Write a Blog >>
Dates
Tracks
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 11 Oct

Displayed time zone: Eastern Time (US & Canada) change

08:30 - 10:00
08:30
30m
Day opening
Welcome from the Chairs
Plenary
P: Julia Rubin University of British Columbia, Canada, P: Shahar Maoz Tel Aviv University, Israel, G: Marouane Kessentini Oakland University, USA
09:00
60m
Keynote
Autonomous Systems: How to address the Dilemma between Autonomy and Safety
Keynotes
K: Lionel Briand University of Luxembourg; University of Ottawa
10:00 - 10:30
Tool Poster Session 1Tool Demonstrations at Ballroom A
10:00
30m
Demonstration
WebMonitor: https://youtu.be/hqVw0JU3k9c
Tool Demonstrations
Ennio Visconti TU Wien, Christos Tsigkanos University of Bern, Switzerland, Laura Nenzi University of Trieste
10:00
30m
Demonstration
Quacky: Quantitative Access Control Permissiveness Analyzer
Tool Demonstrations
William Eiers University of California at Santa Barbara, USA, Ganesh Sankaran University of California Santa Barbara, Albert Li University of California Santa Barbara, Emily O'Mahony University of California Santa Barbara, Benjamin Prince University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara
10:00
30m
Demonstration
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics
Tool Demonstrations
Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Rohan Sethi Loyola University Chicago, Sohini Thota Loyola University Chicago, Shilpika University of California at Davis, Allan J. Miller Loyola University Chicago, Wenxin Jiang Purdue University, Emmanuel S. Amobi Loyola University Chicago, Austin Pinderski Duke University, Loyola University Chicago, Konstantin Läufer Loyola University Chicago, Nicholas J. Hayward Loyola University Chicago, Neil Klingensmith Loyola University Chicago, James C. Davis Purdue University, USA, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory
10:00
30m
Demonstration
AUSERA: Automated Security Vulnerability Detection for Android AppsVirtual
Tool Demonstrations
Sen Chen Tianjin University, Yuxin Zhang Tianjin University, Lingling Fan Nankai University, Jiaming Li Tianjin University, Yang Liu Nanyang Technological University
10:00
30m
Demonstration
Trimmer: Context-Specific Code ReductionVirtual
Tool Demonstrations
Aatira Anum Ahmad Lahore University of Management Sciences, Mubashir Anwar University of Illinois Urbana-Champaign, Hashim Sharif University of Illinois at Urbana-Champaign, Ashish Gehani SRI, Fareed Zaffar Lahore University of Management Sciences
10:00
30m
Demonstration
Maktub: Lightweight Robot System Test Creation and Automation
Tool Demonstrations
Amr Moussa North Carolina State University, John-Paul Ore North Carolina State University
10:00
30m
Demonstration
V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities
Tool Demonstrations
Vipawan Jarukitpipat Mahidol University, Xiao Peng China EverBright Bank, Xiao Peng China EverBright Bank, Chaiyong Ragkhitwetsagul Mahidol University, Thailand, Morakot Choetkiertikul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University, Raula Gaikovina Kula Nara Institute of Science and Technology, Bodin Chinthanet Nara Institute of Science and Technology, Takashi Ishio Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology
10:00
30m
Demonstration
RobSimVer: A Tool for RoboSim Modeling and AnalysisVirtual
Tool Demonstrations
Dehui Du East China Normal University, Ana Cavalcanti University of York, JihuiNie East China Normal University
10:00
30m
Demonstration
Xscope: Hunting for Cross-Chain Bridge AttacksVirtual
Tool Demonstrations
Jiashuo Zhang Peking University, China, Jianbo Gao Peking University, Yue Li Peking University, Ziming Chen Peking University, Zhi Guan Peking University, Zhong Chen
10:00
30m
Demonstration
SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems
Tool Demonstrations
Alberto D. Rodriguez University of Notre Dame, Timothy Newman University of Notre Dame, Katherine R. Dearstyne University of Notre Dame, Jane Cleland-Huang University of Notre Dame
10:00
30m
Demonstration
Building recommender systems for modelling languages with DroidVirtual
Tool Demonstrations
Lissette Almonte Universidad Autónoma de Madrid, Esther Guerra Universidad Autónoma de Madrid, Iván Cantador Universidad Autónoma de Madrid, Juan de Lara Autonomous University of Madrid
