Follow
Justin Smith
Justin Smith
Assistant Professor - Computer Science, Lafayette College
Verified email at lafayette.edu - Homepage
Title
Cited by
Cited by
Year
Does ACM’s code of ethics change ethical decision making in software development?
A McNamara, J Smith, E Murphy-Hill
Proceedings of the 2018 26th ACM Joint Meeting on European Software …, 2018
2482018
Paradise unplugged: Identifying barriers for female participation on stack overflow
D Ford, J Smith, PJ Guo, C Parnin
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
1442016
Do developers read compiler error messages?
T Barik, J Smith, K Lubick, E Holmes, J Feng, E Murphy-Hill, C Parnin
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
106*2017
Questions developers ask while diagnosing potential security vulnerabilities with static analysis
J Smith, B Johnson, E Murphy-Hill, B Chu, HR Lipford
Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015
1052015
Just-in-time static analysis
LNQ Do, K Ali, B Livshits, E Bodden, J Smith, E Murphy-Hill
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
862017
Why can't johnny fix vulnerabilities: A usability evaluation of static analysis tools for security
J Smith, LNQ Do, E Murphy-Hill
Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 221-238, 2020
582020
How Developers Diagnose Potential Security Vulnerabilities with a Static Analysis Tool
J Smith, B Johnson, E Murphy-Hill, BT Chu, H Richter
IEEE Transactions on Software Engineering, 2018
532018
Fuse: a reproducible, extendable, internet-scale corpus of spreadsheets
T Barik, K Lubick, J Smith, J Slankas, E Murphy-Hill
Proceedings of the 12th Working Conference on Mining Software Repositories …, 2015
442015
A cross-tool communication study on program analysis tool notifications
B Johnson, R Pandita, J Smith, D Ford, S Elder, E Murphy-Hill, ...
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
342016
What questions remain? an examination of how developers understand an interactive static analysis tool
TW Thomas, H Lipford, B Chu, J Smith, E Murphy-Hill
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
292016
A study of interactive code annotation for access control vulnerabilities
T Thomas, B Chu, H Lipford, J Smith, E Murphy-Hill
2015 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2015
242015
Flower: Navigating Program Flow in the IDE
J Smith, C Brown, E Murphy-Hill
Visual Languages and Human-Centric Computing (VL/HCC), 2017
182017
Towards Ethical Data-Driven Software: Filling the Gaps in Ethics Research & Practice
B Johnson, J Smith
Workshop on Ethics in Software Engineering Research and Practice, 2021
172021
How Students Unit Test: Perceptions, Practices, and Pitfalls
GR Bai, J Smith, KT Stolee
Proceedings of the 26th ACM Conference on Innovation and Technology in …, 2021
142021
Cheetah: just-in-time taint analysis for android apps
LNQ Do, K Ali, B Livshits, E Bodden, J Smith, E Murphy-Hill
2017 IEEE/ACM 39th International Conference on Software Engineering …, 2017
132017
Spreadsheet Practices and Challenges in a Large Multinational Conglomerate
J Smith, JA Middleton, NA Kraft
Visual Languages and Human-Centric Computing (VL/HCC), 2017
82017
A Case Study of Software Security Red Teams at Microsoft
J Smith, C Theisen, T Barik
2020 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2020
72020
Identifying successful strategies for resolving static analysis notifications
J Smith
Proceedings of the 38th International Conference on Software Engineering …, 2016
42016
Supporting Effective Strategies for Resolving Vulnerabilities Reported by Static Analysis Tools
J Smith
2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2018
12018
The Role of Ethics in Engineering Fair AI (and Beyond)
B Johnson, J Smith
Equity, Diversity, and Inclusion in Software Engineering: Best Practices and …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20