ASE 2023
Mon 11 - Fri 15 September 2023 Kirchberg, Luxembourg
Room InformationNo extra information available
Program

You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 12 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

10:30 - 12:00
Open Source and Software Ecosystems 1Research Papers / Tool Demonstrations at Room E
Chair(s): Denys Poshyvanyk William & Mary
10:30
12m
Talk
An Empirical Study of Malicious Code In PyPI Ecosystem
Research Papers
Wenbo Guo School of Cyber Science and Engineering, Sichuan University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Cheng Huang School of Cyber Science and Engineering, Sichuan University, Yong Fang School of Cyber Science and Engineering, Sichuan University, Yang Liu Nanyang Technological University
Pre-print
10:42
12m
Talk
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem
Research Papers
Weiwei Xu Peking University, Hao He Carnegie Mellon University, Kai Gao University of Science and Technology Beijing, Minghui Zhou Peking University
Pre-print
10:54
12m
Talk
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem
Research Papers
Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Sen Chen Tianjin University, Zhengzi Xu Nanyang Technological University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University
11:06
12m
Talk
Bus Factor Explorer
Tool Demonstrations
Egor Klimov JetBrains Research, Muhammad Umair Ahmed Bilkent University, Nikolai Sviridov JetBrains Research, Pouria Derakhshanfar JetBrains Research, Eray Tüzün Bilkent University, Vladimir Kovalenko JetBrains Research
Media Attached
11:30
12m
Talk
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery
Research Papers
Chenyuan Zhang Xiamen University, Yanlin Wang Sun Yat-sen University, Zhao Wei Tencent, Yong Xu Tencent, Juhong Wang Tencent, Hui Li Xiamen University, Rongrong Ji Xiamen University
Pre-print Media Attached
11:42
12m
Talk
Fork Entropy: Assessing the Diversity of Open Source Software Projects' ForksRecorded talk
Research Papers
Liang Wang Nanjing University, Zhiwen Zheng State Key Laboratory for Novel Software Technology, Nanjing University, Xiangchen Wu State Key Laboratory for Novel Software Technology, Nanjing University, Baihui Sang State Key Laboratory for Novel Software Technology, Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University
Media Attached
13:30 - 15:00
Vulnerability and Security 1Research Papers / Journal-first Papers at Room E
Chair(s): Fatemeh Hendijani Fard University of British Columbia
13:30
12m
Talk
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering
Research Papers
Wentao Liang Institute of Software, Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences
File Attached
13:42
12m
Talk
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value FlowsACM Distinguished Paper
Research Papers
Yujiang Gui UNSW Sydney, Dongjie He UNSW, Jingling Xue UNSW
Pre-print File Attached
13:54
12m
Talk
Learning to Locate and Describe Vulnerabilities
Research Papers
Jian Zhang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xu Wang Beihang University, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University
14:06
12m
Talk
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Research Papers
Xin-Cheng Wen Harbin Institute of Technology, Xinchen Wang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Yang Liu Nanyang Technological University, Zhaoquan Gu Harbin Institute of Technology
14:18
12m
Talk
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study
Journal-first Papers
Emanuele Iannone University of Salerno, Roberta Guadagni University of Salerno, Filomena Ferrucci University of Salerno, Andrea De Lucia University of Salerno, Fabio Palomba University of Salerno
Link to publication DOI Pre-print Media Attached
14:30
12m
Talk
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices
Research Papers
Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Media Attached File Attached
15:30 - 17:00
Testing Tools and TechniquesNIER Track / Research Papers / Tool Demonstrations at Room E
Chair(s): Tim Menzies North Carolina State University
15:30
12m
Talk
Modeling Programmer Attention as Scanpath Prediction
NIER Track
Aakash Bansal University of Notre Dame, Chia-Yi Su University of Notre Dame, Zachary Karas Vanderbilt University, Yifan Zhang Vanderbilt University, Yu Huang Vanderbilt University, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame
15:42
12m
Talk
On Automated Assistants for Software Development: The Role of LLMs
NIER Track
Mira Leung University of British Columbia, Gail Murphy University of British Columbia
Pre-print File Attached
15:54
12m
Talk
SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts
Tool Demonstrations
Monika di Angelo TU Wien, Thomas Durieux TU Delft, João F. Ferreira INESC-ID and IST, University of Lisbon, Gernot Salzer TU Wien
Pre-print File Attached
16:06
12m
Talk
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection
Research Papers
Yintong Huo The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Pinjia He Chinese University of Hong Kong, Shenzhen, Zifan Xie Huazhong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong
Pre-print
16:18
12m
Talk
Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers
Research Papers
Yi Liu Nanyang Technological University, Yuekang Li University of New South Wales, Gelei Deng Nanyang Technological University, Felix Juefei-Xu Meta AI, Yao Du University of California, Irvine, Cen Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lei Ma University of Alberta, Yang Liu Nanyang Technological University, Yuekang Li University of New South Wales
16:30
12m
Talk
Software Entity Recognition with Noise-Robust LearningRecorded talk
Research Papers
Tai Nguyen University of Pennsylvania, Yifeng Di Purdue University, Joohan Lee University of Southern California, Muhao Chen University of Southern California, Tianyi Zhang Purdue University
Pre-print Media Attached File Attached

