Tue 11 OctDisplayed time zone: Eastern Time (US & Canada) change
08:30 - 10:00 | Welcome to Day 1Plenary / Research Papers / Journal-first Papers / Industry Showcase / NIER Track / Keynotes / Doctoral Symposium / Late Breaking Results / MIP Awards / Tool Demonstrations at Banquet B | ||
08:30 30mDay opening | Welcome from the Chairs Plenary P: Julia Rubin University of British Columbia, Canada, P: Shahar Maoz Tel Aviv University, Israel, G: Marouane Kessentini Oakland University, USA | ||
09:00 60mKeynote | Autonomous Systems: How to address the Dilemma between Autonomy and Safety Keynotes |
10:30 - 12:30 | Technical Session 2 - Debugging and TroubleshootingResearch Papers / Industry Showcase / Late Breaking Results at Banquet A Chair(s): Andrew Begel Carnegie Mellon University, Software and Societal Systems Department | ||
10:30 20mResearch paper | Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints Research Papers Arianna Blasi Meta; prev. Università della Svizzera italiana, Alessandra Gorla IMDEA Software Institute, Michael D. Ernst University of Washington, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology | ||
10:50 20mResearch paper | CoditT5: Pretraining for Source Code and Natural Language Editing Research Papers Jiyang Zhang University of Texas at Austin, Sheena Panthaplackel UT Austin, Pengyu Nie University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Milos Gligoric University of Texas at Austin Pre-print | ||
11:30 20mResearch paper | Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness Research Papers Haoye Tian University of Luxembourg, Xunzhu Tang University of Luxembourg, Andrew Habib SnT, University of Luxembourg, Shangwen Wang National University of Defense Technology, Kui Liu Huawei Software Engineering Application Technology Lab, Xin Xia Huawei Software Engineering Application Technology Lab, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé SnT, University of Luxembourg Pre-print |
10:30 - 12:30 | Technical Session 3 - Fuzzing IResearch Papers / Tool Demonstrations / NIER Track at Banquet B Chair(s): Aravind Machiry Purdue University | ||
10:30 20mResearch paper | LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles Research Papers Yang Sun Singapore Management University, Singapore, Chris Poskitt Singapore Management University, Jun Sun Singapore Management University, Yuqi Chen ShanghaiTech University, China, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc DOI Pre-print | ||
10:50 20mResearch paper | Fuzzle: Making a Puzzle for FuzzersACM SIGSOFT Distinguished Paper Award Research Papers | ||
11:20 20mResearch paper | HTFuzz: Heap Operation Sequence Sensitive FuzzingVirtual Research Papers Yuanping Yu Institute of Software, Chinese Academy of Sciences, Xiangkun Jia Institute of Software Chinese Academy of Sciences, Yuwei Liu Institute of Software, Chinese Academy of Sciences, Yanhao Wang Qi An Xin Group Corp., Qian Sang Institute of Software, Chinese Academy of Sciences, Chao Zhang Tsinghua University, Purui Su Institute of Software/CAS China | ||
11:40 20mResearch paper | Efficient Greybox Fuzzing to Detect Memory ErrorsVirtualACM SIGSOFT Distinguished Paper Award Research Papers Jinsheng Ba National University of Singapore, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore | ||
12:00 20mResearch paper | Griffin: Grammar-Free DBMS FuzzingVirtual Research Papers Jingzhou Fu School of Software, Tsinghua University, Jie Liang School of Software, Tsinghua University, Zhiyong Wu Tsinghua University, China, Mingzhe Wang Tsinghua University, Yu Jiang Tsinghua University |
10:30 - 12:30 | Technical Session 4 - Mobile Apps IResearch Papers / NIER Track / Industry Showcase / Journal-first Papers / Tool Demonstrations at Gold A Chair(s): Jacques Klein University of Luxembourg | ||
10:30 20mResearch paper | Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues Research Papers Xiaoyu Sun Monash University, Xiao Chen Monash University, Yanjie Zhao Monash University, Pei Liu Monash University, John Grundy Monash University, Li Li Monash University DOI Pre-print | ||
11:40 20mResearch paper | MalWhiteout: Reducing Label Errors in Android Malware DetectionVirtual Research Papers Liu Wang Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Yulei Sui University of Technology Sydney | ||
12:10 20mResearch paper | A Comprehensive Evaluation of Android ICC Resolution TechniquesVirtual Research Papers Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Shixin Zhang Beijing Jiaotong University, China, Yepang Liu Southern University of Science and Technology, Xi Deng Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China DOI Pre-print |
14:00 - 15:30 | Technical Session 5 - Code AnalysisTool Demonstrations / Research Papers / Journal-first Papers at Ballroom C East Chair(s): Vahid Alizadeh DePaul University | ||
14:00 20mResearch paper | Detecting Blocking Errors in Go Programs using Localized Abstract InterpretationACM SIGSOFT Distinguished Paper Award Research Papers Oskar Haarklou Veileborg Aarhus University, Georgian-Vlad Saioc Aarhus University, Anders Møller Aarhus University Link to publication | ||
15:10 20mResearch paper | SelfAPR: Self-supervised Program Repair with Test Execution DiagnosticsVirtual Research Papers He Ye KTH Royal Institute of Technology, Matias Martinez Université Polytechnique Hauts-de-France, Xiapu Luo Hong Kong Polytechnic University, Tao Zhang Macau University of Science and Technology (MUST), Martin Monperrus KTH Royal Institute of Technology |
14:00 - 15:30 | Technical Session 6 - Source Code ManipulationNIER Track / Research Papers / Late Breaking Results at Banquet A Chair(s): Collin McMillan University of Notre Dame | ||
14:10 20mResearch paper | Automated Feedback Generation for Competition-Level Code Research Papers Jialu Zhang Yale University, De Li The MathWorks, Inc., John C. Kolesar Yale University, Hanyuan Shi N/A, Ruzica Piskac Yale University | ||
14:50 20mResearch paper | CrystalBLEU: Precisely and Efficiently Measuring the Similarity of CodeVirtualACM SIGSOFT Distinguished Paper Award Research Papers | ||
