Write a Blog >>
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 10 Oct

Displayed time zone: Eastern Time (US & Canada) change

08:30 - 10:00
Opening, Keynote and Session 1Doctoral Symposium at Ambassador A
08:30
5m
Day opening
Welcome from the Chairs
Doctoral Symposium
Laurie Williams North Carolina State University, Silvia Abrahão Universitat Politècnica de València
08:35
55m
Keynote
Secrets of the Tenured Professor
Doctoral Symposium
Tim Menzies North Carolina State University
Pre-print
09:30
30m
Doctoral symposium paper
Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart ContractsVirtual
Doctoral Symposium
Asem Ghaleb University of British Columbia
08:30 - 13:00
Keynote + Accepted Papers[Workshop] AUST '22 at Online Workshop 2
08:30
45m
Keynote
Testing the Long Tail Distribution of Autonomous Mobile SystemsVirtual
[Workshop] AUST '22
Sebastian Elbaum University of Virginia
09:15
30m
Talk
The anticipated impact of AI/ML on the Testing PyramidVirtual
[Workshop] AUST '22
Mush Honda Chief Quality Architect, Katalon Inc
09:45
30m
Keynote
Testing and Evaluation of Autonomous Driving Systems: From Simulated to Real-world Test EnvironmentsVirtual
[Workshop] AUST '22
Andrea Stocco Università della Svizzera italiana (USI)
10:15
30m
Talk
Autonomous Test Generation | User Journey DrivenVirtual
[Workshop] AUST '22
Mai Le Sr. Product Manager, Katalon Inc
10:45
30m
Paper
A Scenario Distribution Model for Effective and Efficient Testing of Autonomous Driving SystemsVirtual
[Workshop] AUST '22
Qunying Song Lund University, Per Runeson Lund University, Stefan Persson Volvo Cars Corporation
11:15
20m
Talk
Autonomous Software Testing ModelVirtual
[Workshop] AUST '22
Vu Nguyen Head of Research, Katalon Inc.; University of Science, VNU-HCM, Vietnam
11:35
20m
Paper
Horntinuum: Autonomous Testing using Constrained Horn ClausesVirtual
[Workshop] AUST '22
Ilia Zlatkin Florida State University, USA, Grigory Fedyukovich Florida State University
11:55
20m
Paper
Research on Test Flakiness: From Unit to System TestingVirtual
[Workshop] AUST '22
Kiet Ngo University of Science, VNU-HCM, Vietnam; Katalon Inc., Vu Nguyen Head of Research, Katalon Inc.; University of Science, VNU-HCM, Vietnam, Tien N. Nguyen University of Texas at Dallas
12:15
20m
Paper
A Review of AI-augmented End-to-End Test Automation ToolsVirtual
[Workshop] AUST '22
Phuoc Pham Katalon Inc., Ho Chi Minh City, Vietnam, Vu Nguyen Head of Research, Katalon Inc.; University of Science, VNU-HCM, Vietnam, Tien N. Nguyen University of Texas at Dallas
12:35
20m
Paper
Application of Natural Language Processing in Test AutomationVirtual
[Workshop] AUST '22
Khang Pham University of Science, VNU-HCM, Vietnam; Katalon Inc., Vu Nguyen Head of Research, Katalon Inc.; University of Science, VNU-HCM, Vietnam, Tien N. Nguyen University of Texas at Dallas
12:55
5m
Day closing
ClosingVirtual
[Workshop] AUST '22

08:30 - 10:00
08:30
10m
Day opening
Opening
[Workshop] A-Mobile '22
Jacques Klein University of Luxembourg, Sam Malek University of California at Irvine, USA, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Xiao Chen Monash University, Ting Su East China Normal University
08:40
50m
Keynote
Taming Android Fragmentation
[Workshop] A-Mobile '22
Li Li Monash University
09:30
20m
Paper
E-MANAFA: Energy Monitoring and ANAlysis tool For Android
[Workshop] A-Mobile '22
Rui António Ramada Rua University of Minho & INESC TEC, João Saraiva
08:30 - 10:00
09:00
15m
Day opening
Welcome
[Workshop] JPF '22

09:15
45m
Talk
Invited talk: "Eclipse Foundation: Enabling Open, Vendor Neutral Collaboration"
[Workshop] JPF '22
John Kellerman Eclipse Foundation
09:00 - 10:10
Welcome & Keynote[Workshop] AeSIR '22 at Online Workshop 3
Chair(s): Simone Scalabrino University of Molise
09:00
10m
Day opening
Welcome from the ChairsVirtual
[Workshop] AeSIR '22
Simone Scalabrino University of Molise, Fernanda Madeiral Vrije Universiteit Amsterdam, Felipe Ebert Fontys University of Applied Sciences, Marcelo De Almeida Maia Federal University of Uberlandia
09:10
60m
Keynote
What Developer Gaze Can Tell Us About Readable CodeVirtual
[Workshop] AeSIR '22
Bonita Sharif University of Nebraska-Lincoln, USA
10:00 - 10:30
Poster SessionDoctoral Symposium at Gold B
10:00
30m
Doctoral symposium paper
Call Graph Evolution Analytics over a Version Series of an Evolving Software SystemVirtual
Doctoral Symposium
Animesh Chaturvedi Indian Institute of Information Technology Dharwad (IIIT Dharwad)
DOI Pre-print Media Attached
10:00
30m
Doctoral symposium paper
Coverage-based Greybox Fuzzing with Pointer Monitoring for C ProgramsVirtual
Doctoral Symposium
Haibo Chen School of Computer Science and Communication Engineering, Jiangsu University, Jinfu Chen Jiangsu University
10:00 - 10:30
Coffee BreakSocial at Gold B
10:00
15m
Coffee break
Coffee Break
Social

10:10 - 10:25
10:10
15m
Coffee break
Coffee BreakVirtual
[Workshop] AeSIR '22

10:25 - 11:00
Paper Presentation Session 1: Identifier Names[Workshop] AeSIR '22 at Online Workshop 3
Chair(s): Felipe Ebert Fontys University of Applied Sciences
10:25
10m
Paper
Namesake: A Checker of Lexical Similarity in Identifier NamesVirtual
[Workshop] AeSIR '22
Naser Al Madi Colby College
10:35
10m
Paper
How students choose names: A replication studyVirtual
[Workshop] AeSIR '22
10:45
15m
Live Q&A
Q&A and Open Discussion on Identifier NamesVirtual
[Workshop] AeSIR '22
10:30 - 12:00
Session 2 - AI & Software EngineeringDoctoral Symposium at Ambassador A
10:30
30m
Doctoral symposium paper
Leveraging Artificial Intelligence on Binary Code Comprehension
Doctoral Symposium
Yifan Zhang Vanderbilt University
11:00
30m
Doctoral symposium paper
Assessment of Automated (Intelligent) Toolchains
Doctoral Symposium
Aurora Papotti Vrije Universiteit Amsterdam
11:30
30m
Doctoral symposium paper
Extraction and Management of Rationale
Doctoral Symposium
Mouna Dhaouadi University of Montreal
10:30 - 12:00
Inclusive SoftwareTutorials at Gold A
10:30
90m
Tutorial
Teaching How to Create Inclusive Software
Tutorials
The Accessible Learning Labs Rochester Institute of Technology, USA
10:30 - 12:00
10:30
50m
Keynote
The Promise of (Machine) Learning from User Interfaces to Support Software Engineering for Mobile Apps
[Workshop] A-Mobile '22
Kevin Moran George Mason University
11:20
20m
Paper
Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era
[Workshop] A-Mobile '22
Zikan Dong Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Hao Xie Beijing University of Posts and Telecommunications, Guoai Xu , Haoyu Wang Huazhong University of Science and Technology, China
11:40
20m
Paper
A First Look at CI/CD Adoptions in Open-Source Android Apps
[Workshop] A-Mobile '22
Pei Liu Monash University, Xiaoyu Sun Monash University, Yanjie Zhao Monash University, Yonghui Liu , John Grundy Monash University, Li Li Monash University
10:30 - 12:00
10:30
15m
Talk
Checking Just Pairs of Threads for Efficient and Scalable Incremental Verification of Multithreaded Programs
[Workshop] JPF '22
Pavel Parizek Charles University, Filip Kliber
10:45
15m
Talk
Using Theia Traceviewer to Visualize JPF Traces
[Workshop] JPF '22
Johan Besseling KTH Royal Institute of Technology, Sweden, Cyrille Artho KTH Royal Institute of Technology, Sweden
11:00
60m
Tutorial
Tutorial: Java PathFinder
[Workshop] JPF '22
Cyrille Artho KTH Royal Institute of Technology, Sweden
11:00 - 11:10
11:00
10m
Coffee break
Short BreakVirtual
[Workshop] AeSIR '22

11:10 - 11:45
Paper Presentation Session 2: Readability Assessment[Workshop] AeSIR '22 at Online Workshop 3
Chair(s): Fernanda Madeiral Vrije Universiteit Amsterdam
11:10
10m
Paper
How Readable is Model Generated Code? Examining Readability and Visual Inspection of GitHub CopilotVirtual
[Workshop] AeSIR '22
Naser Al Madi Colby College
11:20
10m
Paper
Rank Learning-Based Code Readability Assessment with Siamese Neural NetworksVirtual
[Workshop] AeSIR '22
11:30
15m
Live Q&A
Q&A and Open Discussion on Readability AssessmentVirtual
[Workshop] AeSIR '22
Naser Al Madi Colby College, Qing Mi
11:45 - 12:00
11:45
15m
Coffee break
Coffee BreakVirtual
[Workshop] AeSIR '22

12:00 - 13:30
LunchSocial at Gold B
12:00
90m
Lunch
Lunch
Social

12:00 - 13:10
Discussion Panel & Closing[Workshop] AeSIR '22 at Online Workshop 3
Chair(s): Marcelo De Almeida Maia Federal University of Uberlandia
12:00
60m
Panel
Discussion PanelVirtual
[Workshop] AeSIR '22
Prem Devanbu Department of Computer Science, University of California, Davis, Nicole Novielli University of Bari, Kevin Moran George Mason University, Marcelo De Almeida Maia Federal University of Uberlandia
13:00
10m
Day closing
Closing sessionVirtual
[Workshop] AeSIR '22
Simone Scalabrino University of Molise, Fernanda Madeiral Vrije Universiteit Amsterdam, Felipe Ebert Fontys University of Applied Sciences, Marcelo De Almeida Maia Federal University of Uberlandia
13:30 - 15:00
Session 3 - Human Factors & TestingDoctoral Symposium at Ambassador A
13:30
30m
Doctoral symposium paper
Identification and Mitigation of Toxic Communications Among Open Source Software Developers
Doctoral Symposium
Jaydeb Sarker Department of Computer Science, Wayne State University
Pre-print
14:00
30m
Doctoral symposium paper
Identification and Mitigation of Gender Biases to Promote Diversity and Inclusion among Open Source Communities
Doctoral Symposium
Sayma Sultana Wayne State University
14:30
30m
Doctoral symposium paper
A Framework for Testing Chemical Reaction Networks
Doctoral Symposium
Michael C. Gerten Iowa State University
13:30 - 15:00
Identifier NamingTutorials at Gold A
13:30
90m
Tutorial
A Primer on High-Quality Identifier Naming
Tutorials
Anthony Peruma University of Hawai‘i at Mānoa, Christian D. Newman Rochester Institute of Technology
Media Attached
13:30 - 15:00
13:30
50m
Keynote
Analyzing Android Native Code: Where Are We? Where Should We Go?
[Workshop] A-Mobile '22
Joshua Garcia University of California, Irvine
14:20
20m
Paper
Scaling Arbitrary Android App Analysis
[Workshop] A-Mobile '22
Felix Pauck Paderborn University, Germany
14:40
20m
Day closing
Closing
[Workshop] A-Mobile '22
Jacques Klein University of Luxembourg, Sam Malek University of California at Irvine, USA, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Xiao Chen Monash University, Ting Su East China Normal University
13:30 - 15:00
13:30
45m
Talk
Invited talk: "Virtual threads: scalable, harmonious concurrency"
[Workshop] JPF '22
14:15
15m
Talk
jpf-logic: a Framework for Checking Temporal Logic Properties of Java Code
[Workshop] JPF '22
Matt Walker York University, Canada, Parssa Khazra York University, Canada, Anto Nanah Ji York University, Canada, Hongru Wang York University, Canada, Franck van Breugel York University, Toronto
14:30
15m
Talk
Towards Wider Support for Java String Functions
[Workshop] JPF '22
Qiuchen Yan University of Minnesota, Cyrille Artho KTH Royal Institute of Technology, Sweden, Pavel Parizek Charles University
14:45
15m
Talk
Gradle support for Symbolic PathFinder
[Workshop] JPF '22
Gaurang Kudale University of Pune
15:00 - 15:30
Coffee BreakSocial at Gold B
15:00
30m
Coffee break
Coffee Break
Social

15:30 - 17:00
Session 4 - Source CodeDoctoral Symposium at Ambassador A
15:30
30m
Doctoral symposium paper
Towards a Live Environment for Code Refactoring
Doctoral Symposium
Sara Fernandes FEUP, Universidade do Porto
16:00
30m
Doctoral symposium paper
A model for automatic generating reusable code from multiple GUIs
Doctoral Symposium
Cícero Araújo Instituto Federal de Educação, Ciência e Tecnologia da Paraíba
DOI
16:30
30m
Doctoral symposium paper
Towards Improving Code Review Effectiveness Through Task Automation
Doctoral Symposium
Asif Kamal Turzo Wayne State University
15:30 - 17:00
Extract Method RefactoringTutorials at Gold A
15:30
90m
Tutorial
Extract Method Refactoring: Challenges, Opportunities, and Recent Application
Tutorials
Eman Abdullah AlOmar Stevens Institute of Technology, Mohamed Wiem Mkaouer Rochester Institute of Technology, Le Nguyen Rochester Institute of Technology
15:30 - 17:00
15:30
60m
Tutorial
Tutorial: Symbolic PathFinder
[Workshop] JPF '22
Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center
16:30
30m
Day closing
Open Discussion
[Workshop] JPF '22

