Call for Papers
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2021 invites high quality contributions describing significant, original, and unpublished results.
Solicited topics include, but are not limited to:- Testing, verification, and validation
- Software analysis
- Empirical software engineering
- Maintenance and evolution
- Artificial intelligence for software engineering
- Software engineering for artificial intelligence
- Software security and trust; data privacy
- Recommender systems for software engineering
- Program synthesis & transformations, automated defect repair
- Program comprehension
- Mobile app development
- Automated reasoning techniques
- Software architecture and design
- Reverse engineering and re-engineering
- Model-driven development
- Knowledge acquisition and management
- Cloud computing
- Human-computer interaction
- Component-based service-oriented systems
- Specification languages
- Configuration management
- Requirements engineering
- Software product line engineering
- Software visualization
Two categories of submissions are solicited:
-
Technical Research Papers should describe innovative research in automating software development activities or automated support to users engaged in such activities. They should describe a novel contribution to the field and should carefully support claims of novelty with citations to the relevant literature. Where a submission builds upon previous work of the author(s), the novelty of the new contribution must be clearly described with respect to the previous work, but the author identity should not be revealed, i.e., prior work should be referenced in the third person, to reflect the double-blind review policy. Papers should also clearly discuss how the results were validated
-
Experience Papers should describe a significant experience in applying automated software engineering technology and should carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of automated software engineering.
Like ASE 2020, New Ideas Papers will be managed and evaluated by a separate track (Short Paper track), with a separate PC, deadline, etc.
SUBMISSION
Abstracts and papers must be submitted electronically through the ASE 2021 HotCRP submission site.
Format. All submissions must be in English.
All submissions must be in PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran}
without including the compsoc
or compsocconf
option).
Papers submitted to this track (Technical Research and Experience Papers) must not exceed 10 pages (including figures) plus up to 2 pages that contain ONLY references. Exceeding this limit will be grounds for rejection without review.
Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.
The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs at ase2021research@gmail.com.
Originality. Papers submitted to ASE 2021 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2021. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.
To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences, affiliated with ACM or IEEE, with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
ASE 2021 will pursue a double-blind review process. If you have any questions, please see FAQs and/or contact the PC chairs at ase2021research@gmail.com. Authors are encouraged to double check conflicts of interest on their papers in HotCRP shortly after the submission deadline.
Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Supplementary material. Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Although PC members are not obligated to look at this material, we strongly encourage submitters to use supplementary material to provide access to anonymized code or data, whenever possible. Please carefully review any supplementary material to ensure it conforms to the double-blind policy (described next). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:
ACCEPTED PAPERS
Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including figures), plus 2 pages which may only contain references. Note that all submitted papers must conform to the 10+2 requirement, described above.
We strongly encourage authors of accepted papers to archive the research artifacts, including code and data, associated with their ASE papers. Software Heritage (presented in a keynote at ASE 2018) requires only providing a URL to an existing archive:
Other often used solutions, focusing on data, include Figshare and Zenodo.
After acceptance, the list of paper authors can not be changed under any circumstances and the list of authors on camera-ready papers must be identical to those on submitted papers. After acceptance paper titles can not be changed except by permission of the Track Chairs, and only then when referees recommended a change for clarity or accuracy with paper content.