15:10 20mResearch paper | Low-Resources Project-Specific Code SummarizationVirtual Research Papers Rui Xie Peking University, Tianxiang Hu Peking University, Wei Ye Peking University, Shikun Zhang Peking University |
14:00 - 15:30 | Technical Session 7 - Fuzzing IIResearch Papers at Banquet B Chair(s): Karine Even-Mendoza Imperial College London | ||
14:00 20mResearch paper | So Many Fuzzers, So Little Time - Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)StackVirtual Research Papers Clement Poncelet Uppsala University, Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Nicolas Tsiftes RISE Research Institutes of Sweden DOI Pre-print | ||
14:20 20mResearch paper | FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures Research Papers | ||
14:40 20mResearch paper | QATest: A Uniform Fuzzing Framework for Question Answering SystemsVirtualACM SIGSOFT Distinguished Paper Award Research Papers Zixi Liu Nanjing University, Yang Feng Nanjing University, Yining Yin Nanjing University, China, Jingyu Sun Nanjing University, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University | ||
15:00 20mResearch paper | Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided FuzzingVirtual Research Papers Jianzhong Su Sun Yat-sen University, Hong-Ning Dai Hong Kong Baptist University, Lingjun Zhao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University |
14:00 - 15:30 | Technical Session 8 - Mobile Apps IIResearch Papers / Tool Demonstrations at Gold A Chair(s): Wei Yang University of Texas at Dallas | ||
14:00 20mResearch paper | Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps Research Papers Forough Mehralian University of California at Irvine, Navid Salehnamadi University of California at Irvine, Syed Fatiul Huq University of California, Irvine, Sam Malek University of California at Irvine, USA | ||
14:20 20mResearch paper | Groundhog: An Automated Accessibility Crawler for Mobile Apps Research Papers Navid Salehnamadi University of California at Irvine, Forough Mehralian University of California at Irvine, Sam Malek University of California at Irvine, USA | ||
14:40 20mResearch paper | Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews Research Papers | ||
15:10 20mResearch paper | The Metamorphosis: Automatic Detection of Scaling Issues for Mobile AppsVirtual Research Papers Yuhui Su Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Shoubin Li ISCAS, Qing Wang Institute of Software at Chinese Academy of Sciences Pre-print |
Wed 12 OctDisplayed time zone: Eastern Time (US & Canada) change
08:00 - 09:30 | Welcome to Day 2Plenary / Research Papers / Journal-first Papers / Industry Showcase / NIER Track / Keynotes / Doctoral Symposium / Late Breaking Results / MIP Awards / Tool Demonstrations at Banquet B Chair(s): Myra Cohen Iowa State University, Houari Sahraoui Université de Montréal | ||
08:00 15mPaper | Modeling bug report quality MIP Awards Link to publication DOI | ||
08:15 15mPaper | Towards automatically generating summary comments for Java methods MIP Awards A: Giriprasad Sridhara IBM Research Labs, A: Emily Hill Drew University, A: Divya Muppaneni , A: Lori Pollock University of Delaware, USA, A: K. Vijay-Shanker Link to publication DOI | ||
08:30 60mKeynote | From Automating Software Engineering to Empowering Software Developers Keynotes |
10:00 - 12:00 | Technical Session 9 - Security and Privacy Research Papers / Industry Showcase at Ballroom C East Chair(s): Wei Yang University of Texas at Dallas | ||
10:00 20mResearch paper | Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage Research Papers Ibrahim Mesecan Iowa State University, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London | ||
10:20 20mResearch paper | ThirdEye: Attention Maps for Safe Autonomous Driving Systems Research Papers Andrea Stocco Università della Svizzera italiana (USI), Paulo J. Nunes Federal University of Pernambuco, Marcelo d'Amorim Federal University of Pernambuco, Paolo Tonella USI Lugano DOI Pre-print | ||
11:00 20mResearch paper | Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps Research Papers Fuman Xie University of Queensland, Yanjun Zhang University of Queensland, Chuan Yan University of Queensland, Suwan Li Nanjing University, Lei Bu Nanjing University, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Zi Huang University of Queensland, Guangdong Bai University of Queensland | ||
11:20 20mResearch paper | An Empirical Study of Automation in Software Security Patch Management Research Papers Nesara Dissanayake University of Adelaide, Asangi Jayatilaka University of Adelaide, Mansooreh Zahedi The Univeristy of Melbourne, Muhammad Ali Babar University of Adelaide | ||
11:40 20mResearch paper | Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions Research Papers Yuxi Ling National University of Singapore, Kailong Wang National University of Singapore, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology, China, Jin Song Dong National University of Singapore |
10:00 - 12:00 | Technical Session 10 - Testing IResearch Papers / Industry Showcase / Tool Demonstrations at Banquet A Chair(s): Gordon Fraser University of Passau | ||
10:00 20mResearch paper | Inline Tests Research Papers Yu Liu University of Texas at Austin, Pengyu Nie University of Texas at Austin, Owolabi Legunsen Cornell University, Milos Gligoric University of Texas at Austin Pre-print | ||
10:30 20mResearch paper | Sorry, I don't Understand: Improving Voice User Interface Testing Research Papers Emanuela Guglielmi University of Molise, Giovanni Rosa University of Molise, Simone Scalabrino University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana, Rocco Oliveto University of Molise | ||
11:10 20mResearch paper | VITAS : Guided Model-based VUI Testing of VPA AppsVirtual Research Papers Suwan Li Nanjing University, Lei Bu Nanjing University, Guangdong Bai University of Queensland, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Hanlin Wei The University of Queensland |
10:00 - 12:00 | Technical Session 12 - Builds and VersionsResearch Papers at Banquet B Chair(s): Yi Li Nanyang Technological University | ||