16:00 - 19:00
Reception for the ASE Organization and Technical Program CommitteeSocial at Gold B
16:00
3h
Dinner
Reception for the ASE Organization and Technical Program Committee
Social

Tue 11 Oct

Displayed time zone: Eastern Time (US & Canada) change

08:30 - 10:00
08:30
30m
Day opening
Welcome from the Chairs
Plenary
P: Julia Rubin University of British Columbia, Canada, P: Shahar Maoz Tel Aviv University, Israel, G: Marouane Kessentini Oakland University, USA
09:00
60m
Keynote
Autonomous Systems: How to address the Dilemma between Autonomy and Safety
Keynotes
K: Lionel Briand University of Luxembourg; University of Ottawa
10:00 - 10:30
Tool Poster Session 1Tool Demonstrations at Ballroom A
10:00
30m
Demonstration
WebMonitor: https://youtu.be/hqVw0JU3k9c
Tool Demonstrations
Ennio Visconti TU Wien, Christos Tsigkanos University of Bern, Switzerland, Laura Nenzi University of Trieste
10:00
30m
Demonstration
Quacky: Quantitative Access Control Permissiveness Analyzer
Tool Demonstrations
William Eiers University of California at Santa Barbara, USA, Ganesh Sankaran University of California Santa Barbara, Albert Li University of California Santa Barbara, Emily O'Mahony University of California Santa Barbara, Benjamin Prince University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara
10:00
30m
Demonstration
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics
Tool Demonstrations
Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Rohan Sethi Loyola University Chicago, Sohini Thota Loyola University Chicago, Shilpika University of California at Davis, Allan J. Miller Loyola University Chicago, Wenxin Jiang Purdue University, Emmanuel S. Amobi Loyola University Chicago, Austin Pinderski Duke University, Loyola University Chicago, Konstantin Läufer Loyola University Chicago, Nicholas J. Hayward Loyola University Chicago, Neil Klingensmith Loyola University Chicago, James C. Davis Purdue University, USA, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory
10:00
30m
Demonstration
AUSERA: Automated Security Vulnerability Detection for Android AppsVirtual
Tool Demonstrations
Sen Chen Tianjin University, Yuxin Zhang Tianjin University, Lingling Fan Nankai University, Jiaming Li Tianjin University, Yang Liu Nanyang Technological University
10:00
30m
Demonstration
Trimmer: Context-Specific Code ReductionVirtual
Tool Demonstrations
Aatira Anum Ahmad Lahore University of Management Sciences, Mubashir Anwar University of Illinois Urbana-Champaign, Hashim Sharif University of Illinois at Urbana-Champaign, Ashish Gehani SRI, Fareed Zaffar Lahore University of Management Sciences
10:00
30m
Demonstration
Maktub: Lightweight Robot System Test Creation and Automation
Tool Demonstrations
Amr Moussa North Carolina State University, John-Paul Ore North Carolina State University
10:00
30m
Demonstration
V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities
Tool Demonstrations
Vipawan Jarukitpipat Mahidol University, Xiao Peng China EverBright Bank, Xiao Peng China EverBright Bank, Chaiyong Ragkhitwetsagul Mahidol University, Thailand, Morakot Choetkiertikul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University, Raula Gaikovina Kula Nara Institute of Science and Technology, Bodin Chinthanet Nara Institute of Science and Technology, Takashi Ishio Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology
10:00
30m
Demonstration
RobSimVer: A Tool for RoboSim Modeling and AnalysisVirtual
Tool Demonstrations
Dehui Du East China Normal University, Ana Cavalcanti University of York, JihuiNie East China Normal University
10:00
30m
Demonstration
Xscope: Hunting for Cross-Chain Bridge AttacksVirtual
Tool Demonstrations
Jiashuo Zhang Peking University, China, Jianbo Gao Peking University, Yue Li Peking University, Ziming Chen Peking University, Zhi Guan Peking University, Zhong Chen
10:00
30m
Demonstration
SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems
Tool Demonstrations
Alberto D. Rodriguez University of Notre Dame, Timothy Newman University of Notre Dame, Katherine R. Dearstyne University of Notre Dame, Jane Cleland-Huang University of Notre Dame
10:00
30m
Demonstration
Building recommender systems for modelling languages with DroidVirtual
Tool Demonstrations
Lissette Almonte Universidad Autónoma de Madrid, Esther Guerra Universidad Autónoma de Madrid, Iván Cantador Universidad Autónoma de Madrid, Juan de Lara Autonomous University of Madrid
Pre-print Media Attached
10:00
30m
Demonstration
Shibboleth: Hybrid Patch Correctness Assessment in Automated Program Repair
Tool Demonstrations
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
10:00 - 10:30
Coffee BreakSocial at Ballroom A
10:00
30m
Coffee break
Coffee Break
Social

10:30 - 12:30
Technical Session 1 - AI for SE IResearch Papers / Industry Showcase at Ballroom C East
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
10:30
20m
Research paper
B-AIS: An Automated Process for Black-box Evaluation of AI-enabled Software Systems against Domain Semantics
Research Papers
Hamed Barzamini , Mona Rahimi Northern Illinois University
10:50
20m
Industry talk
Automatic Generation of Visualizations for Machine Learning Pipelines
Industry Showcase
Lei Liu Fujitsu Laboratories of America, Inc., Wei-Peng Chen Fujitsu Research of America, Inc., Mehdi Bahrami Fujitsu Laboratories of America, Inc., Mukul Prasad Amazon Web Services
11:10
20m
Research paper
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft DesignVirtual
Research Papers
Houssem Ben Braiek École Polytechnique de Montréal, Ali Tfaily Bombardier Aerospace, Foutse Khomh Polytechnique Montréal, Thomas Reid , Ciro Guida Bombardier Aerospace
Pre-print
11:30
20m
Research paper
Unveiling Hidden DNN Defects with Decision-Based Metamorphic TestingVirtual
Research Papers
Yuanyuan Yuan The Hong Kong University of Science and Technology, Qi Pang HKUST, Shuai Wang Hong Kong University of Science and Technology
11:50
20m
Research paper
Patching Weak Convolutional Neural Network Models through Modularization and CompositionVirtual
Research Papers
Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, China, Hongyu Zhang University of Newcastle
12:10
20m
Research paper
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software DeploymentVirtual
Research Papers
Jie Zhu Peking University, Leye Wang Peking University, Xiao Han Shanghai University of Finance and Economics
DOI Pre-print
10:30 - 12:30
Technical Session 2 - Debugging and TroubleshootingResearch Papers / Industry Showcase / Late Breaking Results at Banquet A
Chair(s): Andrew Begel Carnegie Mellon University, Software and Societal Systems Department
10:30
20m
Research paper
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints
Research Papers
Arianna Blasi Meta; prev. Università della Svizzera italiana, Alessandra Gorla IMDEA Software Institute, Michael D. Ernst University of Washington, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology
10:50
20m
Research paper
CoditT5: Pretraining for Source Code and Natural Language Editing
Research Papers
Jiyang Zhang University of Texas at Austin, Sheena Panthaplackel UT Austin, Pengyu Nie University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Milos Gligoric University of Texas at Austin
Pre-print
11:10
20m
Industry talk
Automated Identification of Security-Relevant Configuration Settings Using NLP
Industry Showcase
Patrick Stöckle Technical University of Munich (TUM), Theresa Wasserer Technical University of Munich, Bernd Grobauer Siemens AG, Alexander Pretschner TU Munich
Pre-print
11:30
20m
Research paper
Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness
Research Papers
Haoye Tian University of Luxembourg, Xunzhu Tang University of Luxembourg, Andrew Habib SnT, University of Luxembourg, Shangwen Wang National University of Defense Technology, Kui Liu Huawei Software Engineering Application Technology Lab, Xin Xia Huawei Software Engineering Application Technology Lab, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé SnT, University of Luxembourg
Pre-print
11:50
10m
Paper
A real-world case study for automated ticket team assignment using natural language processing and explainable modelsVirtual
Late Breaking Results
Lucas Pavelski Sidia R&D Institute, Rodrigo de Souza Braga Sidia R&D Institute
10:30 - 12:30
Technical Session 3 - Fuzzing IResearch Papers / Tool Demonstrations / NIER Track at Banquet B
Chair(s): Aravind Machiry Purdue University
10:30
20m
Research paper
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles
Research Papers
Yang Sun Singapore Management University, Singapore, Chris Poskitt Singapore Management University, Jun Sun Singapore Management University, Yuqi Chen ShanghaiTech University, China, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc
DOI Pre-print
10:50
20m
Research paper
Fuzzle: Making a Puzzle for FuzzersACM SIGSOFT Distinguished Paper Award
Research Papers
Haeun Lee KAIST, Soomin Kim KAIST, Sang Kil Cha KAIST, South Korea
11:10
10m
Demonstration
ADEPT: A Testing Platform for Simulated Autonomous DrivingVirtual
Tool Demonstrations
Sen Wang Nanjing University, Zhuheng Sheng Nanjing University, Jingwei Xu , Taolue Chen University of Surrey, UK, Junjun Zhu Nanjing University, Shuhui Zhang Nanjing University, Yuan Yao Nanjing University, Xiaoxing Ma Nanjing University
11:20
20m
Research paper
HTFuzz: Heap Operation Sequence Sensitive FuzzingVirtual
Research Papers
Yuanping Yu Institute of Software, Chinese Academy of Sciences, Xiangkun Jia Institute of Software Chinese Academy of Sciences, Yuwei Liu Institute of Software, Chinese Academy of Sciences, Yanhao Wang Qi An Xin Group Corp., Qian Sang Institute of Software, Chinese Academy of Sciences, Chao Zhang Tsinghua University, Purui Su Institute of Software/CAS China
11:40
20m
Research paper
Efficient Greybox Fuzzing to Detect Memory ErrorsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Jinsheng Ba National University of Singapore, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore
12:00
20m
Research paper
Griffin: Grammar-Free DBMS FuzzingVirtual
Research Papers
Jingzhou Fu School of Software, Tsinghua University, Jie Liang School of Software, Tsinghua University, Zhiyong Wu Tsinghua University, China, Mingzhe Wang Tsinghua University, Yu Jiang Tsinghua University
12:20
10m
Vision and Emerging Results
A Novel Coverage-gudied Greybox Fuzzing based on Power Schedule Optimization with Time ComplexityVirtual
NIER Track
Shengran Wang School of Computer Science and Communication Engineering, Jiangsu University, Jinfu Chen Jiangsu University, Saihua Cai School of Computer Science and Communication Engineering, Jiangsu University, Chi Zhang Jiangsu University, Haibo Chen School of Computer Science and Communication Engineering, Jiangsu University, Jingyi Chen School of Computer Science and Communication Engineering, Jiangsu University
10:30 - 12:30
Technical Session 4 - Mobile Apps IResearch Papers / NIER Track / Industry Showcase / Journal-first Papers / Tool Demonstrations at Gold A
Chair(s): Jacques Klein University of Luxembourg
10:30
20m
Research paper
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues
Research Papers
Xiaoyu Sun Monash University, Xiao Chen Monash University, Yanjie Zhao Monash University, Pei Liu Monash University, John Grundy Monash University, Li Li Monash University
DOI Pre-print
10:50
20m
Paper
Automated, Cost-effective, and Update-driven App TestingVirtual
Journal-first Papers
Chanh-Duc Ngo University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication
11:10
20m
Industry talk
Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement LearningVirtual
Industry Showcase
Zhengwei Lv ByteDance, Chao Peng ByteDance, China, Zhao Zhang Bytedance Network Technology, Ting Su East China Normal University, Kai Liu Bytedance, Ping Yang Bytedance Network Technology
11:30
10m
Vision and Emerging Results
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android AppsVirtual
NIER Track
Vikas K. Malviya Singapore Management University, Chee Wei Leow Singapore Management University, Ashok Kasthuri Singapore Management University, Yan Naing Tun Singapore Management University, Lwin Khin Shar Singapore Management University, Lingxiao Jiang Singapore Management University
Pre-print Media Attached
11:40
20m
Research paper
MalWhiteout: Reducing Label Errors in Android Malware DetectionVirtual
Research Papers
Liu Wang Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Yulei Sui University of Technology Sydney
12:00
10m
Demonstration
AUSERA: Automated Security Vulnerability Detection for Android AppsVirtual
Tool Demonstrations
Sen Chen Tianjin University, Yuxin Zhang Tianjin University, Lingling Fan Nankai University, Jiaming Li Tianjin University, Yang Liu Nanyang Technological University
12:10
20m
Research paper
A Comprehensive Evaluation of Android ICC Resolution TechniquesVirtual
Research Papers
Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Shixin Zhang Beijing Jiaotong University, China, Yepang Liu Southern University of Science and Technology, Xi Deng Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI Pre-print
12:30 - 14:00
12:30
90m
Lunch
Lunch
Social

14:00 - 15:30
Poster Session (for judges only)Student Research Competition at Ballroom A
14:00
90m
Meeting
Poster Session (for judges only)
Student Research Competition