Wed 13 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

10:30 - 12:00
Web Development 2Industry Showcase (Papers) / Research Papers / NIER Track / Journal-first Papers at Room E
Chair(s): Hadar Ziv University of California, Irvine
10:30
12m
Talk
Metamorphic Testing for Web System Security
Journal-first Papers
Nazanin Bayati Chaleshtari University of Ottawa, Fabrizio Pastore University of Luxembourg, Arda Goknil SINTEF Digital, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication DOI Pre-print
10:42
12m
Talk
JavaScript Dead Code Identification, Elimination, and Empirical Assessment
Journal-first Papers
Ivano Malavolta Vrije Universiteit Amsterdam, Kishan Nirghin Vrije Universiteit Amsterdam, Gian Luca Scoccia Gran Sasso Science Institute, Simone Romano University of Salerno, Salvatore Lombardi University of Basilicata, Giuseppe Scanniello University of Salerno, Patricia Lago Vrije Universiteit Amsterdam
File Attached
10:54
12m
Talk
PTdetector: An Automated JavaScript Front-end Library Detector
Research Papers
Xinyue Liu University at Buffalo, SUNY, Lukasz Ziarek University at Buffalo
Link to publication
11:06
12m
Talk
Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing
Research Papers
Shuyao Jiang The Chinese University of Hong Kong, Ruiying Zeng Fudan University, Zihao Rao Fudan University, Jiazhen Gu Chinese University of Hong Kong, Yangfan Zhou Fudan University, Michael Lyu The Chinese University of Hong Kong
Pre-print
11:18
12m
Talk
Dramatically Improving Design Reviews at Google
Industry Showcase (Papers)
Link to publication
11:30
12m
Talk
Characterizing Flaky Tests in Node.js ApplicationsRecorded talk
NIER Track
Xiaoning Chang Institute of Software, Chinese Academy of Sciences, Zheheng Liang Joint Laboratory on Cyberspace Security of China Southern Power Grid, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Zhenyue Long , Lei Cui Joint Laboratory on Cyberspace Security of China Southern Power Grid, Tao Huang Institute of Software Chinese Academy of Sciences
Media Attached
13:30 - 15:00
Code Change AnalysisResearch Papers / Journal-first Papers at Room E
Chair(s): Vladimir Kovalenko JetBrains Research
13:30
12m
Talk
Code Difference Guided Adversarial Example Generation for Deep Code Models
Research Papers
Zhao Tian Tianjin University, Junjie Chen Tianjin University, Zhi Jin Peking University
Pre-print File Attached
13:42
12m
Talk
DiffSearch: A Scalable and Precise Search Engine for Code Changes
Journal-first Papers
Luca Di Grazia University of Stuttgart, Paul Bredl University of Stuttgart, Michael Pradel University of Stuttgart
Link to publication DOI Pre-print File Attached
13:54
12m
Talk
ZC3 Zero-Shot Cross-Language Code Clone Detection
Research Papers
Jia Li , Chongyang Tao Peking University, Zhi Jin Peking University, Fang Liu Beihang University, Jia Li Peking University, Ge Li Peking University
Pre-print File Attached
14:06
12m
Talk
Persisting and Reusing Results of Static Program Analyses on a Large Scale
Research Papers
Johannes Düsing TU Dortmund University, Ben Hermann TU Dortmund, Ben Hermann TU Dortmund
