ASE 2023
Mon 11 - Fri 15 September 2023
Kirchberg, Luxembourg
Toggle navigation
Attending
Venue: European Convention Center Luxembourg (ECCL)
Registration
Author Information
Accommodation
Social Activities
Travel Support
Program
ASE Program
Your Program
Schedule Overview
Keynote
Mon 11 Sep
Tue 12 Sep
Wed 13 Sep
Thu 14 Sep
Fri 15 Sep
Tracks
ASE 2023
Research Papers
SATE - Software Engineering at the Era of LLMs
Keynotes
Journal-first Papers
Industry Showcase (Papers)
Industry Challenge (Competition)
Doctoral Forum
New Faculty Symposium
NIER Track
Tool Demonstrations
Tutorials
Most Influential Papers (MIP)
Workshops
[Workshop] ASYDE
[Workshop] CPAchecker
[Workshop] A-Mobile
[Workshop] HCSE-CS
[Workshop] A-TEST
Social Events
Organization
ASE 2023 Committees
Organizing Committee
Track Committees
Research Papers
Research Papers Chair
Program Committee
SATE - Software Engineering at the Era of LLMs
Journal-first Papers
Journal-first Papers Chair
Program Committee
Industry Showcase (Papers)
Industry Showcase Chairs
Program Committee
Industry Challenge (Competition)
Industry Challenge Chairs
Program Committee
Doctoral Forum
Doctoral Forum Chair
Expert Panel Members
New Faculty Symposium
NIER Track
NIER Chairs
Program Committee
Tool Demonstrations
Tool Demonstrations Chair
Program Committee
Tutorials
Tutorials Chair
Program Committee
Most Influential Papers (MIP)
Most Influential Papers (MIP) Chair
Program Committee
Workshops
Contributors
People Index
Search
Series
Series
ASE 2025
ASE 2024
ASE 2023
ASE 2022
ASE 2021
ASE 2020
ASE 2019
Past Editions
Sign in
Sign up
ASE 2023
(
series
) /
European Convention Center Luxembourg (ECCL)
/
Room information: Room E
Venue
European Convention Center Luxembourg (ECCL)
Room name
Room E
Floor
0
Room Information
No extra information available
Program
Detailed Table
Session Timeline
Detailed Timeline
Program Display Configuration
Time Zone
The program is currently displayed in
(GMT+02:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
.
Use conference time zone: (GMT+02:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
Select other time zone
(GMT-12:00) AoE (Anywhere On Earth)
(GMT-11:00) Midway Island, Samoa
(GMT-09:00) Hawaii-Aleutian
(GMT-10:00) Hawaii
(GMT-09:30) Marquesas Islands
(GMT-09:00) Gambier Islands
(GMT-08:00) Alaska
(GMT-07:00) Tijuana, Baja California
(GMT-08:00) Pitcairn Islands
(GMT-07:00) Pacific Time (US & Canada)
(GMT-06:00) Mountain Time (US & Canada)
(GMT-06:00) Chihuahua, La Paz, Mazatlan
(GMT-07:00) Arizona
(GMT-06:00) Saskatchewan, Central America
(GMT-05:00) Guadalajara, Mexico City, Monterrey
(GMT-05:00) Easter Island
(GMT-05:00) Central Time (US & Canada)
(GMT-04:00) Eastern Time (US & Canada)
(GMT-04:00) Cuba
(GMT-05:00) Bogota, Lima, Quito, Rio Branco
(GMT-04:00) Caracas
(GMT-03:00) Santiago
(GMT-04:00) La Paz
(GMT-03:00) Faukland Islands
(GMT-04:00) Manaus, Amazonas, Brazil
(GMT-03:00) Atlantic Time (Goose Bay)
(GMT-03:00) Atlantic Time (Canada)
(GMT-02:30) Newfoundland
(GMT-03:00) UTC-3
(GMT-03:00) Montevideo
(GMT-02:00) Miquelon, St. Pierre
(GMT-02:00) Greenland
(GMT-03:00) Buenos Aires
(GMT-03:00) Brasilia, Distrito Federal, Brazil
(GMT-02:00) Mid-Atlantic
(GMT-01:00) Cape Verde Is.
