Call for Papers
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2020 invites high quality contributions describing significant, original, and unpublished results.
Solicited topics include, but are not limited to:- Testing, verification, and validation
- Software analysis
- Empirical software engineering
- Maintenance and evolution
- Artificial intelligence for software engineering
- Software engineering for artificial intelligence
- Software security and trust; data privacy
- Recommender systems for software engineering
- Program synthesis & transformations, automated defect repair
- Program comprehension
- Mobile app development
- Automated reasoning techniques
- Software architecture and design
- Reverse engineering and re-engineering
- Model-driven development
- Knowledge acquisition and management
- Cloud computing
- Human-computer interaction
- Component-based service-oriented systems
- Specification languages
- Configuration management
- Requirements engineering
- Software product line engineering
- Software visualization
Two categories of submissions are solicited:
-
Technical Research Papers should describe innovative research in automating software development activities or automated support to users engaged in such activities. They should describe a novel contribution to the field and should carefully support claims of novelty with citations to the relevant literature. Where a submission builds upon previous work of the author(s), the novelty of the new contribution must be clearly described with respect to the previous work, but the author identity should not be revealed, i.e., prior work should be referenced in the third person, to reflect the double-blind review policy. Papers should also clearly discuss how the results were validated
-
Experience Papers should describe a significant experience in applying automated software engineering technology and should carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of automated software engineering.
Note that unlike prior years, New Ideas Papers will be managed and evaluated by a separate track (Short Paper track), with a separate PC, deadline, etc.
SUBMISSION
Abstracts and papers must be submitted electronically through the ASE 2020 HotCRP submission site.
Format. All submissions must be in English.
All submissions must be in PDF format and conform, at time of submission, to the ACM Proceedings Template (LaTEX users must use \documentclass[sigconf,review,anonymous]{acmart})
.
Papers submitted to this track (Technical Research and Experience Papers) must not exceed 10 pages (including figures) plus up to 2 pages that contain ONLY references. Exceeding this limit will be grounds for rejection without review.
Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.
The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs at ase2020.research@gmail.com.
Originality. Papers submitted to ASE 2020 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2020. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.
To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences, affiliated with ACM or IEEE, with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
ASE 2020 will pursue a double-blind review process. If you have any questions, please see FAQs and/or contact the PC chairs at ase2020.research@gmail.com. Authors are encouraged to double check conflicts of interest on their papers in HotCRP shortly after the submission deadline.
Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Supplementary material. Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Although PC members are not obligated to look at this material, we strongly encourage submitters to use supplementary material to provide access to anonymized code or data, whenever possible. Please carefully review any supplementary material to ensure it conforms to the double-blind policy (described next). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:
ACCEPTED PAPERS
Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including figures), plus 2 pages which may only contain references. Note that all submitted papers must conform to the 10+2 requirement, described above.
We strongly encourage authors of accepted papers to archive the research artifacts, including code and data, associated with their ASE papers. Software Heritage (presented in a keynote at ASE 2018) requires only providing a URL to an existing archive:
Other often used solutions, focusing on data, include Figshare and Zenodo.
Tue 22 SepDisplayed time zone: (UTC) Coordinated Universal Time change
02:20 - 03:20 | Test GenerationResearch Papers / Industry Showcase / Tool Demonstrations at Kangaroo Chair(s): Xusheng Xiao Case Western Reserve University | ||
02:20 20mTalk | Legion: Best-First Concolic Testing Research Papers Dongge Liu The Univeristy of Melbourne, Gidon Ernst LMU Munich, Toby Murray University of Melbourne, Australia, Benjamin I.P. Rubinstein University of Melbourne | ||
02:40 20mTalk | The New Approach to IT Testing Industry Showcase | ||
03:00 10mTalk | MetPurity: A Learning-Based Tool of Pure Method Identification for Automatic Test Generation Tool Demonstrations |
02:20 - 03:20 | Formal Methods (1)NIER track / Research Papers at Koala Chair(s): Nazareno Aguirre Dept. of Computer Science FCEFQyN, University of Rio Cuarto | ||
02:20 20mTalk | Accelerating All-SAT Computation with Short Blocking Clauses Research Papers Yueling Zhang Singapore Management University, Geguang Pu East China Normal University, Jun Sun Singapore Management University | ||
02:40 20mTalk | A Predictive Analysis for Detecting Deadlock in MPI Programs Research Papers Yu Huang Southwestern University of Finance and Economics, Benjamin Ogles Brigham Young University, Eric Mercer Brigham Young University Pre-print | ||
03:00 10mTalk | Proving Termination by k-Induction NIER track |
02:20 - 03:20 | Maintenance and Evolution (1)Research Papers / Tool Demonstrations at Wombat Chair(s): Yi Li Nanyang Technological University | ||
02:20 20mTalk | Learning to Handle Exceptions Research Papers Jian Zhang Beihang University, Xu Wang Beihang University, Hongyu Zhang University of Newcastle, Australia, Hailong Sun Beihang University, Yanjun Pu Beihang University, Xudong Liu Beihang University Pre-print | ||
02:40 20mTalk | BuildFast: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration Research Papers Bihuan Chen Fudan University, China, Linlin Chen Fudan University, Chen Zhang Fudan University, Xin Peng Fudan University, China | ||
03:00 10mTalk | OSLDetector: Identifying Open-Source Libraries through Binary Analysis Tool Demonstrations Dan Zhang Tsinghua University |
08:00 - 09:00 | Software Analysis (1)Research Papers at Kangaroo Chair(s): Michael Pradel University of Stuttgart, Germany | ||
