Write a Blog >>
ICSE 2022
Sun 8 - Fri 27 May 2022
Tue 10 May 2022 21:00 - 21:05 at ICSE room 2-odd hours - Software Security 4 Chair(s): Hamid Bagheri
Wed 11 May 2022 03:10 - 03:15 at ICSE room 3-odd hours - Software Security 2 Chair(s): Liliana Pasquale
Thu 26 May 2022 09:05 - 09:10 at Room 306+307 - Papers 10: Software Security 1 Chair(s): Joshua Garcia
Thu 26 May 2022 13:30 - 15:00 at Ballroom Gallery - Posters 2

Context: Software developers often use open-source libraries in their project to improve development speed. However, such libraries may contain security vulnerabilities, and this has resulted in several high-profile incidents in recent years. As usage of open-source libraries grows, understanding of these dependency vulnerabilities becomes increasingly important.

Objective: In this work, we analyze vulnerabilities in open-source libraries used by 450 software projects written in Java, Python, and Ruby. Our goal is to examine types, distribution, severity, and persistence of the vulnerabilities, along with relationships between their prevalence and project as well as commit attributes.

Method: Our data is obtained by scanning versions of the sample projects after each commit made between November 1, 2017 and October 31, 2018 using an industrial software composition analysis tool, which provides information such as library names and versions, dependency types (direct or transitive), and known vulnerabilities.

Results: Among other findings, we found that project activity level, popularity, and developer experience do not translate into better or worse handling of dependency vulnerabilities. We also found “Denial of Service” and “Information Disclosure” types of vulnerabilities being common across the languages studied. Further, we found that most dependency vulnerabilities persist throughout the observation period (mean of 78.4%, 97.7%, and 66.4% for publicly-known vulnerabilities in our Java, Python, and Ruby datasets respectively), and the resolved ones take 3-5 months to fix.

Conclusion: Our results highlight the importance of managing the number of dependencies and performing timely updates, and indicate some areas that can be prioritized to improve security in wide range of projects, such as prevention and mitigation of Denial-of-Service attacks.

Tue 10 May

Displayed time zone: Eastern Time (US & Canada) change

21:00 - 22:00
Software Security 4Journal-First Papers / Technical Track at ICSE room 2-odd hours
Chair(s): Hamid Bagheri University of Nebraska-Lincoln
21:00
5m
Talk
Out of Sight, Out of Mind? How Vulnerable Dependencies Affect Open-Source Projects
Journal-First Papers
Gede Artha Azriadi Prana Singapore Management University, Abhishek Sharma Veracode, Inc., Lwin Khin Shar Singapore Management University, Darius Foo National University of Singapore, Andrew Santosa Veracode, Inc., Asankhaya Sharma Veracode, Inc., David Lo Singapore Management University
Pre-print Media Attached
21:05
5m
Talk
Identifying Challenges for OSS Vulnerability Scanners - A Study & Test Suite
Journal-First Papers
Andreas Dann Paderborn University, Henrik Plate SAP Security Research, France, Ben Hermann Technical University Dortmund, Serena Elisa Ponta SAP Security Research, France, Eric Bodden University of Paderborn; Fraunhofer IEM
Link to publication DOI Pre-print Media Attached
21:10
5m
Talk
DeFault: Mutual Information-based Crash Triage for Massive Crashes
Technical Track
Xing Zhang National University of Defense Technology, Jiongyi Chen National University of Defense Technology, Chao Feng National University of Defense Technology, Ruilin Li National University of Defense Technolog, Wenrui Diao Shandong University, Kehuan Zhang The Chinese University of Hong Kong
Pre-print Media Attached
21:15
5m
Talk
Practical Automated Detection of Malicious npm Packages
Technical Track
Adriana Sejfia University of Southern California, Max Schaefer GitHub, Inc.
Pre-print Media Attached
21:20
5m
Talk
Exploiting Input Sanitization for Regex Denial of Service
Technical Track
Efe Barlas Purdue University, Xin Du Purdue University, James C. Davis Purdue University, USA
DOI Pre-print Media Attached
21:25
5m
Talk
Hiding Critical Program Components via Ambiguous Translation
Technical Track
Chijung Jung University of Virginia, Doowon Kim University of Tennessee, Knoxville, An Chen University of Georgia, Weihang Wang University at Buffalo, SUNY, Yunhui Zheng IBM Research, Kyu Hyung Lee University of Georgia, Yonghwi Kwon University of Virginia
Pre-print Media Attached