Pre-print
14:18
12m
Talk
Optimizing Continuous Development By Detecting and Preventing Unnecessary Content Generation
Research Papers
Talank Baral George Mason University, Shanto Rahman The University of Texas at Austin, Bala Naren Chanumolu George Mason University, Basak Balci Ozyegin University, Tuna Tuncer Ozyegin University, August Shi The University of Texas at Austin, Wing Lam George Mason University
Pre-print Media Attached
14:30
12m
Talk
iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping AlgorithmRecorded talk
Research Papers
Neng Zhang School of Software Engineering, Sun Yat-sen University, ChenQinde School of Software Engineering, Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Ying Zou Queen's University, Kingston, Ontario
Pre-print Media Attached
15:30 - 17:00
Autonomous Systems and AgentsResearch Papers / NIER Track / Journal-first Papers / Tool Demonstrations at Room E
Chair(s): Alessio Gambi IMC University of Applied Sciences Krems
15:30
12m
Talk
TEASER: Simulation-based CAN Bus Regression Testing for Self-driving Cars Software
Tool Demonstrations
Christian Birchler Zurich University of Applied Sciences, Cyrill Rohrbach University of Bern, Switzerland, Hyeongkyun Kim University of Zurich, Switzerland, Alessio Gambi IMC University of Applied Sciences Krems, Tianhai Liu aicas GmbH, Germany, Jens Horneber aicas GmbH, Germany, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences
Pre-print File Attached
15:42
12m
Talk
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms
Journal-first Papers
Andrea Di Sorbo University of Sannio, Fiorella Zampetti University of Sannio, Italy, Corrado A. Visaggio University of Sannio, Italy, Massimiliano Di Penta University of Sannio, Italy, Sebastiano Panichella Zurich University of Applied Sciences
File Attached
15:54
12m
Talk
Towards a Formal Framework for Normative Requirements Elicitation
NIER Track
Nick Feng University of Toronto, Lina Marsso University of Toronto, Sinem Getir Yaman University of York, UK, Beverley Townsend University of York, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Marsha Chechik University of Toronto
File Attached
16:06
12m
Talk
Detecting Smart Home Automation Application Interferences with Domain KnowledgeACM Distinguished Paper
Research Papers
Tao Wang Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Liwei Liu Institute of Software at Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print File Attached
16:18
12m
Talk
CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues
Tool Demonstrations
Xiufeng Xu Nanyang Technological University, Chenguang Zhu Meta, Yi Li Nanyang Technological University
Pre-print Media Attached File Attached
16:30
12m
Talk
A Comprehensive Study on Code Clones in Automated Driving SoftwareRecorded talk
Research Papers
Ran Mo Central China Normal University, Yingjie Jiang Central China Normal University, Wenjing Zhan Central China Normal University, Dongyu Wang Central China Normal University, Zengyang Li Central China Normal University
Pre-print Media Attached File Attached