08:00 20mTalk | Pending Constraints in Symbolic Execution for Better Exploration and Seeding Research Papers Timotej Kapus Imperial College London, UK, Frank Busse Imperial College London, Cristian Cadar Imperial College London, UK Pre-print Media Attached | ||
08:20 20mTalk | Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis Research Papers | ||
08:40 20mTalk | Assessing and Restoring Reproducibility of Jupyter Notebooks Research Papers Jiawei Wang , Tzu-yang Kuo The Hong Kong University of Science and Technology, Li Li Monash University, Australia, Andreas Zeller CISPA, Germany |
08:00 - 09:00 | Maintenance and Evolution (2)Research Papers / Journal-first Papers at Koala Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
08:00 20mTalk | M3: Semantic API Migrations Research Papers Bruce Collie University of Edinburgh, Philip Ginsbach GitHub Software UK, Jackson Woodruff University of Edinburgh, Ajitha Rajan University of Edinburgh, Michael F. P. O'Boyle University of Edinburgh Pre-print Media Attached | ||
08:20 20mTalk | The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux Kernel Research Papers Pre-print | ||
08:40 20mTalk | Game-theoretic Analysis of Development Practices: Challenges and Opportunities Journal-first Papers Carlos Gavidia-Calderon University College London, Federica Sarro University College London, UK, Mark Harman University College London, UK, Earl T. Barr University College London, UK Link to publication DOI Pre-print Media Attached |
09:10 - 10:10 | |||
09:10 20mTalk | Verified from Scratch: Program Analysis for Learners' Programs Research Papers Andreas Stahlbauer University of Passau, Christoph Frädrich University of Passau, Gordon Fraser University of Passau | ||
09:30 20mTalk | Interval Change-Point Detection for Runtime Probabilistic Model Checking Research Papers Xingyu Zhao Heriot-Watt University, Radu Calinescu University of York, UK, Simos Gerasimou University of York, UK, Valentin Robu Heriot-Watt University, David Flynn Heriot-Watt University Pre-print | ||
09:50 20mTalk | UnchartIt: An Interactive Framework for Program Recovery from Charts Research Papers Daniel Ramos INESC-ID/IST, Universidade de Lisboa, Jorge Pereira INESC-ID/IST, Universidade de Lisboa, Ines Lynce INESC-ID/IST, Universidade de Lisboa, Vasco Manquinho INESC-ID/IST, Universidade de Lisboa, Ruben Martins Carnegie Mellon University |
09:10 - 10:10 | Mobile App (1)Tool Demonstrations / Research Papers at Koala Chair(s): Jacques Klein University of Luxembourg, Luxembourg | ||
09:10 20mTalk | Demystifying Diehard Android Apps Research Papers Hao Zhou The Hong Kong Polytechnic University, Haoyu Wang Beijing University of Posts and Telecommunications, China, Yajin Zhou Zhejiang University, Xiapu Luo The Hong Kong Polytechnic University, Yutian Tang ShanghaiTech University, Lei Xue The Hong Kong Polytechnic University, Ting Wang Penn State University | ||
09:30 20mTalk | UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps Research Papers Hao Zhou The Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China, Haoyu Wang Beijing University of Posts and Telecommunications, China, Le Yu The Hong Kong Polytechnic University, Xiapu Luo The Hong Kong Polytechnic University, Ting Wang Penn State University, Wei Zhang Nanjing University of Posts and Telecommunications | ||
09:50 10mTalk | FILO: FIx-LOcus Localization for Backward Incompatibilities Caused by Android Framework Upgrades Tool Demonstrations Marco Mobilio University of Milano Bicocca, Oliviero Riganelli University of Milano-Bicocca, Italy, Daniela Micucci University of Milano-Bicocca, Italy, Leonardo Mariani University of Milano Bicocca |
09:10 - 10:10 | Search-Based TestingJournal-first Papers / Tool Demonstrations / Research Papers at Wombat Chair(s): Maria Kechagia University College London | ||
09:10 20mTalk | Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper Objectives Research Papers Pouria Derakhshanfar Delft University of Technology, Xavier Devroey Delft University of Technology, Andy Zaidman Delft University of Technology, Arie van Deursen Delft University of Technology, Netherlands, Annibale Panichella Delft University of Technology DOI Pre-print Media Attached | ||
09:30 20mTalk | Multi-criteria test cases selection for model transformations Journal-first Papers Bader Alkhazi Kuwait University, Chaima Abid University of Michigan, Marouane Kessentini University of Michigan, Dorian Leroy JKU Linz, Manuel Wimmer Johannes Kepler University Linz Link to publication DOI | ||
09:50 10mTalk | Botsing, a Search-based Crash Reproduction Framework for Java Tool Demonstrations Pouria Derakhshanfar Delft University of Technology, Xavier Devroey Delft University of Technology, Annibale Panichella Delft University of Technology, Andy Zaidman Delft University of Technology, Arie van Deursen Delft University of Technology, Netherlands DOI Pre-print Media Attached |
16:00 - 17:00 | |||
16:00 20mTalk | Synthesis of Infinite-State Systems with Random Behavior Research Papers Andreas Katis University of Minnesota, Grigory Fedyukovich Florida State University, Jeffrey Chen University of Minnesota, David Greve Collins Aerospace, Sanjai Rayadurgam University of Minnesota, Michael Whalen University of Minnesota | ||
16:20 20mTalk | Demystifying Loops in Smart Contracts Research Papers Benjamin Mariano University of Texas at Austin, Yanju Chen University of California, Santa Barbara, Yu Feng University of California, Santa Barbara, Shuvendu K. Lahiri Microsoft Research, Işıl Dillig University of Texas at Austin, USA | ||
16:40 20mTalk | Patching as Translation: The Data and the Metaphor Research Papers Yangruibo Ding Columbia University, Baishakhi Ray Columbia University, USA, Prem Devanbu University of California, Vincent J. Hellendoorn Carnegie Mellon University DOI Pre-print |
16:00 - 17:00 | Maintenance and Evolution (3)Research Papers / Tool Demonstrations at Koala Chair(s): Yongjie Zheng California State University San Marcos | ||
16:00 20mTalk | Subdomain-Based Generality-Aware Debloating Research Papers Qi Xin Georgia Institute of Technology, Myeongsoo Kim Georgia Institute of Technology, Qirun Zhang Georgia Institute of Technology, USA, Alessandro Orso Georgia Tech | ||
16:20 20mTalk | Revisiting the relationship between fault detection, test adequacy criteria, and test set size. Research Papers Yiqun Chen University of Washington, Rahul Gopinath CISPA Helmholtz Center for Information Security, Anita Tadakamalla George Mason University, USA, Michael D. Ernst University of Washington, USA, Reid Holmes University of British Columbia, Gordon Fraser University of Passau, Paul Ammann George Mason University, USA, René Just University of Washington, USA | ||
16:40 10mTalk | WASim: Understanding WebAssembly Applications through Classification Tool Demonstrations | ||
16:50 10mTalk | Sosed: a tool for finding similar software projects Tool Demonstrations Egor Bogomolov JetBrains Research, Yaroslav Golubev JetBrains Research, Artyom Lobanov JetBrains Research, Vladimir Kovalenko JetBrains Research, JetBrains N.V., Timofey Bryksin JetBrains Research, Saint Petersburg State University |
