ICPC 2023
Mon 15 - Tue 16 May 2023 Melbourne, Australia
co-located with ICSE 2023
VenueMelbourne Convention Exhibition Centre | MCEC
Room nameMeeting Room 106
Floor1
Room number106
Room InformationNo extra information available
Program

You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 15 May

Displayed time zone: Hobart change

09:00 - 10:30
Conference Introductions / MIP Talk / Documentation and Stack OverflowDiscussion / Research / Opening / Journal First / MIP Talk at Meeting Room 106
Chair(s): Christoph Treude University of Melbourne, Akhila Sri Manasa Venigalla IIT Tirupati
09:00
15m
Day opening
Conference Opening
Opening
G: Christoph Treude University of Melbourne, P: Raula Gaikovina Kula Nara Institute of Science and Technology, P: Bonita Sharif University of Nebraska-Lincoln, USA
09:15
40m
Talk
MIP Talk on ICPC 2013 Paper titled "Automatic generation of natural language summaries for Java classes"
MIP Talk
Laura Moreno CQSE America, Jairo Aponte Universidad Nacional de Colombia, Giriprasad Sridhara IBM Research Labs, Andrian Marcus University of Texas at Dallas, Lori Pollock University of Delaware, USA, K. Vijay-Shanker
09:55
9m
Full-paper
QTC4SO: Automatic Question Title Completion for Stack Overflow
Research
Yanlin Zhou School of Information Science and Technology, Nantong University, ShaoYu Yang School of Information Science and Technology, Nantong University, Xiang Chen Nantong University, Zichen Zhang School of Information Science and Technology, Nantong University, Jiahua Pei School of Information Science and Technology, Nantong University
Pre-print
10:04
9m
Talk
A Study of Update Request Comments in Stack Overflow Answer Posts
Journal First
Mohammad Sadegh Sheikhaei School of Computing, Queen's University, Yuan Tian Queens University, Kingston, Canada, Shaowei Wang University of Manitoba
Link to publication
10:13
9m
Talk
Machine Translation-based Fine-grained Comments Generation for Solidity Smart Contracts
Journal First
Chaochen Shi Deakin University, Yong Xiang Deakin University, Jiangshan Yu Monash University, Keshav Sood Deakin University, Longxiang Gao Qilu University of Technology
10:22
8m
Panel
Discussion 1
Discussion

11:00 - 12:30
Keynote / Documentation and Stack OverflowTool Demonstration / Research / ICPC Keynotes / Replications and Negative Results (RENE) / Discussion at Meeting Room 106
Chair(s): Bonita Sharif University of Nebraska-Lincoln, USA, Raula Gaikovina Kula Nara Institute of Science and Technology, Chanchal K. Roy University of Saskatchewan
11:00
45m
Keynote
April Wensel: Applications of Emotional Intelligence in Program Comprehension
ICPC Keynotes

11:45
9m
Full-paper
APIContext2Com: Code Comment Generation by Incorporating Pre-Defined API Documentation
Research
Ramin Shahbazi , Fatemeh Hendijani Fard University of British Columbia
Pre-print
11:54
5m
Short-paper
PyVerDetector: A Chrome Extension Detecting the Python Version of Stack Overflow Code Snippets
Tool Demonstration
SHIYU YANG , Tetsuya Kanda Osaka University, Davide Pizzolotto Osaka University, Daniel M. German University of Victoria, Yoshiki Higo Osaka University
11:59
5m
Short-paper
RCGraph - A Tool to Integrate Readme and Commits through Temporal Knowledge Graphs
Tool Demonstration
Akhila Sri Manasa Venigalla IIT Tirupati, Mir Sameed Ali Indian Institute of Technology Tirupati, Nikhil Manjunath Indian Institute of Technology Tirupati, Sridhar Chimalakonda IIT Tirupati
12:04
9m
Full-paper
Performance Prediction From Source Code Is Task and Domain Specific
Replications and Negative Results (RENE)
Markus Böck TU Wien, Sarra Habchi Ubisoft, Mathieu Nayrolles Ubisoft Montreal, Jürgen Cito TU Wien
12:13
17m
Panel
Discussion 2
Discussion