14:00 - 15:30
Technical Session 5 - Code AnalysisTool Demonstrations / Research Papers / Journal-first Papers at Ballroom C East
Chair(s): Vahid Alizadeh DePaul University
14:00
20m
Research paper
Detecting Blocking Errors in Go Programs using Localized Abstract InterpretationACM SIGSOFT Distinguished Paper Award
Research Papers
Oskar Haarklou Veileborg Aarhus University, Georgian-Vlad Saioc Aarhus University, Anders Møller Aarhus University
Link to publication
14:20
10m
Demonstration
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts
Tool Demonstrations
Ye Liu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore
Pre-print
14:30
20m
Paper
An empirical comparison of four Java-based regression test selection techniques
Journal-first Papers
Min Kyung Shin Colorado State University, Sudipto Ghosh Colorado State University, USA, Leo R. Vijayasarathy Colorado State University
Link to publication DOI
14:50
10m
Demonstration
Augur: Dynamic Taint Analysis for Asynchronous JavaScript
Tool Demonstrations
Mark W. Aldrich Tufts University, Alexi Turcotte Northeastern University, Matthew Blanco Northeastern University, Frank Tip Northeastern University
15:00
10m
Demonstration
FlexType: A Plug-and-Play Framework for Type Inference Models
Tool Demonstrations
Sivani Voruganti UC Davis, Kevin Jesse University of California at Davis, USA, Prem Devanbu Department of Computer Science, University of California, Davis
Pre-print
15:10
20m
Research paper
SelfAPR: Self-supervised Program Repair with Test Execution DiagnosticsVirtual
Research Papers
He Ye KTH Royal Institute of Technology, Matias Martinez Université Polytechnique Hauts-de-France, Xiapu Luo Hong Kong Polytechnic University, Tao Zhang Macau University of Science and Technology (MUST), Martin Monperrus KTH Royal Institute of Technology
14:00 - 15:30
14:00
60m
Meeting
Welcome Speed Networking
Diversity and Inclusion Events
O: Andrew Begel Carnegie Mellon University, Software and Societal Systems Department
14:00 - 15:30
Technical Session 6 - Source Code ManipulationNIER Track / Research Papers / Late Breaking Results at Banquet A
Chair(s): Collin McMillan University of Notre Dame
14:00
10m
Vision and Emerging Results
Automatic Code Documentation Generation Using GPT-3
NIER Track
Junaed Younus Khan University of Calgary, Gias Uddin University of Calgary, Canada
14:10
20m
Research paper
Automated Feedback Generation for Competition-Level Code
Research Papers
Jialu Zhang Yale University, De Li The MathWorks, Inc., John C. Kolesar Yale University, Hanyuan Shi N/A, Ruzica Piskac Yale University
14:30
10m
Paper
Generalizability of Code Clone Detection on CodeBERT
Late Breaking Results
Tim Sonnekalb German Aerospace Center (DLR), Bernd Gruner German Aerospace Center (DLR), Clemens-Alexander Brust German Aerospace Center (DLR), Patrick Mäder Technische Universität Ilmenau
DOI Pre-print
14:40
10m
Vision and Emerging Results
Next Syntactic-Unit Code Completion and Applications
NIER Track
Hoan Anh Nguyen Amazon, Aashish Yadavally University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas
14:50
20m
Research paper
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of CodeVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Aryaz Eghbali University of Stuttgart, Germany, Michael Pradel University of Stuttgart
15:10
20m
Research paper
Low-Resources Project-Specific Code SummarizationVirtual
Research Papers
Rui Xie Peking University, Tianxiang Hu Peking University, Wei Ye Peking University, Shikun Zhang Peking University
14:00 - 15:30
Technical Session 7 - Fuzzing IIResearch Papers at Banquet B
Chair(s): Karine Even-Mendoza Imperial College London
14:00
20m
Research paper
So Many Fuzzers, So Little Time - Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)StackVirtual
Research Papers
Clement Poncelet Uppsala University, Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Nicolas Tsiftes RISE Research Institutes of Sweden
DOI Pre-print
14:20
20m
Research paper
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures
Research Papers
Ashwin Kallingal Joshy Iowa State University, Wei Le Iowa State University
14:40
20m
Research paper
QATest: A Uniform Fuzzing Framework for Question Answering SystemsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Zixi Liu Nanjing University, Yang Feng Nanjing University, Yining Yin Nanjing University, China, Jingyu Sun Nanjing University, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University
15:00
20m
Research paper
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided FuzzingVirtual
Research Papers
Jianzhong Su Sun Yat-sen University, Hong-Ning Dai Hong Kong Baptist University, Lingjun Zhao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University
14:00 - 15:30
Technical Session 8 - Mobile Apps IIResearch Papers / Tool Demonstrations at Gold A
Chair(s): Wei Yang University of Texas at Dallas
14:00
20m
Research paper
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps
Research Papers
Forough Mehralian University of California at Irvine, Navid Salehnamadi University of California at Irvine, Syed Fatiul Huq University of California, Irvine, Sam Malek University of California at Irvine, USA
14:20
20m
Research paper
Groundhog: An Automated Accessibility Crawler for Mobile Apps
Research Papers
Navid Salehnamadi University of California at Irvine, Forough Mehralian University of California at Irvine, Sam Malek University of California at Irvine, USA
14:40
20m
Research paper
Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews
Research Papers
Fahimeh Ebrahimi Louisiana State University, Anas "Nash" Mahmoud Louisiana State University
15:00
10m
Demonstration
ecoCode: a SonarQube Plugin to Remove Energy Smells from Android Projects
Tool Demonstrations
Olivier Le Goaër LIUPPA, Université de Pau et des Pays de l'Adour, Julien Hertout Snapp'
DOI File Attached
15:10
20m
Research paper
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile AppsVirtual
Research Papers
Yuhui Su Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Shoubin Li ISCAS, Qing Wang Institute of Software at Chinese Academy of Sciences
Pre-print
15:30 - 16:00
15:30
30m
Poster
ASTOR: An Approach to Identify Security Code Reviews
Student Research Competition
Rajshakhar Paul Wayne State University
15:30
30m
Poster
‘Who built this crap?’ Developing a Software Engineering Domain Specific Toxicity Detector
Student Research Competition
Jaydeb Sarker Department of Computer Science, Wayne State University
Pre-print
15:30
30m
Poster
Automatically Fixing Breaking Changes of Data Science Libraries
Student Research Competition
Hailie Mitchell Carnegie Mellon University
15:30
30m
Poster
Execution Path Detection through Dynamic Analysis in Black-Box Testing Environments
Student Research Competition
Frank Whitworth Wake Forest University
15:30
30m
Poster
Automatic Software Timing Attack Evaluation & Mitigation on Clear Hardware Assumption
Student Research Competition
Prabuddha Chakraborty University of Florida
15:30
30m
Poster
Automatically Tagging the “AAA" Pattern in Unit Test Cases Using Machine Learning Models
Student Research Competition
Chenhao Wei Stevens Institute of Technology, Lu Xiao Stevens Institute of Technology, Tingting Yu University of Cincinnati, Xinyu Chen HSBC Software Development (Guangdong) Limited, Xiao Wang Stevens Institute of Technology, Sunny Wong Envestnet, Abigail Clune AGI
15:30
30m
Poster
A Unified Specification Mining Framework for Smart Contracts
Student Research Competition
Ye Liu Nanyang Technological University
15:30
30m
Poster
Identifying Sexism and Misogyny in Pull Request Comments
Student Research Competition
Sayma Sultana Wayne State University
15:30
30m
Poster
Detecting Inconsistencies in If-Condition-Raise Statements
Student Research Competition
Islem BOUZENIA Software Lab, University of Stuttgart
15:30
30m
Poster
Software Evolution Management with Differential Facts
Student Research Competition
Xiuheng Wu Nanyang Technological University, Singapore
15:30
30m
Poster
RESTCluster: Automated Crash Clustering for RESTful API
Student Research Competition
Yi Liu Nanyang Technological University
15:30 - 16:00
Coffee BreakSocial at Ballroom A
15:30
30m
Coffee break
Coffee Break
Social

16:00 - 16:45
16:00
45m
Meeting
Judges Meeting
Student Research Competition

17:00 - 21:00
Conference Banquet & Award Announcements Social at Meadow Brook Hall
17:00
4h
Dinner
Conference Banquet & Award Announcements
Social

Wed 12 Oct

Displayed time zone: Eastern Time (US & Canada) change

07:30 - 08:00
07:30
30m
Coffee break
Women’s BreakfastWomen Only
Diversity and Inclusion Events
S: Bonita Sharif University of Nebraska-Lincoln, USA
08:00 - 09:30
08:00
15m
Paper
Modeling bug report quality
MIP Awards
A: Pieter Hooimeijer Engineering Manager, Facebook Inc., A: Westley Weimer University of Michigan
Link to publication DOI
08:15
15m
Paper
Towards automatically generating summary comments for Java methods
MIP Awards
A: Giriprasad Sridhara IBM Research Labs, A: Emily Hill Drew University, A: Divya Muppaneni , A: Lori Pollock University of Delaware, USA, A: K. Vijay-Shanker
Link to publication DOI
08:30
60m
Keynote
From Automating Software Engineering to Empowering Software Developers
Keynotes
K: Margaret-Anne Storey University of Victoria
09:30 - 10:00
Tool Poster Session 2Tool Demonstrations at Ballroom A
09:30
30m
Demonstration
ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic Relation
Tool Demonstrations
Jiawei He , Zhida Bao Harbin Engineering University, Quanjun Zhang Nanjing University, Weisong Sun State Key Laboratory for Novel Software Technology, Nanjing University, Jiawei Liu Nanjing University, Chunrong Fang Nanjing University, Yun Lin National University of Singapore
09:30
30m
Demonstration
CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow Memory
Tool Demonstrations
Bernd Fischer Stellenbosch University, South Africa, Salvatore La Torre Università degli Studi di Salerno, Gennaro Parlato University of Molise, Peter Schrammel University of Sussex and Diffblue Ltd
09:30
30m
Demonstration
ADEPT: A Testing Platform for Simulated Autonomous DrivingVirtual
Tool Demonstrations
Sen Wang Nanjing University, Zhuheng Sheng Nanjing University, Jingwei Xu , Taolue Chen University of Surrey, UK, Junjun Zhu Nanjing University, Shuhui Zhang Nanjing University, Yuan Yao Nanjing University, Xiaoxing Ma Nanjing University
09:30
30m
Demonstration
Augur: Dynamic Taint Analysis for Asynchronous JavaScript
Tool Demonstrations
Mark W. Aldrich Tufts University, Alexi Turcotte Northeastern University, Matthew Blanco Northeastern University, Frank Tip Northeastern University
09:30
30m
Demonstration
FlexType: A Plug-and-Play Framework for Type Inference Models
Tool Demonstrations
Sivani Voruganti UC Davis, Kevin Jesse University of California at Davis, USA, Prem Devanbu Department of Computer Science, University of California, Davis
Pre-print
09:30
30m
Demonstration
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts
Tool Demonstrations
Ye Liu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore
Pre-print
09:30
30m
Demonstration
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE
Tool Demonstrations
Eman Abdullah AlOmar Stevens Institute of Technology, Anton Ivanov HSE University, Zarina Kurbatova JetBrains Research, Yaroslav Golubev JetBrains Research, Mohamed Wiem Mkaouer Rochester Institute of Technology, Ali Ouni ETS Montreal, University of Quebec, Timofey Bryksin JetBrains Research, Le Nguyen Rochester Institute of Technology, Amit Kini Rochester Institute of Technology, Aditya Thakur Rochester Institute of Technology
DOI Pre-print
09:30
30m
Demonstration
ecoCode: a SonarQube Plugin to Remove Energy Smells from Android Projects
Tool Demonstrations
Olivier Le Goaër LIUPPA, Université de Pau et des Pays de l'Adour, Julien Hertout Snapp'
DOI File Attached
09:30
30m
Demonstration
Answering Software Deployment Questions via Neural Machine Reading at ScaleVirtual
Tool Demonstrations
Guan Jie Qiu School of Software, Shanghai Jiao Tong University, Diwei Chen School of Software, Shanghai Jiao Tong University, Shuai Zhang School of Software, Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, China, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University
09:30
30m
Demonstration
LiveRef: a Tool for Live Refactoring Java Code
Tool Demonstrations
Sara Fernandes FEUP, Universidade do Porto, Ademar Aguiar FEUP, Universidade do Porto, André Restivo LIACC, Universidade do Porto, Porto, Portugal
09:30
30m
Demonstration
A transformer-based IDE plugin for vulnerability detectionVirtual
Tool Demonstrations
Cláudia Mamede FEUP, U.Porto, Eduard Pinconschi FEUP, U.Porto, Rui Abreu Faculty of Engineering, University of Porto, Portugal
09:30 - 10:00
Coffee BreakSocial at Ballroom A
09:30
30m
Coffee break
Coffee Break
Social