Thu 14 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

10:30 - 12:00
Program Verification 2Research Papers / Tool Demonstrations / NIER Track at Room E
Chair(s): Martin Kellogg New Jersey Institute of Technology
10:30
12m
Talk
Expediting Neural Network Verification via Network Reduction
Research Papers
Yuyi Zhong National University of Singapore, Singapore, Ruiwei Wang School of Computing, National University of Singapore, Siau-Cheng Khoo National University of Singapore
Pre-print File Attached
10:42
12m
Talk
SMT Solver Validation Empowered by Large Pre-trained Language Models
Research Papers
Maolin Sun Nanjing University, Yibiao Yang Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Yuming Zhou Nanjing University
Pre-print File Attached
10:54
12m
Talk
LIV: Invariant Validation Using Straight-Line Programs
Tool Demonstrations
Martin Spiessl LMU Munich, Dirk Beyer LMU Munich
Pre-print Media Attached File Attached
11:06
12m
Talk
CEGAR-PT: A Tool for Abstraction by Program Transformation
Tool Demonstrations
Dirk Beyer LMU Munich, Marian Lingsch-Rosenfeld LMU Munich, Martin Spiessl LMU Munich
Pre-print Media Attached File Attached
11:18
12m
Talk
Symbolic Verification of Fuzzy Logic ModelsRecorded talk
NIER Track
Siang Zhao School of Computer, National University of Defense Technology, China, Zhongyang Li School of Computer, National University of Defense Technology, China, Zhenbang Chen National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China
Pre-print Media Attached
11:30
12m
Talk
HOBAT: Batch Verification for Homogeneous Structural Neural NetworksRecorded talk
Research Papers
Jingyang Li Shanghai Jiao Tong University, Guoqiang Li Shanghai Jiao Tong University
Media Attached File Attached
13:30 - 15:00
DebuggingResearch Papers / Industry Showcase (Papers) at Room E
Chair(s): Carol Hanna University College London
13:30
12m
Talk
Coding and Debugging by Separating Secret Code toward Secure Remote Development
Industry Showcase (Papers)
Media Attached File Attached
13:42
12m
Talk
Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count
Research Papers
Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Hao Zhang Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print
13:54
12m
Research paper
PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis
Research Papers
Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Shuai Wang Hong Kong University of Science and Technology
Pre-print
14:06
12m
Talk
The MAP metric in Information Retrieval Fault Localization
Research Papers
Thomas Hirsch Graz University of Technology, Birgit Hofer Graz University of Technology
Media Attached File Attached
14:18
12m
Talk
Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial ExtrapolationRecorded talk
Research Papers
Zuoyan Zhang Information Engineering University, Bei Zhou Information Engineering University, Jiangwei Hao Information Engineering University, Hongru Yang Information Engineering University, Mengqi Cui Information Engineering University, Yuchang Zhou Information Engineering University, Guanghui Song Information Engineering University, Fei Li Information Engineering University, Jinchen Xu Information Engineering University, Jie Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing
Media Attached File Attached
14:30
12m
Talk
Information Retrieval-based Fault Localization for Concurrent ProgramsRecorded talk
Research Papers
Shuai Shao University of Connecticut, Tingting Yu University of Connecticut
Pre-print Media Attached
15:30 - 17:00
Vulnerability and Security 2Journal-first Papers / Industry Showcase (Papers) / Research Papers at Room E
Chair(s): Ben Hermann TU Dortmund
15:30
12m
Talk
An Industrial Practice for Securing Android Apps in the Banking Domain
Industry Showcase (Papers)
Vikas K. Malviya Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Yan Naing Tun Singapore Management University, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University
File Attached
15:42
12m
Talk
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation
Journal-first Papers
Wuqi Zhang The Hong Kong University of Science and Technology, Lili Wei McGill University, Shing-Chi Cheung Hong Kong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shuqing Li The Chinese University of Hong Kong, Lu Liu The Hong Kong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong
Link to publication DOI Pre-print File Attached
15:54
12m
Talk
Software Engineering Using Autonomous Agents: Are We There Yet?Recorded talk
Industry Showcase (Papers)
Samdyuti Suri Accenture Tech Labs, Sankar Narayan Das Accenture Tech Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India
Media Attached
16:06
12m
Talk
DeFiWarder: Protecting DeFi Apps from Token Leaking VulnerabilitiesRecorded talk
Research Papers
Jianzhong Su Sun Yat-sen University, Xingwei Lin Ant Group, Zhiyuan Fang Sun Yat-sen University, Zhirong Zhu Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Wei Lv Ant Group, Jiashui Wang Zhejiang University
Media Attached
16:18
12m
Talk
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual DeviceRecorded talk
Research Papers
Yuwei Liu Institute of Software, Chinese Academy of Sciences, Siqi Chen Shanghai Jiao Tong University, Yuchong Xie Shanghai Jiao Tong University, Yanhao Wang Qi An Xin Group Corp., Libo Chen Shanghai Jiao Tong University, Bin Wang Beijing Institute of Computer Technology and Applications, Yingming Zeng Beijing Institute of Computer Technology and Applications, Zhi Xue Shanghai Jiao Tong University, Purui Su Institute of Software/CAS China
Media Attached File Attached
16:30
12m
Talk
Smart Prompt Advisor: Multi-objective Prompt Framework for Consistency and Best PracticesRecorded talk
Industry Showcase (Papers)
Kanchanjot Kaur Phokela Accenture, Samarth Sikand Accenture Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India
Media Attached

Tue 12 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

Room10:0015304511:0015304512:0015304513:0015304514:0015304515:0015304516:00153045
Room E

Wed 13 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

Room10:0015304511:0015304512:0015304513:0015304514:0015304515:0015304516:00153045
Room E

Thu 14 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

Room10:0015304511:0015304512:0015304513:0015304514:0015304515:0015304516:00153045
Room E