13:45 - 15:15
Human Aspects, Testing and LogsTool Demonstration / Discussion / Journal First / Early Research Achievements (ERA) / Research at Meeting Room 106
Chair(s): Michael J. Decker Bowling Green State University
13:45
9m
Full-paper
Understanding initial API comprehension
Research
Ava Heinonen Aalto University, Fabian Fagerholm Aalto University
13:54
5m
Short-paper
Evaluating a Language Workbench: from Working Memory Capacity to Comprehension to Acceptance
Early Research Achievements (ERA)
Giovanna Broccia ISTI-CNR, FMT Lab, Alessio Ferrari CNR-ISTI, Maurice ter Beek ISTI-CNR, Pisa, Italy, Walter Cazzola Università degli Studi di Milano, Luca Favali University of Milan, Francesco Bertolotti
13:59
5m
Short-paper
Conversation Disentanglement As-a-Service
Tool Demonstration
Edoardo Riggio Software Institute - USI, Lugano, Marco Raglianti Software Institute - USI, Lugano, Michele Lanza Software Institute - USI, Lugano
14:04
5m
Short-paper
Slicito: Using Computational Notebooks for Program Comprehension
Tool Demonstration
Robert Husak , Jan Kofroň Charles University, Filip Zavoral
14:09
9m
Talk
Selection of human evaluators for design smell detection using dragonfly optimization algorithm: An empirical study
Journal First
Sultan M. Al Khatib Department of Software Engineering, Prince Abdullah bin Ghazi Faculty of Information and Communication Technology, Al-Balqa Applied University (BAU), Al-Salt, 19117, Jordan, Khalid Alkharabsheh Department of Software Engineering, Prince Abdullah bin Ghazi Faculty of Information and Communication Technology, Al-Balqa Applied University (BAU), Al-Salt, 19117, Jordan, Sadi Alawadi Center for Applied Intelligent Systems Research, School of Information Technology, Halmstad University, 30118, Halmstad, Sweden
14:18
5m
Short-paper
SYN: Ultra-Scale Software Evolution Comprehension
Tool Demonstration
Gianlorenzo Occhipinti Software Institute, USI - Lugano, Switzerland, Csaba Nagy Software Institute - USI, Lugano, Roberto Minelli Software Institute - USI, Lugano, Michele Lanza Software Institute - USI, Lugano
14:23
5m
Short-paper
Microusity: A testing tool for Backends for Frontends (BFF) Microservice Systems
Tool Demonstration
Pattarakrit Rattanukul Mahidol University, Chansida Makaranond Mahidol University, Pumipat Watanakulcharus Mahidol University, Chaiyong Ragkhitwetsagul Mahidol University, Thailand, Tanapol Nearunchorn Lineman Wongnai, Vasaka Visoottiviseth Mahidol University, Morakot Choetkiertikul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University
14:28
5m
Short-paper
WebEV: A Dataset on the Behavior of Testers for Web Application End to End Testing
Early Research Achievements (ERA)
Fuad Mridha University of Dhaka, Kazi Sakib Institute of Information Technology, University of Dhaka
14:33
5m
Short-paper
Towards a Classification of Log Parsing Errors
Early Research Achievements (ERA)
Issam Sedki Concordia University, Wahab Hamou-Lhadj Concordia University, Montreal, Canada, Otmane Ait-Mohamed Concordia University, Naser Ezzati Jivan
14:38
37m
Panel
Discussion 3
Discussion

15:45 - 17:15
Code Summarization and VisualizationReplications and Negative Results (RENE) / Discussion / Research at Meeting Room 106
Chair(s): Banani Roy University of Saskatchewan, Akhila Sri Manasa Venigalla IIT Tirupati
15:45
9m
Full-paper
An Extensive Study of the Structure Features in Transformer-based Code Semantic Summarization
Research
Kang Yang , Xinjun Mao National University of Defense Technology, Shangwen Wang National University of Defense Technology, Yihao Qin National University of Defense Technology, Yao Lu National University of Defense Technology, Tanghaoran Zhang , Kamal Al-Sabahi University Of Technology and Applied Sciences-ibra
Pre-print
15:54
9m
Full-paper
Label Smoothing Improves Neural Source Code Summarization
Research
Sakib Haque University of Notre Dame, Aakash Bansal University of Notre Dame, Collin McMillan University of Notre Dame
Pre-print
16:03
9m
Full-paper
Interpretation-based Code Summarization
Research
Mingyang Geng National University of Defense Technology, Shangwen Wang National University of Defense Technology, Dezun Dong NUDT, Haotian Wang National University of Defense Technolog, Shaomeng Cao Peng Cheng Laboratory, Kechi Zhang Peking University, China, Zhi Jin Peking University
Pre-print
16:12
9m
Full-paper
Naturalness in Source Code Summarization. How Significant is it?
Replications and Negative Results (RENE)
Claudio Ferretti University of Milano-Bicocca, Martina Saletta University of Milano-Bicocca
16:21
9m
Full-paper
Comparing 2D and Augmented Reality Visualizations for Microservice System Understandability: A Controlled Experiment
Research
Amr Elsayed Baylor University, Tomas Cerny Baylor University, Davide Taibi Tampere University , Sira Vegas Universidad Politecnica de Madrid
DOI Pre-print
16:30
9m
Full-paper
ChameleonIDE: Untangling Type Errors Through Interactive Visualization and Exploration
Research
Shuai Fu Monash University, Tim Dwyer Monash University, Peter J. Stuckey Monash University, Jackson Wain Monash University, Jesse Linossier Monash University
Pre-print
16:39
36m
Panel
Discussion 4
Discussion