10:00 - 12:00
Technical Session 9 - Security and Privacy Research Papers / Industry Showcase at Ballroom C East
Chair(s): Wei Yang University of Texas at Dallas
10:00
20m
Research paper
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage
Research Papers
Ibrahim Mesecan Iowa State University, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London
10:20
20m
Research paper
ThirdEye: Attention Maps for Safe Autonomous Driving Systems
Research Papers
Andrea Stocco Università della Svizzera italiana (USI), Paulo J. Nunes Federal University of Pernambuco, Marcelo d'Amorim Federal University of Pernambuco, Paolo Tonella USI Lugano
DOI Pre-print
10:40
20m
Industry talk
Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot
Industry Showcase
Meriel von Stein University of Virginia, Sebastian Elbaum University of Virginia
11:00
20m
Research paper
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
Research Papers
Fuman Xie University of Queensland, Yanjun Zhang University of Queensland, Chuan Yan University of Queensland, Suwan Li Nanjing University, Lei Bu Nanjing University, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Zi Huang University of Queensland, Guangdong Bai University of Queensland
11:20
20m
Research paper
An Empirical Study of Automation in Software Security Patch Management
Research Papers
Nesara Dissanayake University of Adelaide, Asangi Jayatilaka University of Adelaide, Mansooreh Zahedi The Univeristy of Melbourne, Muhammad Ali Babar University of Adelaide
11:40
20m
Research paper
Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
Research Papers
Yuxi Ling National University of Singapore, Kailong Wang National University of Singapore, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology, China, Jin Song Dong National University of Singapore
10:00 - 12:00
Technical Session 10 - Testing IResearch Papers / Industry Showcase / Tool Demonstrations at Banquet A
Chair(s): Gordon Fraser University of Passau
10:00
20m
Research paper
Inline Tests
Research Papers
Yu Liu University of Texas at Austin, Pengyu Nie University of Texas at Austin, Owolabi Legunsen Cornell University, Milos Gligoric University of Texas at Austin
Pre-print
10:20
10m
Demonstration
LiveRef: a Tool for Live Refactoring Java Code
Tool Demonstrations
Sara Fernandes FEUP, Universidade do Porto, Ademar Aguiar FEUP, Universidade do Porto, André Restivo LIACC, Universidade do Porto, Porto, Portugal
10:30
20m
Research paper
Sorry, I don't Understand: Improving Voice User Interface Testing
Research Papers
Emanuela Guglielmi University of Molise, Giovanni Rosa University of Molise, Simone Scalabrino University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana, Rocco Oliveto University of Molise
10:50
20m
Industry talk
MOREST: Industry Practice of Automatic RESTful API Testing
Industry Showcase
Yi Liu Nanyang Technological University, Yuekang Li Nanyang Technological University, Yang Liu Nanyang Technological University, Ruiyuan Wan , Runchao Wu Huawei Inc., Qingkun Liu Huawei Cloud Computing Technologies Co., Ltd
11:10
20m
Research paper
VITAS : Guided Model-based VUI Testing of VPA AppsVirtual
Research Papers
Suwan Li Nanjing University, Lei Bu Nanjing University, Guangdong Bai University of Queensland, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Hanlin Wei The University of Queensland
10:00 - 12:00
Technical Session 12 - Builds and VersionsResearch Papers at Banquet B
Chair(s): Yi Li Nanyang Technological University, Singapore
10:00
20m
Research paper
HyperAST: Enabling Efficient Analysis of Software Histories at ScaleACM SIGSOFT Distinguished Paper Award
Research Papers
Quentin Le-dilavrec Univ. Rennes, IRISA, INRIA, Djamel Eddine Khelladi CNRS, France, Arnaud Blouin Univ Rennes, INSA Rennes, Inria, CNRS, IRISA, Jean-Marc Jézéquel Univ Rennes - IRISA
10:20
20m
Research paper
Has My Release Disobeyed Semantic Versioning? Static Detection Based On Semantic DifferencingACM SIGSOFT Distinguished Paper Award
Research Papers
Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Bihuan Chen Fudan University, China, Yang Liu Nanyang Technological University
10:40
20m
Research paper
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis
Research Papers
Sheikh Shadab Towqir Virginia Tech, Bowen Shen Virginia Tech, Muhammad Ali Gulzar Virginia Tech, USA, Na Meng Virginia Tech
11:00
20m
Research paper
SmartPip: A Smart Approach to Resolving Python Dependency Conflict IssuesVirtual
Research Papers
Chao Wang School of Informatics, Xiamen University, Rongxin Wu Xiamen University, Haohao Song School of Informatics, Xiamen University, Jiwu Shu School of Informatics, Xiamen University, Guoqing Li Xiamen Meiya Pico Information Co., Ltd.
11:20
20m
Research paper
Accelerating Build Dependency Error Detection via Virtual BuildVirtual
Research Papers
Rongxin Wu Xiamen University, Minglei Chen School of Informatics, Xiamen University, Chengpeng Wang The Hong Kong University of Science and Technology, Gang Fan Ant Group, Jiguang Qiu Xiamen Meiya Pico Information Co., Ltd., Charles Zhang Hong Kong University of Science and Technology
11:40
20m
Research paper
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration BuildsVirtual
Research Papers
Chen Zhang Fudan University, Bihuan Chen Fudan University, China, Junhao Hu Fudan University, Xin Peng Fudan University, Wenyun Zhao Fudan University, China
10:00 - 12:00
Technical Session 11 - Analysis and TypesResearch Papers / NIER Track / Late Breaking Results at Gold A
Chair(s): Thiago Ferreira University of Michigan - Flint
10:00
20m
Research paper
SA4U: Practical Static Analysis for Unit Type Error Detection
Research Papers
Max Taylor The Ohio State University, Johnathon Aurand The Ohio State University, Feng Qin Ohio State University, USA, Xiaorui Wang The Ohio State University, Brandon Henry Tangram Flex, Xiangyu Zhang Purdue University
10:20
10m
Vision and Emerging Results
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection
NIER Track
Giacomo Priamo Sapienza University of Rome, Daniele Cono D'Elia Sapienza University of Rome, Leonardo Querzoni Sapienza University Rome
10:30
20m
Research paper
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models
Research Papers
José Antonio Hernández López Department of Computer Science and Systems, University of Murcia, Martin Weyssow DIRO, Université de Montréal, Jesús Sánchez Cuadrado , Houari Sahraoui Université de Montréal
Link to publication Pre-print
10:50
10m
Paper
Towards Gradual Multiparty Session TypingVirtual
Late Breaking Results
Sung-Shik Jongmans Open University of the Netherlands; CWI
11:00
20m
Research paper
Static Type Recommendation for PythonVirtual
Research Papers
Ke Sun Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University
11:20
20m
Research paper
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial CodeVirtual
Research Papers
Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhiqiang Yuan School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing Australian National University, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61
11:40
20m
Research paper
Jasmine: A Static Analysis Framework for Spring Core TechnologiesVirtual
Research Papers
Miao Chen Beijing University of Posts and Telecommunications, Tengfei Tu Beijing University of Posts and Telecommunications, Hua Zhang Beijing University of Posts and Telecommunications, Qiaoyan Wen Beijing University of Posts and Telecommunications, Weihang Wang University of Southern California
12:00 - 13:30
12:00
90m
Lunch
Lunch
Social

12:00 - 13:30
12:00
90m
Lunch
LGBTQ Lunch
Diversity and Inclusion Events
S: Andrew Begel Carnegie Mellon University, Software and Societal Systems Department
13:30 - 15:30
Technical Session 13 - Application DomainsNIER Track / Research Papers / Journal-first Papers at Ballroom C East
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
13:30
20m
Research paper
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications
Research Papers
Hoan Anh Nguyen Amazon, Hung Phan , Samantha Syeda Khairunnesa Bradley University, Son Nguyen The University of Texas at Dallas, Aashish Yadavally University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Hridesh Rajan Iowa State University, Tien N. Nguyen University of Texas at Dallas
13:50
10m
Vision and Emerging Results
Property-Based Automated Repair of DeFi Protocols
NIER Track
Palina Tolmach Nanyang Technological University, Singapore, Institute of High Performance Computing, Agency for Science, Technology and Research (A*STAR), Singapore, Yi Li Nanyang Technological University, Singapore, Shang-Wei Lin Nanyang Technological University
Pre-print
14:00
20m
Research paper
Automatically Detecting Visual Bugs in HTML5 <canvas> Games
Research Papers
Finlay Macklon University of Alberta, Mohammad Reza Taesiri University of Alberta, Markos Viggiato University of Alberta, Stefan Antoszko University of Alberta, Natalia Romanova Prodigy Education, Dale Paas Prodigy Education, Cor-Paul Bezemer University of Alberta
14:20
10m
Vision and Emerging Results
Reflecting on Recurring Failures in IoT Development
NIER Track
Dharun Anandayuvaraj Purdue University, James C. Davis Purdue University, USA
14:30
20m
Research paper
Empirical Study of System Resources Abused by IoT AttackersVirtual
Research Papers
Zijing Yin Tsinghua University, Yiwen Xu Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University
14:50
20m
Paper
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart ContractsVirtual
Journal-first Papers
Xiao Peng China EverBright Bank, Shuwei Song University of Electronic Science and Technology of China, Xiao Peng China EverBright Bank, Xiapu Luo Hong Kong Polytechnic University, Xiao Peng China EverBright Bank, Xiao Peng China EverBright Bank, Ting Chen University of Electronic Science and Technology of China, Jiachi Chen Sun Yat-Sen University, Tao Zhang Macau University of Science and Technology (MUST), Xiaosong Zhang University of Electronic Science and Technology of China
Link to publication DOI
15:10
20m
Research paper
Accelerating OCR-Based Widget Localization for Test Automation of GUI ApplicationsVirtual
Research Papers
Ju Qian Nanjing University of Aeronautics and Astronautics, Yingwei Ma Nanjing University of Aeronautics and Astronautics, Chenghao Lin Nanjing University of Aeronautics and Astronautics, Lin Chen Nanjing University
13:30 - 15:30
Fireside Chat & Ask Me AnythingDiversity and Inclusion Events at Ballroom C West
13:30
60m
Meeting
Fireside Chat with Myra Cohen
Diversity and Inclusion Events
I: Bonita Sharif University of Nebraska-Lincoln, USA
14:30
60m
Meeting
Ask Me Anything – Untapped, Underestimated, and Underresourced Communities in CS/IT
Diversity and Inclusion Events
M: Bonita Sharif University of Nebraska-Lincoln, USA, P: Andrew Habib SnT, University of Luxembourg, P: Ibrahim Mesecan Iowa State University, P: Iftekhar Ahmed University of California, Irvine, P: Aakash Bansal University of Notre Dame, P: Amin Alipour University of Houston, P: Arianna Blasi Meta; prev. Università della Svizzera italiana, P: Weihang Wang University of Southern California
13:30 - 15:30
Technical Session 14 - Bug Prediction and LocalizationJournal-first Papers / Research Papers / NIER Track / Industry Showcase at Banquet A
Chair(s): David Lo Singapore Management University
13:30
20m
Research paper
How Useful is Code Change Information for Fault Localization in Continuous Integration?
Research Papers
An Ran Chen Concordia University, Tse-Hsun (Peter) Chen Concordia University, Junjie Chen Tianjin University
13:50
20m
Industry talk
Code Understanding Linter to Detect Variable Misuse
Industry Showcase
Yeonhee Ryou Samsung Research, Samsung Electronics, Sangwoo Joh Samsung Research, Samsung Electronics, Joonmo Yang Samsung Research, Samsung Electronics, Sujin Kim Samsung Research, Samsung Electronics, Youil Kim Samsung Research, Samsung Electronics
14:10
20m
Paper
Static Data-Flow Analysis for Software Product Lines in C
Journal-first Papers
Philipp Dominik Schubert Heinz Nixdorf Institut, Paderborn University, Paul Gazzillo University of Central Florida, Zachary Patterson University of Texas at Dallas, Julian Braha University of Central Florida, Fabian Schiebel Fraunhofer IEM, Ben Hermann Technical University Dortmund, Shiyi Wei University of Texas at Dallas, Eric Bodden University of Paderborn; Fraunhofer IEM
DOI
14:30
10m
Vision and Emerging Results
Boosting Spectrum-Based Fault Localization for Spreadsheets with Product Metrics in a Learning ApproachVirtual
NIER Track
Adil mukhtar Graz University of Technology, Birgit Hofer Graz University of Technology, Dietmar Jannach University of Klagenfurt, Franz Wotawa Graz University of Technology, Konstantin Schekotihin University of Klagenfurt
14:40
20m
Research paper
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault IsolationVirtual
Research Papers
Yi Song School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China, Xihao Zhang School of Computer Science, Wuhan University, Quanming Liu School of Computer Science, Wuhan University, Ruizhi Gao Sonos Inc.
15:00
20m
Paper
Leveraging structural properties of source code graphs for just-in-time bug predictionVirtual
Journal-first Papers
Md Nadim University of Saskatchewan, Debajyoti Mondal University of Saskatchewan, Chanchal K. Roy University of Saskatchewan
13:30 - 15:30
Technical Session 15 - Compilers and LanguagesJournal-first Papers / Research Papers / Industry Showcase at Banquet B
Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign
13:30
20m
Research paper
Cornucopia: A Framework for Feedback Guided Generation of Binaries
Research Papers
Vidush Singhal Purdue University, Akul Abhilash Pillai Purdue University, Charitha Saumya Purdue University, Milind Kulkarni Purdue University, Aravind Machiry Purdue University
13:50
20m
Paper
CSMITHEDGE: More Effective Compiler Testing by Handling Undefined Behaviour Less Conservatively
Journal-first Papers
Karine Even-Mendoza Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London
14:10
20m
Research paper
Compiler Testing using Template Java ProgramsACM SIGSOFT Distinguished Paper Award
Research Papers
Zhiqiang Zang University of Texas at Austin, Nathan Wiatrek The University of Texas at Austin, Milos Gligoric University of Texas at Austin, August Shi University of Texas at Austin
DOI Pre-print
14:30
20m
Industry talk
Towards Understanding the Performance of Rust
Industry Showcase
Yuchen Zhang Stevens Institute of Technology, Yunhang Zhang The University of Utah, Georgios Portokalidis Stevens Institute of Technology, Jun Xu The University of Utah
14:50
20m
Research paper
TransRepair: Context-aware Program Repair for Compilation ErrorsVirtual
Research Papers
Xueyang Li SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Shangqing Liu Nanyang Technological University, Ruitao Feng Nanyang Technological University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Singapore, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University
15:10
20m
Research paper
Enriching Compiler Testing with Real Program from Bug ReportVirtual
Research Papers
Hao Zhong Shanghai Jiao Tong University
13:30 - 15:30
Technical Session 16 - Software VulnerabilitiesResearch Papers / Journal-first Papers at Gold A
Chair(s): Mohamed Wiem Mkaouer Rochester Institute of Technology
13:30
20m
Research paper
Data Leakage in Notebooks: Static Detection and Better Processes
Research Papers
Chenyang Yang , Rachel A Brower-Sinning Carnegie Mellon Software Engineering Institute, Grace Lewis Carnegie Mellon Software Engineering Institute, Christian Kästner Carnegie Mellon University
13:50
20m
Research paper
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as CodeVirtual
Research Papers
Nuno Saavedra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon
Pre-print
14:10
20m
Paper
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-Flow AnalysisVirtual
Journal-first Papers
Mohan Cui Fudan University, Chengjun Chen Fudan University, Hui Xu Fudan University, Yangfan Zhou Fudan University
14:30
20m
Research paper
Precise (Un)Affected Version Analysis for Web VulnerabilitiesVirtual
Research Papers
ShiYoukun Fudan University, Yuan Zhang Fudan University, Tianhan Luo Fudan University, Xiangyu Mao Fudan University, Min Yang Fudan University
14:50
20m
Research paper
Leveraging Practitioners' Feedback to Improve a Security LinterVirtual
Research Papers
Sofia Reis Instituto Superior Técnico, U. Lisboa & INESC-ID, Rui Abreu Faculty of Engineering, University of Porto, Portugal, Marcelo d'Amorim Federal University of Pernambuco, Daniel Fortunato INESC-ID, University of Porto
15:10
20m
Research paper
Insight: Exploring Cross-Ecosystem Vulnerability ImpactsVirtual
Research Papers
Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, China, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
15:30 - 16:00
Coffee BreakSocial at Ballroom A
15:30
30m
Coffee break
Coffee Break
Social