17:10 - 18:10 | Software Analysis (2) Research Papers / Industry Showcase at Kangaroo Chair(s): Saba Alimadadi Simon Fraser University | ||
17:10 20mTalk | Representing and Reasoning about Dynamic Code Research Papers Jesse Bartels University of Arizona, Jon Stephens University of Texas at Austin, Saumya Debray University of Arizona | ||
17:30 20mTalk | ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in Android Research Papers Navid Salehnamadi University of California, Irvine, Abdulaziz Alshayban University of California, Irvine, Iftekhar Ahmed University of California at Irvine, USA, Sam Malek University of California at Irvine, USA | ||
17:50 20mTalk | Automatic Generation of IFTTT Mashup Infrastructures Industry Showcase Lei Liu Fujitsu Laboratories of America, Inc., Mehdi Bahrami Fujitsu Laboratories of America, Inc., Wei-Peng Chen Fujitsu Laboratories of America, Inc. |
17:10 - 18:10 | AI for Software Engineering (1)NIER track / Research Papers at Koala Chair(s): Tingting Yu University of Kentucky | ||
17:10 20mTalk | DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests Research Papers Devjeet Roy Washington State University, Ziyi Zhang Washington State University, Maggie Ma Washington State University, Venera Arnaoudova Washington State University, Annibale Panichella Delft University of Technology, Sebastiano Panichella Zurich University of Applied Sciences, Danielle Gonzalez Rochester Institute of Technology, USA, Mehdi Mirakhorli Rochester Institute of Technology | ||
17:30 20mTalk | Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems Research Papers Pre-print | ||
17:50 10mTalk | On Benign Features in Malware Detection NIER track Michael Cao The University of British Columbia, Sahar Badihi University of British Columbia, Canada, Khaled Ahmed The University of British Columbia, Peiyu Xiong The University of British Columbia, Julia Rubin University of British Columbia, Canada |
Wed 23 SepDisplayed time zone: (UTC) Coordinated Universal Time change
00:00 - 01:00 | Software Engineering for AI (1)NIER track / Research Papers at Kangaroo Chair(s): Song Wang York University, Canada | ||
00:00 20mTalk | Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining Research Papers Weijun Shen Nanjing University, Yanhui Li Department of Computer Science and Technology, Nanjing University, Lin Chen Nanjing University, YuanLei Han Nanjing University, Yuming Zhou Nanjing University, Baowen Xu State Key Laboratory for Novel Software Technology, Nanjing University | ||
00:20 20mTalk | MARBLE: Model-Based Robustness Analysis of Stateful Deep Learning Systems Research Papers Xiaoning Du Nanyang Technological University, Yi Li Nanyang Technological University, Xiaofei Xie Nanyang Technological University, Lei Ma Kyushu University, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University | ||
00:40 10mTalk | Making Fair ML Software using Trustworthy Explanation NIER track Joymallya Chakraborty North Carolina State University, USA, Kewen Peng North Carolina State University, Tim Menzies North Carolina State University, USA Link to publication DOI Pre-print Media Attached |
00:00 - 01:00 | AI for Software Engineering (2)Research Papers at Koala Chair(s): Tse-Hsun (Peter) Chen Concordia University | ||
00:00 20mTalk | A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum Research Papers Mingyang Li ISCAS, Lin Shi ISCAS, Ye Yang Stevens institute of technology, Qing Wang Institute of Software, Chinese Academy of Sciences | ||
00:20 20mTalk | Retrieve and Refine: Exemplar-based Neural Comment Generation Research Papers Bolin Wei Peking University, Yongmin Li Peking University, Ge Li Peking University, Xin Xia Monash University, Zhi Jin Peking University Pre-print | ||
00:40 20mTalk | Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks Research Papers Zhenhao Li Concordia University, Tse-Hsun (Peter) Chen Concordia University, Weiyi Shang Concordia University |
00:00 - 01:00 | Incidents and Bug ReportsResearch Papers at Platypus Chair(s): Yepang Liu Southern University of Science and Technology | ||
00:00 20mTalk | How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service SystemsExperience Research Papers Junjie Chen Tianjin University, China, Shu Zhang Microsoft Research, Beijing, Xiaoting He Microsoft, Qingwei Lin Microsoft Research, China, Hongyu Zhang University of Newcastle, Australia, Dan Hao Peking University, China, Yu Kang Microsoft Research, China, Feng Gao Microsoft, China, Zhangwei Xu Microsoft, China, Yingnong Dang Microsoft, USA, Dongmei Zhang Microsoft Research, China | ||
00:20 20mTalk | Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports Research Papers Songqiang Chen School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China, Bangguo Yin School of Computer Science, Wuhan University, Yuanxiang Ji School of Computer Science, Wuhan University, Lin Chen Nanjing University, Baowen Xu State Key Laboratory for Novel Software Technology, Nanjing University | ||
00:40 20mTalk | Owl Eyes: Spotting UI Display Issues via Visual Understanding Research Papers Zhe Liu Laboratory for Internet Software Technologies, Institute of Software Chinese Academy of Sciences, University of Chinese Academy of Sciences, Chunyang Chen Monash University, Australia, Junjie Wang Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software, Chinese Academy of Sciences |
00:00 - 01:00 | Testing (1)Research Papers / Tool Demonstrations at Wombat Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign, USA | ||
00:00 20mTalk | MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests Research Papers Hengcheng Zhu Southern University of Science and Technology, Lili Wei The Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, China, Qin Sheng WeBank Co Ltd, Cui Zhou WeBank Co Ltd DOI Pre-print | ||
00:20 20mTalk | Defect Prediction Guided Search-Based Software Testing Research Papers Anjana Perera Monash University, Aldeida Aleti Monash University, Marcel Böhme Monash University, Australia, Burak Turhan Monash University DOI Pre-print | ||
00:40 10mTalk | STIFA: Crowdsourced Mobile Testing Report Selection Based on Text and Image Fusion Analysis Tool Demonstrations Zhenfei Cao Nanjing University, Xu Wang Nanjing University, Shengcheng Yu Nanjing University, China, Yexiao Yun Nanjing University, Chunrong Fang Nanjing University, China |
01:10 - 02:10 | Software Engineering for AI (2) Research Papers / Industry Showcase at Kangaroo Chair(s): Aldeida Aleti Monash University | ||
01:10 20mTalk | Audee: Automated Testing for Deep Learning Frameworks Research Papers Qianyu Guo College of Intelligence and Computing, Tianjin University, Xiaofei Xie Nanyang Technological University, Yi Li Nanyang Technological University, Xiaoyu Zhang Xi'an Jiaotong University, Yang Liu Nanyang Technological University, Singapore, Xiaohong Li TianJin University, Chao Shen Xi'an Jiaotong University | ||