Tue 16 May

Displayed time zone: Hobart change

09:00 - 10:30
Keynote / Code AnalysisDiscussion / Tool Demonstration / Research / Early Research Achievements (ERA) / ICPC Keynotes at Meeting Room 106
Chair(s): Christoph Treude University of Melbourne, Nicolás Cardozo Universidad de los Andes, Raula Gaikovina Kula Nara Institute of Science and Technology, Chaiyong Rakhitwetsagul Mahidol University, Thailand
09:00
45m
Keynote
Kobi Leins: Guidance on more than just standing upright to create safe models, software and use of data
ICPC Keynotes

09:45
9m
Full-paper
Implant Global and Local Hierarchy Information to Sequence based Code Representation Models
Research
Kechi Zhang Peking University, China, Zhuo Li , Zhi Jin Peking University, Ge Li Peking University
Pre-print
09:54
9m
Full-paper
Pathways to Leverage Transcompiler based Data Augmentation for Cross-Language Clone Detection
Research
Subroto Nag Pinku University of Saskatchewan, Debajyoti Mondal University of Saskatchewan, Chanchal K. Roy University of Saskatchewan
Pre-print
10:03
5m
Short-paper
Investigating the Generalizability of Deep Learning-based Clone Detectors
Early Research Achievements (ERA)
Eunjong Choi Kyoto Institute of Technology, Norihiro Fuke Osaka University, Yuji Fujiwara Osaka University, Norihiro Yoshida Ritsumeikan University, Katsuro Inoue Nanzan University
10:08
5m
Short-paper
UnityLint: A Bad Smell Detector for Unity
Tool Demonstration
Matteo Bosco University of Sannio, Italy, Pasquale Cavoto University of Sannio, Italy, Augusto Ungolo University of Sannio, Italy, Biruk Asmare Muse Polytechnique Montréal, Foutse Khomh Polytechnique Montréal, Vittoria Nardone , Massimiliano Di Penta University of Sannio, Italy
Pre-print
10:13
17m
Panel
Discussion 5
Discussion

11:00 - 12:30
Empirical Studies and RecommendationsResearch / Discussion / Early Research Achievements (ERA) / Journal First at Meeting Room 106
Chair(s): Issam Sedki Concordia University, Vittoria Nardone
11:00
9m
Full-paper
REMS: Recommending Extract Method Refactoring Opportunities via Multi-view Representation of Code Property Graph
Research
Di Cui , Qiangqiang Wang Xidian University, Siqi Wang , Jianlei Chi , Jianan Li Xidian University, Lu Wang Xidian University, Qingshan Li Xidian University
11:09
9m
Full-paper
Automating Method Naming with Context-Aware Prompt-Tuning
Research
Jie Zhu Institute of Software, Chinese Academy of Sciences;University of Chinese Academy of Sciences, Lingwei Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Li Yang Institute of Software at Chinese Academy of Sciences, Xiaoxiao Ma Institute of Software, Chinese Academy of Sciences, Chun Zuo Sinosoft
Pre-print
11:18
9m
Full-paper
Generation-based Code Review Automation: How Far Are We?
Research
Xin Zhou Singapore Management University, Singapore, Kisub Kim Singapore Management University, Bowen Xu North Carolina State University, DongGyun Han Royal Holloway, University of London, Junda He Singapore Management University, David Lo Singapore Management University
Pre-print
11:27
9m
Full-paper
Reanalysis of Empirical Data on Java Local Variables with Narrow and Broad Scope
Research
Dror Feitelson Hebrew University
Pre-print
11:36
9m
Talk
Predicting vulnerability inducing function versions using node embeddings and graph neural networks
Journal First
ecem mine özyedierler Istanbul Technical University, Ayse Tosun Istanbul Technical University, Sefa Eren Sahin Faculty of Computer and Informatics Engineering, Istanbul Technical University
11:45
5m
Short-paper
Properly Offer Options to Improve the Practicality of Software Document Completion Tools
Early Research Achievements (ERA)
Zhipeng Cai School of Computer Science, Wuhan University, Songqiang Chen School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China
Media Attached
11:50
40m
Panel
Discussion 6
Discussion