Tue 16 NovDisplayed time zone: Hobart change
11:00 - 12:00 | AutomationResearch Papers / Tool Demonstrations / Journal-first Papers at Kangaroo Chair(s): Eunsuk Kang Carnegie Mellon University | ||
11:00 20mTalk | Automating User Notice Generation for Smart Contract Functions Research Papers Xing Hu Zhejiang University, Zhipeng Gao Monash University, Xin Xia Huawei Software Engineering Application Technology Lab, David Lo Singapore Management University, Xiaohu Yang Zhejiang University | ||
11:20 20mTalk | End-to-End Automation of Feedback on Student Assembly Programs Research Papers Zikai Liu ETH Zurich, Tingkai Liu UIUC, Qi Li Purdue University, Wenqing Luo UIUC, Steven S. Lumetta UIUC |
11:00 - 12:00 | Empirical StudiesIndustry Showcase / Research Papers / Tool Demonstrations at Koala Chair(s): Felipe Fronchetti Virginia Commonwealth University | ||
11:00 20mTalk | Is Historical Data an Appropriate Benchmark for Reviewer Recommendation Systems? A Case Study of the Gerrit Community Research Papers Ian X. Gauthier McGill University, Maxime Lamothe Polytechnique Montréal, Gunter Mussbacher McGill University, Shane McIntosh University of Waterloo | ||
11:20 20mTalk | An Empirical Study of Bugs in WebAssembly Compilers Research Papers Alan Romano University at Buffalo, Xinyue Liu University at Buffalo, SUNY, Yonghwi Kwon University of Virginia, Weihang Wang University at Buffalo, SUNY |
12:00 - 13:00 | ProgrammingJournal-first Papers / Research Papers / NIER track at Kangaroo Chair(s): Amiangshu Bosu Wayne State University | ||
12:00 20mTalk | Detecting TensorFlow Program Bugs in Real-World Industrial Environment Research Papers Chen Liu , Jie Lu SKL Computer Architecture, ICT, CAS, Guangwei Li Institute of Computing Technology, Ting Yuan SKL Computer Architecture, ICT, CAS University of Chinese Academy of Sciences, China, Lian Li Institute of Computing Technology at Chinese Academy of Sciences, China, Feng Tan Alibaba Group, Jun Yang Alibaba Group, Liang You Alibaba Group, Jingling Xue UNSW Sydney Pre-print | ||
12:20 20mTalk | Why Do Developers Remove Lambda Expressions in Java? Research Papers Mingwei Zheng Huazhong University of Science and Technology, Jun Yang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Hengcheng Zhu The Hong Kong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Hai Jin Huazhong University of Science and Technology |
12:00 - 13:00 | LanguagesNIER track / Tool Demonstrations / Research Papers at Koala Chair(s): Jean-Guy Schneider Deakin University | ||
12:00 20mTalk | Context Debloating for Object-Sensitive Pointer Analysis Research Papers | ||
12:20 20mTalk | Dynamic Generation of Python Bindings for HPC Kernels Research Papers Steven Zhu The University of Texas at Austin, Nader Al Awar The University of Texas at Austin, Mattan Erez The University of Texas at Austin, Milos Gligoric University of Texas at Austin |
18:00 - 19:00 | Testing IResearch Papers / NIER track / Industry Showcase at Kangaroo Chair(s): Xiaoyin Wang University of Texas at San Antonio | ||
18:00 20mTalk | Testing Your Question Answering Software via Asking Recursively Research Papers Songqiang Chen School of Computer Science, Wuhan University, Shuo Jin School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China | ||
18:20 20mTalk | Improving Test Case Generation for REST APIs Through Hierarchical Clustering Research Papers Dimitri Stallenberg Delft University of Technology, Mitchell Olsthoorn Delft University of Technology, Annibale Panichella Delft University of Technology DOI Pre-print |
18:00 - 19:00 | Mining and IssuesNIER track / Research Papers at Koala Chair(s): Hongyu Zhang University of Newcastle | ||
18:00 20mTalk | VizSmith: Automated Visualization Synthesis by Mining Data-Science Notebooks Research Papers Rohan Bavishi University of California at Berkeley, Shadaj Laddad UC Berkeley, Hiroaki Yoshida Fujitsu Laboratories of America, Inc., Mukul Prasad Fujitsu Research of America, Koushik Sen University of California at Berkeley | ||
18:20 20mTalk | ISPY: Automatic Issue-Solution Pair Extraction from Community Live Chats Research Papers Lin Shi Institute of Software at Chinese Academy of Sciences, Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Ye Yang Stevens Institute of Technology, Xiao Chen Institute of Software at Chinese Academy of Sciences, YuMin Zhang Institute of Software Chinese Academy of Sciences, Fangwen Mu Institute of Software Chinese Academy of Sciences, Hanzhi Jiang Institute of Software at Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences Pre-print |