10:00 20mResearch paper | HyperAST: Enabling Efficient Analysis of Software Histories at ScaleACM SIGSOFT Distinguished Paper Award Research Papers Quentin Le-dilavrec Univ. Rennes, IRISA, INRIA, Djamel Eddine Khelladi CNRS, France, Arnaud Blouin Univ Rennes, INSA Rennes, Inria, CNRS, IRISA, Jean-Marc Jézéquel Univ Rennes - IRISA | ||
10:20 20mResearch paper | Has My Release Disobeyed Semantic Versioning? Static Detection Based On Semantic DifferencingACM SIGSOFT Distinguished Paper Award Research Papers Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Bihuan Chen Fudan University, China, Yang Liu Nanyang Technological University | ||
10:40 20mResearch paper | Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis Research Papers Sheikh Shadab Towqir Virginia Tech, Bowen Shen Virginia Tech, Muhammad Ali Gulzar Virginia Tech, USA, Na Meng Virginia Tech | ||
11:00 20mResearch paper | SmartPip: A Smart Approach to Resolving Python Dependency Conflict IssuesVirtual Research Papers Chao Wang School of Informatics, Xiamen University, Rongxin Wu Xiamen University, Haohao Song School of Informatics, Xiamen University, Jiwu Shu School of Informatics, Xiamen University, Guoqing Li Xiamen Meiya Pico Information Co., Ltd. | ||
11:20 20mResearch paper | Accelerating Build Dependency Error Detection via Virtual BuildVirtual Research Papers Rongxin Wu Xiamen University, Minglei Chen School of Informatics, Xiamen University, Chengpeng Wang The Hong Kong University of Science and Technology, Gang Fan Ant Group, Jiguang Qiu Xiamen Meiya Pico Information Co., Ltd., Charles Zhang Hong Kong University of Science and Technology | ||
11:40 20mResearch paper | BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration BuildsVirtual Research Papers Chen Zhang Fudan University, Bihuan Chen Fudan University, China, Junhao Hu Fudan University, Xin Peng Fudan University, Wenyun Zhao Fudan University, China |
10:00 - 12:00 | Technical Session 11 - Analysis and TypesResearch Papers / NIER Track / Late Breaking Results at Gold A Chair(s): Thiago Ferreira University of Michigan - Flint | ||
10:00 20mResearch paper | SA4U: Practical Static Analysis for Unit Type Error Detection Research Papers Max Taylor The Ohio State University, Johnathon Aurand The Ohio State University, Feng Qin Ohio State University, USA, Xiaorui Wang The Ohio State University, Brandon Henry Tangram Flex, Xiangyu Zhang Purdue University | ||
10:30 20mResearch paper | AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models Research Papers José Antonio Hernández López Department of Computer Science and Systems, University of Murcia, Martin Weyssow DIRO, Université de Montréal, Jesús Sánchez Cuadrado , Houari Sahraoui Université de Montréal Link to publication Pre-print | ||
11:00 20mResearch paper | Static Type Recommendation for PythonVirtual Research Papers Ke Sun Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University | ||
11:20 20mResearch paper | Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial CodeVirtual Research Papers Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhiqiang Yuan School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing Australian National University, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61 | ||
11:40 20mResearch paper | Jasmine: A Static Analysis Framework for Spring Core TechnologiesVirtual Research Papers Miao Chen Beijing University of Posts and Telecommunications, Tengfei Tu Beijing University of Posts and Telecommunications, Hua Zhang Beijing University of Posts and Telecommunications, Qiaoyan Wen Beijing University of Posts and Telecommunications, Weihang Wang University of Southern California |
13:30 - 15:30 | Technical Session 13 - Application DomainsNIER Track / Research Papers / Journal-first Papers at Ballroom C East Chair(s): Andrea Stocco Università della Svizzera italiana (USI) | ||
13:30 20mResearch paper | A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications Research Papers Hoan Anh Nguyen Amazon, Hung Phan , Samantha Syeda Khairunnesa Bradley University, Son Nguyen The University of Texas at Dallas, Aashish Yadavally University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Hridesh Rajan Iowa State University, Tien N. Nguyen University of Texas at Dallas | ||
14:00 20mResearch paper | Automatically Detecting Visual Bugs in HTML5 <canvas> Games Research Papers Finlay Macklon University of Alberta, Mohammad Reza Taesiri University of Alberta, Markos Viggiato University of Alberta, Stefan Antoszko University of Alberta, Natalia Romanova Prodigy Education, Dale Paas Prodigy Education, Cor-Paul Bezemer University of Alberta | ||
14:30 20mResearch paper | Empirical Study of System Resources Abused by IoT AttackersVirtual Research Papers Zijing Yin Tsinghua University, Yiwen Xu Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University | ||
15:10 20mResearch paper | Accelerating OCR-Based Widget Localization for Test Automation of GUI ApplicationsVirtual Research Papers Ju Qian Nanjing University of Aeronautics and Astronautics, Yingwei Ma Nanjing University of Aeronautics and Astronautics, Chenghao Lin Nanjing University of Aeronautics and Astronautics, Lin Chen Nanjing University |
13:30 - 15:30 | Technical Session 14 - Bug Prediction and LocalizationJournal-first Papers / Research Papers / NIER Track / Industry Showcase at Banquet A Chair(s): David Lo Singapore Management University | ||
13:30 20mResearch paper | How Useful is Code Change Information for Fault Localization in Continuous Integration? Research Papers An Ran Chen Concordia University, Tse-Hsun (Peter) Chen Concordia University, Junjie Chen Tianjin University | ||
14:40 20mResearch paper | Evolving Ranking-Based Failure Proximities for Better Clustering in Fault IsolationVirtual Research Papers Yi Song School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China, Xihao Zhang School of Computer Science, Wuhan University, Quanming Liu School of Computer Science, Wuhan University, Ruizhi Gao Sonos Inc. |