13:45 - 15:15
Programming Languages, Types, and ComplexityDiscussion / Research / Replications and Negative Results (RENE) / Journal First at Meeting Room 106
Chair(s): Vittoria Nardone
13:45
9m
Full-paper
How Well Static Type Checkers Work with Gradual Typing? A Case Study on Python
Research
Wenjie Xu Nanjing University, Lin Chen Nanjing University, Chenghao Su Nanjing University, Yimeng Guo Nanjing University, Yanhui Li Nanjing University, Yuming Zhou Nanjing University, Baowen Xu Nanjing University
13:54
9m
Full-paper
Too Simple? Notions of Task Complexity used in Maintenance-based Studies of Programming Tools
Research
Patrick Rein University of Potsdam; Hasso Plattner Institute, Tom Beckmann Hasso Plattner Institute, Eva Krebs Hasso Plattner Institute (HPI), University of Potsdam, Germany, Toni Mattis University of Potsdam; Hasso Plattner Institute, Robert Hirschfeld University of Potsdam; Hasso Plattner Institute
14:03
9m
Full-paper
Path Complexity Predicts Code Comprehension Effort
Research
Sofiane Dissem Harvey Mudd College, Eli Pregerson Harvey Mudd College, Adi Bhargava Harvey Mudd College, Josh Cordova Harvey Mudd College, Lucas Bang Harvey Mudd College
14:12
5m
Short-paper
Revisiting Deep Learning for Variable Type Recovery
Replications and Negative Results (RENE)
Kevin Cao Vanderbilt University, Kevin Leach Vanderbilt University
Pre-print
14:17
9m
Talk
Programming language implementations for context-oriented self-adaptive systems
Journal First
Nicolás Cardozo Universidad de los Andes, Kim Mens Université catholique de Louvain, ICTEAM institute, Belgium
Link to publication DOI Media Attached
14:26
9m
Full-paper
Improving Code Search with Multi-Modal Momentum Contrastive Learning
Research
Zejian Shi Fudan University, Yun Xiong Fudan University, Yao Zhang Fudan University, Zhijie Jiang National University of Defense Technology, Jinjing Zhao National Key Laboratory of Science and Technology on Information System Security, Lei Wang National University of Defense Technology, Shanshan Li National University of Defense Technology
Pre-print
14:35
9m
Full-paper
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries
Replications and Negative Results (RENE)
Jason Kim Georgia Tech, Daniel Genkin Georgia Tech, Kevin Leach Vanderbilt University
Pre-print
14:44
31m
Panel
Discussion 7
Discussion

15:45 - 17:15
Bugs and Machine Learning / Steering Committee Meeting / ClosingResearch / Journal First / Closing at Meeting Room 106
Chair(s): Banani Roy University of Saskatchewan
15:45
9m
Full-paper
Mitigating the Effect of Class Imbalance in Fault Localization Using Context-aware Generative Adversarial Network
Research
Yan Lei Chongqing University, Tiantian Wen , Huan Xie , Lingfeng Fu Chongqing University, Chunyan Liu Chongqing University, Lei Xu Haier Smart Home Co., Ltd., Hongxia Sun Qingdao Haidacheng Purchasing Service Co., Ltd.
Pre-print Media Attached
15:54
9m
Full-paper
Still Confusing for Bug-Component Triaging? Deep Feature Learning and Ensemble Setting to Rescue
Research
Yanqi Su Australian National University, Zheming Han , Zhipeng Gao Shanghai Institute for Advanced Study of Zhejiang University, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61
16:03
9m
Full-paper
Understanding Bugs in Multi-Language Deep Learning Frameworks
Research
Zengyang Li Central China Normal University, Sicheng Wang Central China Normal University, Wenshuo Wang , Peng Liang Wuhan University, China, Ran Mo Central China Normal University, Bing Li Wuhan University
Link to publication Pre-print Media Attached
16:12
9m
Full-paper
FVA: Assessing Function-Level Vulnerability by Integrating Flow-Sensitive Structure and Code Statement Semantic
Research
Chao Ni Zhejiang University, Liyu Shen Zhejiang University, Wei Wang Zhejiang University, Xiang Chen Nantong University, Xin Yin The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Lexiao Zhang School of Software Technology, Zhejiang University
16:21
9m
Talk
Event-Aware Precise Dynamic Slicing for Automatic Debugging of Android Applications
Journal First
Hsu Myat Win University of Technology Sydney (UTS), Shin Hwei Tan Southern University of Science and Technology, Yulei Sui University of New South Wales, Sydney
Link to publication
16:30
15m
Panel
Discussion 8
Closing