01:30 20mTalk | Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction Research Papers Guoliang Dong Computer College of Zhejiang University, Jingyi Wang Zhejiang University, Jun Sun Singapore Management University, Yang Zhang Zhejiang University, Xinyu Wang Zhejiang University, Dai Ting Huawei International Pte Ltd, Jin Song Dong National University of Singapore, Xingen Wang Zhejiang University | ||
01:50 20mTalk | Towards Building Robust DNN Applications: An Industrial Case Study of Evolutionary Data Augmentation Industry Showcase Haruki Yokoyama Fujitsu Laboratories Ltd., Satoshi Onoue Fujitsu Ltd., Shinji Kikuchi Fujitsu Laboratories Ltd. |
01:10 - 02:10 | Recommender Systems for Software EngineeringResearch Papers / Tool Demonstrations at Koala Chair(s): Shaowei Wang Mississippi State University | ||
01:10 20mTalk | API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph Research Papers Xiaoxue Ren Zhejiang University, Xinyuan Ye Australian National University, Zhenchang Xing Australian National University, Australia, Xin Xia Monash University, Xiwei (Sherry) Xu Data61 at CSIRO, Australia, Liming Zhu Data61 at CSIRO, Australia / UNSW, Australia, JianLing Sun Zhejiang University Pre-print | ||
01:30 20mTalk | Multi-task Learning based Pre-trained Language Model for Code Completion Research Papers Fang Liu Peking University, Ge Li Peking University, Yunfei Zhao Peking University, Zhi Jin Peking University | ||
01:50 10mTalk | HomoTR: Online Test Recommendation System Based on Homologous Code Matching Tool Demonstrations Chenqian Zhu Nanjing University, Weisong Sun State Key Laboratory for Novel Software Technology, Nanjing University, Qin LIU , Yangyang Yuan Nanjing University, Chunrong Fang Nanjing University, China, Yong Huang State Key Laboratory for Novel Software Technology, Nanjing University |
01:10 - 02:10 | Software Security and Trust (1) NIER track / Tool Demonstrations / Research Papers at Platypus Chair(s): Christoph Csallner University of Texas at Arlington | ||
01:10 20mTalk | Continuous ComplianceExperience Research Papers Martin Kellogg University of Washington, Seattle, Martin Schäf Amazon Web Services, Serdar Tasiran Amazon Web Services, Michael D. Ernst University of Washington, USA | ||
01:30 20mTalk | SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementions Research Papers Lili Quan College of Intelligence and Computing,Tianjin University, Qianyu Guo College of Intelligence and Computing, Tianjin University, Hongxu Chen Research Associate, xiexiaofei , Xiaohong Li TianJin University, Yang Liu Nanyang Technological University, Singapore, Jing Hu Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing,Tianjin University | ||
01:50 10mTalk | A Hybrid Analysis to Detect Java Serialisation Vulnerabilities NIER track | ||
02:00 10mTalk | EXPRESS: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems Tool Demonstrations |
01:10 - 02:10 | Testing of Emerging ApplicationsResearch Papers / Tool Demonstrations at Wombat Chair(s): Yuan Tian Queens University, Kingston, Canada | ||
01:10 20mTalk | CoFI: Consistency-Guided Fault Injection for Cloud Systems Research Papers Haicheng Chen The Ohio State University, USA, Wensheng Dou Institute of Software, Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Feng Qin Ohio State University, USA | ||
01:30 20mTalk | ChemTest: An Automated Software Testing Framework for an Emerging Paradigm Research Papers Michael C. Gerten Iowa State University, James I. Lathrop Iowa State University, Myra Cohen Iowa State University, Titus H. Klinge Drake University Pre-print | ||
01:50 10mTalk | ImpAPTr: A Tool For Identifying The Clues To Online Service Anomalies Tool Demonstrations hao wang , Guoping Rong Nanjing University, Yangchen Xu Nanjing University, Yong You Meituan-Dianping Group |
02:20 - 03:20 | |||
02:20 5mTalk | JITBot: An Explainable Just-In-Time Defect Prediction Bot Tool Demonstrations Chaiyakarn Khanan Mahidol University, Worawit Luewichana Mahidol University, Krissakorn Pruktharathikoon Mahidol University, Jirayus Jiarpakdee Monash University, Australia, Kla Tantithamthavorn Monash University, Australia, Morakot Choetkiertikul Mahidol University, Thailand, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University | ||
02:25 5mTalk | OSLDetector: Identifying Open-Source Libraries through Binary Analysis Tool Demonstrations Dan Zhang Tsinghua University | ||
02:30 5mTalk | AirMochi – A Tool for Remotely Controlling iOS Devices Tool Demonstrations Nikola Lukic University of Southern California, Saghar Talebipour University of Southern California, Nenad Medvidović University of Southern California, USA | ||
02:35 5mTalk | Edge4Real: A Cost-Effective Edge Computing based Human Behaviour Recognition System for Human-Centric Software Engineering Tool Demonstrations DI SHAO School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University, Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Thuong Hoang School of Information Technology, Deakin University | ||
02:40 5mTalk | HomoTR: Online Test Recommendation System Based on Homologous Code Matching Tool Demonstrations Chenqian Zhu Nanjing University, Weisong Sun State Key Laboratory for Novel Software Technology, Nanjing University, Qin LIU , Yangyang Yuan Nanjing University, Chunrong Fang Nanjing University, China, Yong Huang State Key Laboratory for Novel Software Technology, Nanjing University | ||
02:45 5mTalk | WASim: Understanding WebAssembly Applications through Classification Tool Demonstrations | ||
02:50 30mLive Q&A | Q&A or Discussion Tool Demonstrations |
09:10 - 10:10 | |||
09:10 20mTalk | Just-In-Time Reactive Synthesis Research Papers | ||
09:30 20mTalk | JISET: JavaScript IR-based Semantics Extraction Toolchain Research Papers | ||
09:50 20mTalk | FlashRegex: Deducing Anti-ReDoS Regexes from Examples Research Papers Yeting Li Institute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiwu Xu Shenzhen University, Jialun Cao Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Haiming Chen Institute of Software, Chinese Academy of Sciences, Tingjian Ge University of Massachusetts, Lowell, Shing-Chi Cheung Hong Kong University of Science and Technology, China, Haoren Zhao Shaanxi Normal University, Xi'an, China |
09:10 - 10:10 | Configuration Management (1)Research Papers at Koala Chair(s): Carmine Vassallo University of Zurich, Switzerland | ||
09:10 20mTalk | Automated Implementation of Windows-related Security-Configuration Guides Research Papers Patrick Stöckle Technical University of Munich (TUM), Bernd Grobauer Siemens AG, Alexander Pretschner Technical University of Munich Link to publication DOI Pre-print | ||