13:30 - 15:30 | Technical Session 15 - Compilers and LanguagesJournal-first Papers / Research Papers / Industry Showcase at Banquet B Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign | ||
13:30 20mResearch paper | Cornucopia: A Framework for Feedback Guided Generation of Binaries Research Papers Vidush Singhal Purdue University, Akul Abhilash Pillai Purdue University, Charitha Saumya Purdue University, Milind Kulkarni Purdue University, Aravind Machiry Purdue University | ||
14:10 20mResearch paper | Compiler Testing using Template Java ProgramsACM SIGSOFT Distinguished Paper Award Research Papers Zhiqiang Zang University of Texas at Austin, Nathan Wiatrek The University of Texas at Austin, Milos Gligoric University of Texas at Austin, August Shi University of Texas at Austin DOI Pre-print | ||
14:50 20mResearch paper | TransRepair: Context-aware Program Repair for Compilation ErrorsVirtual Research Papers Xueyang Li SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Shangqing Liu Nanyang Technological University, Ruitao Feng Nanyang Technological University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Singapore, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University | ||
15:10 20mResearch paper | Enriching Compiler Testing with Real Program from Bug ReportVirtual Research Papers Hao Zhong Shanghai Jiao Tong University |
13:30 - 15:30 | Technical Session 16 - Software VulnerabilitiesResearch Papers / Journal-first Papers at Gold A Chair(s): Mohamed Wiem Mkaouer Rochester Institute of Technology | ||
13:30 20mResearch paper | Data Leakage in Notebooks: Static Detection and Better Processes Research Papers Chenyang Yang , Rachel A Brower-Sinning Carnegie Mellon Software Engineering Institute, Grace Lewis Carnegie Mellon Software Engineering Institute, Christian Kästner Carnegie Mellon University | ||
13:50 20mResearch paper | GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as CodeVirtual Research Papers Nuno Saavedra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon Pre-print | ||
14:30 20mResearch paper | Precise (Un)Affected Version Analysis for Web VulnerabilitiesVirtual Research Papers ShiYoukun Fudan University, Yuan Zhang Fudan University, Tianhan Luo Fudan University, Xiangyu Mao Fudan University, Min Yang Fudan University | ||
14:50 20mResearch paper | Leveraging Practitioners' Feedback to Improve a Security LinterVirtual Research Papers Sofia Reis Instituto Superior Técnico, U. Lisboa & INESC-ID, Rui Abreu Faculty of Engineering, University of Porto, Portugal, Marcelo d'Amorim Federal University of Pernambuco, Daniel Fortunato INESC-ID, University of Porto | ||
15:10 20mResearch paper | Insight: Exploring Cross-Ecosystem Vulnerability ImpactsVirtual Research Papers Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, China, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China |
16:00 - 18:00 | Technical Session 19 - Formal Methods and Models IResearch Papers / Journal-first Papers / Tool Demonstrations at Ballroom C East Chair(s): Michalis Famelis Université de Montréal | ||
16:00 20mResearch paper | Automatic Comment Generation via Multi-Pass Deliberation Research Papers Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences | ||
16:40 20mResearch paper | Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural NetworksVirtual Research Papers Zhaodi Zhang East China Normal University, Yiting Wu East China Normal University, Si Liu ETH Zurich, Jing Liu East China Normal University, Min Zhang East China Normal University | ||
17:00 20mResearch paper | Efficient Synthesis of Method Call Sequences for Test Generation and Bounded VerificationVirtual Research Papers Yunfan Zhang Peking University, Ruidong Zhu Peking University, Yingfei Xiong Peking University, Tao Xie Peking University | ||
17:40 20mResearch paper | Detecting Semantic Code Clones by Building AST-based Markov Chains ModelVirtual Research Papers Yueming Wu Nanyang Technological University, Siyue Feng Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology |
16:00 - 18:00 | Technical Session 18 - Testing IIResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A Chair(s): Darko Marinov University of Illinois at Urbana-Champaign | ||
16:10 20mResearch paper | Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems Research Papers DOI Pre-print | ||
17:00 20mResearch paper | Natural Test Generation for Precise Testing of Question Answering SoftwareVirtual Research Papers Qingchao Shen Tianjin University, Junjie Chen Tianjin University, Jie M. Zhang King's College London, Haoyu Wang College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Menghan Tian College of Intelligence and Computing, Tianjin University Pre-print | ||
17:40 20mResearch paper | Selectively Combining Multiple Coverage Goals in Search-Based Unit Test GenerationVirtual Research Papers Zhichao Zhou School of Information Science and Technology, ShanghaiTech University, Yuming Zhou Nanjing University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University, Yutian Tang ShanghaiTech University DOI Pre-print |
16:00 - 18:00 | Technical Session 17 - SE for AIResearch Papers / Late Breaking Results / NIER Track / Tool Demonstrations at Banquet B Chair(s): Tim Menzies North Carolina State University | ||
16:10 20mResearch paper | A Light Bug Triage Framework for Applying Large Pre-trained Language Model Research Papers Jaehyung Lee Pohang University of Science and Technology, Pohang , Hwanjo Yu Pohang University of Science and Technology, Pohang, HanKisun Samsung Research | ||
16:40 20mResearch paper | CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices ArchitectureACM SIGSOFT Distinguished Paper Award Research Papers Vikram Nitin Columbia University, Shubhi Asthana IBM Research, Baishakhi Ray Columbia University, Rahul Krishna IBM Research Pre-print | ||
17:10 20mResearch paper | PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language ModelsVirtual Research Papers Xianchang Luo University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Zhenchang Xing Australian National University, Jiamou Sun Australian National University |