(GMT) Azores
(UTC) Coordinated Universal Time
(GMT+01:00) Belfast
(GMT+01:00) Dublin
(GMT+01:00) Lisbon
(GMT+01:00) London
(GMT) Monrovia, Reykjavik
(GMT+02:00) Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
(GMT+02:00) Belgrade, Bratislava, Budapest, Ljubljana, Prague
(GMT+02:00) Brussels, Copenhagen, Madrid, Paris
(GMT+01:00) West Central Africa
(GMT+02:00) Windhoek
(GMT+03:00) Athens
(GMT+03:00) Beirut
(GMT+02:00) Cairo
(GMT+03:00) Gaza
(GMT+02:00) Harare, Pretoria
(GMT+03:00) Jerusalem
(GMT+03:00) Minsk
(GMT+03:00) Syria
(GMT+03:00) Moscow, St. Petersburg, Volgograd
(GMT+03:00) Nairobi
(GMT+03:30) Tehran
(GMT+04:00) Abu Dhabi, Muscat
(GMT+04:00) Yerevan
(GMT+04:30) Kabul
(GMT+05:00) Ekaterinburg
(GMT+05:00) Tashkent
(GMT+05:30) Chennai, Kolkata, Mumbai, New Delhi
(GMT+05:45) Kathmandu
(GMT+06:00) Astana, Dhaka
(GMT+07:00) Novosibirsk
(GMT+06:30) Yangon (Rangoon)
(GMT+07:00) Bangkok, Hanoi, Jakarta
(GMT+07:00) Krasnoyarsk
(GMT+08:00) Beijing, Chongqing, Hong Kong, Urumqi
(GMT+08:00) Irkutsk, Ulaan Bataar
(GMT+08:00) Perth
(GMT+08:45) Eucla
(GMT+09:00) Osaka, Sapporo, Tokyo
(GMT+09:00) Seoul
(GMT+09:00) Yakutsk
(GMT+09:30) Adelaide
(GMT+09:30) Darwin
(GMT+10:00) Brisbane
(GMT+10:00) Hobart
(GMT+10:00) Vladivostok
(GMT+10:30) Lord Howe Island
(GMT+11:00) Solomon Is., New Caledonia
(GMT+11:00) Magadan
(GMT+11:00) Norfolk Island
(GMT+12:00) Anadyr, Kamchatka
(GMT+12:00) Auckland, Wellington
(GMT+12:00) Fiji, Kamchatka, Marshall Is.
(GMT+12:45) Chatham Islands
(GMT+13:00) Nuku'alofa
(GMT+14:00) Kiritimati
The GMT offsets shown reflect the offsets
at the moment of the conference
.
Time Band
By setting a time band, the program will dim events that are outside this time window. This is useful for (virtual) conferences with a continuous program (with repeated sessions).
The time band will also limit the events that are included in the personal iCalendar subscription service.
Display full program
Specify a time band
-
Save
×
You're viewing the program in a time zone which is different from your device's time zone
change time zone
Tue 12 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
10:30 - 12:00
Open Source and Software Ecosystems 1
Research Papers
/
Tool Demonstrations
at
Room E
Chair(s):
Denys Poshyvanyk
William & Mary
10:30
12m
Talk
An Empirical Study of Malicious Code In PyPI Ecosystem
Research Papers
Wenbo Guo
School of Cyber Science and Engineering, Sichuan University
,
Zhengzi Xu
Nanyang Technological University
,
Chengwei Liu
Nanyang Technological University
,
Cheng Huang
School of Cyber Science and Engineering, Sichuan University
,
Yong Fang
School of Cyber Science and Engineering, Sichuan University
,
Yang Liu
Nanyang Technological University
Pre-print
10:42
12m
Talk
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem
Research Papers
Weiwei Xu
Peking University
,
Hao He
Carnegie Mellon University
,
Kai Gao
University of Science and Technology Beijing
,
Minghui Zhou
Peking University
Pre-print
10:54
12m
Talk
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem
Research Papers
Lyuye Zhang
Nanyang Technological University
,
Chengwei Liu
Nanyang Technological University
,
Sen Chen
Tianjin University
,
Zhengzi Xu
Nanyang Technological University
,
Lingling Fan
Nankai University
,
Lida Zhao
Nanyang Technological University
,
Yiran Zhang
Nanyang Technological University
,
Yang Liu
Nanyang Technological University
11:06
12m
Talk
Bus Factor Explorer
Tool Demonstrations
Egor Klimov
JetBrains Research
,
Muhammad Umair Ahmed
Bilkent University
,
Nikolai Sviridov
JetBrains Research
,
Pouria Derakhshanfar
JetBrains Research
,
Eray Tüzün
Bilkent University
,
Vladimir Kovalenko
JetBrains Research
Media Attached
11:30
12m
Talk
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery
Research Papers
Chenyuan Zhang
Xiamen University
,
Yanlin Wang
Sun Yat-sen University
,
Zhao Wei
Tencent
,
Yong Xu
Tencent
,
Juhong Wang
Tencent
,
Hui Li
Xiamen University
,
Rongrong Ji
Xiamen University
Pre-print
Media Attached
11:42
12m
Talk
Fork Entropy: Assessing the Diversity of Open Source Software Projects' Forks
Recorded talk
Research Papers
Liang Wang
Nanjing University
,
Zhiwen Zheng