09:30 20mTalk | Identifying Software Performance Changes Across Variants and Versions Research Papers Stefan Mühlbauer Leipzig University, Sven Apel Saarland University, Germany, Norbert Siegmund Leipzig University DOI Pre-print | ||
09:50 20mTalk | CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs Research Papers Haochen He National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, China, Erci Xu National University of Defense Technology, Tingting Yu University of Kentucky, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Ji Wang National University of Defense Technology, Liao Xiangke National University of Defense Technology, China DOI Pre-print |
09:10 - 10:10 | AI for Software Engineering (3)Research Papers at Wombat Chair(s): Artur Andrzejak Heidelberg University | ||
09:10 20mTalk | Automatic Extraction of Cause-Effect-Relations from Requirements Artifacts Research Papers Julian Frattini Blekinge Institute of Technology, Maximilian Junker Technische Universität Muenchen, Michael Unterkalmsteiner Blekinge Institute of Technology, Daniel Mendez Blekinge Institute of Technology | ||
09:30 20mTalk | BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect Prediction Research Papers Ke Li University of Exeter, Zilin Xiang University of Electronic Science and Technology of China, Tao Chen Loughborough University, Kay Chen Tan City University of Hong Kong Pre-print | ||
09:50 20mTalk | Automating Just-In-Time Comment Updating Research Papers Zhongxin Liu Zhejiang University, Xin Xia Monash University, Meng Yan Chongqing University, Shanping Li Zhejiang University Pre-print |
10:20 - 11:20 | |||
10:20 5mTalk | MetPurity: A Learning-Based Tool of Pure Method Identification for Automatic Test Generation Tool Demonstrations | ||
10:25 5mTalk | STIFA: Crowdsourced Mobile Testing Report Selection Based on Text and Image Fusion Analysis Tool Demonstrations Zhenfei Cao Nanjing University, Xu Wang Nanjing University, Shengcheng Yu Nanjing University, China, Yexiao Yun Nanjing University, Chunrong Fang Nanjing University, China | ||
10:30 5mTalk | ImpAPTr: A Tool For Identifying The Clues To Online Service Anomalies Tool Demonstrations hao wang , Guoping Rong Nanjing University, Yangchen Xu Nanjing University, Yong You Meituan-Dianping Group | ||
10:35 5mTalk | PerfCI: A Toolchain for Automated Performance Testing during Continuous Integration of Python Projects Tool Demonstrations Omar Javed Università della Svizzera italiana, Joshua Heneage Dawes University of Manchester and CERN, Marta Han University of Zagreb and CERN, Giovanni Franzoni CERN, Andreas Pfeiffer CERN, Giles Reger University of Manchester, Walter Binder University of Lugano, Switzerland | ||
10:40 5mTalk | Botsing, a Search-based Crash Reproduction Framework for Java Tool Demonstrations Pouria Derakhshanfar Delft University of Technology, Xavier Devroey Delft University of Technology, Annibale Panichella Delft University of Technology, Andy Zaidman Delft University of Technology, Arie van Deursen Delft University of Technology, Netherlands DOI Pre-print Media Attached | ||
10:45 5mTalk | Speeding up GUI Testing by On-Device Test Generation Tool Demonstrations Nataniel Borges Jr. CISPA Helmholtz Center for Information Security, Jenny Rau CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA, Germany | ||
10:50 30mLive Q&A | Q&A or Discussion Tool Demonstrations |
16:00 - 17:00 | |||
16:00 20mTalk | TestMC: Testing Model Counters using Differential and Metamorphic TestingExperience Research Papers Muhammad Usman University of Texas at Austin, USA, Wenxi Wang University of Texas at Austin, USA, Sarfraz Khurshid University of Texas at Austin, USA | ||
16:20 20mTalk | BigFuzz: Efficient Fuzz Testing for Data Analytics using Framework Abstraction Research Papers Qian Zhang University of California, Los Angeles, Jiyuan Wang University of California, Los Angeles, Muhammad Ali Gulzar University of California at Los Angeles, USA, Rohan Padhye Carnegie Mellon University, Miryung Kim University of California at Los Angeles, USA | ||
16:40 20mTalk | Scaling Client-Specific Equivalence Checking via Impact Boundary Search Research Papers Nick Feng University of Toronto, Vincent Hui University of Toronto, Federico Mora University of California, Berkeley, Marsha Chechik University of Toronto |
16:00 - 17:00 | Configuration Management (2)Research Papers at Koala Chair(s): Arie van Deursen Delft University of Technology, Netherlands | ||
16:00 20mTalk | Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors Research Papers Chengyuan Wen Virginia Tech, Yaxuan Zhang Virginia Tech, Xiao He University of Science and Technology Beijing, China, Na Meng Virginia Tech | ||
16:20 20mTalk | Mastering Uncertainty in Performance Estimations of Configurable Software Systems Research Papers Johannes Dorn Leipzig University, Sven Apel Saarland University, Germany, Norbert Siegmund Leipzig University DOI Pre-print | ||
16:40 20mTalk | Team Discussions and Dynamics During DevOps Tool Adoptions in OSS Projects Research Papers |
17:10 - 18:10 | Empirical Software Engineering (1)Research Papers / Journal-first Papers at Koala Chair(s): Jinqiu Yang Concordia University, Montreal, Canada | ||
17:10 20mTalk | Code to Comment "Translation": Data, Metrics, Baselining & Evaluation Research Papers David Gros University of California, Davis, Hariharan Sezhiyan University of California, Davis, Prem Devanbu University of California, Zhou Yu University of California, Davis | ||
17:30 20mTalk | Reproducing Performance Bug Reports in Server Applications: The Researchers' Experiences Journal-first Papers Xue Han University of Kentucky, Daniel Carroll University of Kentucky, Tingting Yu University of Kentucky Link to publication DOI | ||
17:50 20mTalk | Exploring the Architectural Impact of Possible Dependencies in Python software Research Papers Wuxia Jin Xi'an Jiaotong University, Yuanfang Cai Drexel University, Rick Kazman University of Hawai‘i at Mānoa, Gang Zhang Emergent Design Inc, Qinghua Zheng Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University |
Thu 24 SepDisplayed time zone: (UTC) Coordinated Universal Time change
01:10 - 02:10 | Test EfficiencyResearch Papers / NIER track at Kangaroo Chair(s): Darko Marinov University of Illinois at Urbana-Champaign | ||
01:10 20mResearch paper | Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once Research Papers Yufeng Zhang College of Information Science and Engineering, Hunan University, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Ziqi Shuai National University of Defense Technology, Tianqi Zhang National University of Defense Technology, Kenli Li College of Information Science and Engineering, National Supercomputing Center in Changsha, Hunan University, Ji Wang National University of Defense Technology Pre-print | ||