Pre-print Media Attached
10:00
30m
Demonstration
Shibboleth: Hybrid Patch Correctness Assessment in Automated Program Repair
Tool Demonstrations
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
10:00 - 10:30
Coffee BreakSocial at Ballroom A
10:00
30m
Coffee break
Coffee Break
Social

10:30 - 12:30
Technical Session 1 - AI for SE IResearch Papers / Industry Showcase at Ballroom C East
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
10:30
20m
Research paper
B-AIS: An Automated Process for Black-box Evaluation of AI-enabled Software Systems against Domain Semantics
Research Papers
Hamed Barzamini , Mona Rahimi Northern Illinois University
10:50
20m
Industry talk
Automatic Generation of Visualizations for Machine Learning Pipelines
Industry Showcase
Lei Liu Fujitsu Laboratories of America, Inc., Wei-Peng Chen Fujitsu Research of America, Inc., Mehdi Bahrami Fujitsu Laboratories of America, Inc., Mukul Prasad Amazon Web Services
11:10
20m
Research paper
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft DesignVirtual
Research Papers
Houssem Ben Braiek École Polytechnique de Montréal, Ali Tfaily Bombardier Aerospace, Foutse Khomh Polytechnique Montréal, Thomas Reid , Ciro Guida Bombardier Aerospace
Pre-print
11:30
20m
Research paper
Unveiling Hidden DNN Defects with Decision-Based Metamorphic TestingVirtual
Research Papers
Yuanyuan Yuan The Hong Kong University of Science and Technology, Qi Pang HKUST, Shuai Wang Hong Kong University of Science and Technology
11:50
20m
Research paper
Patching Weak Convolutional Neural Network Models through Modularization and CompositionVirtual
Research Papers
Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, China, Hongyu Zhang University of Newcastle
12:10
20m
Research paper
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software DeploymentVirtual
Research Papers
Jie Zhu Peking University, Leye Wang Peking University, Xiao Han Shanghai University of Finance and Economics
DOI Pre-print
10:30 - 12:30
Technical Session 2 - Debugging and TroubleshootingResearch Papers / Industry Showcase / Late Breaking Results at Banquet A
Chair(s): Andrew Begel Carnegie Mellon University, Software and Societal Systems Department
10:30
20m
Research paper
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints
Research Papers
Arianna Blasi Meta; prev. Università della Svizzera italiana, Alessandra Gorla IMDEA Software Institute, Michael D. Ernst University of Washington, Mauro Pezze USI Lugano; Schaffhausen Institute of Technology
10:50
20m
Research paper
CoditT5: Pretraining for Source Code and Natural Language Editing
Research Papers
Jiyang Zhang University of Texas at Austin, Sheena Panthaplackel UT Austin, Pengyu Nie University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Milos Gligoric University of Texas at Austin
Pre-print
11:10
20m
Industry talk
Automated Identification of Security-Relevant Configuration Settings Using NLP
Industry Showcase
Patrick Stöckle Technical University of Munich (TUM), Theresa Wasserer Technical University of Munich, Bernd Grobauer Siemens AG, Alexander Pretschner TU Munich
Pre-print
11:30
20m
Research paper
Is this Change the Answer to that Problem? Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness
Research Papers
Haoye Tian University of Luxembourg, Xunzhu Tang University of Luxembourg, Andrew Habib SnT, University of Luxembourg, Shangwen Wang National University of Defense Technology, Kui Liu Huawei Software Engineering Application Technology Lab, Xin Xia Huawei Software Engineering Application Technology Lab, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé SnT, University of Luxembourg
Pre-print
11:50
10m
Paper
A real-world case study for automated ticket team assignment using natural language processing and explainable modelsVirtual
Late Breaking Results
Lucas Pavelski Sidia R&D Institute, Rodrigo de Souza Braga Sidia R&D Institute
10:30 - 12:30
Technical Session 3 - Fuzzing IResearch Papers / Tool Demonstrations / NIER Track at Banquet B
Chair(s): Aravind Machiry Purdue University
10:30
20m
Research paper
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles
Research Papers