19:00 - 20:00 | CodeTool Demonstrations / Research Papers / NIER track at Kangaroo Chair(s): Michael Pradel University of Stuttgart | ||
19:00 20mTalk | EditSum: A Retrieve-and-Edit Framework for Source Code Summarization Research Papers | ||
19:20 20mTalk | Interactive Cross-language Code Retrieval with Auto-Encoders Research Papers |
19:00 - 20:00 | |||
19:00 20mTalk | Data-Driven Design and Evaluation of SMT Meta-Solving Strategies: Balancing Performance, Accuracy, and Cost Research Papers | ||
19:20 20mTalk | Reducing Bug Triaging Confusion by Learning from Mistakes with a Bug Tossing Knowledge Graph Research Papers Yanqi Su Australian National University, Zhenchang Xing Australian National University, Xin Peng Fudan University, Xin Xia Huawei Software Engineering Application Technology Lab, Chong Wang Fudan University, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61; UNSW | ||
19:40 20mTalk | ASE: A Value Set Decision Procedure for Symbolic Execution Research Papers Alireza S. Abyaneh University of Salzburg, Christoph Kirsch University of Salzburg; Czech Technical University Pre-print |
21:00 - 22:00 | Fuzzing ApplicationsResearch Papers / Industry Showcase / Tool Demonstrations at Kangaroo Chair(s): Thuan Pham The University of Melbourne | ||
21:00 20mTalk | CorbFuzz: Checking Browser Security Policies with Fuzzing Research Papers Chaofan Shou University of California, Santa Barbara, Ismet Burak Kadron University of California at Santa Barbara, Qi Su University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara Pre-print | ||
21:20 20mTalk | SMARTIAN : Enhancing Smart Contract Fuzzing with Static and Dynamic Data-Flow Analyses Research Papers Jaeseung Choi KAIST, Doyeon Kim LINE Plus Corporation, Soomin Kim KAIST, Gustavo Grieco Trail of Bits, Alex Groce Northern Arizona University, Sang Kil Cha KAIST, South Korea |
21:00 - 22:00 | |||
21:00 20mTalk | Finding Replacements for Missing APIs in Library Update Research Papers Kaifeng Huang Fudan University, Bihuan Chen Fudan University, China, Linghao Pan Fudan University, Shuai Wu Fudan University, Xin Peng Fudan University | ||
21:20 20mTalk | Adversarial Attacks to API Recommender Systems: Time to Wake Up and Smell the Coffee? Research Papers Phuong T. Nguyen University of L’Aquila, Claudio Di Sipio University of L'Aquila, Juri Di Rocco University of L'Aquila, Massimiliano Di Penta University of Sannio, Italy, Davide Di Ruscio University of L'Aquila Pre-print |
22:00 - 23:00 | ApplicationsResearch Papers / Industry Showcase / NIER track at Koala Chair(s): ingo Mueller Monash University | ||
22:00 20mTalk | Targeting Requirements Violations of Autonomous Driving Systems by Dynamic Evolutionary Search Research Papers Yixing Luo Peking University, Xiao-Yi Zhang National Institute of Informatics, Japan, Paolo Arcaini National Institute of Informatics
, Zhi Jin Peking University, Haiyan Zhao Peking University, Fuyuki Ishikawa National Institute of Informatics, Rongxin Wu Xiamen University, Tao Xie Peking University |
Wed 17 NovDisplayed time zone: Hobart change
08:00 - 09:00 | Bugs IResearch Papers / Industry Showcase / Tool Demonstrations at Kangaroo Chair(s): Elena Sherman Boise State University | ||
08:00 20mResearch paper | On the Real-World Effectiveness of Static Bug Detectors at Finding Null Pointer Exceptions Research Papers David A Tomassi University of California, Davis, Cindy Rubio-González University of California at Davis | ||
08:20 20mTalk | Subtle Bugs Everywhere: Generating Documentation for Data Wrangling Code Research Papers Chenyang Yang Peking University, Shurui Zhou University of Toronto, Jin L.C. Guo McGill University, Christian Kästner Carnegie Mellon University |
08:00 - 09:00 | VerificationResearch Papers at Koala Chair(s): Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina | ||
08:00 20mTalk | Distribution Models for Falsification and Verification of DNNs Research Papers Felipe Toledo , David Shriver University of Virginia, Sebastian Elbaum University of Virginia, Matthew B Dwyer University of Virginia Pre-print | ||
08:20 20mTalk | SATune: A Study-Driven Auto-Tuning Approach for Configurable Software Verification Tools Research Papers Ugur Koc University of Maryland, College Park, Austin Mordahl The University of Texas at Dallas, Shiyi Wei The University of Texas at Dallas, Jeffrey S. Foster Tufts University, Adam Porter University of Maryland | ||
08:40 20mTalk | Efficient SMT-Based Model Checking for Signal Temporal Logic Research Papers Jia Lee POSTECH, Geunyeol Yu Pohang University of Science and Technology (POSTECH), Kyungmin Bae Pohang University of Science and Technology (POSTECH) |