16:00 - 18:00 | Technical Session 20 - Web, Cloud, NetworkingJournal-first Papers / Late Breaking Results / Research Papers / Tool Demonstrations / Industry Showcase at Gold A Chair(s): Karine Even-Mendoza Imperial College London | ||
16:30 20mResearch paper | Exploiting Epochs and Symmetries in Analysing MPI Programs Research Papers | ||
17:10 20mResearch paper | Graph based Incident Extraction and Diagnosis in Large-Scale Online SystemsVirtual Research Papers Zilong He Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yu Luo Tencent Inc., Qiuyu Yan Tencent Inc., Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Guangba Yu Sun Yat-Sen University, Fangyuan Li Tencent Inc. |
Thu 13 OctDisplayed time zone: Eastern Time (US & Canada) change
08:00 - 09:30 | Welcome to Day 3Plenary / Research Papers / Journal-first Papers / Industry Showcase / NIER Track / Keynotes / Doctoral Symposium / Late Breaking Results / MIP Awards / Tool Demonstrations at Banquet B | ||
08:00 30mDay opening | IEEE Harlan D. Mills Award to Prof. Matthew Dwyer Plenary | ||
08:30 60mKeynote | Automated Testing as Production Simulation: Research Opportunities and Challenges Keynotes |
10:00 - 12:00 | Technical Session 23 - SecurityTool Demonstrations / Journal-first Papers / Late Breaking Results / Research Papers at Ballroom C East Chair(s): John-Paul Ore North Carolina State University | ||
11:10 20mResearch paper | Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase ApproachVirtual Research Papers Zhuo Zhang Chongqing University, Yan Lei Chongqing University, Meng Yan Chongqing University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Jiachi Chen Sun Yat-Sen University, Shangwen Wang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology |
10:00 - 12:00 | Technical Session 22 - Code Summarization and RecommendationResearch Papers / NIER Track / Journal-first Papers / Industry Showcase at Banquet A Chair(s): Houari Sahraoui Université de Montréal | ||
10:00 20mResearch paper | Identifying Solidity Smart Contract API Documentation Errors Research Papers Chenguang Zhu The University of Texas at Austin, Ye Liu Nanyang Technological University, Xiuheng Wu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University Pre-print | ||
10:30 20mResearch paper | Answer Summarization for Technical Queries: Benchmark and New Approach Research Papers Chengran Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Ferdian Thung Singapore Management University, Yucen Shi Singapore Management University, Ting Zhang Singapore Management University, Zhou Yang Singapore Management University, Xin Zhou , Jieke Shi Singapore Management University, Junda He Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University | ||
11:40 20mResearch paper | Which Exception Shall We Throw?Virtual Research Papers Hao Zhong Shanghai Jiao Tong University |
10:00 - 12:00 | Technical Session 21 - SE for AI IIResearch Papers / Late Breaking Results / NIER Track / Journal-first Papers at Banquet B Chair(s): Andrea Stocco Università della Svizzera italiana (USI) | ||
10:00 20mResearch paper | DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks Research Papers Simin Chen University of Texas at Dallas, USA, Mirazul Haque UT Dallas, Cong Liu University of Texas at Dallas, USA, Wei Yang University of Texas at Dallas | ||
10:30 20mResearch paper | Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided MethodVirtualACM SIGSOFT Distinguished Paper Award Research Papers Xiaoyuan Xie School of Computer Science, Wuhan University, China, Pengbo Yin School of Computer Science, Wuhan University, Songqiang Chen School of Computer Science, Wuhan University | ||
11:10 20mResearch paper | Towards Understanding the Faults of JavaScript-Based Deep Learning SystemsVirtual Research Papers Lili Quan Tianjin University, Qianyu Guo College of Intelligence and Computing, Tianjin University, Xiaofei Xie Singapore Management University, Singapore, Sen Chen Tianjin University, Xiaohong Li TianJin University, Yang Liu Nanyang Technological University | ||
11:40 20mResearch paper | Toward Improving the Robustness of Deep Learning Models via Model TransformationVirtual Research Papers Yingyi Zhang College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Jiajun Jiang Tianjin University, Hanmo You College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University |
10:00 - 12:00 | Technical Session 24 - Human AspectsResearch Papers / Journal-first Papers / NIER Track at Gold A Chair(s): Silvia Abrahão Universitat Politècnica de València | ||
10:00 20mResearch paper | Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing Research Papers Yanqi Su Australian National University, Zheming Han , Zhenchang Xing Australian National University, Xin Xia Huawei Software Engineering Application Technology Lab, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61 | ||
10:20 20mResearch paper | Data Augmentation for Improving Emotion Recognition in Software Engineering Communication Research Papers Mia Mohammad Imran Virginia Commonwealth University, Yashasvi Jain Drexel University, Preetha Chatterjee Drexel University, USA, Kostadin Damevski Virginia Commonwealth University Pre-print |
13:30 - 15:30 | Technical Session 25 - Software RepairsNIER Track / Research Papers / Tool Demonstrations at Ballroom C East Chair(s): Yannic Noller National University of Singapore | ||
13:30 20mResearch paper | ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications Research Papers Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Guolong Zheng University of Nebraska Lincoln, Hamid Bagheri University of Nebraska-Lincoln, ThanhVu Nguyen George Mason University, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires | ||
13:50 20mResearch paper | Repairing Failure-inducing Inputs with Input Reflection Research Papers Yan Xiao National University of Singapore, Yun Lin National University of Singapore, Ivan Beschastnikh University of British Columbia, Changsheng SUN , David Rosenblum George Mason University, Jin Song Dong National University of Singapore | ||