Yang Sun Singapore Management University, Singapore, Chris Poskitt Singapore Management University, Jun Sun Singapore Management University, Yuqi Chen ShanghaiTech University, China, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc
DOI Pre-print
10:50
20m
Research paper
Fuzzle: Making a Puzzle for FuzzersACM SIGSOFT Distinguished Paper Award
Research Papers
Haeun Lee KAIST, Soomin Kim KAIST, Sang Kil Cha KAIST, South Korea
11:10
10m
Demonstration
ADEPT: A Testing Platform for Simulated Autonomous DrivingVirtual
Tool Demonstrations
Sen Wang Nanjing University, Zhuheng Sheng Nanjing University, Jingwei Xu , Taolue Chen University of Surrey, UK, Junjun Zhu Nanjing University, Shuhui Zhang Nanjing University, Yuan Yao Nanjing University, Xiaoxing Ma Nanjing University
11:20
20m
Research paper
HTFuzz: Heap Operation Sequence Sensitive FuzzingVirtual
Research Papers
Yuanping Yu Institute of Software, Chinese Academy of Sciences, Xiangkun Jia Institute of Software Chinese Academy of Sciences, Yuwei Liu Institute of Software, Chinese Academy of Sciences, Yanhao Wang Qi An Xin Group Corp., Qian Sang Institute of Software, Chinese Academy of Sciences, Chao Zhang Tsinghua University, Purui Su Institute of Software/CAS China
11:40
20m
Research paper
Efficient Greybox Fuzzing to Detect Memory ErrorsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Jinsheng Ba National University of Singapore, Gregory J. Duck National University of Singapore, Abhik Roychoudhury National University of Singapore
12:00
20m
Research paper
Griffin: Grammar-Free DBMS FuzzingVirtual
Research Papers
Jingzhou Fu School of Software, Tsinghua University, Jie Liang School of Software, Tsinghua University, Zhiyong Wu Tsinghua University, China, Mingzhe Wang Tsinghua University, Yu Jiang Tsinghua University
12:20
10m
Vision and Emerging Results
A Novel Coverage-gudied Greybox Fuzzing based on Power Schedule Optimization with Time ComplexityVirtual
NIER Track
Shengran Wang School of Computer Science and Communication Engineering, Jiangsu University, Jinfu Chen Jiangsu University, Saihua Cai School of Computer Science and Communication Engineering, Jiangsu University, Chi Zhang Jiangsu University, Haibo Chen School of Computer Science and Communication Engineering, Jiangsu University, Jingyi Chen School of Computer Science and Communication Engineering, Jiangsu University
10:30 - 12:30
Technical Session 4 - Mobile Apps IResearch Papers / NIER Track / Industry Showcase / Journal-first Papers / Tool Demonstrations at Gold A
Chair(s): Jacques Klein University of Luxembourg
10:30
20m
Research paper
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues
Research Papers
Xiaoyu Sun Monash University, Xiao Chen Monash University, Yanjie Zhao Monash University, Pei Liu Monash University, John Grundy Monash University, Li Li Monash University
DOI Pre-print
10:50
20m
Paper
Automated, Cost-effective, and Update-driven App TestingVirtual
Journal-first Papers
Chanh-Duc Ngo University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication
11:10
20m
Industry talk
Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement LearningVirtual
Industry Showcase
Zhengwei Lv ByteDance, Chao Peng ByteDance, China, Zhao Zhang Bytedance Network Technology, Ting Su East China Normal University, Kai Liu Bytedance, Ping Yang Bytedance Network Technology
11:30
10m
Vision and Emerging Results
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android AppsVirtual
NIER Track
Vikas K. Malviya Singapore Management University, Chee Wei Leow Singapore Management University, Ashok Kasthuri Singapore Management University, Yan Naing Tun Singapore Management University, Lwin Khin Shar Singapore Management University, Lingxiao Jiang Singapore Management University
Pre-print Media Attached
11:40
20m
Research paper
MalWhiteout: Reducing Label Errors in Android Malware DetectionVirtual
Research Papers
Liu Wang Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, China, Xiapu Luo Hong Kong Polytechnic University, Yulei Sui University of Technology Sydney
12:00
10m
Demonstration
AUSERA: Automated Security Vulnerability Detection for Android AppsVirtual
Tool Demonstrations
Sen Chen Tianjin University, Yuxin Zhang Tianjin University, Lingling Fan Nankai University, Jiaming Li Tianjin University, Yang Liu Nanyang Technological University
12:10
20m
Research paper