09:00 - 10:00 | Learning INIER track / Research Papers / Tool Demonstrations at Kangaroo Chair(s): Denys Poshyvanyk William and Mary | ||
09:00 20mTalk | DeepMetis: Augmenting a Deep Learning Test Set to Increase its Mutation Score Research Papers Vincenzo Riccio USI Lugano, Nargiz Humbatova Università della Svizzera Italiana (USI), Gunel Jahangirova USI Lugano, Paolo Tonella USI Lugano | ||
09:20 20mTalk | Efficient state synchronisation in model-based testing through reinforcement learning Research Papers Uraz Cengiz Türker University of Leicester, UK, Robert Hierons University of Sheffield, Mohammad Reza Mousavi King's College London, Ivan Tyukin University of Leicester |
09:00 - 10:00 | Analysis IJournal-first Papers / Research Papers / Industry Showcase at Koala Chair(s): Pavneet Singh Kochhar Microsoft | ||
09:00 20mTalk | Faster Mutation Analysis with Fewer Processes and Smaller Overheads Research Papers Bo Wang Beijing Jiaotong University, Sirui Lu Peking University, Yingfei Xiong Peking University, Feng Liu Beijing Jiaotong University | ||
09:20 20mTalk | FRUGAL: Unlocking Semi-supervised Learning for Software Analytics Research Papers |
11:00 - 12:00 | Finding DefectsResearch Papers / NIER track / Journal-first Papers at Kangaroo Chair(s): Xiao Liu School of Information Technology, Deakin University | ||
11:00 20mTalk | Graph-based Incident Aggregation for Large-Scale Online Service Systems Research Papers Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su The Chinese University of Hong Kong, Jinyang Liu , Hongyu Zhang University of Newcastle, Xuemin Wen Huawei Technologies, Xiao Ling Huawei Technologies, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong | ||
11:20 20mTalk | PyExplainer: Explaining the Predictions of Just-In-Time Defect Models Research Papers Chanathip Pornprasit Monash University, Kla Tantithamthavorn Monash University, Jirayus Jiarpakdee Monash University, Australia, Michael Fu Monash University, Patanamon Thongtanunam University of Melbourne |
11:00 - 12:00 | Large Scale SystemsIndustry Showcase / Research Papers at Koala Chair(s): ingo Mueller Monash University | ||
11:00 20mTalk | Groot: An Event-graph-based Approach for Root Cause Analysis in Industrial Settings Research Papers Hanzhang Wang eBay, Zhengkai Wu University of Illinois at Urbana-Champaign, Huai Jiang eBay, USA, Yichao Huang eBay, Jiamu Wang eBay, Selcuk Kopru eBay, Tao Xie Peking University |
12:00 - 13:00 | |||
12:00 20mTalk | On Multi-Modal Learning of Editing Source Code Research Papers | ||
12:20 20mTalk | Learning Highly Recursive Input Grammars Research Papers Neil Kulkarni University of California, Berkeley, Caroline Lemieux Microsoft Research, Koushik Sen University of California at Berkeley Link to publication Pre-print |
12:00 - 13:00 | Testing ApplicationsIndustry Showcase / NIER track / Research Papers at Koala Chair(s): Scott Barnett | ||
12:00 20mTalk | Automated Testing for Machine Translation via Constituency Invariance Research Papers Pin Ji Nanjing University, Yang Feng Nanjing University, Jia Liu Nanjing University, Zhihong Zhao Nanjing Tech Unniversity, Baowen Xu Nanjing University |
19:00 - 20:00 | DetectionResearch Papers / NIER track at Kangaroo Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
19:00 20mTalk | Race Detection for Event-Driven Node.js Applications Research Papers Xiaoning Chang Institute of Software, Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences, Jinhui Xie Tencent Inc., Yuetang Deng Tencent, Jianbo Yang Tencent Inc., Jiaheng Yang Tencent Inc. | ||
19:20 20mTalk | Log-based Anomaly Detection Without Log Parsing Research Papers Link to publication DOI Pre-print |
19:00 - 20:00 | |||
19:00 20mTalk | Finding the Missing Piece: Permission Specification Analysis for Android NDK Research Papers Hao Zhou The Hong Kong Polytechnic University, Haoyu Wang Beijing University of Posts and Telecommunications, Shuohan Wu The Hong Kong Polytechnic University, Xiapu Luo Hong Kong Polytechnic University, Yajin Zhou Zhejiang University, Ting Chen University of Electronic Science and Technology of China, Ting Wang Pennsylvania State University | ||
19:20 20mTalk | Characterizing and Detecting Configuration Compatibility Issues in Android Apps Research Papers Huaxun Huang Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Lili Wei Hong Kong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology | ||
19:40 20mTalk | Where to Start: Studying Type Annotation Practices in Python Research Papers Wuxia Jin Xi'an Jiaotong University, Dinghong Zhong Xi'an Jiaotong University, Zifan Ding Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University |
21:00 - 22:00 | |||