01:30 20mTalk | Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling Research Papers Chijin Zhou Tsinghua University, Mingzhe Wang School of Software, Tsinghua University, Jie Liang School of Software, Tsinghua University, Zhe Liu Nanjing University of Aeronautics and Astronautics, Yu Jiang | ||
01:50 10mTalk | SRRTA: Regression Testing Acceleration via State Reuse NIER track Jinhao Dong Peking University, Yiling Lou Peking University, China, Dan Hao Peking University, China |
01:10 - 02:10 | Maintenance and Evolution (4)Research Papers / Tool Demonstrations at Koala Chair(s): Xin Xia Monash University | ||
01:10 20mTalk | SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis Research Papers Yueming Wu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Shihan Dou Huazhong University of Science and Technology, Siru Yang Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, USA, Feng Cheng Huazhong University of Science and Technology, Hong Liang Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
01:30 20mTalk | Generating Concept based API Element Comparison Using a Knowledge Graph Research Papers Yang Liu Fudan University, China, Mingwei Liu Fudan University, China, Xin Peng Fudan University, China, Christoph Treude University of Adelaide, Australia, Zhenchang Xing Australian National University, Australia, Xiaoxin Zhang Fudan University, China | ||
01:50 10mTalk | JITBot: An Explainable Just-In-Time Defect Prediction Bot Tool Demonstrations Chaiyakarn Khanan Mahidol University, Worawit Luewichana Mahidol University, Krissakorn Pruktharathikoon Mahidol University, Jirayus Jiarpakdee Monash University, Australia, Kla Tantithamthavorn Monash University, Australia, Morakot Choetkiertikul Mahidol University, Thailand, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University |
01:10 - 02:10 | Human-computer interactionResearch Papers / Tool Demonstrations at Wombat Chair(s): Zhiyuan Wan Zhejiang University | ||
01:10 20mTalk | Identifying and Describing Information Seeking Tasks Research Papers Chris Satterfield University of British Columbia, Thomas Fritz University of Zurich, Gail Murphy University of British Columbia | ||
01:30 20mTalk | Predicting Code Context Models for Software Development Tasks Research Papers Zhiyuan Wan Zhejiang University, Gail Murphy University of British Columbia, Xin Xia Monash University Pre-print | ||
01:50 10mTalk | Edge4Real: A Cost-Effective Edge Computing based Human Behaviour Recognition System for Human-Centric Software Engineering Tool Demonstrations DI SHAO School of Information Technology, Deakin University, Xiao Liu School of Information Technology, Deakin University, Ben Cheng School of Information Technology, Deakin University, Yi Wang School of Information Technology, Deakin University, Thuong Hoang School of Information Technology, Deakin University |
02:20 - 03:20 | Software Analysis (3)Research Papers / Industry Showcase at Kangaroo Chair(s): Rahul Purandare IIIT-Delhi | ||
02:20 20mTalk | CCGraph: a PDG-based code clone detector with approximate graph matching Research Papers Yue Zou Department of Computer Science and Technology, University of Science and Technology of China, Bihuan Ban School of Data Science, University of Science and Technology of China, Yinxing Xue , Yun Xu University of Science and Technology of China | ||
02:40 20mTalk | Towards Generating Thread-Safe Classes Automatically Research Papers Haichi Wang College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Jun Sun Singapore Management University, Shuang Liu Tianjin University, China, Ayesha Sadiq Monash University, Yuan-Fang Li Monash University | ||
03:00 20mTalk | Industry practice of JavaScript Dynamic Analysis on WeChat Mini-Programs Industry Showcase Yi Liu Southern University of Science and Technology, Jinhui Xie Tencent Inc., Jianbo Yang Tencent Inc., Shiyu Guo Tencent Inc., Yuetang Deng Tencent, Inc., Shuqing Li Southern University of Science and Technology, Yechang Wu Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology |
02:20 - 03:20 | Empirical Software Engineering (2)Research Papers at Koala Chair(s): Julia Rubin University of British Columbia, Canada | ||
02:20 20mTalk | Understanding Performance Concerns in the API Documentation of Data Science Libraries Research Papers Yida Tao Shenzhen University, Jiefang Jiang Shenzhen University, Yepang Liu Southern University of Science and Technology, Zhiwu Xu Shenzhen University, Shengchao Qin University of Teesside | ||
02:40 20mTalk | On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems Research Papers Samuel Benton The University of Texas at Dallas, Xia Li Kennesaw State University, Yiling Lou Peking University, China, Lingming Zhang University of Illinois at Urbana-Champaign, USA | ||
03:00 20mTalk | Automated Third-party Library Detection for Android Applications: Are We There Yet?Experience Research Papers Xian Zhan The Hong Kong Polytechnic University, Lingling Fan Nanyang Technological University, Singapore, Tianming Liu Monash University, Australia, Sen Chen Nanyang Technological University, Singapore, Li Li Monash University, Australia, Haoyu Wang Beijing University of Posts and Telecommunications, China, Yifei Xu Southern University of Science and Technology, Xiapu Luo The Hong Kong Polytechnic University, Yang Liu Nanyang Technological University, Singapore |
02:20 - 03:20 | AI for Software Engineering (4)Research Papers / NIER track at Wombat Chair(s): Hoa Khanh Dam University of Wollongong | ||
02:20 20mTalk | Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks Research Papers | ||
02:40 20mTalk | OCoR: An Overlapping-Aware Code Retriever Research Papers Qihao Zhu Peking University, Zeyu Sun Peking University, Xiran Liang Peking University, Yingfei Xiong Peking University, China, Lu Zhang Peking University, China | ||
03:00 10mTalk | BugPecker: Locating Faulty Methods with Deep Learning on Revision Graphs NIER track Junming Cao School of Software, Shanghai Jiao Tong University, Shouliang Yang School of Software, Shanghai Jiao Tong University, Wenhui Jiang School of Software, Shanghai Jiao Tong University, Hushuang Zeng School of Software, Shanghai Jiao Tong University, Beijun Shen School of Software, Shanghai Jiao Tong University, Hao Zhong Shanghai Jiao Tong University |
08:00 - 09:00 | |||
08:00 20mTalk | No Strings Attached: An Empirical Study of String-related Software Bugs Research Papers Pre-print File Attached | ||
08:20 20mResearch paper | Automated Patch Correctness Assessment: How Far are We? Research Papers Shangwen Wang National University of Defense Technology, Ming Wen Huazhong University of Science and Technology, China, Bo Lin National University of Defense Technology, Hongjun Wu National University of Defense Technology, Yihao Qin National University of Defense Technology, Deqing Zou Huazhong University of Science and Technology, Xiaoguang Mao National University of Defense Technology, Hai Jin Huazhong University of Science and Technology DOI Pre-print Media Attached | ||