A Comprehensive Evaluation of Android ICC Resolution TechniquesVirtual
Research Papers
Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Shixin Zhang Beijing Jiaotong University, China, Yepang Liu Southern University of Science and Technology, Xi Deng Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences, China, Jian Zhang Institute of Software at Chinese Academy of Sciences, China
DOI Pre-print
14:00 - 15:30
Technical Session 5 - Code AnalysisTool Demonstrations / Research Papers / Journal-first Papers at Ballroom C East
Chair(s): Vahid Alizadeh DePaul University
14:00
20m
Research paper
Detecting Blocking Errors in Go Programs using Localized Abstract InterpretationACM SIGSOFT Distinguished Paper Award
Research Papers
Oskar Haarklou Veileborg Aarhus University, Georgian-Vlad Saioc Aarhus University, Anders Møller Aarhus University
Link to publication
14:20
10m
Demonstration
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts
Tool Demonstrations
Ye Liu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore
Pre-print
14:30
20m
Paper
An empirical comparison of four Java-based regression test selection techniques
Journal-first Papers
Min Kyung Shin Colorado State University, Sudipto Ghosh Colorado State University, USA, Leo R. Vijayasarathy Colorado State University
Link to publication DOI
14:50
10m
Demonstration
Augur: Dynamic Taint Analysis for Asynchronous JavaScript
Tool Demonstrations
Mark W. Aldrich Tufts University, Alexi Turcotte Northeastern University, Matthew Blanco Northeastern University, Frank Tip Northeastern University
15:00
10m
Demonstration
FlexType: A Plug-and-Play Framework for Type Inference Models
Tool Demonstrations
Sivani Voruganti UC Davis, Kevin Jesse University of California at Davis, USA, Prem Devanbu Department of Computer Science, University of California, Davis
Pre-print
15:10
20m
Research paper
SelfAPR: Self-supervised Program Repair with Test Execution DiagnosticsVirtual
Research Papers
He Ye KTH Royal Institute of Technology, Matias Martinez Université Polytechnique Hauts-de-France, Xiapu Luo Hong Kong Polytechnic University, Tao Zhang Macau University of Science and Technology (MUST), Martin Monperrus KTH Royal Institute of Technology
14:00 - 15:30
Technical Session 6 - Source Code ManipulationNIER Track / Research Papers / Late Breaking Results at Banquet A
Chair(s): Collin McMillan University of Notre Dame
14:00
10m
Vision and Emerging Results
Automatic Code Documentation Generation Using GPT-3
NIER Track
Junaed Younus Khan University of Calgary, Gias Uddin University of Calgary, Canada
14:10
20m
Research paper
Automated Feedback Generation for Competition-Level Code
Research Papers
Jialu Zhang Yale University, De Li The MathWorks, Inc., John C. Kolesar Yale University, Hanyuan Shi N/A, Ruzica Piskac Yale University
14:30
10m
Paper
Generalizability of Code Clone Detection on CodeBERT
Late Breaking Results
Tim Sonnekalb German Aerospace Center (DLR), Bernd Gruner German Aerospace Center (DLR), Clemens-Alexander Brust German Aerospace Center (DLR), Patrick Mäder Technische Universität Ilmenau
DOI Pre-print
14:40
10m
Vision and Emerging Results
Next Syntactic-Unit Code Completion and Applications
NIER Track
Hoan Anh Nguyen Amazon, Aashish Yadavally University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas
14:50
20m
Research paper
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of CodeVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Aryaz Eghbali University of Stuttgart, Germany, Michael Pradel University of Stuttgart
15:10
20m
Research paper
Low-Resources Project-Specific Code SummarizationVirtual
Research Papers
Rui Xie Peking University, Tianxiang Hu Peking University, Wei Ye Peking University, Shikun Zhang Peking University
14:00 - 15:30
Technical Session 7 - Fuzzing IIResearch Papers at Banquet B
Chair(s): Karine Even-Mendoza Imperial College London
14:00
20m
Research paper
So Many Fuzzers, So Little Time - Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)StackVirtual
Research Papers
Clement Poncelet Uppsala University, Konstantinos (Kostis) Sagonas Uppsala University and Nat. Tech. Univ. of Athens, Nicolas Tsiftes RISE Research Institutes of Sweden
DOI Pre-print
14:20
20m
Research paper
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures
Research Papers
Ashwin Kallingal Joshy Iowa State University, Wei Le Iowa State University
14:40
20m
Research paper
QATest: A Uniform Fuzzing Framework for Question Answering SystemsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Zixi Liu Nanjing University, Yang Feng Nanjing University, Yining Yin Nanjing University, China, Jingyu Sun Nanjing University, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University
15:00
20m
Research paper
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided FuzzingVirtual
Research Papers
Jianzhong Su Sun Yat-sen University, Hong-Ning Dai Hong Kong Baptist University, Lingjun Zhao Sun Yat-sen University, Zibin Zheng School of Data and Computer Science, Sun Yat-sen University, Xiapu Luo Hong Kong Polytechnic University
14:00 - 15:30
Technical Session 8 - Mobile Apps IIResearch Papers / Tool Demonstrations at Gold A
Chair(s): Wei Yang University of Texas at Dallas
14:00
20m
Research paper
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps
Research Papers
Forough Mehralian University of California at Irvine, Navid Salehnamadi University of California at Irvine, Syed Fatiul Huq University of California, Irvine, Sam Malek University of California at Irvine, USA
14:20
20m
Research paper
Groundhog: An Automated Accessibility Crawler for Mobile Apps
Research Papers
Navid Salehnamadi University of California at Irvine, Forough Mehralian University of California at Irvine, Sam Malek University of California at Irvine, USA
14:40
20m
Research paper
Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews
Research Papers
Fahimeh Ebrahimi Louisiana State University, Anas "Nash" Mahmoud Louisiana State University
15:00
10m
Demonstration
ecoCode: a SonarQube Plugin to Remove Energy Smells from Android Projects
Tool Demonstrations
Olivier Le Goaër LIUPPA, Université de Pau et des Pays de l'Adour, Julien Hertout Snapp'
DOI File Attached
15:10
20m
Research paper
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile AppsVirtual
Research Papers
Yuhui Su Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Shoubin Li ISCAS, Qing Wang Institute of Software at Chinese Academy of Sciences
Pre-print

Wed 12 Oct

Displayed time zone: Eastern Time (US & Canada) change

08:00 - 09:30
08:00
15m
Paper
Modeling bug report quality
MIP Awards
A: Pieter Hooimeijer Engineering Manager, Facebook Inc., A: Westley Weimer University of Michigan
Link to publication DOI
08:15
15m
Paper
Towards automatically generating summary comments for Java methods
MIP Awards
A: Giriprasad Sridhara IBM Research Labs, A: Emily Hill Drew University, A: Divya Muppaneni , A: Lori Pollock University of Delaware, USA, A: K. Vijay-Shanker
Link to publication DOI
08:30
60m
Keynote
From Automating Software Engineering to Empowering Software Developers
Keynotes
K: Margaret-Anne Storey University of Victoria
09:30 - 10:00
Tool Poster Session 2Tool Demonstrations at Ballroom A
09:30
30m
Demonstration
ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic Relation
Tool Demonstrations
Jiawei He , Zhida Bao Harbin Engineering University, Quanjun Zhang Nanjing University, Weisong Sun State Key Laboratory for Novel Software Technology, Nanjing University, Jiawei Liu Nanjing University, Chunrong Fang Nanjing University, Yun Lin National University of Singapore
09:30
30m
Demonstration
CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow Memory
Tool Demonstrations
Bernd Fischer Stellenbosch University, South Africa, Salvatore La Torre Università degli Studi di Salerno, Gennaro Parlato University of Molise, Peter Schrammel University of Sussex and Diffblue Ltd
09:30
30m
Demonstration
ADEPT: A Testing Platform for Simulated Autonomous DrivingVirtual
Tool Demonstrations
Sen Wang Nanjing University, Zhuheng Sheng Nanjing University, Jingwei Xu , Taolue Chen University of Surrey, UK, Junjun Zhu Nanjing University, Shuhui Zhang Nanjing University, Yuan Yao Nanjing University, Xiaoxing Ma Nanjing University
09:30
30m
Demonstration
Augur: Dynamic Taint Analysis for Asynchronous JavaScript
Tool Demonstrations
Mark W. Aldrich Tufts University, Alexi Turcotte Northeastern University, Matthew Blanco Northeastern University, Frank Tip Northeastern University
09:30
30m
Demonstration
FlexType: A Plug-and-Play Framework for Type Inference Models
