ICSE 2024
Fri 12 - Sun 21 April 2024 Lisbon, Portugal
Wed 17 Apr 2024 15:30 - 16:00 at Open Space - Posters 2

API misuses refer to incorrect usages that violate the usage constraints of API elements, potentially leading to issues such as runtime errors, exceptions, program crashes, and security vulnerabilities. Existing mining-based approaches for API misuse detection face challenges in accuracy, particularly in distinguishing infrequent from invalid usage. This limitation stems from the necessity to set pre-defined thresholds for frequent API usage patterns, resulting in potential misclassification of alternative usages. This paper introduces Poirot, a learning-based approach that mitigates the need for predefined thresholds. Leveraging Labeled, Graph-based Convolutional Networks, Poirot learns embeddings for API usages, capturing key features and enhancing API misuse detection. Preliminary evaluation on an API misuse benchmark demonstrates that our model achieves a relative improvement of 1.37–10.36X in F-score compared to state-of-the-art API misuse detection techniques.

Wed 17 Apr

Displayed time zone: Lisbon change

15:30 - 16:00
Posters 2Posters at Open Space
15:30
30m
Poster
Graph Neural Networks based Log Anomaly Detection and Explanation
Posters
Zhong Li Leiden University, Jiayang Shi Leiden University, Matthijs van Leeuwen Leiden University
15:30
30m
Poster
Unleashing the Giants: Enabling Advanced Testing for Infrastructure as Code
Posters
Daniel Sokolowski University of St. Gallen, David Spielmann University of St. Gallen, Guido Salvaneschi University of St. Gallen
Link to publication DOI Pre-print
15:30
30m
Poster
Engineering Industry-Ready Anomaly Detection Algorithms
Posters
Ngoc-Thanh Nguyen Western Norway University of Applied Sciences, Rogardt Heldal , Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy
File Attached
15:30
30m
Poster
Behavior Trees with Dataflow: Coordinating Reactive Tasks in Lingua Franca
Posters
Alexander Schulz-Rosengarten Kiel University, Department of Computer Science, Akash Ahmad Kiel University, Department of Computer Science, Malte Clement Kiel University, Department of Computer Science, Reinhard von Hanxleden Kiel University, Benjamin Asch University of California, Berkeley, Marten Lohstroh University of California, Berkeley, Edward Lee University of California at Berkeley, Gustavo Quiros Siemens Technology, Ankit Shukla Siemens Technology
15:30
30m
Poster
A Study of Backporting Code in Open-Source Software for Characterizing Changesets
Posters
Debasish Chakroborti University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Canada, Kevin Schneider University of Saskatchewan
15:30
30m
Poster
Domain Knowledge is All You Need: A Field Deployment of LLM-Powered Test Case Generation in FinTech Domain
Posters
Zhiyi Xue East China Normal University, Liangguo Li East China Normal University, Senyue Tian East China Normal University, Xiaohong Chen ECNU, Pingping Li Guotai Junan Securities Co., Ltd, Liangyu Chen East China Normal University, Tingting Jiang Guotai Junan Securities Co., Ltd, Min Zhang East China Normal University
15:30
30m
Poster
A Transformer-based Model for Assisting Dockerfile Revising
Posters
Yiwen Wu National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Tao Wang National University of Defense Technology, Huaimin Wang
15:30
30m
Poster
Poirot: Deep Learning for API Misuse Detection
Posters
Yi Li New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang Central University of Finance and Economics, Aashish Yadavally University of Texas at Dallas
15:30
30m
Poster
Going Viral: Case Studies on the Impact of Protestware
Posters
Youmei Fan Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Hathaichanok Damrongsiri Nara Institute of Science and Technology, Christoph Treude Singapore Management University, Hideaki Hata Shinshu University, Raula Gaikovina Kula Nara Institute of Science and Technology
Pre-print File Attached
15:30
30m
Poster
Neural Exception Handling Recommender
Posters
Yi Li New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Yuchen Cai University of Texas at Dallas, Aashish Yadavally University of Texas at Dallas, Abhishek Mishra University of Texas at Dallas, Genesis Montejo University of Texas at Dallas
15:30
30m
Poster
Towards Leveraging Fine-Grained Dependencies to Check Requirements Traceability Correctness
Posters
Anamaria-Roberta Hartl Johannes Kepler University Linz, Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Atif Mashkoor Johannes Kepler University Linz, Wesley Assunção North Carolina State University, Alexander Egyed Johannes Kepler University Linz
15:30
30m
Poster
Imperfect Code Generation: Uncovering Weaknesses in Automatic Code Generation by Large Language Models
Posters
Xiaoli Lian Beihang University, China, Shuaisong Wang Beihang University, Jieping Ma Beihang University, Xin Tan Beihang University, Fang Liu Beihang University, Lin Shi Beihang University, Cuiyun Gao Harbin Institute of Technology, Li Zhang Beihang University
15:30
30m
Poster
Understanding the Strategies Used by Employees to Cope with Technostress in the Software Industry
Posters
Valtteri Siitonen University of Jyväskylä, Saima Ritonummi University of Jyväskylä, Markus Salo University of Jyväskylä, Henri Pirkkalainen Tampere University, Saija Mauno University of Jyväskylä
15:30
30m
Poster
Programmable and Semantic Connector for DNN Component Integration: a Software Engineering Perspective
Posters
Jingwei Xu , Zihan Zeng Nanjing University