16:00 - 18:00
Technical Session 19 - Formal Methods and Models IResearch Papers / Journal-first Papers / Tool Demonstrations at Ballroom C East
Chair(s): Michalis Famelis Université de Montréal
16:00
20m
Research paper
Automatic Comment Generation via Multi-Pass Deliberation
Research Papers
Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences
16:20
10m
Demonstration
Building recommender systems for modelling languages with DroidVirtual
Tool Demonstrations
Lissette Almonte Universidad Autónoma de Madrid, Esther Guerra Universidad Autónoma de Madrid, Iván Cantador Universidad Autónoma de Madrid, Juan de Lara Autonomous University of Madrid
Pre-print Media Attached
16:30
10m
Demonstration
RobSimVer: A Tool for RoboSim Modeling and AnalysisVirtual
Tool Demonstrations
Dehui Du East China Normal University, Ana Cavalcanti University of York, JihuiNie East China Normal University
16:40
20m
Research paper
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural NetworksVirtual
Research Papers
Zhaodi Zhang East China Normal University, Yiting Wu East China Normal University, Si Liu ETH Zurich, Jing Liu East China Normal University, Min Zhang East China Normal University
17:00
20m
Research paper
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded VerificationVirtual
Research Papers
Yunfan Zhang Peking University, Ruidong Zhu Peking University, Yingfei Xiong Peking University, Tao Xie Peking University
17:20
20m
Paper
Demystifying Performance Regressions in String SolversVirtual
Journal-first Papers
Yao Zhang , Xiaofei Xie Singapore Management University, Singapore, Yi Li Nanyang Technological University, Singapore, Yun Lin National University of Singapore, Sen Chen Tianjin University, Yang Liu Nanyang Technological University, Xiaohong Li TianJin University
Link to publication DOI
17:40
20m
Research paper
Detecting Semantic Code Clones by Building AST-based Markov Chains ModelVirtual
Research Papers
Yueming Wu Nanyang Technological University, Siyue Feng Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
16:00 - 18:00
Technical Session 18 - Testing IIResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A
Chair(s): Darko Marinov University of Illinois at Urbana-Champaign
16:00
10m
Demonstration
Shibboleth: Hybrid Patch Correctness Assessment in Automated Program Repair
Tool Demonstrations
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
16:10
20m
Research paper
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems
Research Papers
Tomasz Kuchta Samsung Electronics, Bartosz Zator Samsung Electronics
DOI Pre-print
16:30
10m
Demonstration
Maktub: Lightweight Robot System Test Creation and Automation
Tool Demonstrations
Amr Moussa North Carolina State University, John-Paul Ore North Carolina State University
16:40
20m
Paper
Cerebro: Static Subsuming Mutant Selection
Journal-first Papers
Aayush Garg University of Luxembourg, Milos Ojdanic University of Luxembourg, Renzo Degiovanni SnT, University of Luxembourg, Thierry Titcheu Chekam SES S.A. & University of Luxembourg (SnT), Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Link to publication DOI
17:00
20m
Research paper
Natural Test Generation for Precise Testing of Question Answering SoftwareVirtual
Research Papers
Qingchao Shen Tianjin University, Junjie Chen Tianjin University, Jie M. Zhang King's College London, Haoyu Wang College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Menghan Tian College of Intelligence and Computing, Tianjin University
Pre-print
17:20
20m
Paper
GloBug: Using global data in Fault LocalizationVirtual
Journal-first Papers
Nima Miryeganeh University of Calgary, Sepehr Hashtroudi University of Calgary, Hadi Hemmati University of Calgary
Link to publication DOI
17:40
20m
Research paper
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test GenerationVirtual
Research Papers
Zhichao Zhou School of Information Science and Technology, ShanghaiTech University, Yuming Zhou Nanjing University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University, Yutian Tang ShanghaiTech University
DOI Pre-print
16:00 - 18:00
Technical Session 17 - SE for AIResearch Papers / Late Breaking Results / NIER Track / Tool Demonstrations at Banquet B
Chair(s): Tim Menzies North Carolina State University
16:00
10m
Vision and Emerging Results
On the Naturalness of Bytecode Instructions
NIER Track
Yoon-ho Choi Handong Global University, Jaechang Nam Handong Global University
16:10
20m
Research paper
A Light Bug Triage Framework for Applying Large Pre-trained Language Model
Research Papers
Jaehyung Lee Pohang University of Science and Technology, Pohang , Hwanjo Yu Pohang University of Science and Technology, Pohang, HanKisun Samsung Research
16:30
10m
Vision and Emerging Results
Global Decision Making Over Deep Variability in Feedback-Driven Software Development
NIER Track
Jörg Kienzle McGill University, Canada, Benoit Combemale University of Rennes; Inria; IRISA, Gunter Mussbacher McGill University, Omar Alam Trent University, Francis Bordeleau École de Technologie Supérieure (ETS), Lola Burgueño University of Malaga, Gregor Engels Paderborn University, Jessie Galasso-Carbonnel Université de Montréal, Jean-Marc Jézéquel Univ Rennes - IRISA, Bettina Kemme McGill University, Canada, Sébastien Mosser McMaster University, Houari Sahraoui Université de Montréal, Maximilian Schiedermeier McGill University, Eugene Syriani Université de Montréal
16:40
20m
Research paper
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices ArchitectureACM SIGSOFT Distinguished Paper Award
Research Papers
Vikram Nitin Columbia University, Shubhi Asthana IBM Research, Baishakhi Ray Columbia University, Rahul Krishna IBM Research
Pre-print
17:00
10m
Demonstration
Answering Software Deployment Questions via Neural Machine Reading at ScaleVirtual
Tool Demonstrations
Guan Jie Qiu School of Software, Shanghai Jiao Tong University, Diwei Chen School of Software, Shanghai Jiao Tong University, Shuai Zhang School of Software, Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, China, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University
17:10
20m
Research paper
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language ModelsVirtual
Research Papers
Xianchang Luo University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Zhenchang Xing Australian National University, Jiamou Sun Australian National University
17:30
10m
Vision and Emerging Results
Test-Driven Multi-Task Learning with Functionally Equivalent Code Transformation for Neural Code GenerationVirtual
NIER Track
Xin Wang Wuhan University, Xiao Liu School of Information Technology, Deakin University, Pingyi Zhou Noah’s Ark Lab, Huawei Technologies, Qixia Liu China Mobile Communications Corporation, Jin Liu Wuhan University, Hao Wu Yunnan University, Xiaohui Cui Wuhan University
17:40
10m
Paper
Towards Using Data-Influence Methods to Detect Noisy Samples in Source Code CorporaVirtual
Late Breaking Results
Anh T. V. Dau FPT Software AI Center, Nghi D. Q. Bui Singapore Management University, Thang Nguyen-Duc FPT Software AI Center, Hoang Thanh-Tung Vietnam National University
16:00 - 18:00
Technical Session 20 - Web, Cloud, NetworkingJournal-first Papers / Late Breaking Results / Research Papers / Tool Demonstrations / Industry Showcase at Gold A
Chair(s): Karine Even-Mendoza Imperial College London
16:00
20m
Paper
Mutation-based Analysis of Queueing Network Performance Models -- Journal First Research
Journal-first Papers
Thomas Laurent Lero & University College Dublin, Paolo Arcaini National Institute of Informatics , Catia Trubiani Gran Sasso Science Institute, Anthony Ventresque University College Dublin & Lero, Ireland
Link to publication DOI
16:20
10m
Demonstration
WebMonitor: https://youtu.be/hqVw0JU3k9c
Tool Demonstrations
Ennio Visconti TU Wien, Christos Tsigkanos University of Bern, Switzerland, Laura Nenzi University of Trieste
16:30
20m
Research paper
Exploiting Epochs and Symmetries in Analysing MPI Programs
Research Papers
Rishabh Ranjan IIT Delhi, Ishita Agrawal IIT Delhi, Subodh Sharma IIT Delhi
16:50
20m
Paper
MLASP: Machine learning assisted capacity planning
Journal-first Papers
Arthur Vitui Concordia University, Tse-Hsun (Peter) Chen Concordia University
Link to publication DOI
17:10
20m
Research paper
Graph based Incident Extraction and Diagnosis in Large-Scale Online SystemsVirtual
Research Papers
Zilong He Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yu Luo Tencent Inc., Qiuyu Yan Tencent Inc., Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Guangba  Yu Sun Yat-Sen University, Fangyuan Li Tencent Inc.
17:30
10m
Paper
ESAVE: Estimating Server and Virtual Machine EnergyVirtual
Late Breaking Results
Priyavanshi Pathania Accenture Labs, Rohit Mehra Accenture Labs, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture, Adam P. Burden Accenture
17:40
20m
Industry talk
MCDA Framework for Edge-Aware Multi-Cloud Hybrid Architecture RecommendationVirtual
Industry Showcase
Manish Ahuja Accenture Labs, Narendranath Sukhavasi Accenture Labs, Swapnajeet Choudhury Accenture Labs, Kaushik Amar Das Accenture Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vikrant Kaulgud Accenture Labs, India
18:00 - 20:00
ASE 2022 ReceptionSocial at Ballroom A
18:00
2h
Other
ASE 2022 Reception
Social

18:00 - 00:00
ASE Steering Committee MeetingMeetings at Ballroom C West
18:00
6h
Meeting
ASE Steering Committee Meeting
Meetings

Thu 13 Oct

Displayed time zone: Eastern Time (US & Canada) change

09:30 - 10:00
Coffee BreakSocial at Ballroom A
09:30
30m
Coffee break
Coffee Break
Social

