adhere to the following rules:

Author names and affiliations must be omitted. (The track co-chairs will check compliance before reviewing begins.)
References to authors’ own related work must be in the third person. (For example, not “We build on our previous work…” but rather “We build on the work of…”)
If the program chairs find that the authors did not respect the rules of double-blind review they can decide to (desk) reject the paper.

Artifact Evaluation

ICSME, VISSOFT, and SCAM have joined once more forces and present a single Artifact Evaluation Track for the three venues. We invite authors of any paper accepted to SCAM 2024 to submit artifacts associated with their papers for evaluation. Papers with artifacts that meet the review criteria will be awarded badges, noting their contributions to open science in software engineering.

More information on the Call for Papers of the Joint Artifact Evaluation Track will be available at the ICSME 2024 web page (https://conf.researchr.org/home/icsme-2024).

Proceedings

All accepted papers will appear in the proceedings which will be available through the IEEE Digital Library.
 

Related Resources

IEEE-Ei/Scopus-ITCC 2025   2025 5th International Conference on Information Technology and Cloud Computing (ITCC 2025)-EI Compendex
SCA 2024   Source Code Analysis
IDA 2025   Intelligent Data Analysis
MAT 2024   10th International Conference of Advances in Materials Science and Engineering
AASDS 2024   Special Issue on Applications and Analysis of Statistics and Data Science
ACM SAC 2025   40th ACM/SIGAPP Symposium On Applied Computing
ICPAMI 2025   2025 2nd International Conference on Pattern Analysis and Machine Intelligence
ACIJ 2024   Advanced Computing: An International Journal
UAKK 2024   The International Open Source Conference