Wed 11 May

Displayed time zone: Eastern Time (US & Canada) change

03:00 - 04:00
Software Security 2Journal-First Papers / Technical Track at ICSE room 3-odd hours
Chair(s): Liliana Pasquale University College Dublin & Lero
03:00
5m
Talk
Lags in the release, adoption, and propagation of npm vulnerability fixes
Journal-First Papers
Bodin Chinthanet Nara Institute of Science and Technology, Raula Gaikovina Kula Nara Institute of Science and Technology, Shane McIntosh University of Waterloo, Takashi Ishio Nara Institute of Science and Technology, Akinori Ihara Wakayama University, Kenichi Matsumoto Nara Institute of Science and Technology
Link to publication DOI Pre-print Media Attached
03:05
5m
Talk
The Case for Adaptive Security Interventions
Journal-First Papers
Irum Rauf The Open University, UK, Marian Petre The Open University, Thein Tun , Tamara Lopez The Open University, Paul Lunn The University of Manchester, UK, Dirk van der Linden Northumbria University, John Towse Department of Psychology, University of Lancaster, UK, Helen Sharp The Open University, Mark Levine Lancaster University, Awais Rashid University of Bristol, UK, Bashar Nuseibeh The Open University (UK) & Lero (Ireland)
Link to publication DOI Pre-print Media Attached
03:10
5m
Talk
Out of Sight, Out of Mind? How Vulnerable Dependencies Affect Open-Source Projects
Journal-First Papers
Gede Artha Azriadi Prana Singapore Management University, Abhishek Sharma Veracode, Inc., Lwin Khin Shar Singapore Management University, Darius Foo National University of Singapore, Andrew Santosa Veracode, Inc., Asankhaya Sharma Veracode, Inc., David Lo Singapore Management University
Pre-print Media Attached
03:15
5m
Talk
MVD: Memory-related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks
Technical Track
Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Lili Bo Yangzhou University, Rongxin Wu Xiamen University, Bin Li Yangzhou University, Chuanqi Tao Nanjing University of Aeronautics and Astronautics
DOI Pre-print Media Attached
03:20
5m
Talk
VulCNN: An Image-inspired Scalable Vulnerability Detection System
Technical Track
Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Shihan Dou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Duo Xu Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
DOI Pre-print Media Attached
03:25
5m
Talk
DeFault: Mutual Information-based Crash Triage for Massive Crashes
Technical Track
Xing Zhang National University of Defense Technology, Jiongyi Chen National University of Defense Technology, Chao Feng National University of Defense Technology, Ruilin Li National University of Defense Technolog, Wenrui Diao Shandong University, Kehuan Zhang The Chinese University of Hong Kong
Pre-print Media Attached