10:00 - 12:00
Technical Session 23 - SecurityTool Demonstrations / Journal-first Papers / Late Breaking Results / Research Papers at Ballroom C East
Chair(s): John-Paul Ore North Carolina State University
10:00
10m
Demonstration
V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities
Tool Demonstrations
Vipawan Jarukitpipat Mahidol University, Xiao Peng China EverBright Bank, Xiao Peng China EverBright Bank, Chaiyong Ragkhitwetsagul Mahidol University, Thailand, Morakot Choetkiertikul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University, Raula Gaikovina Kula Nara Institute of Science and Technology, Bodin Chinthanet Nara Institute of Science and Technology, Takashi Ishio Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology
10:10
20m
Paper
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?
Journal-first Papers
Ying Zhang Virginia Tech, USA, Md Mahir Asef Kabir Virginia Tech, Ya Xiao Virginia Tech, Daphne Yao Virginia Tech, Na Meng Virginia Tech
DOI Pre-print
10:30
10m
Demonstration
A transformer-based IDE plugin for vulnerability detectionVirtual
Tool Demonstrations
Cláudia Mamede FEUP, U.Porto, Eduard Pinconschi FEUP, U.Porto, Rui Abreu Faculty of Engineering, University of Porto, Portugal
10:40
10m
Demonstration
Quacky: Quantitative Access Control Permissiveness Analyzer
Tool Demonstrations
William Eiers University of California at Santa Barbara, USA, Ganesh Sankaran University of California Santa Barbara, Albert Li University of California Santa Barbara, Emily O'Mahony University of California Santa Barbara, Benjamin Prince University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara
10:50
10m
Paper
Towards Robust Models of Code via Energy-Based Learning on Auxiliary DatasetsVirtual
Late Breaking Results
Nghi D. Q. Bui Singapore Management University, Yijun Yu Huawei Ireland Research Center
11:00
10m
Demonstration
Xscope: Hunting for Cross-Chain Bridge AttacksVirtual
Tool Demonstrations
Jiashuo Zhang Peking University, China, Jianbo Gao Peking University, Yue Li Peking University, Ziming Chen Peking University, Zhi Guan Peking University, Zhong Chen
11:10
20m
Research paper
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase ApproachVirtual
Research Papers
Zhuo Zhang Chongqing University, Yan Lei Chongqing University, Meng Yan Chongqing University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Jiachi Chen Sun Yat-Sen University, Shangwen Wang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology
10:00 - 12:00
Technical Session 22 - Code Summarization and RecommendationResearch Papers / NIER Track / Journal-first Papers / Industry Showcase at Banquet A
Chair(s): Houari Sahraoui Université de Montréal
10:00
20m
Research paper
Identifying Solidity Smart Contract API Documentation Errors
Research Papers
Chenguang Zhu The University of Texas at Austin, Ye Liu Nanyang Technological University, Xiuheng Wu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Singapore
Pre-print
10:20
10m
Vision and Emerging Results
Few-shot training LLMs for project-specific code-summarization
NIER Track
Toufique Ahmed University of California at Davis, Prem Devanbu Department of Computer Science, University of California, Davis
DOI Pre-print
10:30
20m
Research paper
Answer Summarization for Technical Queries: Benchmark and New Approach
Research Papers
Chengran Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Ferdian Thung Singapore Management University, Yucen Shi Singapore Management University, Ting Zhang Singapore Management University, Zhou Yang Singapore Management University, Xin Zhou , Jieke Shi Singapore Management University, Junda He Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University
10:50
20m
Paper
Code Structure Guided Transformer for Source Code SummarizationVirtual
Journal-first Papers
Shuzheng Gao Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Yulan He University of Warwick, Jichuan Zeng The Chinese University of Hong Kong, Lun Yiu Nie Tsinghua University, Xin Xia Huawei Software Engineering Application Technology Lab, Michael Lyu The Chinese University of Hong Kong
11:10
10m
Vision and Emerging Results
Taming Multi-Output Recommenders for Software EngineeringVirtual
NIER Track
Christoph Treude University of Melbourne
11:20
20m
Industry talk
MV-HAN: A Hybrid Attentive Networks based Multi-View Learning Model for Large-scale Contents RecommendationVirtual
Industry Showcase
Ge Fan Tencent Inc., Chaoyun Zhang Tencent Inc., Kai Wang Tencent Inc., Junyang Chen Shenzhen University
DOI Pre-print
11:40
20m
Research paper
Which Exception Shall We Throw?Virtual
Research Papers
Hao Zhong Shanghai Jiao Tong University
10:00 - 12:00
Technical Session 21 - SE for AI IIResearch Papers / Late Breaking Results / NIER Track / Journal-first Papers at Banquet B
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
10:00
20m
Research paper
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks
Research Papers
Simin Chen University of Texas at Dallas, USA, Mirazul Haque UT Dallas, Cong Liu University of Texas at Dallas, USA, Wei Yang University of Texas at Dallas
10:20
10m
Paper
Prototyping Deep Learning Applications with Non-Experts: An Assistant Proposition
Late Breaking Results
Gustavo Rodrigues dos Reis, Adrian Mos NAVER LABS Europe, Cyril Labbé LIG - UGA, Mario Cortes Cornax LIG - UGA
10:30
20m
Research paper
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided MethodVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Xiaoyuan Xie School of Computer Science, Wuhan University, China, Pengbo Yin School of Computer Science, Wuhan University, Songqiang Chen School of Computer Science, Wuhan University
10:50
20m
Paper
Faults in Deep Reinforcement Learning Programs: A Taxonomy and A Detection ApproachVirtual
Journal-first Papers
Amin Nikanjam École Polytechnique de Montréal, Mohammad Mehdi Morovati École Polytechnique de Montréal, Foutse Khomh Polytechnique Montréal, Houssem Ben Braiek École Polytechnique de Montréal
Link to publication DOI Authorizer link
11:10
20m
Research paper
Towards Understanding the Faults of JavaScript-Based Deep Learning SystemsVirtual
Research Papers
Lili Quan Tianjin University, Qianyu Guo College of Intelligence and Computing, Tianjin University, Xiaofei Xie Singapore Management University, Singapore, Sen Chen Tianjin University, Xiaohong Li TianJin University, Yang Liu Nanyang Technological University
11:30
10m
Vision and Emerging Results
An Empirical Study on Numerical Bugs in Deep Learning ProgramsVirtual
NIER Track
Gan Wang , Zan Wang Tianjin University, China, Junjie Chen Tianjin University, Xiang Chen Nantong University, Ming Yan College of Intelligence and Computing, Tianjin University
11:40
20m
Research paper
Toward Improving the Robustness of Deep Learning Models via Model TransformationVirtual
Research Papers
Yingyi Zhang College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Jiajun Jiang Tianjin University, Hanmo You College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University
10:00 - 12:00
Technical Session 24 - Human AspectsResearch Papers / Journal-first Papers / NIER Track at Gold A
Chair(s): Silvia Abrahão Universitat Politècnica de València
10:00
20m
Research paper
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing
Research Papers
Yanqi Su Australian National University, Zheming Han , Zhenchang Xing Australian National University, Xin Xia Huawei Software Engineering Application Technology Lab, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61
10:20
20m
Research paper
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication
Research Papers
Mia Mohammad Imran Virginia Commonwealth University, Yashasvi Jain Drexel University, Preetha Chatterjee Drexel University, USA, Kostadin Damevski Virginia Commonwealth University
Pre-print
10:40
10m
Vision and Emerging Results
End-to-End Rationale Reconstruction
NIER Track
Mouna Dhaouadi University of Montreal, Bentley Oakes Université de Montréal, Michalis Famelis Université de Montréal
Pre-print
10:50
20m
Paper
Towards digitalization of requirements: Generating context-sensitive user stories from diverse specifications
Journal-first Papers
Padmalata Nistala Tata Consultancy Services Research, Asha Rajbhoj TCS Research, Vinay Kulkarni Tata Consultancy Services Research, Shivani Soni TCS Research, Kesav Vithal Nori IIIT Hyderabad, Raghu Reddy IIT Hyderabad
Link to publication DOI
11:10
20m
Paper
Which neural network makes more explainable decisions? An approach towards measuring explainabilityVirtual
Journal-first Papers
Mengdi Zhang Singapore Management University, Singapore, Jun Sun Singapore Management University, Jingyi Wang Zhejiang University
Link to publication DOI
11:30
20m
Paper
Automatically Identifying the Quality of Developer Chats for Post Hoc UseVirtual
Journal-first Papers
Preetha Chatterjee Drexel University, USA, Kostadin Damevski Virginia Commonwealth University, Nicholas A. Kraft UserVoice, Lori Pollock University of Delaware
Link to publication Media Attached
12:00 - 13:30
12:00
90m
Lunch
Lunch
Social

13:30 - 15:30
Technical Session 25 - Software RepairsNIER Track / Research Papers / Tool Demonstrations at Ballroom C East
Chair(s): Yannic Noller National University of Singapore
13:30
20m
Research paper
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications
Research Papers
Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Guolong Zheng University of Nebraska Lincoln, Hamid Bagheri University of Nebraska-Lincoln, ThanhVu Nguyen George Mason University, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
13:50
20m
Research paper
Repairing Failure-inducing Inputs with Input Reflection
Research Papers
Yan Xiao National University of Singapore, Yun Lin National University of Singapore, Ivan Beschastnikh University of British Columbia, Changsheng SUN , David Rosenblum George Mason University, Jin Song Dong National University of Singapore
14:10
10m
Demonstration
ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic Relation
Tool Demonstrations
Jiawei He , Zhida Bao Harbin Engineering University, Quanjun Zhang Nanjing University, Weisong Sun State Key Laboratory for Novel Software Technology, Nanjing University, Jiawei Liu Nanjing University, Chunrong Fang Nanjing University, Yun Lin National University of Singapore
14:20
20m
Research paper
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program RepairVirtual
Research Papers
Deheng Yang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology, Liqian Chen National University of Defense Technology, China, Xuezheng Xu Academy of Military Sciences, Beijing, China, Yan Lei Chongqing University, David Lo Singapore Management University, Jiayu He National University of Defense Technology, Changsha, China
14:40
10m
Vision and Emerging Results
Multi-objective Optimization-based Bug-fixing Template Mining for Automated Program RepairVirtual
NIER Track
Misoo Kim Sungkyunkwan University, Youngkyoung Kim Sungkyunkwan University, Kicheol Kim SungKyunKwan University, Eunseok Lee Sungkyunkwan University
14:50
20m
Research paper
StandUp4NPR: Standardizing Setup for Empirically Comparing Neural Program Repair SystemsVirtual
Research Papers
Wenkang Zhong State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongliang Ge State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongfei Ai State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Chuanyi Li State Key Laboratory for Novel Software Technology, Nanjing University, Kui Liu Huawei Software Engineering Application Technology Lab, Jidong Ge , Bin Luo Software Institute, Nanjing University
13:30 - 15:30
Technical Session 27 - Dynamic and Concolic AnalysisResearch Papers / NIER Track / Journal-first Papers at Banquet A
Chair(s): ThanhVu Nguyen George Mason University
13:30
20m
Research paper
LISSA: Lazy Initialization with Specialized Solver Aid
Research Papers
Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Alessandra Gorla IMDEA Software Institute, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
13:50
10m
Vision and Emerging Results
Outcome-Preserving Input Reduction for Scientific Data Analysis Workflows
NIER Track
Anh Duc Vu Humboldt-Universität zu Berlin, Timo Kehrer University of Bern, Christos Tsigkanos University of Bern, Switzerland
Pre-print
14:00
20m
Research paper
SymFusion: Hybrid Instrumentation for Concolic Execution
Research Papers
Emilio Coppa Sapienza University of Rome, Heng Yin UC Riverside, Camil Demetrescu Sapienza University Rome
Pre-print
14:20
20m
Research paper
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel
Research Papers
David Fernandez-Amoros UNED, Ruben Heradio UNED (Universidad Nacional de Educacion a Distancia), Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Alexander Egyed Johannes Kepler University Linz
14:40
20m
Paper
A Practical Approach for Dynamic Taint Tracking with Control-Flow RelationshipsVirtual
Journal-first Papers
Katherine Hough , Jonathan Bell Northeastern University
Link to publication DOI Pre-print Media Attached
15:00
20m
Research paper
Prioritized Constraint-Aided Dynamic Partial-Order ReductionVirtual
Research Papers
Jie Su Xidian University, Cong Tian Xidian University, Zuchao Yang Xidian University, Jiyu Yang Xidian University, Bin Yu Xidian University, Zhenhua Duan Xidian University
13:30 - 15:30
Technical Session 26 - Testing IIIResearch Papers / Industry Showcase at Banquet B
Chair(s): Owolabi Legunsen Cornell University
13:30
20m
Research paper
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing
Research Papers
Tahmid Rafi University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio
13:50
20m
Research paper
Neuroevolution-Based Generation of Tests and Oracles for Games
Research Papers
Patric Feldmeier University of Passau, Gordon Fraser University of Passau
Pre-print
14:10
20m
Industry talk
WOLFFI: A fault injection platform for learning AIOps models
Industry Showcase
Frank Bagehorn IBM Research, Jesus Rios IBM Research, Saurabh Jha IBM Research, Robert Filepp IBM Research, Larisa Shwartz IBM T.J. Watson Research, Naoki Abe IBM, Xi Yang IBM Research
14:30
20m
Research paper
Learning to Construct Better Mutation FaultsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Zhao Tian Tianjin University, Junjie Chen Tianjin University, Qihao Zhu Peking University, Junjie Yang College of Intelligence and Computing, Tianjin University, Lingming Zhang University of Illinois at Urbana-Champaign
DOI Pre-print
14:50
20m
Research paper
Differentially Testing Database Transactions for Fun and ProfitVirtual
Research Papers
Ziyu Cui Institute of Software, Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qianwang Dai Institute of Software, Chinese Academy of Sciences, Jiansen Song , Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences
13:30 - 15:30
13:30
60m
Meeting
Ask Me Anything – What It’s Like to Be a Grad Student
Diversity and Inclusion Events
M: Andrew Begel Carnegie Mellon University, Software and Societal Systems Department, P: Vikram Nitin Columbia University, P: Sheikh Shadab Towqir Virginia Tech, P: Jasmine Latendresse Concordia University, P: Mouna Dhaouadi University of Montreal
13:30 - 15:30
Technical Session 28 - Safety-Critical and Self-Adaptive SystemsIndustry Showcase / Tool Demonstrations / Research Papers / Late Breaking Results / NIER Track at Room 128
Chair(s): Eunsuk Kang Carnegie Mellon University
13:30
10m
Demonstration
SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems
Tool Demonstrations
Alberto D. Rodriguez University of Notre Dame, Timothy Newman University of Notre Dame, Katherine R. Dearstyne University of Notre Dame, Jane Cleland-Huang University of Notre Dame
13:40
20m
Research paper
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior PatternsVirtual
Research Papers
Haoxiang Tian Institute of Software, Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences, China, Jiren Yan Institute of Software, Chinese Academy of Sciences, Yan Jiang Institute of Software, Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Shuo Li Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences
14:00
20m
Research paper
Consistent Scene Graph Generation by Constraint OptimizationVirtual
Research Papers
Boqi Chen McGill University, Kristóf Marussy Budapest University of Technology and Economics, Sebastian Pilarski McGill University, Oszkár Semeráth Budapest University of Technology and Economics, Daniel Varro McGill University / Budapest University of Technology and Economics
14:20
20m
Industry talk
A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial ProcessesVirtual
Industry Showcase
Firas Bayram Department of Mathematics and Computer Science, Karlstad University, Sweden, Bestoun S. Ahmed Karlstad University Sweden, Erik Hallin Uddeholms AB, Sweden, Anton Engman Uddeholms AB, Sweden
Pre-print
14:40
10m
Paper
SML4ADS: An Open DSML for Autonomous Driving Scenario Representation and GenerationVirtual
Late Breaking Results
Bo Li East China Normal University, Dehui Du East China Normal University, Sicong Chen East China Normal University, Minjun Wei East China Normal University, Chenghang Zheng East China Normal University, Xinyuan Zhang East China Normal University
14:50
10m
Vision and Emerging Results
XSA: eXplainable Self-AdaptationVirtual
NIER Track
Matteo Camilli Free University of Bozen-Bolzano, Raffaela Mirandola Politecnico di Milano, Patrizia Scandurra University of Bergamo, Italy
File Attached
15:00
20m
Industry talk
Design-Space Exploration for Decision-Support Software
Industry Showcase
Ate Penders Thales Research & Technology, Ana Lucia Varbanescu University of Twente, Gregor Pavlin Thales Research & Technology, Henk Sips Delft University of Technology
15:30 - 16:00
Coffee BreakSocial at Ballroom A
15:30
30m
Coffee break
Coffee Break
Social