State Key Laboratory for Novel Software Technology, Nanjing University
,
Xiangchen Wu
State Key Laboratory for Novel Software Technology, Nanjing University
,
Baihui Sang
State Key Laboratory for Novel Software Technology, Nanjing University
,
Jierui Zhang
Nanjing University
,
Xianping Tao
Nanjing University
Media Attached
13:30 - 15:00
Vulnerability and Security 1
Research Papers
/
Journal-first Papers
at
Room E
Chair(s):
Fatemeh Hendijani Fard
University of British Columbia
13:30
12m
Talk
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering
Research Papers
Wentao Liang
Institute of Software, Chinese Academy of Sciences
,
Xiang Ling
Institute of Software, Chinese Academy of Sciences
,
Jingzheng Wu
Institute of Software, The Chinese Academy of Sciences
,
Tianyue Luo
Institute of Software, Chinese Academy of Sciences
,
Yanjun Wu
Institute of Software, Chinese Academy of Sciences
File Attached
13:42
12m
Talk
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows
Research Papers
Yujiang Gui
UNSW Sydney
,
Dongjie He
UNSW
,
Jingling Xue
UNSW
Pre-print
File Attached
13:54
12m
Talk
Learning to Locate and Describe Vulnerabilities
Research Papers
Jian Zhang
Nanyang Technological University
,
Shangqing Liu
Nanyang Technological University
,
Xu Wang
Beihang University
,
Li Tianlin
Nanyang Technological University
,
Yang Liu
Nanyang Technological University
14:06
12m
Talk
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Research Papers
Xin-Cheng Wen
Harbin Institute of Technology
,
Xinchen Wang
Harbin Institute of Technology
,
Cuiyun Gao
Harbin Institute of Technology
,
Shaohua Wang
New Jersey Institute of Technology
,
Yang Liu
Nanyang Technological University
,
Zhaoquan Gu
Harbin Institute of Technology
14:18
12m
Talk
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study
Journal-first Papers
Emanuele Iannone
University of Salerno
,
Roberta Guadagni
University of Salerno
,
Filomena Ferrucci
University of Salerno
,
Andrea De Lucia
University of Salerno
,
Fabio Palomba
University of Salerno
Link to publication
DOI
Pre-print
Media Attached
14:30
12m
Talk
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices
Research Papers
Ziyou Jiang
Institute of Software at Chinese Academy of Sciences
,
Lin Shi
Beihang University
,
Guowei Yang
University of Queensland
,
Qing Wang
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Media Attached
File Attached
15:30 - 17:00
Testing Tools and Techniques
NIER Track
/
Research Papers
/
Tool Demonstrations
at
Room E
Chair(s):
Tim Menzies
North Carolina State University
15:30
12m
Talk
Modeling Programmer Attention as Scanpath Prediction
NIER Track
Aakash Bansal
University of Notre Dame
,
Chia-Yi Su
University of Notre Dame
,
Zachary Karas
Vanderbilt University
,
Yifan Zhang
Vanderbilt University
,
Yu Huang
Vanderbilt University
,
Toby Jia-Jun Li
University of Notre Dame
,
Collin McMillan
University of Notre Dame
15:42
12m
Talk
On Automated Assistants for Software Development: The Role of LLMs
NIER Track
Mira Leung
University of British Columbia
,
Gail Murphy
University of British Columbia
Pre-print
File Attached
15:54
12m
Talk
SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts
Tool Demonstrations
Monika di Angelo
TU Wien
,
Thomas Durieux
TU Delft
,
João F. Ferreira
INESC-ID and IST, University of Lisbon
,
Gernot Salzer
TU Wien
Pre-print
File Attached
16:06
12m
Talk
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection
Research Papers
Yintong Huo
The Chinese University of Hong Kong
,
Yichen LI
The Chinese University of Hong Kong
,
Yuxin Su
Sun Yat-sen University
,
Pinjia He
Chinese University of Hong Kong, Shenzhen
,
Zifan Xie
Huazhong University of Science and Technology
,
Michael Lyu
The Chinese University of Hong Kong
Pre-print
16:18
12m
Talk
Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers
Research Papers
Yi Liu
Nanyang Technological University
,
Yuekang Li
University of New South Wales
,
Gelei Deng
Nanyang Technological University
,
Felix Juefei-Xu
Meta AI
,
Yao Du
University of California, Irvine
,
Cen Zhang
Nanyang Technological University
,
Chengwei Liu
Nanyang Technological University
,
Yeting Li
Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Lei Ma
University of Alberta
,
Yang Liu
Nanyang Technological University
,
Yuekang Li
University of New South Wales
16:30
12m
Talk
Software Entity Recognition with Noise-Robust Learning
Recorded talk
Research Papers
Tai Nguyen
University of Pennsylvania
,
Yifeng Di
Purdue University
,
Joohan Lee
University of Southern California
,
Muhao Chen
University of Southern California
,
Tianyi Zhang
Purdue University
Pre-print
Media Attached
File Attached
Wed 13 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
10:30 - 12:00
Web Development 2
Industry Showcase (Papers)
/
Research Papers
/
NIER Track
/
Journal-first Papers
at
Room E
Chair(s):
Hadar Ziv
University of California, Irvine
10:30
12m
Talk
Metamorphic Testing for Web System Security
Journal-first Papers
Nazanin Bayati Chaleshtari
University of Ottawa
,
Fabrizio Pastore
University of Luxembourg
,
Arda Goknil
SINTEF Digital
,
Lionel Briand
University of Luxembourg; University of Ottawa
Link to publication
DOI
Pre-print
10:42
12m
Talk
JavaScript Dead Code Identification, Elimination, and Empirical Assessment
Journal-first Papers
Ivano Malavolta
Vrije Universiteit Amsterdam
,
Kishan Nirghin
Vrije Universiteit Amsterdam
,
Gian Luca Scoccia
Gran Sasso Science Institute
,
Simone Romano
University of Salerno
,
Salvatore Lombardi
University of Basilicata
,
Giuseppe Scanniello
University of Salerno
,
Patricia Lago
Vrije Universiteit Amsterdam
File Attached
10:54
12m
Talk
PTdetector: An Automated JavaScript Front-end Library Detector
Research Papers
Xinyue Liu
University at Buffalo, SUNY
,
Lukasz Ziarek
University at Buffalo
Link to publication
11:06
12m
Talk
Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing
Research Papers
Shuyao Jiang
The Chinese University of Hong Kong
,
Ruiying Zeng
Fudan University
,
Zihao Rao
Fudan University
,
Jiazhen Gu
Chinese University of Hong Kong
,
Yangfan Zhou
Fudan University
,
Michael Lyu
The Chinese University of Hong Kong
Pre-print
11:18
12m
Talk
Dramatically Improving Design Reviews at Google
Industry Showcase (Papers)
Celal Ziftci
Google
,
Ben Greenberg
Google
Link to publication
11:30
12m
Talk
Characterizing Flaky Tests in Node.js Applications
Recorded talk
NIER Track
Xiaoning Chang
Institute of Software, Chinese Academy of Sciences
,
Zheheng Liang
Joint Laboratory on Cyberspace Security of China Southern Power Grid
,
Guoquan Wu
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid
,
Yu Gao
Institute of Software, Chinese Academy of Sciences, China
,
Wei Chen
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College
,
Jun Wei
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School
,
Zhenyue Long
,
Lei Cui
Joint Laboratory on Cyberspace Security of China Southern Power Grid
,
Tao Huang
Institute of Software Chinese Academy of Sciences
Media Attached
13:30 - 15:00
Code Change Analysis
Research Papers
/
Journal-first Papers
at
Room E
Chair(s):
Vladimir Kovalenko
JetBrains Research
13:30
12m
Talk
Code Difference Guided Adversarial Example Generation for Deep Code Models
Research Papers
Zhao Tian
Tianjin University
,
Junjie Chen
Tianjin University
,
Zhi Jin
Peking University
Pre-print
File Attached
13:42
12m
Talk
DiffSearch: A Scalable and Precise Search Engine for Code Changes
Journal-first Papers
Luca Di Grazia
University of Stuttgart
,
Paul Bredl
University of Stuttgart
,
Michael Pradel
University of Stuttgart
Link to publication
DOI
Pre-print
File Attached
13:54
12m
Talk
ZC3 Zero-Shot Cross-Language Code Clone Detection
Research Papers
Jia Li
,
Chongyang Tao
Peking University
,
Zhi Jin
Peking University
,
Fang Liu
Beihang University
,
Jia Li
Peking University
,
Ge Li
Peking University
Pre-print
File Attached
14:06
12m
Talk
Persisting and Reusing Results of Static Program Analyses on a Large Scale
Research Papers
Johannes Düsing
TU Dortmund University
,
Ben Hermann
TU Dortmund
,
Ben Hermann
TU Dortmund
Pre-print
14:18
12m
Talk
Optimizing Continuous Development By Detecting and Preventing Unnecessary Content Generation
Research Papers
Talank Baral
George Mason University
,
Shanto Rahman
The University of Texas at Austin
,
Bala Naren Chanumolu