08:40 20mResearch paper | Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair Research Papers Haoye Tian University of Luxembourg, Kui Liu University of Luxembourg, Luxembourg, Abdoul Kader Kaboré University of Luxembourg, Anil Koyuncu University of Luxembourg, Luxembourg, Li Li Monash University, Australia, Jacques Klein University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Luxembourg |
08:00 - 09:00 | Verification and TestingTool Demonstrations / Industry Showcase / Research Papers at Koala Chair(s): Jun Sun Singapore Management University | ||
08:00 20mTalk | Attend and Represent: A Novel View on Algorithm Selection for Software Verification Research Papers | ||
08:20 20mTalk | Lightweight MBT Testing for National e-Health Portal in Norway Industry Showcase Davrondzhon Gafurov Norsk Helsenett SF, Margrete Sunde Grovan Norsk Helsenett SF, Margrete Sunde Grovan Norsk Helsenett SF | ||
08:40 10mTalk | Speeding up GUI Testing by On-Device Test Generation Tool Demonstrations Nataniel Borges Jr. CISPA Helmholtz Center for Information Security, Jenny Rau CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA, Germany | ||
08:50 10mTalk | PerfCI: A Toolchain for Automated Performance Testing during Continuous Integration of Python Projects Tool Demonstrations Omar Javed Università della Svizzera italiana, Joshua Heneage Dawes University of Manchester and CERN, Marta Han University of Zagreb and CERN, Giovanni Franzoni CERN, Andreas Pfeiffer CERN, Giles Reger University of Manchester, Walter Binder University of Lugano, Switzerland |
08:00 - 09:00 | Model-Driven Development and Rapid PrototypingTool Demonstrations / Research Papers at Wombat Chair(s): Timo Kehrer Humboldt-Universtität zu Berlin | ||
08:00 20mTalk | Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model Transformations Research Papers Christos Tsigkanos TU Vienna, NIANYU LI Peking University, China, Zhi Jin Peking University, Zhenjiang Hu Peking University, China, Carlo Ghezzi Politecnico di Milano | ||
08:20 20mTalk | Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach Research Papers Chaima Boufaied University of Luxembourg, Claudio Menghi University of Luxembourg, Luxembourg, Domenico Bianculli University of Luxembourg, Lionel Briand SnT Centre/University of Luxembourg, Yago Isasi Parache LuxSpace | ||
08:40 10mTalk | GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language Requirements Tool Demonstrations Kristian Kolthoff Institute for Enterprise Systems (InES), University Of Mannheim, Christian Bartelt Institute for Software and Systems Engineering, TU Clausthal, Simone Paolo Ponzetto Data and Web Science Group, University of Mannheim |
09:10 - 10:10 | Software Security and Trust (2)Tool Demonstrations / Research Papers / Industry Showcase at Kangaroo Chair(s): Raula Gaikovina Kula NAIST | ||
09:10 20mTalk | Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts Research Papers Yinxing Xue , Mingliang Ma University of Science and Technology of China, Yun Lin National University of Singapore, Yulei Sui University of Technology Sydney, Australia, Jiaming Ye University of Science and Technology of China, Tianyong Peng University of Science and Technology of China | ||
09:30 20mTalk | Code-based Vulnerability Detection in Node.js Applications: How far are we? Industry Showcase Bodin Chinthanet Nara Institute of Science and Technology, Serena Elisa Ponta SAP Security Research, Henrik Plate SAP Security Research, Antonino Sabetta SAP Security Research, Raula Gaikovina Kula NAIST, Takashi Ishio Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology | ||
09:50 10mTalk | SmartBugs: A Framework to Analyze Solidity Smart Contracts Tool Demonstrations João F. Ferreira INESC-ID and IST, University of Lisbon, Pedro Cruz IST, University of Lisbon, Portugal, Thomas Durieux KTH Royal Institute of Technology, Sweden, Rui Abreu Faculty of Engineering, University of Porto, Portugal DOI |
09:10 - 10:10 | Testing and AIResearch Papers / Journal-first Papers at Koala Chair(s): Xiaoyuan Xie School of Computer Science, Wuhan University, China | ||
09:10 20mTalk | Predicting failures in multi-tier distributed systems Journal-first Papers Leonardo Mariani University of Milano Bicocca, Mauro Pezze USI Lugano, Switzerland, Oliviero Riganelli University of Milano-Bicocca, Italy, Rui Xin USI Università della Svizzera italiana | ||
09:30 20mTalk | Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness Research Papers David Berend Nanyang Technological University, Singapore, Xiaofei Xie Nanyang Technological University, Lei Ma Kyushu University, Lingjun Zhou College of Intelligence and Computing, Tianjin University, Yang Liu Nanyang Technological University, Singapore, Chi Xu Singapore Institute of Manufacturing Technology, A*Star, Jianjun Zhao Kyushu University | ||
09:50 20mTalk | Metamorphic Object Insertion for Testing Object Detection Systems Research Papers |
10:20 - 11:20 | Tool Demo Showcase (3)Tool Demonstrations at Wombat Chair(s): Csaba Nagy Software Institute - USI, Lugano, Switzerland | ||
10:20 5mTalk | FILO: FIx-LOcus Localization for Backward Incompatibilities Caused by Android Framework Upgrades Tool Demonstrations Marco Mobilio University of Milano Bicocca, Oliviero Riganelli University of Milano-Bicocca, Italy, Daniela Micucci University of Milano-Bicocca, Italy, Leonardo Mariani University of Milano Bicocca | ||
10:25 5mTalk | EXPRESS: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems Tool Demonstrations | ||
10:30 5mTalk | SmartBugs: A Framework to Analyze Solidity Smart Contracts Tool Demonstrations João F. Ferreira INESC-ID and IST, University of Lisbon, Pedro Cruz IST, University of Lisbon, Portugal, Thomas Durieux KTH Royal Institute of Technology, Sweden, Rui Abreu Faculty of Engineering, University of Porto, Portugal DOI | ||
10:35 5mTalk | RepoSkillMiner: Identifying software expertise from GitHub repositories using Natural Language Processing Tool Demonstrations Efstratios Kourtzanidis University Of Macedonia, Alexander Chatzigeorgiou University of Macedonia, Apostolos Ampatzoglou University of Macedonia Pre-print Media Attached File Attached | ||
10:40 5mTalk | Sosed: a tool for finding similar software projects Tool Demonstrations Egor Bogomolov JetBrains Research, Yaroslav Golubev JetBrains Research, Artyom Lobanov JetBrains Research, Vladimir Kovalenko JetBrains Research, JetBrains N.V., Timofey Bryksin JetBrains Research, Saint Petersburg State University | ||
10:45 5mTalk | GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language Requirements Tool Demonstrations Kristian Kolthoff Institute for Enterprise Systems (InES), University Of Mannheim, Christian Bartelt Institute for Software and Systems Engineering, TU Clausthal, Simone Paolo Ponzetto Data and Web Science Group, University of Mannheim | ||
10:50 30mLive Q&A | Q&A or Discussion Tool Demonstrations |