14:20 20mResearch paper | TransplantFix: Graph Differencing-based Code Transplantation for Automated Program RepairVirtual Research Papers Deheng Yang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology, Liqian Chen National University of Defense Technology, China, Xuezheng Xu Academy of Military Sciences, Beijing, China, Yan Lei Chongqing University, David Lo Singapore Management University, Jiayu He National University of Defense Technology, Changsha, China | ||
14:50 20mResearch paper | StandUp4NPR: Standardizing Setup for Empirically Comparing Neural Program Repair SystemsVirtual Research Papers Wenkang Zhong State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongliang Ge State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongfei Ai State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Chuanyi Li State Key Laboratory for Novel Software Technology, Nanjing University, Kui Liu Huawei Software Engineering Application Technology Lab, Jidong Ge , Bin Luo Software Institute, Nanjing University |
13:30 - 15:30 | Technical Session 27 - Dynamic and Concolic AnalysisResearch Papers / NIER Track / Journal-first Papers at Banquet A Chair(s): ThanhVu Nguyen George Mason University | ||
13:30 20mResearch paper | LISSA: Lazy Initialization with Specialized Solver Aid Research Papers Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Alessandra Gorla IMDEA Software Institute, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires | ||
14:00 20mResearch paper | SymFusion: Hybrid Instrumentation for Concolic Execution Research Papers Emilio Coppa Sapienza University of Rome, Heng Yin UC Riverside, Camil Demetrescu Sapienza University Rome Pre-print | ||
14:20 20mResearch paper | Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel Research Papers David Fernandez-Amoros UNED, Ruben Heradio UNED (Universidad Nacional de Educacion a Distancia), Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Alexander Egyed Johannes Kepler University Linz | ||
15:00 20mResearch paper | Prioritized Constraint-Aided Dynamic Partial-Order ReductionVirtual Research Papers Jie Su Xidian University, Cong Tian Xidian University, Zuchao Yang Xidian University, Jiyu Yang Xidian University, Bin Yu Xidian University, Zhenhua Duan Xidian University |
13:30 - 15:30 | Technical Session 26 - Testing IIIResearch Papers / Industry Showcase at Banquet B Chair(s): Owolabi Legunsen Cornell University | ||
13:30 20mResearch paper | PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing Research Papers Tahmid Rafi University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio | ||
13:50 20mResearch paper | Neuroevolution-Based Generation of Tests and Oracles for Games Research Papers Pre-print | ||
14:30 20mResearch paper | Learning to Construct Better Mutation FaultsVirtualACM SIGSOFT Distinguished Paper Award Research Papers Zhao Tian Tianjin University, Junjie Chen Tianjin University, Qihao Zhu Peking University, Junjie Yang College of Intelligence and Computing, Tianjin University, Lingming Zhang University of Illinois at Urbana-Champaign DOI Pre-print | ||
14:50 20mResearch paper | Differentially Testing Database Transactions for Fun and ProfitVirtual Research Papers Ziyu Cui Institute of Software, Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qianwang Dai Institute of Software, Chinese Academy of Sciences, Jiansen Song , Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences |
13:30 - 15:30 | Technical Session 28 - Safety-Critical and Self-Adaptive SystemsIndustry Showcase / Tool Demonstrations / Research Papers / Late Breaking Results / NIER Track at Room 128 Chair(s): Eunsuk Kang Carnegie Mellon University | ||
13:40 20mResearch paper | Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior PatternsVirtual Research Papers Haoxiang Tian Institute of Software, Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences, China, Jiren Yan Institute of Software, Chinese Academy of Sciences, Yan Jiang Institute of Software, Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Shuo Li Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences | ||
14:00 20mResearch paper | Consistent Scene Graph Generation by Constraint OptimizationVirtual Research Papers Boqi Chen McGill University, Kristóf Marussy Budapest University of Technology and Economics, Sebastian Pilarski McGill University, Oszkár Semeráth Budapest University of Technology and Economics, Daniel Varro McGill University / Budapest University of Technology and Economics |
16:00 - 18:00 | Technical Session 29 - AI for SE IIResearch Papers / Journal-first Papers at Ballroom C East Chair(s): Tim Menzies North Carolina State University | ||
16:00 20mResearch paper | Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? Research Papers Cedric Richter University of Oldenburg, Jan Haltermann University of Oldenburg, Marie-Christine Jakobs Technical University of Darmstadt, Felix Pauck Paderborn University, Germany, Stefan Schott Paderborn University, Heike Wehrheim University of Oldenburg DOI Pre-print Media Attached File Attached | ||
16:20 20mResearch paper | Learning Contract Invariants Using Reinforcement Learning Research Papers Junrui Liu University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Bryan Tan Amazon Web Services, Işıl Dillig University of Texas at Austin, Yu Feng University of California at Santa Barbara | ||
16:40 20mResearch paper | Compressing Pre-trained Models of Code into 3 MB Research Papers Jieke Shi Singapore Management University, Zhou Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Hong Jin Kang Singapore Management University, Singapore, David Lo Singapore Management University DOI Pre-print Media Attached | ||
17:00 20mResearch paper | A Transferable Time Series Forecasting Service using Deep Transformer model for Online SystemsVirtual Research Papers Tao Huang Tencent, Pengfei Chen Sun Yat-Sen University, Jingrun Zhang School of Data and Computer Science, Sun Yat-sen University, Ruipeng Li Tencent, Rui Wang Tencent | ||