George Mason University
,
Basak Balci
Ozyegin University
,
Tuna Tuncer
Ozyegin University
,
August Shi
The University of Texas at Austin
,
Wing Lam
George Mason University
Pre-print
Media Attached
14:30
12m
Talk
iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping Algorithm
Recorded talk
Research Papers
Neng Zhang
School of Software Engineering, Sun Yat-sen University
,
ChenQinde
School of Software Engineering, Sun Yat-sen University
,
Zibin Zheng
Sun Yat-sen University
,
Ying Zou
Queen's University, Kingston, Ontario
Pre-print
Media Attached
15:30 - 17:00
Autonomous Systems and Agents
Research Papers
/
NIER Track
/
Journal-first Papers
/
Tool Demonstrations
at
Room E
Chair(s):
Alessio Gambi
IMC University of Applied Sciences Krems
15:30
12m
Talk
TEASER: Simulation-based CAN Bus Regression Testing for Self-driving Cars Software
Tool Demonstrations
Christian Birchler
Zurich University of Applied Sciences
,
Cyrill Rohrbach
University of Bern, Switzerland
,
Hyeongkyun Kim
University of Zurich, Switzerland
,
Alessio Gambi
IMC University of Applied Sciences Krems
,
Tianhai Liu
aicas GmbH, Germany
,
Jens Horneber
aicas GmbH, Germany
,
Timo Kehrer
University of Bern
,
Sebastiano Panichella
Zurich University of Applied Sciences
Pre-print
File Attached
15:42
12m
Talk
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms
Journal-first Papers
Andrea Di Sorbo
University of Sannio
,
Fiorella Zampetti
University of Sannio, Italy
,
Corrado A. Visaggio
University of Sannio, Italy
,
Massimiliano Di Penta
University of Sannio, Italy
,
Sebastiano Panichella
Zurich University of Applied Sciences
File Attached
15:54
12m
Talk
Towards a Formal Framework for Normative Requirements Elicitation
NIER Track
Nick Feng
University of Toronto
,
Lina Marsso
University of Toronto
,
Sinem Getir Yaman
University of York, UK
,
Beverley Townsend
University of York
,
Ana Cavalcanti
University of York
,
Radu Calinescu
University of York, UK
,
Marsha Chechik
University of Toronto
File Attached
16:06
12m
Talk
Detecting Smart Home Automation Application Interferences with Domain Knowledge
Research Papers
Tao Wang
Institute of Software at Chinese Academy of Sciences
,
Wei Chen
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College
,
Liwei Liu
Institute of Software at Chinese Academy of Sciences
,
Guoquan Wu
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid
,
Jun Wei
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School
,
Tao Huang
Institute of Software Chinese Academy of Sciences
Pre-print
File Attached
16:18
12m
Talk
CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues
Tool Demonstrations
Xiufeng Xu
Nanyang Technological University
,
Chenguang Zhu
Meta
,
Yi Li
Nanyang Technological University
Pre-print
Media Attached
File Attached
16:30
12m
Talk
A Comprehensive Study on Code Clones in Automated Driving Software
Recorded talk
Research Papers
Ran Mo
Central China Normal University
,
Yingjie Jiang
Central China Normal University
,
Wenjing Zhan
Central China Normal University
,
Dongyu Wang
Central China Normal University
,
Zengyang Li
Central China Normal University
Pre-print
Media Attached
File Attached
Thu 14 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
10:30 - 12:00
Program Verification 2
Research Papers
/
Tool Demonstrations
/
NIER Track
at
Room E
Chair(s):
Martin Kellogg
New Jersey Institute of Technology
10:30
12m
Talk
Expediting Neural Network Verification via Network Reduction
Research Papers
Yuyi Zhong
National University of Singapore, Singapore
,
Ruiwei Wang
School of Computing, National University of Singapore
,
Siau-Cheng Khoo
National University of Singapore
Pre-print
File Attached
10:42
12m
Talk
SMT Solver Validation Empowered by Large Pre-trained Language Models
Research Papers
Maolin Sun
Nanjing University
,
Yibiao Yang
Nanjing University
,
Yang Wang
National Key Laboratory for Novel Software Technology, Nanjing University
,
Ming Wen
Huazhong University of Science and Technology
,
Haoxiang Jia
Huazhong University of Science and Technology
,
Yuming Zhou
Nanjing University
Pre-print
File Attached
10:54
12m
Talk
LIV: Invariant Validation Using Straight-Line Programs