21:00 20mTalk | APIzation: Generating Reusable APIs from StackOverflow Code Snippets Research Papers Pre-print | ||
21:20 20mTalk | FIGCPS: Effective Failure-inducing Input Generation for Cyber-Physical Systems with Deep Reinforcement Learning Research Papers Shaohua Zhang Tianjin University, Shuang Liu Tianjin University, Jun Sun Singapore Management University, Yuqi Chen Singapore Management University, Wenzhi Huang Tianjin University, Jinyi Liu Tianjin University, Jian Liu Tianjin University, Jianye Hao Tianjin University |
21:00 - 22:00 | Fuzzing and SmellsResearch Papers at Koala Chair(s): Xiaoyuan Xie School of Computer Science, Wuhan University, China | ||
21:00 20mTalk | InstruGuard: Find and Fix Instrumentation Errors for Coverage-based Greybox Fuzzing Research Papers Yuwei Liu Institute of Software, Chinese Academy of Sciences, Yanhao Wang QiAnXin Technology Research Institute, Purui Su Institute of Software/CAS China, Yuanping Yu Institute of Software, Chinese Academy of Sciences, Xiangkun Jia Institute of Software Chinese Academy of Sciences | ||
21:20 20mTalk | RULF: Rust Library Fuzzing via API Dependency Graph Traversal Research Papers Pre-print | ||
21:40 20mTalk | PyNose: A Test Smell Detector For Python Research Papers Tongjie Wang University of California, Irvine, Yaroslav Golubev JetBrains Research, Oleg Smirnov JetBrains Research, Saint Petersburg State University, Jiawei Li University of California, Irvine, Timofey Bryksin JetBrains Research; HSE University, Iftekhar Ahmed University of California, Irvine Pre-print |
22:00 - 23:00 | |||
22:00 20mTalk | JSTAR: JavaScript Specification Type Analyzer using Refinement Research Papers | ||
22:20 20mTalk | Can neural clone detection generalize to unseen functionalities? Research Papers Chenyao Liu School of Software, Tsinghua University, Zeqi Lin Microsoft Research, China, Jian-Guang Lou Microsoft Research, Lijie Wen School of Software, Tsinghua University, Dongmei Zhang Microsoft Research | ||
22:40 20mTalk | Characterizing Transaction-Reverting Statements in Ethereum Smart Contracts Research Papers Lu Liu Southern University of Science and Technology; The Hong Kong University of Science and Technology, Lili Wei Hong Kong University of Science and Technology, Wuqi Zhang The Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology |
22:00 - 23:00 | PerformanceResearch Papers / Journal-first Papers / Tool Demonstrations at Koala Chair(s): Ming Wen Huazhong University of Science and Technology | ||
22:00 20mTalk | "What makes my queries slow?": Subgroup Discovery for SQL Workload Analysis Research Papers Youcef Remil Infologic, INSA Lyon, Anes Bendimerad Infologic, Romain Mathonat Infologic, Philippe Chaleat Infologic, Mehdi Kaytoue INFOLOGIC | ||
22:20 20mTalk | AID: Efficient Prediction of Aggregated Intensity of Dependency in Large-scale Cloud Systems Research Papers Tianyi Yang The Chinese University of Hong Kong, Jiacheng Shen The Chinese University of Hong Kong, Yuxin Su The Chinese University of Hong Kong, Xiao Ling Huawei Technologies, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong |
Thu 18 NovDisplayed time zone: Hobart change
09:00 - 10:00 | DevelopmentIndustry Showcase / Research Papers / NIER track at Kangaroo Chair(s): James C. Davis Purdue University, USA | ||
09:00 20mTalk | Performance Testing for Cloud Computing with Dependent Data Bootstrapping Research Papers Sen He The University of Texas at San Antonio, Tianyi Liu The University of Texas at San Antonio, Palden Lama The University of Texas at San Antonio, Jaewoo Lee University of Georgia, In Kee Kim University of Georgia, Wei Wang University of Texas at San Antonio, USA |
09:00 - 10:00 | Testing IIResearch Papers at Koala Chair(s): Rui Abreu Faculty of Engineering, University of Porto, Portugal | ||
09:00 20mTalk | Nekara: Generalized Concurrency Testing Research Papers Udit Agarwal IIIT Delhi, Pantazis Deligiannis Microsoft Research, Cheng Huang Microsoft, Kumseok Jung University of British Columbia, Akash Lal Microsoft Research, Immad Naseer Microsoft, Matthew J. Parkinson Microsoft Research, UK, Arun Thangamani Microsoft Research, Jyothi Vedurada IIT Hyderabad, Yunpeng Xiao Microsoft | ||
09:20 20mTalk | QDiff: Differential Testing of Quantum Software Stacks Research Papers Jiyuan Wang University of California at Los Angeles, Qian Zhang University of California at Los Angeles, Guoqing Harry Xu University of California at Los Angeles, Miryung Kim University of California at Los Angeles, USA | ||