Thu 26 May

Displayed time zone: Eastern Time (US & Canada) change

09:00 - 10:30
Papers 10: Software Security 1Technical Track / SEIP - Software Engineering in Practice / Journal-First Papers at Room 306+307
Chair(s): Joshua Garcia University of California, Irvine
09:00
5m
Talk
The Case for Adaptive Security Interventions
Journal-First Papers
Irum Rauf The Open University, UK, Marian Petre The Open University, Thein Tun , Tamara Lopez The Open University, Paul Lunn The University of Manchester, UK, Dirk van der Linden Northumbria University, John Towse Department of Psychology, University of Lancaster, UK, Helen Sharp The Open University, Mark Levine Lancaster University, Awais Rashid University of Bristol, UK, Bashar Nuseibeh The Open University (UK) & Lero (Ireland)
Link to publication DOI Pre-print Media Attached
09:05
5m
Talk
Out of Sight, Out of Mind? How Vulnerable Dependencies Affect Open-Source Projects
Journal-First Papers
Gede Artha Azriadi Prana Singapore Management University, Abhishek Sharma Veracode, Inc., Lwin Khin Shar Singapore Management University, Darius Foo National University of Singapore, Andrew Santosa Veracode, Inc., Asankhaya Sharma Veracode, Inc., David Lo Singapore Management University
Pre-print Media Attached
09:10
5m
Talk
VulCNN: An Image-inspired Scalable Vulnerability Detection System
Technical Track
Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Shihan Dou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Duo Xu Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
DOI Pre-print Media Attached
09:15
5m
Talk
Deep Learning based Vulnerability Detection: Are We There Yet?
Journal-First Papers
Saikat Chakraborty Columbia University, Rahul Krishna IBM Research, Yangruibo Ding Columbia University, Baishakhi Ray Columbia University
Link to publication DOI Media Attached
09:20
5m
Talk
Practical Automated Detection of Malicious npm Packages
Technical Track
Adriana Sejfia University of Southern California, Max Schaefer GitHub, Inc.
Pre-print Media Attached
09:25
5m
Talk
Exploiting Input Sanitization for Regex Denial of Service
Technical Track
Efe Barlas Purdue University, Xin Du Purdue University, James C. Davis Purdue University, USA
DOI Pre-print Media Attached
09:30
5m
Talk
What are Weak Links in the npm Supply Chain?
SEIP - Software Engineering in Practice
Nusrat Zahan North Carolina State University, Laurie Williams North Carolina State University, Thomas Zimmermann Microsoft Research, Patrice Godefroid Microsoft Research, USA, Brendan Murphy Microsoft Research, Chandra Sekhar Maddila Microsoft Research
Pre-print Media Attached
09:35
5m
Talk
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
Technical Track
Michael Cao University of British Columbia, Khaled Ahmed University of British Columbia (UBC), Julia Rubin University of British Columbia
Pre-print Media Attached
09:40
5m
Talk
What the Fork? Finding Hidden Code Clones in npm
Technical Track
Elizabeth Wyss University of Kansas, Lorenzo De Carli Worcester Polytechnic Institute, Drew Davidson University of Kansas
DOI Pre-print Media Attached
13:30 - 15:00
13:30
90m
Talk
"Did You Miss My Comment or What?" Understanding Toxicity in Open Source DiscussionsDistinguished Paper Award
Technical Track
Courtney Miller Carnegie Mellon University, Sophie Cohen Wesleyan University, Daniel Klug Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, USA, Christian Kästner Carnegie Mellon University
Pre-print Media Attached
13:30
90m
Talk
On Debugging the Performance of Configurable Software Systems: Developer Needs and Tailored Tool Support
Technical Track
Miguel Velez Carnegie Mellon University, Pooyan Jamshidi University of South Carolina, Norbert Siegmund Leipzig University, Sven Apel Saarland University, Christian Kästner Carnegie Mellon University
Pre-print Media Attached
13:30
90m
Let's Talk Open-Source - An Analysis of Conference Talks and Community Dynamics
SRC - ACM Student Research Competition
Kimberly Truong Oregon State University
13:30
90m
Talk
The Case for Adaptive Security Interventions
Journal-First Papers