16:00 - 18:00
Technical Session 29 - AI for SE IIResearch Papers / Journal-first Papers at Ballroom C East
Chair(s): Tim Menzies North Carolina State University
16:00
20m
Research paper
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?
Research Papers
Cedric Richter University of Oldenburg, Jan Haltermann University of Oldenburg, Marie-Christine Jakobs Technical University of Darmstadt, Felix Pauck Paderborn University, Germany, Stefan Schott Paderborn University, Heike Wehrheim University of Oldenburg
DOI Pre-print Media Attached File Attached
16:20
20m
Research paper
Learning Contract Invariants Using Reinforcement Learning
Research Papers
Junrui Liu University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Bryan Tan Amazon Web Services, Işıl Dillig University of Texas at Austin, Yu Feng University of California at Santa Barbara
16:40
20m
Research paper
Compressing Pre-trained Models of Code into 3 MB
Research Papers
Jieke Shi Singapore Management University, Zhou Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Hong Jin Kang Singapore Management University, Singapore, David Lo Singapore Management University
DOI Pre-print Media Attached
17:00
20m
Research paper
A Transferable Time Series Forecasting Service using Deep Transformer model for Online SystemsVirtual
Research Papers
Tao Huang Tencent, Pengfei Chen Sun Yat-Sen University, Jingrun Zhang School of Data and Computer Science, Sun Yat-sen University, Ruipeng Li Tencent, Rui Wang Tencent
17:20
20m
Paper
The Weights can be Harmful: Pareto Search versus Weighted Search in Multi-Objective Search-Based Software EngineeringVirtual
Journal-first Papers
Tao Chen Loughborough University, Miqing Li University of Birmingham
Pre-print
17:40
20m
Research paper
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering DatasetsVirtual
Research Papers
Zhong Li Nanjing, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University
16:00 - 18:00
Technical Session 31 - Code Similarities and RefactoringResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A
Chair(s): Hua Ming Oakland University
16:00
20m
Research paper
Reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications
Research Papers
Alexi Turcotte Northeastern University, Mark W. Aldrich Tufts University, Frank Tip Northeastern University
16:20
20m
Paper
How Software Refactoring Impacts Execution Time
Journal-first Papers
Luca Traini University of L'Aquila, Daniele Di Pompeo University of L'Aquila, Michele Tucci Charles University, Bin Lin Radboud University, Simone Scalabrino University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana, Michele Lanza Software Institute - USI, Lugano, Rocco Oliveto University of Molise, Vittorio Cortellessa University of L'Aquila
Link to publication DOI Authorizer link
16:40
20m
Research paper
Learning to Synthesize Relational Invariants
Research Papers
Jingbo Wang University of Southern California, Chao Wang USC
17:00
10m
Demonstration
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE
Tool Demonstrations
Eman Abdullah AlOmar Stevens Institute of Technology, Anton Ivanov HSE University, Zarina Kurbatova JetBrains Research, Yaroslav Golubev JetBrains Research, Mohamed Wiem Mkaouer Rochester Institute of Technology, Ali Ouni ETS Montreal, University of Quebec, Timofey Bryksin JetBrains Research, Le Nguyen Rochester Institute of Technology, Amit Kini Rochester Institute of Technology, Aditya Thakur Rochester Institute of Technology
DOI Pre-print
17:10
20m
Research paper
TreeCen: Building Tree Graph for Scalable Semantic Code Clone DetectionVirtual
Research Papers
Yutao Hu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Junru Peng Xidian University, Yueming Wu Nanyang Technological University, Junjie Shan KTH Royal Institute of Technology, Hai Jin Huazhong University of Science and Technology
17:30
10m
Demonstration
Trimmer: Context-Specific Code ReductionVirtual
Tool Demonstrations
Aatira Anum Ahmad Lahore University of Management Sciences, Mubashir Anwar University of Illinois Urbana-Champaign, Hashim Sharif University of Illinois at Urbana-Champaign, Ashish Gehani SRI, Fareed Zaffar Lahore University of Management Sciences
17:40
20m
Research paper
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software DebloatingVirtual
Research Papers
Qi Xin Wuhan University, Qirun Zhang Georgia Institute of Technology, Alessandro Orso Georgia Tech
16:00 - 18:00
Technical Session 32 - Formal Methods and Models IITool Demonstrations / Journal-first Papers / Research Papers at Banquet B
Chair(s): Khouloud Gaaloul University of Michigan - Dearborn
16:00
10m
Demonstration
CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow Memory
Tool Demonstrations
Bernd Fischer Stellenbosch University, South Africa, Salvatore La Torre Università degli Studi di Salerno, Gennaro Parlato University of Molise, Peter Schrammel University of Sussex and Diffblue Ltd
16:10
20m
Research paper
Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses
Research Papers
Elias Kuiter Otto-von-Guericke-University Magdeburg, Sebastian Krieter University of Ulm, Chico Sundermann University of Ulm, Thomas Thüm University of Ulm, Gunter Saake University of Magdeburg, Germany
16:30
20m
Paper
A three-valued model abstraction framework for PCTL* stochastic model checkingVirtual
Journal-first Papers
Yang Liu Shanghai Maritime University/National University of Singapore, Yan Ma Nanjing University of Finance and Economics / National University of Singapore, Yongsheng Yang Shanghai Maritime University
File Attached
16:50
20m
Research paper
Finding and Understanding Incompleteness Bugs in SMT SolversVirtual
Research Papers
Mauro Bringolf ETH Zurich, Dominik Winterer ETH Zurich, Zhendong Su ETH Zurich
17:10
20m
Research paper
Checking LTL Satisfiability via End-to-end LearningVirtual
Research Papers
Weilin Luo School of Computer Science and Engineering, Sun Yat-sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Delong Zhang SUN YAT-SEN UNIVERSITY, Jianfeng Du Guangdong University of Foreign Studies, Hengdi Su SUN YAT-SEN UNIVERSITY
17:30
20m
Research paper
QVIP: An ILP-based Formal Verification Approach for Quantized Neural NetworksVirtual
Research Papers
Yedi Zhang ShanghaiTech University, Zhe Zhao ShanghaiTech University, Guangke Chen ShanghaiTech University, Fu Song ShanghaiTech University, Min Zhang East China Normal University, Taolue Chen Birkbeck University of London, Jun Sun Singapore Management University
16:00 - 18:00
Technical Session 30 - Builds and DependenciesJournal-first Papers / Research Papers / Tool Demonstrations at Room 128
Chair(s): Christian Kästner Carnegie Mellon University
16:00
20m
Research paper
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem
Research Papers
Wei Tang Tsinghua University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Wu Jiahui Nanyang Technological University, shouguo yang Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Yi Li Nanyang Technological University, Singapore, Ping Luo Tsinghua University, Yang Liu Nanyang Technological University
16:20
10m
Demonstration
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics
Tool Demonstrations
Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Rohan Sethi Loyola University Chicago, Sohini Thota Loyola University Chicago, Shilpika University of California at Davis, Allan J. Miller Loyola University Chicago, Wenxin Jiang Purdue University, Emmanuel S. Amobi Loyola University Chicago, Austin Pinderski Duke University, Loyola University Chicago, Konstantin Läufer Loyola University Chicago, Nicholas J. Hayward Loyola University Chicago, Neil Klingensmith Loyola University Chicago, James C. Davis Purdue University, USA, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory
16:30
20m
Research paper
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM
Research Papers
Jasmine Latendresse Concordia University, Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Emad Shihab Concordia University
16:50
20m
Research paper
Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS ProjectsVirtual
Research Papers
Yiwen Wu National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Kele Xu National University of Defense Technology, Tao Wang National University of Defense Technology, Huaimin Wang National University of Defense Technology
17:10
20m
Paper
CIT-daily: A Combinatorial Interaction Testing-Based Daily Build ProcessVirtual
Journal-first Papers
Hanefi Mercan Sabanci University, Atakan Aytar Sabanci University, Giray Coskun Sabanci University, Dilara Müstecep Sabanci University, Gülsüm Uzer Sabanci University, Cemal Yilmaz Sabancı University
Link to publication DOI
17:30
20m
Research paper
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability RecoveryVirtual
Research Papers
Hui Gao Nanjing University, Hongyu Kuang Nanjing University, Kexin Sun Nanjing University, Xiaoxing Ma Nanjing University, Alexander Egyed Johannes Kepler University Linz, Patrick Mäder Technische Universität Ilmenau, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University
Pre-print Media Attached

Fri 14 Oct

Displayed time zone: Eastern Time (US & Canada) change

08:30 - 10:00
Session 1[Workshop] HILT' 22 at Ballroom C East
  • 830-840 Opening, S. Tucker Taft and Jerome Hugues

  • 840-940 Keynote#1 : Rustan Leino, Senior Principal Engineer, Amazon Web Services

    Title Recent experience with developing formally verified software

    Abstract: Numerous impressive projects have developed formally verified software. Typically, the participants in such projects have been formal-methods experts. Can verification tools also be used by common software engineers? I will reflect on this question in the context of the most recent AWS Encryption SDK, a verified library developed in a team with no particular background in verification. I will also give an overview of the verification-aware programming language Dafny, which was used in this development.

    Bio: K. Rustan M. Leino is a Senior Principal Applied Scientist in the Automated Reasoning Group at Amazon Web Services. Throughout his career, he has developed and applied tools for the formal verification of software. The most recent of these is the Dafny language and verifier, which has been used in projects and education for more than a decade. Leino is an ACM Fellow and a recipient of the CAV Award.


  • 940-1010 Session #1: Formal methods and applications (part 1)
    1. Daniel Larraz (The University of Iowa) and Cesare Tinelli (The University of Iowa).

      Title: Finding Locally Smallest Cut Sets using Max-SMT.

      Abstract: Model-based development (MBD) is increasingly being used for system-level development of safety-critical systems. This approach allows safety engineers to leverage the resultant system model created in the MBD process to assess the system’s resilience to component failure. In particular, one fundamental activity is the identification of minimal cut sets (MCSs), i.e, minimal sets of faults that lead to the violation of a safety requirement. Although the construction of a formal system model enables safety engineers to automate the generation process of MCSs, this is usually a computationally expensive task for complex systems. In this paper, we present a method that leverages Max-SMT solvers to efficiently obtain a small set of faults based on a local optimization of the cut set cardinality. Initial experimental results show the effectiveness of the method in generating cut sets that are close or equal to globally optimal solutions (smallest cut sets) while providing an answer 5.6 times faster on average than the standard method to find a smallest cut set.

08:30
90m
Other
TBA
[Workshop] HILT' 22

08:30 - 10:00
Session 1: Research Papers[Workshop] VARSE '22 at Ballroom C West
08:30
10m
Day opening
Opening
[Workshop] VARSE '22
Xiaoyin Wang University of Texas at San Antonio, Xusheng Xiao Arizona State University, Wei Wang University of Texas at San Antonio, USA
08:40
20m
Paper
A Study of User Privacy in Android Mobile AR Apps
[Workshop] VARSE '22
Xiaoyi Yang , Xueling Zhang Rochester Institute of Technology
09:00
20m
Paper
Towards Generating Labeled Property Graphs for Comprehending C#-based Software Projects
[Workshop] VARSE '22
David Heidrich German Aerospace Center (DLR), Andreas Schreiber German Aerospace Center (DLR), Sebastian Oberdörfer University of Würzburg
09:20
20m
Paper
DyTRec: A Dynamic Testing Recommendation tool for Virtual Reality Software
[Workshop] VARSE '22
Xue Qin Villanova University, Foyzul Hassan University of Michigan - Dearborn
09:40
20m
Paper
A Role Based Model Template for Specifying Virtual Reality SoftwareVirtual
[Workshop] VARSE '22
Karre Sai Anirudh IIIT Hyderabad, Vivek Pareek SERC, IIIT Hyderabad, India, Raghav Mittal SERC, IIIT Hyderabad, India, Raghu Reddy IIT Hyderabad
08:30 - 10:00
Session 1[Workshop] HCSE&CS '22 at Gold A
Chair(s): Mohan Baruwal Chhetri CSIRO’s Data61, Xiao Liu School of Information Technology, Deakin University

22:30-23:20: Opening/Keynote - Prof Ali Babar, University of Adelaide, Australia

Title: Privacy Engineering: Enabling Mobility of Mental Health Services with Data Protection

Abstract: Ease of access and reduced wait time coupled with COVID-19 restrictions have resulted in unprecedented demand/use of mobile based mental health services, mHealth. At the same time, there are increased concerns about data privacy risks stimulating questions like “Are Apps Enabling Mobility of Mental Health Services with Data Protection”? However, there is relatively little empirically known about the data privacy issues that may exist in mHealth apps, whose users can be particularly vulnerable. This talk will share the motivation, methodological details and key findings of our research aimed at systematically identifying and understanding data privacy incorporated in mHealth Apps. This talk will enumerate the approaches used for in- depth privacy analysis of 27 apps and what we found. I’ll show how we mapped the findings to the LINDDUN threat taxonomy for ease of understandability of the identified issues such as unnecessary permissions, insecure cryptography implementations and leaks of personal data and credentials in logs and web requests. The talk will end with a few recommendations for different stakeholders of mHealth apps in general and apps developers in particular.

Bio: M. Ali Babar is a Professor in the School of Computer Science, University of Adelaide. He leads a theme on architecture and platform for security as service in CyberSecurity Cooperative Research Centre. Prof Babar has established an interdisciplinary research centre called CREST (Centre for Research on Engineering Software Technologies), where he directs the research, education, and engineering activities of more than 25 researchers and engineers. Prof Babar has attracted more than $12 Millions dollar cash funding from industry/government since 2017. Professor Babar has authored/co-authored more than 270 peer-reviewed research papers at premier Software journals and conferences. Professor Babar obtained a Ph.D. in Computer Science and Engineering from the school of computer science and engineering of University of New South Wales, Australia.