16:45
30m
Meeting
Steering Committee Meeting and Closing
Closing
Alexander Serebrenik Eindhoven University of Technology, Igor Steinmacher Northern Arizona University

Wed 17 May

Displayed time zone: Hobart change

11:00 - 12:30
11:00
15m
Talk
SmartMark: Software Watermarking Scheme for Smart Contracts
ICSE Technical Track
Taeyoung Kim Sungkyunkwan University, Yunhee Jang Sungkyunkwan University, Chanjong Lee Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, hyoungshick kim Sungkyunkwan University
11:15
15m
Talk
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum
ICSE Technical Track
Zibin Zheng School of Software Engineering, Sun Yat-sen University, Neng Zhang School of Software Engineering, Sun Yat-sen University, Jianzhong Su Sun Yat-sen University, Zhijie Zhong School of Software Engineering, Sun Yat-sen University, Mingxi Ye Sun Yat-sen University, Jiachi Chen School of Software Engineering, Sun Yat-sen University
Pre-print
11:30
15m
Talk
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts
ICSE Technical Track
Peilin Zheng Sun Yat-sen University, Xiapu Luo The Hong Kong Polytechnic University, Zibin Zheng School of Software Engineering, Sun Yat-sen University
Pre-print File Attached
11:45
15m
Talk
DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications
ICSE SEIP - Software Engineering in Practice
Jianfei Zhou University of Electronic Science and Technology of China, Jiang Tianxing , Haijun Wang Ant Group, Meng Wu Ant Group, Ting Chen University of Electronic Science and Technology of China
12:00
15m
Talk
Evolutionary Approach for Concurrency Testing of Ripple Blockchain Consensus Algorithm
ICSE SEIP - Software Engineering in Practice
Martijn van Meerten Delft University of Technology, Burcu Kulahcioglu Ozkan Delft University of Technology, Annibale Panichella Delft University of Technology
12:15
7m
Talk
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts
ICSE DEMO - Demonstrations
Jiashuo Zhang Peking University, China, Yue Li Peking University, Jianbo Gao Peking University, Zhi Guan Peking University, Zhong Chen
12:22
7m
Talk
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts
ICSE Journal-First Papers
Maha Ayub Information Technology University (ITU) Lahore, Pakistan, Tania Saleem Information Technology University (ITU) Lahore, Pakistan, Muhammad Umar Janjua Information Technology University (ITU) Lahore, Pakistan, Talha Ahmed Information Technology University (ITU) Lahore, Pakistan
13:45 - 15:15
13:45
15m
Talk
RepresentThemAll: A Universal Learning Representation of Bug Reports
ICSE Technical Track
Sen Fang Macau University of Science and Technology, Tao Zhang Macau University of Science and Technology, Youshuai Tan Macau University of Science and Technology, He Jiang Dalian University of Technology, Xin Xia Huawei, Xiaobing Sun Yangzhou University
14:00
15m
Talk
Demystifying Exploitable Bugs in Smart Contracts
ICSE Technical Track
Zhuo Zhang Purdue University, Brian Zhang Harrison High School (Tippecanoe), Wen Xu PNM Labs, Zhiqiang Lin The Ohio State University
Pre-print
14:15
15m
Talk
Understanding and Detecting On-the-Fly Configuration BugsDistinguished Paper Award
ICSE Technical Track
Teng Wang National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Si Zheng National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Erci Xu National University of Defense Technology, Shaoliang Peng Hunan University, Liao Xiangke National University of Defense Technology
Pre-print
14:30
15m
Talk
Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation
ICSE Technical Track
Parvez Mahbub Dalhousie University, Ohiduzzaman Shuvo Dalhousie University, Masud Rahman Dalhousie University
Pre-print Media Attached
14:45
15m
Talk
Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services
ICSE SEIP - Software Engineering in Practice
Zexin Zhong Ant Group; University of Technology Sydney, Jiangchao Liu Ant Group, Diyu Wu Ant Group, Peng Di Ant Group, Yulei Sui University of New South Wales, Sydney, Alex X. Liu Ant Group, John C.S. Lui The Chinese University of Hong Kong
15:00
7m
Talk
Exploring the relationship between performance metrics and cost saving potential of defect prediction models
ICSE Journal-First Papers
Steffen Tunkel None, Steffen Herbold University of Passau
15:07
7m
Talk
A Machine and Deep Learning analysis among SonarQube rules, Product, and Process Metrics for Faults Prediction
ICSE Journal-First Papers
Francesco Lomio Constructor Institute Schaffhausen, Sergio Moreschini Tampere University, Valentina Lenarduzzi University of Oulu
15:45 - 17:15
Introductory and undergraduate educationICSE SEET - Software Engineering Education and Training at Meeting Room 106
Chair(s): Rafael Prikladnicki School of Technology at PUCRS University
15:45
15m
Talk
Are you cloud-certified? An Experience Report to Prepare Computing Undergraduates for Cloud Certification with Experiential Learning
ICSE SEET - Software Engineering Education and Training
Eng Lieh Ouh Singapore Management University, Benjamin Kok Siew Gan Singapore Management University
16:00
15m
Talk
Understanding Students' Knowledge of Programming Patterns Through Code Editing and Revising Tasks
ICSE SEET - Software Engineering Education and Training
Sara Nurollahian University of Utah, Anna Rafferty Carleton College, Eliane Wiese University of Utah
16:15
15m
Talk
Speak, Memory! Analyzing Historical Accidents to Sensitize Software Testing Novices
ICSE SEET - Software Engineering Education and Training
Natalia Silvis-Cividjian Vrije Universiteit (VU) Amsterdam, Fritz Hager NA
16:30
15m
Talk
Software startup within a university - producing industry-ready graduates
ICSE SEET - Software Engineering Education and Training
Saara Tenhunen University of Helsinki, Tomi Männistö University of Helsinki, Petri Ihantola University of Helsinki, Jami Kousa University of Helsinki, Matti Luukkainen University of Helsinki
16:45
7m
Talk
Teaching MLOps in Higher Education through Project-Based Learning
ICSE SEET - Software Engineering Education and Training
Filippo Lanubile University of Bari, Silverio Martínez-Fernández UPC-BarcelonaTech, Luigi Quaranta University of Bari, Italy
16:52
7m
Talk
Software Resurrection: Discovering Programming Pearls by Showing Modernity to Historical Software
ICSE SEET - Software Engineering Education and Training
Abhishek Dutta University of Oxford
Pre-print Media Attached File Attached
17:00
7m
Talk
Teaching Computer Science Students to Communicate Scientific Findings More Effectively
ICSE SEET - Software Engineering Education and Training
Marvin Wyrich Saarland University, Stefan Wagner University of Stuttgart
Pre-print