Irum Rauf The Open University, UK, Marian Petre The Open University, Thein Tun , Tamara Lopez The Open University, Paul Lunn The University of Manchester, UK, Dirk van der Linden Northumbria University, John Towse Department of Psychology, University of Lancaster, UK, Helen Sharp The Open University, Mark Levine Lancaster University, Awais Rashid University of Bristol, UK, Bashar Nuseibeh The Open University (UK) & Lero (Ireland)
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
TaintBench: Automatic Real-World Malware Benchmarking of Android Taint Analyses
Journal-First Papers
Linghui Luo Amazon Web Services, Felix Pauck Paderborn University, Germany, Goran Piskachev Fraunhofer IEM, Manuel Benz Paderborn University, Ivan Pashchenko University of Trento, Martin Mory Paderborn University, Eric Bodden , Ben Hermann Technical University Dortmund, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
Link to publication DOI Pre-print Media Attached File Attached
13:30
90m
Talk
Change Is the Only Constant: Dynamic Updates for WorkflowsBest Artifact Award
Technical Track
Daniel Sokolowski University of St. Gallen, Pascal Weisenburger University of St. Gallen, Guido Salvaneschi University of St. Gallen
DOI Pre-print Media Attached
13:30
90m
Talk
FeatCompare: Feature Comparison for Competing Mobile Apps Leveraging User Reviews
Journal-First Papers
Maram Assi Queen's University, Safwat Hassan Thompson Rivers University, Yuan Tian Queens University, Kingston, Canada, Ying Zou Queen's University, Kingston, Ontario
Link to publication Pre-print Media Attached
13:30
90m
Talk
Scratch as Social Network: Topic Modeling and Sentiment Analysis in Scratch Projects
SEIS - Software Engineering in Society
Isabella Graßl University of Passau, Gordon Fraser University of Passau
Pre-print Media Attached
13:30
90m
Talk
Deep Learning based Vulnerability Detection: Are We There Yet?
Journal-First Papers
Saikat Chakraborty Columbia University, Rahul Krishna IBM Research, Yangruibo Ding Columbia University, Baishakhi Ray Columbia University
Link to publication DOI Media Attached
13:30
90m
Talk
Static Inference Meets Deep Learning: A Hybrid Type Inference Approach for PythonNominated for Distinguished Paper
Technical Track
Yun Peng The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Zongjie Li The Hong Kong University of Science and Technology, Bowei Gao Harbin Institute of Technology, Shenzhen, David Lo Singapore Management University, Qirun Zhang Georgia Institute of Technology, USA, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print Media Attached
13:30
90m
Talk
Preempting Flaky Tests via Non-Idempotent-Outcome Tests
Technical Track
Anjiang Wei Stanford University, Pu Yi Peking University, Zhengxi Li University of Illinois Urbana-Champaign, Tao Xie Peking University, Darko Marinov University of Illinois at Urbana-Champaign, Wing Lam University of Illinois at Urbana-Champaign
Pre-print Media Attached
13:30
90m
Talk
A Tale of Two Cities: Software Developers Working from Home During the COVID-19 Pandemic
Journal-First Papers
Denae Ford Microsoft Research, Margaret-Anne Storey University of Victoria, Thomas Zimmermann Microsoft Research, Christian Bird Microsoft Research, Sonia Jaffe Microsoft, Chandra Sekhar Maddila Microsoft Research, Jenna L. Butler Microsoft Research, Brian Houck Microsoft Research, Nachiappan Nagappan Microsoft Research
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
A Grounded Theory Based Approach to Characterize Software Attack Surfaces
Technical Track
sara moshtari Rochester Institute of Technology, Ahmet Okutan Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
Pre-print Media Attached
13:30
90m
Talk
Out of Sight, Out of Mind? How Vulnerable Dependencies Affect Open-Source Projects
Journal-First Papers
Gede Artha Azriadi Prana Singapore Management University, Abhishek Sharma Veracode, Inc., Lwin Khin Shar Singapore Management University, Darius Foo National University of Singapore, Andrew Santosa Veracode, Inc., Asankhaya Sharma Veracode, Inc., David Lo Singapore Management University
Pre-print Media Attached
13:30
90m
Talk
Towards Property-Based Tests in Natural Language
NIER - New Ideas and Emerging Results
Colin Gordon Drexel University
Pre-print Media Attached
13:30
90m
Talk
How Templated Requirements Specifications Inhibit Creativity in Software Engineering
Journal-First Papers