09:40 20mTalk | Restoring the Executability of Jupyter Notebooks by Automatic Upgrade of Deprecated APIs Research Papers Chenguang Zhu University of Texas at Austin, Ripon Saha Fujitsu Laboratories of America, Inc., Mukul Prasad Fujitsu Research of America, Sarfraz Khurshid The University of Texas at Austin |
11:00 - 12:00 | |||
11:00 20mTalk | Finding A Needle in a Haystack: Automated Mining of Silent Vulnerability Fixes Research Papers Jiayuan Zhou Centre for Software Excellence, Huawei, Canada, Michael Pacheco Centre for Software Excellence, Huawei, Zhiyuan Wan Zhejiang University, Xin Xia Huawei Software Engineering Application Technology Lab, David Lo Singapore Management University, Yuan Wang Huawei Sweden Research Center, Ahmed E. Hassan Queen's University | ||
11:20 20mTalk | DeepCVA: Automated Commit-level Vulnerability Assessment with Deep Multi-task Learning Research Papers Triet Le The University of Adelaide, David Hin The University of Adelaide, Roland Croft The University of Adelaide, Muhammad Ali Babar University of Adelaide Pre-print |
11:00 - 12:00 | |||
11:00 20mTalk | Automated Repair for Size-Based Inaccessibility Issues in Mobile Apps Research Papers Ali S. Alotaibi University of Southern California, Paul T. Chiou University of Southern California, William G.J. Halfond University of Southern California | ||
11:20 20mTalk | Mining Cross-Domain Apps for Software Evolution: A Feature-based Approach Research Papers MD KAFIL UDDIN Swinburne University of Technology, Qiang He Swinburne University of Technology, Jun Han Swinburne University of Technology, Caslon Chua Swinburne University of Technology | ||
11:40 20mTalk | UI Test Migration Across Mobile Platforms Research Papers Saghar Talebipour University of Southern California, Yixue Zhao University of Massachusetts Amherst, Luka Dojcilovic University of Southern California, Chenggang Li University of Southern California, Nenad Medvidović University of Southern California, USA Pre-print |
12:00 - 13:00 | Debt and RefactoringTool Demonstrations / Research Papers at Kangaroo Chair(s): Yuan Tian Queens University, Kingston, Canada | ||
12:00 20mTalk | Intelligent Change Operators for Multi-Objective Refactoring Research Papers Chaima Abid University of Michigan, James Ivers Carnegie Mellon University, USA, Thiago Ferreira University of Michigan - Flint, Marouane Kessentini University of Michigan - Dearborn, Fares El Kahla University of Michigan, Ipek Ozkaya Carnegie Mellon Software Engineering Institute | ||
12:20 20mTalk | Refactorings and Technical Debt in Docker Projects: An Empirical Study Research Papers Emna Ksontini University of Michigan - Dearborn, Marouane Kessentini University of Michigan - Dearborn, Thiago Ferreira University of Michigan - Flint, Foyzul Hassan University of Michigan - Dearborn |
18:00 - 19:00 | FirmwareResearch Papers / NIER track / Industry Showcase at Kangaroo Chair(s): ingo Mueller Monash University | ||
18:00 20mTalk | FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution Research Papers Qiang Liu Zhejiang University, Cen Zhang Nanyang Technological University, Lin Ma Zhejiang University, Muhui Jiang The Hong Kong Polytechnic University; Zhejiang University, Yajin Zhou Zhejiang University, Lei Wu Zhejiang University, Wenbo Shen Zhejing University, Xiapu Luo Hong Kong Polytechnic University, Yang Liu Nanyang Technological University, Kui Ren Zhejiang University Pre-print | ||
18:20 20mTalk | iFIZZ: Deep-State and Efficient Fault-Scenario Generation to Test IoT Firmware Research Papers Peiyu Liu Zhejiang University, Shouling Ji Zhejiang University, Xuhong Zhang Zhejiang University, Qinming Dai Zhejiang University, Kangjie Lu University of Minnesota, Lirong Fu Zhejiang University, Wenzhi Chen Zhejiang University, Peng Cheng Zhejiang University, Wenhai Wang Zhejiang University, Raheem Beyah Georgia Institute of Technology |
18:00 - 19:00 | |||
18:00 20mTalk | Learning Patterns in Configuration Research Papers Ranjita Bhagwan Microsoft Research, Sonu Mehta Microsoft Research, Arjun Radhakrishna Microsoft, Sahil Garg | ||
18:20 20mTalk | Transcode: Detecting Status Code Mapping Errors in Large-Scale Systems Research Papers Wensheng Tang The Hong Kong University of Science and Technology, Yikun Hu The Hong Kong University of Science and Technology, Gang Fan Hong Kong University of Science and Technology, Peisen Yao Hong Kong University of Science and Technology; Ant Group, Rongxin Wu Xiamen University, Guangyuan Bai Tencent Inc., Pengcheng Wang Tencent, China, Charles Zhang Hong Kong University of Science and Technology | ||
18:40 20mTalk | Evolutionary-Guided Synthesis of Verified Pareto Optimal Policies Research Papers Simos Gerasimou University of York, UK, Javier Camara University of Málaga, Radu Calinescu University of York, UK, Naif Alasmari University of York, Faisal Alhwikem University of York, UK, Xinwei Fang University of York, UK |