Thu 18 May

Displayed time zone: Hobart change

11:00 - 12:30
11:00
15m
Talk
Data-driven Recurrent Set Learning For Non-termination Analysis
ICSE Technical Track
Zhilei Han Tsinghua University, Fei He Tsinghua University
11:15
15m
Talk
Compiling Parallel Symbolic Execution with Continuations
ICSE Technical Track
Guannan Wei Purdue University, Songlin Jia Purdue University, Ruiqi Gao Purdue University, Haotian Deng Purdue University, Shangyin Tan UC Berkeley, Oliver Bračevac Purdue University, Tiark Rompf Purdue University
Pre-print
11:30
15m
Talk
Verifying Data Constraint Equivalence in FinTech Systems
ICSE Technical Track
Chengpeng Wang Hong Kong University of Science and Technology, Gang Fan Ant Group, Peisen Yao Zhejing University, Fuxiong Pan Ant Group, Charles Zhang Hong Kong University of Science and Technology
Pre-print
11:45
15m
Talk
Tolerate Control-Flow Changes for Sound Data Race Prediction
ICSE Technical Track
Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yuqi Guo Institute of Software, Chinese Academy of Sciences, Beijing, China, Long Zhang Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences
12:00
7m
Talk
TSVD4J: Thread-Safety Violation Detection for Java
ICSE DEMO - Demonstrations
Shanto Rahman University of Texas at Austin, Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin
12:07
7m
Talk
What Petri Nets Oblige Us to Say Comparing Approaches for Behavior Composition
ICSE Journal-First Papers
Achiya Elyasaf Ben-Gurion University of the Negev, Tom Yaacov Ben-Gurion University of the Negev, Gera Weiss Ben-Gurion University of the Negev
Link to publication DOI
12:15
7m
Talk
A Novel and Pragmatic Scenario Modeling Framework with Verification-in-the-loop for Autonomous Driving Systems
ICSE NIER - New Ideas and Emerging Results
Dehui Du East China Normal University, Bo Li East China Normal University, Chenghang Zheng East China Normal University
13:45 - 15:15
SE for security 2ICSE Technical Track / ICSE Journal-First Papers at Meeting Room 106
Chair(s): Cristian Cadar Imperial College London, UK
13:45
15m
Talk
SLR: From Saltzer & Schoeder to 2021…
ICSE Journal-First Papers
Nikhil Patnaik University of Bristol, Andrew C Dwyer University of Durham, Joseph Hallett , Awais Rashid University of Bristol, UK
14:00
15m
Talk
On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN)
ICSE Technical Track
Viktoria Koscinski Rochester Institute of Technology, Sara Hashemi Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
14:15
15m
Talk
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon
ICSE Technical Track
Ita Ryan University College Cork, Utz Roedig University College Cork, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital
Pre-print
14:30
15m
Talk
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
ICSE Technical Track
Setu Kumar Basak North Carolina State University, Lorenzo Neil North Carolina State University, Bradley Reaves North Carolina State University, Laurie Williams North Carolina State University
Pre-print
14:45
15m
Talk
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGXDistinguished Paper Award
ICSE Technical Track
Xinyuan Miao Shanghai Jiao Tong University, Ziyi Lin Alibaba Group, Shaojun Wang Alibaba Group, Lei Yu Alibaba Group, Sanhong Li Alibaba Inc., Zihan Wang Shanghai Jiao Tong University, Pengbo Nie Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, He Jiang Dalian University of Technology
Pre-print
15:00
15m
Talk
Keyword Extraction From Specification Documents for Planning Security Mechanisms
ICSE Technical Track
Jeffy Jahfar Poozhithara Apple Inc. and University of Washington Bothell, Hazeline Asuncion University of Washington Bothell, Brent Lagesse University of Washington Bothell
Pre-print