Tool Demonstrations
Martin Spiessl
LMU Munich
,
Dirk Beyer
LMU Munich
Pre-print
Media Attached
File Attached
11:06
12m
Talk
CEGAR-PT: A Tool for Abstraction by Program Transformation
Tool Demonstrations
Dirk Beyer
LMU Munich
,
Marian Lingsch-Rosenfeld
LMU Munich
,
Martin Spiessl
LMU Munich
Pre-print
Media Attached
File Attached
11:18
12m
Talk
Symbolic Verification of Fuzzy Logic Models
Recorded talk
NIER Track
Siang Zhao
School of Computer, National University of Defense Technology, China
,
Zhongyang Li
School of Computer, National University of Defense Technology, China
,
Zhenbang Chen
National University of Defense Technology
,
Ji Wang
School of Computer, National University of Defense Technology, China
Pre-print
Media Attached
11:30
12m
Talk
HOBAT: Batch Verification for Homogeneous Structural Neural Networks
Recorded talk
Research Papers
Jingyang Li
Shanghai Jiao Tong University
,
Guoqiang Li
Shanghai Jiao Tong University
Media Attached
File Attached
13:30 - 15:00
Debugging
Research Papers
/
Industry Showcase (Papers)
at
Room E
Chair(s):
Carol Hanna
University College London
13:30
12m
Talk
Coding and Debugging by Separating Secret Code toward Secure Remote Development
Industry Showcase (Papers)
Shinobu Saito
NTT
Media Attached
File Attached
13:42
12m
Talk
Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count
Research Papers
Xutong Ma
State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
,
Jiwei Yan
Institute of Software at Chinese Academy of Sciences, China
,
Hao Zhang
Institute of Software, Chinese Academy of Sciences
,
Jun Yan
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
,
Jian Zhang
Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print
13:54
12m
Research paper
PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis
Research Papers
Zhenlan Ji
The Hong Kong University of Science and Technology
,
Pingchuan Ma
HKUST
,
Shuai Wang
Hong Kong University of Science and Technology
Pre-print
14:06
12m
Talk
The MAP metric in Information Retrieval Fault Localization
Research Papers
Thomas Hirsch
Graz University of Technology
,
Birgit Hofer
Graz University of Technology
Media Attached
File Attached
14:18
12m
Talk
Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial Extrapolation
Recorded talk
Research Papers
Zuoyan Zhang
Information Engineering University
,
Bei Zhou
Information Engineering University
,
Jiangwei Hao
Information Engineering University
,
Hongru Yang
Information Engineering University
,
Mengqi Cui
Information Engineering University
,
Yuchang Zhou
Information Engineering University
,
Guanghui Song
Information Engineering University
,
Fei Li
Information Engineering University
,
Jinchen Xu
Information Engineering University
,
Jie Zhao
State Key Laboratory of Mathematical Engineering and Advanced Computing
Media Attached
File Attached
14:30
12m
Talk
Information Retrieval-based Fault Localization for Concurrent Programs
Recorded talk
Research Papers
Shuai Shao
University of Connecticut
,
Tingting Yu
University of Connecticut
Pre-print
Media Attached
15:30 - 17:00
Vulnerability and Security 2
Journal-first Papers
/
Industry Showcase (Papers)
/
Research Papers
at
Room E
Chair(s):
Ben Hermann
TU Dortmund
15:30
12m
Talk
An Industrial Practice for Securing Android Apps in the Banking Domain
Industry Showcase (Papers)
Vikas K. Malviya
Singapore Management University
,
Phong Phan
i-Sprint Innovations Pte. Ltd
,
Yan Naing Tun
Singapore Management University
,
Albert Ching
i-Sprint Innovations Pte. Ltd
,
Lwin Khin Shar
Singapore Management University
File Attached
15:42
12m
Talk
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation
Journal-first Papers
Wuqi Zhang
The Hong Kong University of Science and Technology
,
Lili Wei
McGill University
,
Shing-Chi Cheung
Hong Kong University of Science and Technology
,
Yepang Liu
Southern University of Science and Technology
,
Shuqing Li
The Chinese University of Hong Kong
,
Lu Liu
The Hong Kong University of Science and Technology
,
Michael Lyu
The Chinese University of Hong Kong
Link to publication
DOI
Pre-print
File Attached
15:54
12m
Talk
Software Engineering Using Autonomous Agents: Are We There Yet?
