Keynote 2: Coding with the Machine: Promises and Perils in AI-Driven Software Engineering
Artificial intelligence is rapidly reshaping the way in which software is designed, developed, and maintained. From change recommendations and intelligent autocomplete to vulnerability detection, automated program repair, and agentic code generation, AI tooling is increasingly embedded across the software engineering lifecycle. These changes offer significant opportunities by accelerating development, amplifying capabilities, and unlocking new forms of automation that help software engineers scale up their work with an increased focus on the creative aspects. However, the integration of AI into the software engineering lifecycle also raises serious concerns. AI-generated code may be incorrect, insecure, or subtly biased. Developers risk over-relying on opaque systems, while sophisticated attackers may exploit generative models to insert backdoors or mislead human reviewers. As AI tools evolve from assistants to agents, we face a growing need to scrutinize their behavior, limitations, and impact on software quality, security, and developer cognition. This keynote surveys the emerging landscape of AI in software engineering, drawing on insights from our earlier research efforts that span change recommendation, log analysis, vulnerability detection, automated program repair, and autonomous evolutionary programming agents. We will reflect on the deeper implications of adopting AI in software engineering. What are we gaining, and what might we be losing? How can we ensure that human oversight, intent, and accountability remain central, and what role can the research community play as we move toward increasingly autonomous software engineering ecosystems?
Leon Moonen is a Professor and head of the Data-Driven Software Engineering Department (dataSED) at Simula Research Laboratory, Norway. He also holds a visiting professor position at the Department of Data Science and Analytics at BI Norwegian Business School. His research is aimed at the design and development of advanced, data-driven techniques and tools that support software engineers with the assessment, evolution, and operations of complex industrial software systems, with a particular interest in security and resilience in Software Systems, self-healing and self-adaptive technology and, more general, the application of machine learning and AI in Software Engineering. His research covers a wide range of topics, such as software analytics, software reverse engineering, software repository mining, machine learning, program comprehension, and empirical software engineering. Leon prefers to work in close collaboration with industry, to ensure that his research addresses questions of practical value, and to evaluate candidate solutions in real-life circumstances. Current projects investigate automated identification and repair of software security vulnerabilities, the use of LLMs to support cyber threat intelligence, adaptive bio-inspired techniques for creating autonomously self-healing systems, smart analytics of the vast amounts of logging data produced in continuous engineering, and recommendation systems for smarter evolution and testing of software-intensive systems.
Fri 20 JunDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
11:00 - 13:00 | Keynote & Session1: Software Vulnerability and Security IResearch Track / Plenary Events at Cosmos 3A Chair(s): William Chu Tunghai University | ||
11:00 60mKeynote | Keynote 2: Coding with the Machine: Promises and Perils in AI-Driven Software Engineering Plenary Events Leon Moonen Simula Research Laboratory | ||
12:00 15mTalk | Towards understanding the security issues of Python programs Research Track Hongcheng Fan Nanjing University, di liu Jiangsu Police Institute, Jielun Wu Nanjing University, Yang Feng Nanjing University, Qingkai Shi Nanjing University, Baowen Xu Nanjing University | ||
12:15 15mTalk | A Novel LLM Approach of Cybersecurity Threat Analysis and Response Research Track TIAN HU Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Shangyuan Zhuang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaorui Guo Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Jiyan Sun Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Yinlong Liu Institute of Information Engineering, Chinese Academy of Sciences,School of Cyber Security, University of Chinese Academy of Sciences, Wei Ma Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, Hongchao Wang Institute of Information Engineering, Chinese Academy of Sciences;School of Cyber Security, University of Chinese Academy of Sciences, zhaolingfeng Innovation Academy for Microsatellites of Chinese Academy of Science, zhangxiaojie Innovation Academy for Microsatellites of Chinese Academy of Science | ||
12:30 15mTalk | Measuring and Explaining the Effects of Android App Transformations in Online Malware Detection Research Track Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Xiaodong Zhang University of Chinese Academy of Science, Haoyu Wang Huazhong University of Science and Technology, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yang Liu Nanyang Technological University | ||
12:45 15mTalk | Leveraging Visible Widget Sizes for Detecting Repackaged Android Apps Research Track Pre-print |
Cosmos 3A is the first room in the Cosmos 3 wing.
When facing the main Cosmos Hall, access to the Cosmos 3 wing is on the left, close to the stairs. The area is accessed through a large door with the number “3”, which will stay open during the event.