17:40 20mResearch paper | Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering DatasetsVirtual Research Papers Zhong Li Nanjing, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University |
16:00 - 18:00 | Technical Session 31 - Code Similarities and RefactoringResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A Chair(s): Hua Ming Oakland University | ||
16:00 20mResearch paper | Reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications Research Papers Alexi Turcotte Northeastern University, Mark W. Aldrich Tufts University, Frank Tip Northeastern University | ||
16:40 20mResearch paper | Learning to Synthesize Relational Invariants Research Papers | ||
17:10 20mResearch paper | TreeCen: Building Tree Graph for Scalable Semantic Code Clone DetectionVirtual Research Papers Yutao Hu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Junru Peng Xidian University, Yueming Wu Nanyang Technological University, Junjie Shan KTH Royal Institute of Technology, Hai Jin Huazhong University of Science and Technology | ||
17:40 20mResearch paper | Studying and Understanding the Tradeoffs Between Generality and Reduction in Software DebloatingVirtual Research Papers |
16:00 - 18:00 | Technical Session 32 - Formal Methods and Models IITool Demonstrations / Journal-first Papers / Research Papers at Banquet B Chair(s): Khouloud Gaaloul University of Michigan - Dearborn | ||
16:10 20mResearch paper | Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses Research Papers Elias Kuiter Otto-von-Guericke-University Magdeburg, Sebastian Krieter University of Ulm, Chico Sundermann University of Ulm, Thomas Thüm University of Ulm, Gunter Saake University of Magdeburg, Germany | ||
16:50 20mResearch paper | Finding and Understanding Incompleteness Bugs in SMT SolversVirtual Research Papers | ||
17:10 20mResearch paper | Checking LTL Satisfiability via End-to-end LearningVirtual Research Papers Weilin Luo School of Computer Science and Engineering, Sun Yat-sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Delong Zhang SUN YAT-SEN UNIVERSITY, Jianfeng Du Guangdong University of Foreign Studies, Hengdi Su SUN YAT-SEN UNIVERSITY | ||
17:30 20mResearch paper | QVIP: An ILP-based Formal Verification Approach for Quantized Neural NetworksVirtual Research Papers Yedi Zhang ShanghaiTech University, Zhe Zhao ShanghaiTech University, Guangke Chen ShanghaiTech University, Fu Song ShanghaiTech University, Min Zhang East China Normal University, Taolue Chen Birkbeck University of London, Jun Sun Singapore Management University |
16:00 - 18:00 | Technical Session 30 - Builds and DependenciesJournal-first Papers / Research Papers / Tool Demonstrations at Room 128 Chair(s): Christian Kästner Carnegie Mellon University | ||
16:00 20mResearch paper | Towards Understanding Third-party Library Dependency in C/C++ Ecosystem Research Papers Wei Tang Tsinghua University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Wu Jiahui Nanyang Technological University, shouguo yang Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Yi Li Nanyang Technological University, Ping Luo Tsinghua University, Yang Liu Nanyang Technological University | ||
16:30 20mResearch paper | Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM Research Papers Jasmine Latendresse Concordia University, Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Emad Shihab Concordia University | ||
16:50 20mResearch paper | Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS ProjectsVirtual Research Papers Yiwen Wu National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Kele Xu National University of Defense Technology, Tao Wang National University of Defense Technology, Huaimin Wang National University of Defense Technology | ||
17:30 20mResearch paper | Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability RecoveryVirtual Research Papers Hui Gao Nanjing University, Hongyu Kuang Nanjing University, Kexin Sun Nanjing University, Xiaoxing Ma Nanjing University, Alexander Egyed Johannes Kepler University Linz, Patrick Mäder Technische Universität Ilmenau, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University Pre-print Media Attached |
Accepted Papers
Q/A on the Double-Anonymous Policy
If you have questions not answered below, please contact the program chairs at ase2022research@gmail.com.
Q: Why Double-Anonymous?
There are many reasons for a submission track to employ a double-anonymous review process, which have become an accepted practice at many Software Engineering conferences over the past several years. This model is standard in many other communities as well. For more information on the motivation for double-anonymous reviewing, see a list of double-anonymous resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.
Q: How to prepare your paper for double-anonymous reviewing?
You must make every reasonable effort to honor the double-anonymous review process but you do not need to guarantee that your identity is undiscoverable. The double-anonymous aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
- Omit all authors’ names and affiliations from the title page. If you have acknowledgments, do not mention any names or organizations. Take care not to inadvertently include this information in PDF metadata.
- Refer to your own work in the third person. You should not omit or change the names of your own previously published tools, approaches, or systems, because this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper.
- Try to avoid relying on supplementary material that is impossible to properly anonymize, such as a companion technical report or thesis (see below), your personal website, or a YouTube channel. We do encourage the careful sharing of suitably anonymized code repositories and datasets, such as through anonymous sharing links (doable via DropBox, for example) to a cleaned and anonymized GitHub repository. Check such data files and repositories carefully for any information that could reveal author identities. It is also possible to submit supplementary material with the paper, but again it is necessary to check the material carefully for anything that can reveal author identity.
