Write a Blog >>
MSR 2022
Mon 23 - Tue 24 May 2022
co-located with ICSE 2022
Thu 19 May 2022 21:21 - 21:25 at MSR Main room - odd hours - Session 13: Security & Quality Chair(s): Gias Uddin

Ethereum is the most popular blockchain network because of the introduction of a smart contract. While Ethereum-based software has significantly increased in the wake of their popularity, the carbon emitted by them is pointed to as a global issue.To reduce the emission of carbon, it is necessary to reduce the energy consumed by the software. Recently, most studies have focused on the smart contract and then proposed energy efficiency methods for carbon friendly Ethereum networks. However, it is required to review not only smart contract but also client software for energy used in Ethereum network. This is because the client software performs all functions occurring in Ethereum network that includes smart contracts. Therefore, we need to investigate energy bugs that waste energy in the Ethereum client software, and then study to solve these bugs. The first task to make these studies possible is to build the energy bug benchmark of Ethereum client software. This paper introduces ECench, an energy bug benchmark of Ethereum client software. ECench includes 507 energy buggy commits from 7 series of client software that are nomally operated in Ethereum network. We carefully collected and manually reviewed them for the more clean commits. Another key strength of our benchmark is to provide the 8 categories which cause energy wastage. These categories can serve as a cornerstone for researchers to identify energy waste codes. Consequently, it can provide a valuable starting point for studies for energy reduction, further carbon reduction, in Ethereum.

Thu 19 May

Displayed time zone: Eastern Time (US & Canada) change

21:00 - 21:50
Session 13: Security & QualityTechnical Papers / Data and Tool Showcase Track / Registered Reports / Industry Track at MSR Main room - odd hours
Chair(s): Gias Uddin University of Calgary, Canada
21:00
7m
Talk
On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models
Technical Papers
Triet Le The University of Adelaide, Muhammad Ali Babar University of Adelaide
Pre-print
21:07
7m
Talk
LineVD: Statement-level Vulnerability Detection using Graph Neural Networks
Technical Papers
David Hin The University of Adelaide, Andrey Kan The University of Adelaide, Huaming Chen The University of Adelaide, Muhammad Ali Babar University of Adelaide
21:14
7m
Talk
LineVul: A Transformer-based Line-Level Vulnerability Prediction
Technical Papers
Michael Fu Monash University, Kla Tantithamthavorn Monash University
Pre-print
21:21
4m
Talk
ECench: An Energy Bug Benchmark of Ethereum Client Software
Data and Tool Showcase Track
Jinyoung Kim Sungkyunkwan University, Misoo Kim Sungkyunkwan University, Eunseok Lee Sungkyunkwan University
21:25
7m
Talk
Microsoft CloudMine: Data Mining for the Executive Order on Improving the Nation’s Cybersecurity
Industry Track
Kim Herzig Tools for Software Engineers, Microsoft, Luke Gostling Microsoft Corporation, Maximilian Grothusmann Microsoft Corporation, Nora Huang Microsoft Corporation, Sascha Just Microsoft, Alan Klimowski Microsoft Corporation, Yashasvini Ramkumar Microsoft Corporation, Myles McLeroy Microsoft Corporation, Kıvanç Muşlu Microsoft, Hitesh Sajnani Microsoft , Varsha Vadaga Microsoft Corporation
21:32
4m
Talk
Evaluating few shot and Contrastive learning Methods for Code Clone Detection
Registered Reports
Mohamad Khajezade University of British Columbia, Fatemeh Hendijani Fard University of British Columbia, Mohamed S Shehata University of British Columbia
Pre-print
21:36
14m
Live Q&A
Discussions and Q&A
Technical Papers


Information for Participants
Thu 19 May 2022 21:00 - 21:50 at MSR Main room - odd hours - Session 13: Security & Quality Chair(s): Gias Uddin
Info for room MSR Main room - odd hours:

Click here to go to the room on Midspace