Recorded talk
Industry Showcase (Papers)
Samdyuti Suri
Accenture Tech Labs
,
Sankar Narayan Das
Accenture Tech Labs
,
Kapil Singi
Accenture
,
Kuntal Dey
Accenture Labs, India
,
Vibhu Saujanya Sharma
Accenture Labs
,
Vikrant Kaulgud
Accenture Labs, India
Media Attached
16:06
12m
Talk
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities
Recorded talk
Research Papers
Jianzhong Su
Sun Yat-sen University
,
Xingwei Lin
Ant Group
,
Zhiyuan Fang
Sun Yat-sen University
,
Zhirong Zhu
Sun Yat-sen University
,
Jiachi Chen
Sun Yat-sen University
,
Zibin Zheng
Sun Yat-sen University
,
Wei Lv
Ant Group
,
Jiashui Wang
Zhejiang University
Media Attached
16:18
12m
Talk
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device
Recorded talk
Research Papers
Yuwei Liu
Institute of Software, Chinese Academy of Sciences
,
Siqi Chen
Shanghai Jiao Tong University
,
Yuchong Xie
Shanghai Jiao Tong University
,
Yanhao Wang
Qi An Xin Group Corp.
,
Libo Chen
Shanghai Jiao Tong University
,
Bin Wang
Beijing Institute of Computer Technology and Applications
,
Yingming Zeng
Beijing Institute of Computer Technology and Applications
,
Zhi Xue
Shanghai Jiao Tong University
,
Purui Su
Institute of Software/CAS China
Media Attached
File Attached
16:30
12m
Talk
Smart Prompt Advisor: Multi-objective Prompt Framework for Consistency and Best Practices
Recorded talk
Industry Showcase (Papers)
Kanchanjot Kaur Phokela
Accenture
,
Samarth Sikand
Accenture Labs
,
Kapil Singi
Accenture
,
Kuntal Dey
Accenture Labs, India
,
Vibhu Saujanya Sharma
Accenture Labs
,
Vikrant Kaulgud
Accenture Labs, India
Media Attached
Tue 12 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
Room
10:00
30
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
Room E
Research Papers + Tool Demonstrations
Open Source and Software Ecosystems 1
Research Papers + Journal-first Papers
Vulnerability and Security 1
NIER Track + Research Papers + Tool Demonstrations
Testing Tools and Techniques
Wed 13 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
Room
10:00
30
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
Room E
Industry Showcase (Papers) + Research Papers + NIER Track + Journal-first Papers
Web Development 2
Research Papers + Journal-first Papers
Code Change Analysis
Research Papers + NIER Track + Journal-first Papers + Tool Demonstrations
Autonomous Systems and Agents
Thu 14 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
Room
10:00
30
11:00
30
12:00
30
13:00
30
14:00
30
15:00
30
16:00
30
Room E
Research Papers + Tool Demonstrations + NIER Track
Program Verification 2
Research Papers + Industry Showcase (Papers)
Debugging
Journal-first Papers + Industry Showcase (Papers) + Research Papers
Vulnerability and Security 2
Tue 12 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
Room
10:00
15
30
45
11:00
15
30
45
12:00
15
30
45
13:00
15
30
45
14:00
15
30
45
15:00
15
30
45
16:00
15
30
45
Room E
ASE Research Papers
An Empirical Study of Malicious Code In PyPI Ecosystem
10:30 - 10:42
ASE Research Papers
Understanding and Remediating Open-Source License Incompatibilities in ...
10:42 - 10:54
ASE Research Papers
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem
10:54 - 11:06
ASE Tool Demonstrations
Bus Factor Explorer
11:06 - 11:18
ASE Research Papers
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commi ...
11:30 - 11:42
ASE Research Papers
Recorded talk
Fork Entropy: Assessing the Diversity of Open Source Software Projects' ...
11:42 - 11:54
ASE Research Papers
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages w ...
13:30 - 13:42
ASE Research Papers
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equi ...
13:42 - 13:54
ASE Research Papers
Learning to Locate and Describe Vulnerabilities
13:54 - 14:06
ASE Research Papers
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerab ...
14:06 - 14:18
ASE Journal-first Papers
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study
14:18 - 14:30
ASE Research Papers
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Pr ...
14:30 - 14:42
ASE NIER Track
Modeling Programmer Attention as Scanpath Prediction
15:30 - 15:42
ASE NIER Track
On Automated Assistants for Software Development: The Role of LLMs
15:42 - 15:54
ASE Tool Demonstrations
SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereu ...
15:54 - 16:06
ASE Research Papers
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection
16:06 - 16:18
ASE Research Papers
Aster: Automatic Speech Recognition System Accessibility Testing for St ...