Rahul Mohanani University of Jyväskylä, Paul Ralph Dalhousie University, Burak Turhan University of Oulu, Vladimir Mandić Faculty of Technical Sciences, University of Novi Sad
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
Using Reinforcement Learning for Load Testing of Video Games
Technical Track
Rosalia Tufano Università della Svizzera Italiana, Simone Scalabrino University of Molise, Luca Pascarella Università della Svizzera italiana (USI), Emad Aghajani Software Institute, USI Università della Svizzera italiana, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
Pre-print Media Attached
13:30
90m
Talk
Free Lunch for Testing: Fuzzing Deep-Learning Libraries from Open Source
Technical Track
Anjiang Wei Stanford University, Yinlin Deng University of Illinois at Urbana-Champaign, Chenyuan Yang Nanjing University, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print Media Attached
13:30
90m
Talk
Trust Enhancement Issues in Program Repair
Technical Track
Yannic Noller National University of Singapore, Ridwan Salihin Shariffdeen National University of Singapore, Xiang Gao Beihang University, China, Abhik Roychoudhury National University of Singapore
Pre-print Media Attached
13:30
90m
Talk
An Empirical Study on Release Notes Patterns of Popular Apps in the Google Play Store
Journal-First Papers
Aidan Z.H. Yang Carnegie Mellon University, Safwat Hassan Thompson Rivers University, Ying Zou Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen's University
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
Learning Lenient Parsing & Typing via Indirect Supervision
Journal-First Papers
Toufique Ahmed University of California at Davis, Prem Devanbu Department of Computer Science, University of California, Davis, Vincent J. Hellendoorn Carnegie Mellon University
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
CONFETTI: Amplifying Concolic Guidance for Fuzzers
Technical Track
James Kukucka George Mason University, Luís Pina University of Illinois at Chicago, Paul Ammann George Mason University, USA, Jonathan Bell Northeastern University
Pre-print Media Attached
13:30
90m
Talk
Natural Attack for Pre-trained Models of Code
Technical Track
Zhou Yang Singapore Management University, Jieke Shi Singapore Management University, Junda He Singapore Management University, David Lo Singapore Management University
DOI Pre-print Media Attached
13:30
90m
Talk
A Fine-grained Data Set and Analysis of Tangling in Bug Fixing Commits
Journal-First Papers
Steffen Herbold TU Clausthal, Alexander Trautsch University of Göttingen, Benjamin Ledel TU Clausthal, Alireza Aghamohammadi Sharif University of Technology, Taher A Ghaleb University of Ottawa, Kuljit Kaur Chahal Guru Nanak Dev University, Tim Bossenmaier Karlsruhe Institute of Technology (KIT), Bhaveet Nagaria Brunel University London, Philip Makedonski University of Goettingen, Matin Nili Ahmadabadi University of Tehran, Kristof Szabados Ericsson Hungary ltd., Helge Spieker Simula Research Laboratory, Norway, Matej Madeja Technical University of Košice, Nathaniel G. Hoy Brunel University London, Valentina Lenarduzzi University of Oulu, Shangwen Wang National University of Defense Technology, Gema Rodríguez-Pérez University of British Columbia (UBC), Ricardo Colomo-Palacios Østfold University College, Roberto Verdecchia Vrije Universiteit Amsterdam, Paramvir Singh The University of Auckland, Yihao Qin , Debasish Chakroborti University of Saskatchewan, Willard Davis IBM, Vijay Walunj University of Missouri-Kansas City, Hongjun Wu National University of Defense Technology, Diego Marcilio USI Università della Svizzera italiana, Omar Alam Trent University, Abdullah Aldaeej Imam Abdulrahman Bin Faisal University, Idan Amit The Hebrew University, Burak Turhan University of Oulu, Simon Eismann University of Würzburg, Anna-Katharina Wickert TU Darmstadt, Germany, Ivano Malavolta Vrije Universiteit Amsterdam, Matúš Sulír Technical University of Košice, Fatemeh Hendijani Fard University of British Columbia, Austin Henley University of Tennessee, Efstratios Kourtzanidis University Of Macedonia, Eray Tüzün Bilkent University, Christoph Treude University of Melbourne, Simin Maleki Shamasbi Indendent Researcher, Ivan Pashchenko University of Trento, Marvin Wyrich University of Stuttgart, James C. Davis Purdue University, USA, Alexander Serebrenik Eindhoven University of Technology, Ella Albrecht University of Goettingen, Ethem Utku Aktas Softtech Inc., Daniel Strüber Chalmers | University of Gothenburg / Radboud University, Johannes Erbel University of Goettingen