Fri 19 May

Displayed time zone: Hobart change

11:00 - 12:30
11:00
15m
Talk
DLInfer: Deep Learning with Static Slicing for Python Type Inference
ICSE Technical Track
Yanyan Yan Nanjing University, Yang Feng Nanjing University, Hongcheng Fan Nanjing University, Baowen Xu Nanjing University
11:15
15m
Talk
ViolationTracker: Building Precise Histories for Static Analysis Violations
ICSE Technical Track
Ping Yu Fudan University, China, Yijian Wu Fudan University, Xin Peng Fudan University, Jiahan Peng Fudan University, Jian Zhang Fudan University, Peicheng Xie Fudan University, Wenyun Zhao Fudan University, China
Pre-print
11:30
15m
Talk
On the use of static analysis to engage students with software quality improvement: An experience with PMD
ICSE SEET - Software Engineering Education and Training
Eman Abdullah AlOmar Stevens Institute of Technology, Salma Abdullah AlOmar NA, Mohamed Wiem Mkaouer Rochester Institute of Technology
Pre-print
11:45
15m
Talk
Long-term Static Analysis Rule Quality Monitoring Using True Negatives
ICSE SEIP - Software Engineering in Practice
Linghui Luo Amazon Web Services, Rajdeep Mukherjee Amazon Web Services, Omer Tripp Amazon, Martin Schäf Amazon Web Services, Qiang Zhou Amazon Web Services, Daniel J Sanchez Amazon Alexa
12:00
15m
Talk
A Language-agnostic Framework for Mining Static Analysis Rules from Code Changes
ICSE SEIP - Software Engineering in Practice
David Baker Effendi Stellenbosch University, Berk Cirisci IRIF, University Paris Diderot and CNRS, France, Rajdeep Mukherjee Amazon Web Services, Hoan Anh Nguyen Amazon, Omer Tripp Amazon
12:15
7m
Talk
GradeStyle: GitHub-Integrated and Automated Assessment of Java Code Style
ICSE SEET - Software Engineering Education and Training
Callum Iddon University of Auckland, Nasser Giacaman The University of Auckland, Valerio Terragni University of Auckland
12:22
7m
Talk
The Challenges of Shift Left Static Analysis
ICSE SEIP - Software Engineering in Practice
Quoc-Sang Phan Facebook, Inc., KimHao Nguyen University of Nebraska-Lincoln, ThanhVu Nguyen George Mason University
12:30 - 13:45
12:30
75m
Meeting
Executive Meeting
ICSE Social Events