23:20-00:00 - Paper Presentation (Session 1)

  1. Towards Improving the Adoption and Usage of National Digital Identity Systems, Malyun Hilowle (Deakin University), William Yeoh (Deakin University), Marthie Grobler (CSIRO Data61), Graeme Pye (Deakin University), Frank Jiang (Deakin University)

  2. Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development, Debi Ashenden (University of Adelaide), Gail Ollis (University of Portsmouth), Iain Reid (University of Portsmouth)

08:30
90m
Other
TBA
[Workshop] HCSE&CS '22

08:30 - 10:00
Welcome & Keynote[Workshop] IWoR '22 at Gold B
08:30
10m
Day opening
Opening
[Workshop] IWoR '22
Eman Abdullah AlOmar Stevens Institute of Technology, Thiago Ferreira University of Michigan - Flint
08:40
60m
Keynote
Scaling Refactoring
[Workshop] IWoR '22
K: James Ivers Carnegie Mellon University, USA
09:40
20m
Product announcement
A Software Refactoring Community Infrastructure
[Workshop] IWoR '22
Marouane Kessentini Oakland University, USA
08:30 - 10:00
AI Quality Assurance I (Part I)Tutorials at Gold C
08:30
90m
Tutorial
AI Quality Assurance
Tutorials
Zhijie Wang University of Alberta, Yuheng Huang University of Alberta, Canada, Lei Ma University of Alberta, Houssem Ben Braiek École Polytechnique de Montréal, Foutse Khomh Polytechnique Montréal
10:00 - 10:30
Coffee BreakSocial at Ballroom B
10:00
30m
Coffee break
Coffee Break
Social

10:30 - 12:00
Session 2[Workshop] HILT' 22 at Ballroom C East
  • 1030-1130 Session #1: Formal methods and applications (part 2)
    1. Daniel Larraz (The University of Iowa), Arjun Viswanathan (The University of Iowa), Mickaël Laurent (Université de Paris) and Cesare Tinelli (The University of Iowa).

      Title: Beyond model checking of idealized Lustre in Kind 2.

      Abstract: This paper describes several new features of the open-source model checker Kind 2. Its input language and model checking engines have been extended to allow users to model and reason about systems with machine integers. In addition, Kind 2 can now provide traceability information between specification and design elements, which can be used for several purposes, including assessing the quality of a system specification, tracking the safety impact of model changes, and analyzing the tolerance and resilience of a system against faults or cyber-attacks. Finally, Kind 2 is also able to check whether a component contract is realizable or not, and provide a deadlocking computation and a set of conflicting guarantees when the contract is unrealizable.

    2. Danielle Stewart (University of Minnesota) and John Hatcliff (Kansas State University).

      Title: An AADL Contract Language Supporting Integrated Model- and Code-Level Verification.

      Abstract Model-based systems engineering approaches support the early adoption of a model – a collection of abstractions – of the system under development. The system model can be augmented with key properties of the system including formal specifications of system behavior that codify portions of system and unit-level requirements. There are obvious gaps between the model with formally specified behavior and the deployed system. Previous work on component contract languages has shown how behavior can be specified in models defined using the Architecture Analysis and Design Language (AADL) – a SAE International standard (AS5506C). That work demonstrated the effectiveness of model-level formal methods specification and verification but did not provide a strong and direct connection to system implementations developed using conventional programming languages. In particular, there was no refinement of model-level contracts to programming language-level contracts nor a framework for formally verifying that program code conforms to model-level behavioral specifications. To address these gaps and to enable the practical application of model-contract languages for verification of deployed high-integrity systems, this paper describes the design of GUMBO AADL contract language that integrates and extends key concepts from earlier contract languages. The GUMBO contract language (GCL) is closely aligned to a formal semantics of the AADL run-time framework, which provides a platform- and language-independent specification of AADL semantics. We have enhanced the HAMR AADL code generation framework to translate model-level contracts to programming language-level contracts in the Slang high-integrity language. We demonstrate how the Logika verification tool can automatically verify that Slang-based AADL component implementations conform to contracts, both at the code-level and model-level. Slang-based implementations of AADL systems can be executed directly or compiled to C for deployments on Linux or the seL4 verified microkernel.


  • 1130-1230 Keynote #2: Niko Matsakis, Senior Principal Engineer, Amazon Web Services

    Title: a-mir-formality: a formal model for the Rust language

    Bio: Nicholas Matsakis is a Senior Principal Engineer at AWS and co-lead of the open source Rust language design team. He has worked on Rust since 2011, and led the design of its “secret sauce”, the borrow checker. He has played a number of other roles in Rust over the years, such as being a member of the Rust core team, the lead of the Rust compiler team, and helping to launch the Rust Foundation. Prior to working on Rust, he completed a PhD at ETH Zurich and did his undergraduate study at MIT.

10:30
90m
Other
TBA
[Workshop] HILT' 22

10:30 - 12:00
Session 2: Keynote Presentation[Workshop] VARSE '22 at Ballroom C West
10:30
80m
Keynote
Security, Privacy, and Safety for AR/VR: The Next 10 YearsVirtual
[Workshop] VARSE '22
Franzika Roesner University of Washington
11:50
10m
Day closing
Closing
[Workshop] VARSE '22
Xiaoyin Wang University of Texas at San Antonio, Xusheng Xiao Arizona State University, Wei Wang University of Texas at San Antonio, USA
10:30 - 12:00
Session 2[Workshop] HCSE&CS '22 at Gold A
Chair(s): Marthie Grobler CSIRO's Data61

00:30-01:50 - Paper Presentation (Session 2)

3. Do Regional Variations Affect the CAPTCHA User Experience? A Comparison of CAPTCHAs in China and the United States, Xinyao Ma (Indiana University Bloomington), Zaiqiao Ye (Indiana University Bloomington), Sameer Patil (University of Utah)

4. Simulating cyber security management: A gamified approach to executive decision making, Adam Tonkin (Fivecast), William Kosasih (The University of Adelaide), Marthie Grobler (CSIRO’s Data61), Mehwish Nasim (The University of Western Australia)

5. Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture Design, Jason Jaskolka (Department of Systems and Computer Engineering, Carleton University, Canada, Brahim HAMID (IRIT, University of Toulouse, France)

6. Intelligent Code Review Assignment for Large Scale Open Source Software Stacks, Ishan Aryendu (Stevens Institute of Technology), Ying Wang (Stevens Institute of Technology), Farah Elkourdi (Stevens Institute of Technology), Eman Abdullah AlOmar (Stevens Institute of Technology)

01:50-02:00 - Conclusion

10:30
90m
Other
TBA
[Workshop] HCSE&CS '22

10:30 - 12:00
Accepted Papers[Workshop] IWoR '22 at Gold B
10:30
20m
Paper
Empirical Evaluation of a Live Environment for Code Refactoring
[Workshop] IWoR '22
Sara Fernandes FEUP, Universidade do Porto, Ademar Aguiar FEUP, Universidade do Porto, André Restivo LIACC, Universidade do Porto, Porto, Portugal
10:50
20m
Paper
Rename Chains: An Exploratory Study on the Occurrence and Characteristics of Identifiers Undergoing Multiple Renamings
[Workshop] IWoR '22
Anthony Peruma University of Hawai‘i at Mānoa, Christian D. Newman Rochester Institute of Technology
11:10
10m
Day closing
Closing
[Workshop] IWoR '22

10:30 - 12:00
AI Quality Assurance II (Part II)Tutorials at Gold C
10:30
90m
Tutorial
AI Quality Assurance
Tutorials
Zhijie Wang University of Alberta, Yuheng Huang University of Alberta, Canada, Lei Ma University of Alberta, Houssem Ben Braiek École Polytechnique de Montréal, Foutse Khomh Polytechnique Montréal
12:00 - 13:30
12:00
90m
Lunch
Lunch
Social

13:30 - 15:00
Session 3[Workshop] HILT' 22 at Ballroom C East
  • 1330-1530 Session #2 : Language and Assurance
    1. David Hardin (Collins Aerospace).

      Title: Hardware/Software Co-Assurance for the Rust Programming Language Applied to Zero Trust Architecture Development.

      Abstract: Zero Trust Architecture requirements are of increasing importance in critical systems development. Zero trust tenets hold that no implicit trust be granted to assets based on their physical or network location. Zero Trust development focuses on authentication, authorization, and shrinking implicit trust zones to the most granular level possible, while maintaining availability and minimizing authentication latency. Performant, high-assurance cryptographic primitives are thus central to successfully realizing a Zero Trust Architecture. The Rust programming language has garnered significant interest and use as a modern, type-safe, memory-safe, and potentially formally analyzable programming language. Our interest in Rust particularly stems from its potential as a hardware/software co-assurance language for developing Zero Trust Architectures. We describe a novel environment enabling Rust to be used as a High-Level Synthesis (HLS) language, suitable for secure and performant Zero Trust application development. Many incumbent HLS languages are a subset of C, and inherit many of the well-known security shortcomings of that language. A Rust-based HLS brings a single modern, type-safe, memory-safe, high-assurance development language for both hardware and software. To study the benefits of this approach, we crafted a Rust HLS subset, and developed a frontend to the hardware/software co-assurance toolchain due to Russinoff and colleagues at Arm, used primarily for floating-point hardware formal verification. This allows us to leverage a number of existing hardware/software co-assurance tools with a minimum investment of time and effort. In this paper, we describe our Rust subset, detail our prototype toolchain, and describe the implementation, performance analysis, formal verification and validation of representative Zero Trust algorithms and data structures written in Rust, emphasizing cryptographic primitives and common data structures.

    2. Claire Dross (AdaCore).

      Title: Containers for Specification in SPARK.

      Abstract: The SPARK tool performs static analysis of Ada programs. It can be used to verify both that a program is free from runtime exceptions and that it conforms to a specification expressed through contracts. To facilitate dynamic analysis, Ada contracts are regular expressions which can be evaluated at execution. As a result, the annotation language of the SPARK tool is restricted to executable constructs. In this context, high-level concepts necessary for specification by contracts need to be supplied as libraries. For example, the latest version of the Ada language introduces unbounded integers and rational numbers to the standard library. In this article, we present the functional containers library which provides collections suitable for use in specification. We explain how they can be used to specify and verify complex programs through concrete examples that have been developed over many years.

    3. S. Tucker Taft (AdaCore).

      Title: Rigorous Pattern Matching as a Language Feature.

      Abstract: Structural pattern-matching as a language feature has become more common in programming languages over the past decade. This paper will consider more generally the challenge of adding pattern matching as a programming language feature, from the points of view of language design, rigorous static error detection, and effectiveness. In this context, a pattern matching language feature can be seen as providing a more rigorous approach to handling the complex conditionals that arise in processing highly structured input

13:30
90m
Other
TBA
[Workshop] HILT' 22

13:30 - 15:00
13:30
90m
Other
TBA
[Workshop] HCSE&CS '22

15:00 - 15:30
Coffee BreakSocial at Ballroom B
15:00
30m
Coffee break
Coffee Break
Social

15:30 - 17:00
Session 4[Workshop] HILT' 22 at Ballroom C East
  • 1530-1700 Session #3 : Use Cases
    1. Tabea Bordis (Karlsruhe Institute of Technology), Tobias Runge (Karlsruhe Institute of Technology), Alexander Kittelmann (Karlsruhe Institute of Technology) and Ina Schaefer (Karlsruhe Institute of Technology).

      Title: Correctness-by-Construction: An Overview of the CorC Ecosystem (Short Abstract).

      Abstract: Correctness-by-Construction (CbC) is an incremental software development technique in the field of formal methods to create functionally correct programs guided by a specification. In contrast to post-hoc verification, where the specification and verification takes part after implementing a program, with CbC the specification is defined first, and then the program is successively created using a small set of refinement rules that define side conditions preserving the correctness of the program. This specification-first, refinement-based approach as pursued by CbC has the advantage that errors are likely to be detected earlier in the design process and can be tracked more easily. Even though the idea of CbC emerged over 40 years ago, CbC is not widespread and mostly used to create small algorithms. We believe in the idea of CbC and envision a scaled CbC approach that contributes to solving problems of modern software verification. In this short paper, we give an overview on our research regarding CbC in four different lines of research. For all of them, we provide tool support building the CorC ecosystem that even further enables CbC-based development for different fields of application and size of software systems. Furthermore, we give an outlook on future work that extends on our concepts for CbC.

    2. Laura Humphrey (Air Force Research Laboratory).

      Title: Basic Formal Verification of a Waypoint Manager for Unmanned Air Vehicles in SPARK.

      Abstract: As software becomes more complex, it becomes more difficult to verify its correctness. This poses a particular challenge for autonomous systems, since they are software-intensive and also require strong evidence of correctness in order to be allowed operate in real-world environments. One way to help address this problem is through the use of formal methods, i.e. mathematically-based tools for software and hardware verification. In this paper, we perform formal program verification on a service in OpenUxAS, a free and open source software framework for mission-level, multi-vehicle autonomy. More specifically, we apply the SPARK language and verification toolset to a service that sanity-checks and segments long sequences of vehicle waypoints to prove that it is free of runtime errors.

    3. Howard Ausden (Leidos).

      Title: Getting to 100% availability in a large C++ and Ada program.

      Abstract: Fault tolerance is a key requirement for air traffic control systems. A system failure could lead to hundreds of flights being delayed or cancelled. Using experience from earlier systems a set of techniques were built into our system at inception, including hot standby copies of executables and latest state checkpointed in disk files. As the system matured through formal testing and early site experience additional techniques were added to bolster the MTBF. These include exception safety, runaway process protection, and pro-active monitoring of the system to let us find and fix defects, often without the air traffic controllers being aware. Leidos now has a variety of techniques with defense in depth, and for new developments we scale the number of layers to the difficulty and impact of failure and recovery from the failure. Since Fall 2016, the customer has measured the system as 100% available at all operational sites.


1700 - 1715 Conclusion

15:30
90m
Other
TBA
[Workshop] HILT' 22

15:30 - 17:00
15:30
90m
Other
TBA
[Workshop] HCSE&CS '22