19:00 - 20:00 | DevelopersResearch Papers / Industry Showcase / NIER track at Kangaroo Chair(s): Chetan Arora Deakin University | ||
19:00 20mTalk | Automating Developer Chat Mining Research Papers Shengyi Pan Zhejiang University, Lingfeng Bao Zhejiang University, Xiaoxue Ren Zhejiang University, Xin Xia Huawei Software Engineering Application Technology Lab, David Lo Singapore Management University, Shanping Li Zhejiang University | ||
19:20 20mTalk | Thinking Like a Developer? Comparing the Attention of Humans with Neural Models of Code Research Papers Pre-print Media Attached |
19:00 - 20:00 | Bugs IIResearch Papers / NIER track / Tool Demonstrations at Koala Chair(s): Annibale Panichella Delft University of Technology | ||
19:00 20mTalk | Detecting Memory-Related Bugs by Tracking Heap Memory Management of C++ Smart Pointers Research Papers Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Wei Wang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jun Yan Institute of Software at Chinese Academy of Sciences, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China, Zongyan Qiu Peking University | ||
19:20 20mTalk | Understanding and Detecting Performance Bugs in Markdown Compilers Research Papers Penghui Li The Chinese University of Hong Kong, Yinxi Liu The Chinese University of Hong Kong, Wei Meng Chinese University of Hong Kong Pre-print |
21:00 - 22:00 | Learning ApplicationsResearch Papers / Tool Demonstrations / Journal-first Papers at Kangaroo Chair(s): Michael Pradel University of Stuttgart | ||
21:00 20mTalk | Deep GUI: Black-box GUI Input Generation with Deep Learning Research Papers Faraz YazdaniBanafsheDaragh University of California, Irvine, Sam Malek University of California at Irvine, USA | ||
21:20 20mTalk | Towards Exploring the Limitations of Active Learning: An Empirical Study Research Papers Qiang Hu University of Luxembourg, Yuejun GUo University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Xiaofei Xie Kyushu University, Wei Ma University of Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg |
21:00 - 22:00 | |||
21:00 20mTalk | Learning Domain-Specific Edit Operations from Model Repositories with Frequent Subgraph Mining Research Papers Christof Tinnes Saarland University, Timo Kehrer Humboldt University of Berlin, Mitchell Joblin Siemens AG, Uwe Hohenstein Siemens AG, Andreas Biesdorf Siemens AG, Sven Apel Saarland University | ||
21:20 20mTalk | Unsupervised Labeling and Extraction of Phrase-based Concepts in Vulnerability Descriptions Research Papers Sofonias Yitagesu Tianjin University, Zhenchang Xing Australian National University, Xiaowang Zhang Tianjin University, Zhiyong Feng Tianjin University, Xiaohong Li TianJin University, Linyi Han Tianjin University | ||
21:40 20mTalk | A Compositional Deadlock Detector for Android Java Research Papers James Brotherston , Paul Brunet University College London, Nikos Gorogiannis Facebook, Max Kanovich University College London |
22:00 - 23:00 | |||
22:00 20mTalk | Binary Diffing as a Network Alignment Problem via Belief Propagation Research Papers Elie Mengin SAMM, EA 4543 - Université Paris 1 Panthéon-Sorbonne, Fabrice Rossi CEREMADE, CNRS, UMR 7534 - Université Paris-Dauphine, PSL University | ||
22:20 20mTalk | CiFi: Versatile Analysis of Class and Field Immutability Research Papers Tobias Roth Technische Universität Darmstadt, Dominik Helm Technische Universität Darmstadt, Michael Reif Technische Universität Darmstadt, Mira Mezini Technische Universität Darmstadt |
22:00 - 23:00 | |||
22:00 20mTalk | Modeling Team Dynamics for the Characterization and Prediction of Delays in User Stories Research Papers Elvan Kula Delft University of Technology, Arie van Deursen Delft University of Technology, Netherlands, Georgios Gousios Facebook & Delft University of Technology Pre-print | ||
22:20 20mTalk | DeepMemory: Model-based Memorization Analysis of Deep Neural Language Models Research Papers Derui Zhu Technical University of Munich, Jinfu Chen Centre for Software Excellence, Huawei, Canada, Weiyi Shang Concordia University, Xuebing Zhou Huawei Munich Research Center, Jens Grossklags Technical University of Munich, Ahmed E. Hassan Queen's University | ||
22:40 20mTalk | Automated Verification of Go Programs via Bounded Model Checking Research Papers Pre-print |
Accepted Papers
FAQs on Double Blind
If you have questions not answered below, please contact the program chairs at ase2021research@gmail.com
Q: Why Double Blind?