Tool Demonstrations
Sivani Voruganti UC Davis, Kevin Jesse University of California at Davis, USA, Prem Devanbu Department of Computer Science, University of California, Davis
Pre-print
09:30
30m
Demonstration
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts
Tool Demonstrations
Ye Liu Nanyang Technological University, Yi Li Nanyang Technological University, Singapore
Pre-print
09:30
30m
Demonstration
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE
Tool Demonstrations
Eman Abdullah AlOmar Stevens Institute of Technology, Anton Ivanov HSE University, Zarina Kurbatova JetBrains Research, Yaroslav Golubev JetBrains Research, Mohamed Wiem Mkaouer Rochester Institute of Technology, Ali Ouni ETS Montreal, University of Quebec, Timofey Bryksin JetBrains Research, Le Nguyen Rochester Institute of Technology, Amit Kini Rochester Institute of Technology, Aditya Thakur Rochester Institute of Technology
DOI Pre-print
09:30
30m
Demonstration
ecoCode: a SonarQube Plugin to Remove Energy Smells from Android Projects
Tool Demonstrations
Olivier Le Goaër LIUPPA, Université de Pau et des Pays de l'Adour, Julien Hertout Snapp'
DOI File Attached
09:30
30m
Demonstration
Answering Software Deployment Questions via Neural Machine Reading at ScaleVirtual
Tool Demonstrations
Guan Jie Qiu School of Software, Shanghai Jiao Tong University, Diwei Chen School of Software, Shanghai Jiao Tong University, Shuai Zhang School of Software, Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, China, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University
09:30
30m
Demonstration
LiveRef: a Tool for Live Refactoring Java Code
Tool Demonstrations
Sara Fernandes FEUP, Universidade do Porto, Ademar Aguiar FEUP, Universidade do Porto, André Restivo LIACC, Universidade do Porto, Porto, Portugal
09:30
30m
Demonstration
A transformer-based IDE plugin for vulnerability detectionVirtual
Tool Demonstrations
Cláudia Mamede FEUP, U.Porto, Eduard Pinconschi FEUP, U.Porto, Rui Abreu Faculty of Engineering, University of Porto, Portugal
09:30 - 10:00
Coffee BreakSocial at Ballroom A
09:30
30m
Coffee break
Coffee Break
Social

10:00 - 12:00
Technical Session 9 - Security and Privacy Research Papers / Industry Showcase at Ballroom C East
Chair(s): Wei Yang University of Texas at Dallas
10:00
20m
Research paper
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage
Research Papers
Ibrahim Mesecan Iowa State University, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London
10:20
20m
Research paper
ThirdEye: Attention Maps for Safe Autonomous Driving Systems
Research Papers
Andrea Stocco Università della Svizzera italiana (USI), Paulo J. Nunes Federal University of Pernambuco, Marcelo d'Amorim Federal University of Pernambuco, Paolo Tonella USI Lugano
DOI Pre-print
10:40
20m
Industry talk
Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot
Industry Showcase
Meriel von Stein University of Virginia, Sebastian Elbaum University of Virginia
11:00
20m
Research paper
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps
Research Papers
Fuman Xie University of Queensland, Yanjun Zhang University of Queensland, Chuan Yan University of Queensland, Suwan Li Nanjing University, Lei Bu Nanjing University, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Zi Huang University of Queensland, Guangdong Bai University of Queensland
11:20
20m
Research paper
An Empirical Study of Automation in Software Security Patch Management
Research Papers
Nesara Dissanayake University of Adelaide, Asangi Jayatilaka University of Adelaide, Mansooreh Zahedi The Univeristy of Melbourne, Muhammad Ali Babar University of Adelaide
11:40
20m
Research paper
Are They Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions
Research Papers
Yuxi Ling National University of Singapore, Kailong Wang National University of Singapore, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology, China, Jin Song Dong National University of Singapore
10:00 - 12:00
Technical Session 10 - Testing IResearch Papers / Industry Showcase / Tool Demonstrations at Banquet A
Chair(s): Gordon Fraser University of Passau
10:00
20m
Research paper
Inline Tests
Research Papers
Yu Liu University of Texas at Austin, Pengyu Nie University of Texas at Austin, Owolabi Legunsen Cornell University, Milos Gligoric University of Texas at Austin