Q: Can I submit my work on arXiv?
To comply with the double-anonymous reviewing process, we request that the authors postpone publishing their submitted work on arXiv or similar sites until after the notification of acceptance. If the authors have compelling reasons to nevertheless publish a preprint earlier, this publication cannot take place in the two weeks before or after the ASE submission deadline. Another option is to make a tech report at your institution, which allows someone to cite the work, if needed, but does not have the same degree of visibility. If the program chairs get the impression that the authors frivolously share papers and do not live up to the spirit of the double-anonymous reviewing process, the program chairs can decide to (desk) reject the paper.
Q: Can I disseminate a non-anonymous version of my submitted work by discussing it with colleagues, giving talks, etc.?
You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting) but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you should not discuss your work specifically with members of the program committee and publicize your work on mailing lists or media that are widely shared and can reach the program committee.
Q: I published a previous version of my work on arXiv or as a tech report at my institution. Do I need to cite it, and if so how?
A paper on arXiv or a tech report is not a peer-reviewed publication. If the submission completely subsumes the previous version, then there is no need to cite the previous version at all. We explicitly discourage “anonymous” references (e.g., “[31] —Reference omitted for double-anonymous review—”: if the cited report is necessary for a reviewer to fully understand the submission, then the relevant material should either be included in the submission, cited in third person, or provided as suitably anonymized supplementary material (such as an anonymized appendix) hosted anonymously. Note that reviewers are not obligated to review such previous material, however, and so you should strive to make your submissions as stand-alone as possible (regardless of the double-anonymous review process).
Q: I previously published an earlier version of this work elsewhere than arXiv. What should I do about citing that previous work?
If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors. This would include posters, but only if the poster is accompanied by a paper in the conference proceedings. Posters that are not represented in the proceedings can be ignored.
Q: What about a PhD or master’s thesis?
It’s perfectly fine to publish work arising from a PhD or master’s degree, and there’s no need to cite it in a submission that is undergoing double-anonymous review because prior dissertation publication does not compromise novelty. In the final camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution. In general, the guideline is that the author’s job is to ensure that the submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identities, so they will likely not be searching the web to check whether there is a tech report or other unpublished material related to this work.
This Q/A is based on guidelines from recent editions of ASE, ICSE, and ESEC/FSE.
Call for Papers
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2022 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:
- Requirements and Design
- requirements elicitation and management, traceability analysis;
- architecture and design;
- modeling and model-driven engineering;
- software product lines;
- component-based, service-oriented systems;
- OO/Aspect-oriented;
- Testing and Analysis
- regression, mutation, model-based testing;
- program analysis;
- program synthesis;
- program repairs
- Tools and Processes
- release engineering and DevOps;
- configuration and release management;
- Agile processes
- Maintenance and Evolution
- debugging and fault-localization;
- refactoring and reengineering;
- reverse engineering;
- software reuse;
- API design and management
- Formal Aspects of Software Engineering
- formal methods, validation and verification;
- programming languages;
- specification languages, DSLs
- AI and Software Engineering
- search-based software engineering;
- recommender systems;
- autonomous and self-adapting systems;
- AI for SE;
- SE for AI
- Software Analytics
- mining software repositories;
- apps and app store analysis
- Human Aspects of Software Engineering
- program comprehension;
- systematic reviews, code inspection;
- human-computer interface;
- software visualization;
- crowd-based software engineering;
- distributed and collaborative software engineering
- Social Aspects of Software Engineering
- green and sustainable technologies;
- software economics;
- ethics in software engineering
- Dependability, Safety, and Reliability
- privacy and security;
- reliability;
- safety;
- performance
ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.
Submission Categories and Evaluation Criteria
We solicit submissions in two categories:
Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:
- clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
- articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
- show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.
Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:
- clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
- present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
- carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.
Papers in both categories should:
- discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
- provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
- include an adequate use of the English language, absence of major ambiguity, and with clearly readable figures and tables;
- adhere to the formatting instructions provided below.
New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.
Originality
Papers submitted to ASE 2022 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2022. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.
To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.
Double-Anonymous Review Process
The ASE 2022 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
- Authors’ names and affiliated institution names must be omitted from the submission.
- All references to the author’s prior work should be in the third person.
- Authors are encouraged to title their submission differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.
Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.
Artifact Availability and Supplementary Material
We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.
Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:
Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2022 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.
ACM Policy on Research Involving Humans
If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects
It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.
Formatting and Submission Guidelines
Abstracts and papers must be submitted electronically through the ASE 2022 HotCRP submission site: https://ase2022.hotcrp.com/. All submissions must be in English.
For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interests. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.
For the full paper submissions, authors are required to upload their paper in the PDF format. It should conform, at time of submission, to the ACM Proceedings Template: https://www.acm.org/publications/proceedings-template. LaTEX users must use the \documentclass[sigconf,review,anonymous]{acmart}
option.
Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.
Authors are encouraged to try out the HotCRP format checker and/or experimental SIGSOFT Submission Checker to detect violations to the formatting and double-anonymous guidelines. Mind that the tools are based on heuristics. Therefore, they may miss violations or raise false alarms. The requirements listed in this call for papers take precedence over the results of the tools when deciding whether a paper meets the submission guidelines.
Accepted Papers
Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.
After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommended a change for clarity or accuracy with the paper content.
We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include, but are not limited to, Figshare and Zenodo.
If a submission is accepted, at least one author of the paper is required to register for ASE 2022 and present the paper.
Questions and Comments
If you have any further questions, please contact the PC chairs at ase2022research@gmail.com.