16:18 - 16:30
ASE Research Papers
Recorded talk
Software Entity Recognition with Noise-Robust Learning
16:30 - 16:42
Wed 13 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
Room
10:00
15
30
45
11:00
15
30
45
12:00
15
30
45
13:00
15
30
45
14:00
15
30
45
15:00
15
30
45
16:00
15
30
45
Room E
ASE Journal-first Papers
Metamorphic Testing for Web System Security
10:30 - 10:42
ASE Journal-first Papers
JavaScript Dead Code Identification, Elimination, and Empirical Assessment
10:42 - 10:54
ASE Research Papers
PTdetector: An Automated JavaScript Front-end Library Detector
10:54 - 11:06
ASE Research Papers
Revealing Performance Issues in Server-side WebAssembly Runtimes via Di ...
11:06 - 11:18
ASE Industry Showcase (Papers)
Dramatically Improving Design Reviews at Google
11:18 - 11:30
ASE NIER Track
Recorded talk
Characterizing Flaky Tests in Node.js Applications
11:30 - 11:42
ASE Research Papers
Code Difference Guided Adversarial Example Generation for Deep Code Models
13:30 - 13:42
ASE Journal-first Papers
DiffSearch: A Scalable and Precise Search Engine for Code Changes
13:42 - 13:54
ASE Research Papers
ZC3 Zero-Shot Cross-Language Code Clone Detection
13:54 - 14:06
ASE Research Papers
Persisting and Reusing Results of Static Program Analyses on a Large Scale
14:06 - 14:18
ASE Research Papers
Optimizing Continuous Development By Detecting and Preventing Unnecessa ...
14:18 - 14:30
ASE Research Papers
Recorded talk
iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping ...
14:30 - 14:42
ASE Tool Demonstrations
TEASER: Simulation-based CAN Bus Regression Testing for Self-driving Ca ...
15:30 - 15:42
ASE Journal-first Papers
Automated Identification and Qualitative Characterization of Safety Con ...
15:42 - 15:54
ASE NIER Track
Towards a Formal Framework for Normative Requirements Elicitation
15:54 - 16:06
ASE Research Papers
Detecting Smart Home Automation Application Interferences with Domain K ...
16:06 - 16:18
ASE Tool Demonstrations
CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues
16:18 - 16:30
ASE Research Papers
Recorded talk
A Comprehensive Study on Code Clones in Automated Driving Software
16:30 - 16:42
Thu 14 Sep
Displayed time zone:
Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna
change
Room
10:00
15
30
45
11:00
15
30
45
12:00
15
30
45
13:00
15
30
45
14:00
15
30
45
15:00
15
30
45
16:00
15
30
45
Room E
ASE Research Papers
Expediting Neural Network Verification via Network Reduction
10:30 - 10:42
ASE Research Papers
SMT Solver Validation Empowered by Large Pre-trained Language Models
10:42 - 10:54
ASE Tool Demonstrations
LIV: Invariant Validation Using Straight-Line Programs
10:54 - 11:06
ASE Tool Demonstrations
CEGAR-PT: A Tool for Abstraction by Program Transformation
11:06 - 11:18
ASE NIER Track
Recorded talk
Symbolic Verification of Fuzzy Logic Models
11:18 - 11:30
ASE Research Papers
Recorded talk
HOBAT: Batch Verification for Homogeneous Structural Neural Networks
11:30 - 11:42
ASE Industry Showcase (Papers)
Coding and Debugging by Separating Secret Code toward Secure Remote Dev ...
13:30 - 13:42
ASE Research Papers
Detecting Memory Errors in Python Native Code by Tracking Object Lifecy ...
13:42 - 13:54
ASE Research Papers
PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhan ...
13:54 - 14:06
ASE Research Papers
The MAP metric in Information Retrieval Fault Localization
14:06 - 14:18
ASE Research Papers
Recorded talk
Eiffel: Inferring Input Ranges of Significant Floating-point Errors via ...
14:18 - 14:30
ASE Research Papers
Recorded talk
Information Retrieval-based Fault Localization for Concurrent Programs
14:30 - 14:42
ASE Industry Showcase (Papers)
An Industrial Practice for Securing Android Apps in the Banking Domain
15:30 - 15:42
ASE Journal-first Papers
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark C ...
15:42 - 15:54
ASE Industry Showcase (Papers)
Recorded talk
Software Engineering Using Autonomous Agents: Are We There Yet?
15:54 - 16:06
ASE Research Papers
Recorded talk
DeFiWarder: Protecting DeFi Apps from Token Leaking Vulnerabilities
16:06 - 16:18
ASE Research Papers
Recorded talk
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual Device
16:18 - 16:30
ASE Industry Showcase (Papers)
Recorded talk
Smart Prompt Advisor: Multi-objective Prompt Framework for Consistency ...
16:30 - 16:42
x
Sat 21 Dec 15:28