16:00 - 17:00 | Mobile App (2)NIER track / Tool Demonstrations / Research Papers at Kangaroo Chair(s): Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM | ||
16:00 20mTalk | Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for AndroidExperience Research Papers | ||
16:20 20mTalk | Test Automation in Open-Source Android Apps: A Large-Scale Empirical Study Research Papers Jun-Wei Lin University of California, Irvine, Navid Salehnamadi University of California, Irvine, Sam Malek University of California at Irvine, USA | ||
16:40 10mTalk | A Framework for Automated Test Mocking of Mobile Apps NIER track Mattia Fazzini University of Minnesota, Alessandra Gorla IMDEA Software Institute, Alessandro Orso Georgia Tech | ||
16:50 10mTalk | AirMochi – A Tool for Remotely Controlling iOS Devices Tool Demonstrations Nikola Lukic University of Southern California, Saghar Talebipour University of Southern California, Nenad Medvidović University of Southern California, USA |
16:00 - 17:00 | |||
16:00 20mTalk | Prober: Practically Defending Overflows with Page Protection Research Papers Hongyu Liu Purdue University, Ruiqin Tian College of William and Mary, Bin Ren College of William and Mary, Tongping Liu University of Massachusetts Amherst | ||
16:20 20mTalk | MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection Research Papers Alan Romano University at Buffalo, SUNY, Yunhui Zheng IBM Research, Weihang Wang University at Buffalo, SUNY | ||
16:40 20mTalk | Summary-Based Symbolic Evaluation for Smart Contracts Research Papers Yu Feng University of California, Santa Barbara, Emina Torlak University of Washington, Rastislav Bodík University of Washington |
16:00 - 17:00 | Model-Driven Development Journal-first Papers / Research Papers at Wombat Chair(s): Marianne Huchard LIRMM | ||
16:00 20mTalk | Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems Research Papers Benjamin Gafford Grinnell College, Tobias Dürschmid Carnegie Mellon University, Institute for Software Research, Gabriel A. Moreno Carnegie Mellon University, USA, Eunsuk Kang Carnegie Mellon University, USA | ||
16:20 20mTalk | MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools Research Papers Hoang Lam Nguyen Humboldt-Universität zu Berlin, Nebras Nassar Philipps-Universität Marburg, Timo Kehrer Humboldt-Universtität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin | ||
16:40 20mTalk | Characterization of Implied Scenarios as Families of Common Behavior Journal-first Papers Caio Batista de Melo University of California, Irvine, André Luiz Fernandes Cançado University of Brasília, Genaína Nunes Rodrigues University of Brasília Link to publication DOI Pre-print |
Accepted Papers
FAQs on Double Blind
If you have questions not answered below, please contact the program chairs at ase2020.research@gmail.com
Q: Why Double Blind?
There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. Over the past several years, this model has become an accepted practice at many Software Engineering conferences, and it is standard in many other communities as well. For more information on the motivation for double-blind reviewing, see Claire Le Goues’ blog post arguing in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.
Q: How to prepare your paper for double-blind reviewing?
You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
- Omit all authors’ names and affiliations from the title page. If you have acknowledgments, do not mention any names or organizations. Take care not to inadvertently include this information in PDF metadata.
- Refer to your own work in the third person. You should not omit or change the names of your own previously published tools, approaches, or systems, because this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper.
- Take care with the use of supplementary material in the paper. Try to avoid relying on supplementary material that is impossible to properly anonymize, such as a companion technical report or thesis (see below), your personal website, or a YouTube channel. We do encourage the careful sharing of suitably anonymized code repositories and datasets, such as through an anonymous sharing links (doable via DropBox, for example) to a cleaned and anonymized GitHub repository. Check such data files and repositories carefully for any information that could reveal author identities. It is also possible to submit supplementary material with the paper, but again it is necessary to check the material carefully for anything that can reveal author identity.
Q: Can I disseminate a non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at arXiv, etc.?
You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you should not discuss your work specifically with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post the submitted work on arXiv or a similar site immediately before or after submitting to the conference. One option is to make a tech report at your institution, which allows someone to cite the work, if need be, like arXiv, but doesn’t have the same degree of visibility.
Q: I published a previous version of my work on arXiv or as a tech report at my institution. Do I need to cite it, and if so how?
A paper on arXiv or a tech report is not a peer-reviewed publication. If the submission completely subsumes the previous version, then there is no need to cite the previous version at all. We explicitly discourage “anonymous” references (e.g., “[31] —Reference omitted for double-blind review—”: if the cited report is necessary for a reviewer to fully understand the submission, then the relevant material should either be included in the submission, cited in the third person, or provided as suitably anonymized supplementary material (such as an anonymized appendix) hosted anonymously. Note that reviewers are not obligated to review such previous material, however, and so you should strive to make your submissions as stand-alone as possible (regardless of the double-blind review process).
Q: I previously published an earlier version of this work elsewhere than arXiv. What should I do about citing that previous work? If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors. This would include posters, but only if the poster is accompanied by a paper in the conference proceedings. Posters that are not represented in the proceedings can be ignored.
Q: What about a PhD or master’s thesis?
It’s perfectly fine to publish work arising from a PhD or master’s degree, and there’s no need to cite it in a submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution. In general, the guideline is that the author’s job is to ensure that the submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identities, so they will likely not be searching the web to check whether there is a tech report or other unpublished material related to this work.
This FAQ is based on guidelines for double-blind reviewing from ASE 2019 and ICSE 2019.