There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. Over the past several years, this model has become an accepted practice at many Software Engineering conferences, and it is standard in many other communities as well. For more information on the motivation for double-blind reviewing, see Claire Le Goues’ blog post arguing in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.
Q: How to prepare your paper for double-blind reviewing?
You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
- Omit all authors’ names and affiliations from the title page. If you have acknowledgments, do not mention any names or organizations. Take care not to inadvertently include this information in PDF metadata.
- Refer to your own work in the third person. You should not omit or change the names of your own previously published tools, approaches, or systems, because this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper.
- Take care with the use of supplementary material in the paper. Try to avoid relying on supplementary material that is impossible to properly anonymize, such as a companion technical report or thesis (see below), your personal website, or a YouTube channel. We do encourage the careful sharing of suitably anonymized code repositories and datasets, such as through an anonymous sharing links (doable via DropBox, for example) to a cleaned and anonymized GitHub repository. Check such data files and repositories carefully for any information that could reveal author identities. It is also possible to submit supplementary material with the paper, but again it is necessary to check the material carefully for anything that can reveal author identity.
Q: Can I submit my work on Arxiv?
To comply with the double-blind reviewing process, we request that the authors postpone publishing your submitted work on Arxiv or similar sites until after the notification of acceptance. If the authors have compelling reasons to nevertheless publish a preprint earlier, this publication cannot take place in the two weeks before or after the ASE submission deadline. If the program chairs get the impression that the authors frivolously share papers and do not live up to the spirit of the double-blind reviewing process, the program chairs can decide to (desk) reject the paper.
Q: Can I disseminate a non-blinded version of my submitted work by discussing it with colleagues, giving talks, etc.?
You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you should not discuss your work specifically with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee. One option is to make a tech report at your institution, which allows someone to cite the work, if need be, like arXiv, but doesn’t have the same degree of visibility.
Q: I published a previous version of my work on arXiv or as a tech report at my institution. Do I need to cite it, and if so how?
A paper on arXiv or a tech report is not a peer-reviewed publication. If the submission completely subsumes the previous version, then there is no need to cite the previous version at all. We explicitly discourage “anonymous” references (e.g., “[31] —Reference omitted for double-blind review—”: if the cited report is necessary for a reviewer to fully understand the submission, then the relevant material should either be included in the submission, cited in the third person, or provided as suitably anonymized supplementary material (such as an anonymized appendix) hosted anonymously. Note that reviewers are not obligated to review such previous material, however, and so you should strive to make your submissions as stand-alone as possible (regardless of the double-blind review process).
Q: I previously published an earlier version of this work elsewhere than arXiv. What should I do about citing that previous work? If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors. This would include posters, but only if the poster is accompanied by a paper in the conference proceedings. Posters that are not represented in the proceedings can be ignored.
Q: What about a PhD or master’s thesis?
It’s perfectly fine to publish work arising from a PhD or master’s degree, and there’s no need to cite it in a submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution. In general, the guideline is that the author’s job is to ensure that the submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identities, so they will likely not be searching the web to check whether there is a tech report or other unpublished material related to this work.
This FAQ is based on guidelines for double-blind reviewing from ASE 2019, ICSE 2019, and FSE 2021