13:45 - 15:15
Vulnerability detectionICSE Technical Track / ICSE Journal-First Papers at Meeting Room 106
Chair(s): Cuiyun Gao Harbin Institute of Technology
13:45
15m
Talk
An Empirical Study of Deep Learning Models for Vulnerability Detection
ICSE Technical Track
Benjamin Steenhoek Iowa State University, Md Mahbubur Rahman Iowa State University, Richard Jiles Iowa State University, Wei Le Iowa State University
Pre-print
14:00
15m
Talk
DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection
ICSE Technical Track
Wenbo Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Yi Li New Jersey Institute of Technology, Jiyuan Zhang University of Illinois Urbana-Champaign, Aashish Yadavally The University of Texas at Dallas
Pre-print
14:15
15m
Talk
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model
ICSE Technical Track
Bin Yuan Huazhong University of Science and Technology, Yifan Lu Huazhong University of Science and Technology, Yilin Fang Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Deqing Zou Huazhong University of Science and Technology, Zhen Li Huazhong University of Science and Technology, Zhi Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
14:30
15m
Talk
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
ICSE Technical Track
Xin-Cheng Wen Harbin Institute of Technology, Yupan Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Hongyu Zhang The University of Newcastle, Jie M. Zhang King's College London, Qing Liao Harbin Institute of Technology
14:45
15m
Talk
Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays!
ICSE Technical Track
Xu Yang University of Manitoba, Shaowei Wang University of Manitoba, Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology
Pre-print
15:00
7m
Talk
Learning from What We Know: How to Perform Vulnerability Prediction using Noisy Historical Data
ICSE Journal-First Papers
Aayush Garg University of Luxembourg, Luxembourg, Renzo Degiovanni SnT, University of Luxembourg, Matthieu Jimenez SnT, University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Link to publication DOI Authorizer link Pre-print Media Attached
15:07
7m
Talk
Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
ICSE Journal-First Papers
Sarah Elder North Carolina State University, Nusrat Zahan North Carolina State University, Rui Shu North Carolina State University, Valeri Kozarev North Carolina State University, Tim Menzies North Carolina State University, Laurie Williams North Carolina State University
15:45 - 17:15
15:45
15m
Talk
Data-driven Mutation Analysis for Cyber-Physical Systems
ICSE Journal-First Papers
Enrico Viganò University of Luxembourg, Oscar Cornejo SnT Centre, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication Pre-print
16:00
15m
Talk
Finding Causally Different Tests for an Industrial Control System
ICSE Technical Track
Chris Poskitt Singapore Management University, Yuqi Chen ShanghaiTech University, China, Jun Sun Singapore Management University, Yu Jiang Tsinghua University
DOI Pre-print File Attached
16:15
15m
Talk
Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software
ICSE Technical Track
Yuqi Huai University of California, Irvine, Yuntianyi Chen University of California, Irvine, Sumaya Almanee University of California, Irvine, Tuan Ngo VNU University of Engineering and Technology, Xiang Liao University of California, Irvine, Ziwen Wan University of California, Irvine, Qi Alfred Chen University of California, Irvine, Joshua Garcia University of California, Irvine
Pre-print
16:30
15m
Talk
Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems
ICSE Technical Track
Garrett Christian University of Virginia, Trey Woodlief University of Virginia, Sebastian Elbaum University of Virginia
Pre-print
16:45
15m
Talk
Automated Test Case Generation for Safety-Critical Software in Scade
ICSE SEIP - Software Engineering in Practice
Elson Kurian University of Milano Bicocca, Pietro Braione University of Milano-Bicocca, Daniela Briola University of Milano Bicocca, Dario D'Avino , Matteo Modonato , Giovanni Denaro University of Milano-Bicocca, Italy
17:00
7m
Talk
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments
ICSE Journal-First Papers
Christian Birchler Zurich University of Applied Sciences, Sajad Khatiri USI-Lugnao & Zurich University of Applied Sciences, Pouria Derakhshanfar JetBrains Research, Sebastiano Panichella Zurich University of Applied Sciences, Annibale Panichella Delft University of Technology
17:07
7m
Talk
Parameter Coverage for Testing of Autonomous Driving Systems Under Uncertainty
ICSE Journal-First Papers
Thomas Laurent JSPS@National Institute of Informatics, Japan, Stefan Klikovits Johannes Kepler University, Linz, Paolo Arcaini National Institute of Informatics , Fuyuki Ishikawa National Institute of Informatics, Anthony Ventresque Trinity College Dublin & Lero, Ireland
Link to publication DOI

Mon 15 May

Displayed time zone: Hobart change

Room9:0015304510:0015304511:0015304512:0015304513:0015304514:0015304515:0015304516:0015304517:00153045
Meeting Room 106

Tue 16 May

Displayed time zone: Hobart change

Room9:0015304510:0015304511:0015304512:0015304513:0015304514:0015304515:0015304516:0015304517:00153045
Meeting Room 106

Wed 17 May

Displayed time zone: Hobart change

Room11:0015304512:0015304513:0015304514:0015304515:0015304516:0015304517:00153045
Meeting Room 106

Fri 19 May

Displayed time zone: Hobart change

Room11:0015304512:0015304513:0015304514:0015304515:0015304516:0015304517:00153045
Meeting Room 106