Pre-print Media Attached
13:30
90m
Talk
A Family of Experiments on Test-Driven Development
Journal-First Papers
Adrian Santos Parrilla University of Oulu, Sira Vegas Universidad Politecnica de Madrid, Oscar Dieste Universidad Politécnica de Madrid, Fernando Uyaguari ETAPA Telecommunications Company, Ayse Tosun Istanbul Technical University, Davide Fucci Blekinge Institute of Technology, Burak Turhan University of Oulu, Giuseppe Scanniello University of Basilicata, Simone Romano University of Bari, Itir Karac University of Oulu, Marco Kuhrmann Reutlingen University, Vladimir Mandić Faculty of Technical Sciences, University of Novi Sad, Robert Ramač Faculty of Technical Sciences, University of Novi Sad, Dietmar Pfahl University of Tartu, Christian Engblom Ericsson, Jarno Kyykka Ericsson, Kerli Rungi Testlio, Carolina Palomeque ETAPA Telecommunications Company, Jaroslav Spisak PAF, Markku Oivo University of Oulu, Natalia Juristo Universidad Politecnica de Madrid
Link to publication DOI Pre-print Media Attached
13:30
90m
Talk
SugarC: Scalable Desugaring of Real-World Preprocessor Usage into Pure C
Technical Track
Zachary Patterson University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Brent Pappas University of Central Florida, Shiyi Wei University of Texas at Dallas, Paul Gazzillo University of Central Florida
Pre-print Media Attached
13:30
90m
Talk
Within-project Defect Prediction of Infrastructure-as-Code Using Product and Process Metrics
Journal-First Papers
Stefano Dalla Palma Tilburg University, Dario Di Nucci University of Salerno, Fabio Palomba University of Salerno, Damian Andrew Tamburri TU/e
Link to publication DOI Authorizer link Pre-print Media Attached
13:30
90m
Poster
Enabling End-Users to Implement Larger Block-Based Programs
Posters
Nico Ritschel The University of British Columbia, Felipe Fronchetti Virginia Commonwealth University, Reid Holmes University of British Columbia, Ronald Garcia University of British Columbia, David C. Shepherd Virginia Commonwealth University
13:30
90m
Talk
FADATest: Fast and Adaptive Performance Regression Testing of Dynamic Binary Translation Systems
Technical Track
Jin Wu Harbin Institute of Technology, Jian Dong Harbin Institute Of Technology, Ruili Fang University of Georgia, Wen Zhang University of Georgia, Wenwen Wang University of Georgia, Decheng Zuo Harbin Institute of Technology
Pre-print Media Attached
13:30
90m
Talk
PUS: A Fast and Highly Efficient Solver for Inclusion-based Pointer AnalysisDistinguished Paper Award
Technical Track
Peiming Liu Texas A&M University, Yanze Li University of British Columbia, Bradley Swain Texas A&M University, Jeff Huang Texas A&M University
Pre-print Media Attached
13:30
90m
Talk
Adaptive Performance Anomaly Detection for Online Service Systems via Pattern Sketching
Technical Track
Zhuangbin Chen Chinese University of Hong Kong, China, Jinyang Liu , Yuxin Su Sun Yat-sen University, Hongyu Zhang University of Newcastle, Xiao Ling Huawei Technologies, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong
Pre-print Media Attached
13:30
90m
Talk
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
Technical Track
Michael Cao University of British Columbia, Khaled Ahmed University of British Columbia (UBC), Julia Rubin University of British Columbia
Pre-print Media Attached
13:30
90m
Short-paper
Efficiently and Precisely Searching for Code Changes with DiffSearch
SRC - ACM Student Research Competition
Luca Di Grazia University of Stuttgart
Link to publication DOI File Attached

Information for Participants
Tue 10 May 2022 21:00 - 22:00 at ICSE room 2-odd hours - Software Security 4 Chair(s): Hamid Bagheri
Info for room ICSE room 2-odd hours:

Click here to go to the room on Midspace

Wed 11 May 2022 03:00 - 04:00 at ICSE room 3-odd hours - Software Security 2 Chair(s): Liliana Pasquale
Info for room ICSE room 3-odd hours:

Click here to go to the room on Midspace