Pre-print
10:20
10m
Demonstration
LiveRef: a Tool for Live Refactoring Java Code
Tool Demonstrations
Sara Fernandes FEUP, Universidade do Porto, Ademar Aguiar FEUP, Universidade do Porto, André Restivo LIACC, Universidade do Porto, Porto, Portugal
10:30
20m
Research paper
Sorry, I don't Understand: Improving Voice User Interface Testing
Research Papers
Emanuela Guglielmi University of Molise, Giovanni Rosa University of Molise, Simone Scalabrino University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana, Rocco Oliveto University of Molise
10:50
20m
Industry talk
MOREST: Industry Practice of Automatic RESTful API Testing
Industry Showcase
Yi Liu Nanyang Technological University, Yuekang Li Nanyang Technological University, Yang Liu Nanyang Technological University, Ruiyuan Wan , Runchao Wu Huawei Inc., Qingkun Liu Huawei Cloud Computing Technologies Co., Ltd
11:10
20m
Research paper
VITAS : Guided Model-based VUI Testing of VPA AppsVirtual
Research Papers
Suwan Li Nanjing University, Lei Bu Nanjing University, Guangdong Bai University of Queensland, Zhixiu Guo Institute of Information Engineering, Chinese Academy of Sciences, China, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Hanlin Wei The University of Queensland
10:00 - 12:00
Technical Session 12 - Builds and VersionsResearch Papers at Banquet B
Chair(s): Yi Li Nanyang Technological University, Singapore
10:00
20m
Research paper
HyperAST: Enabling Efficient Analysis of Software Histories at ScaleACM SIGSOFT Distinguished Paper Award
Research Papers
Quentin Le-dilavrec Univ. Rennes, IRISA, INRIA, Djamel Eddine Khelladi CNRS, France, Arnaud Blouin Univ Rennes, INSA Rennes, Inria, CNRS, IRISA, Jean-Marc Jézéquel Univ Rennes - IRISA
10:20
20m
Research paper
Has My Release Disobeyed Semantic Versioning? Static Detection Based On Semantic DifferencingACM SIGSOFT Distinguished Paper Award
Research Papers
Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Bihuan Chen Fudan University, China, Yang Liu Nanyang Technological University
10:40
20m
Research paper
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis
Research Papers
Sheikh Shadab Towqir Virginia Tech, Bowen Shen Virginia Tech, Muhammad Ali Gulzar Virginia Tech, USA, Na Meng Virginia Tech
11:00
20m
Research paper
SmartPip: A Smart Approach to Resolving Python Dependency Conflict IssuesVirtual
Research Papers
Chao Wang School of Informatics, Xiamen University, Rongxin Wu Xiamen University, Haohao Song School of Informatics, Xiamen University, Jiwu Shu School of Informatics, Xiamen University, Guoqing Li Xiamen Meiya Pico Information Co., Ltd.
11:20
20m
Research paper
Accelerating Build Dependency Error Detection via Virtual BuildVirtual
Research Papers
Rongxin Wu Xiamen University, Minglei Chen School of Informatics, Xiamen University, Chengpeng Wang The Hong Kong University of Science and Technology, Gang Fan Ant Group, Jiguang Qiu Xiamen Meiya Pico Information Co., Ltd., Charles Zhang Hong Kong University of Science and Technology
11:40
20m
Research paper
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration BuildsVirtual
Research Papers
Chen Zhang Fudan University, Bihuan Chen Fudan University, China, Junhao Hu Fudan University, Xin Peng Fudan University, Wenyun Zhao Fudan University, China
10:00 - 12:00
Technical Session 11 - Analysis and TypesResearch Papers / NIER Track / Late Breaking Results at Gold A
Chair(s): Thiago Ferreira University of Michigan - Flint
10:00
20m
Research paper
SA4U: Practical Static Analysis for Unit Type Error Detection
Research Papers
Max Taylor The Ohio State University, Johnathon Aurand The Ohio State University, Feng Qin Ohio State University, USA, Xiaorui Wang The Ohio State University, Brandon Henry Tangram Flex, Xiangyu Zhang Purdue University
10:20
10m
Vision and Emerging Results
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection
NIER Track
Giacomo Priamo Sapienza University of Rome, Daniele Cono D'Elia Sapienza University of Rome, Leonardo Querzoni Sapienza University Rome
10:30
20m
Research paper
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models
Research Papers
José Antonio Hernández López Department of Computer Science and Systems, University of Murcia, Martin Weyssow DIRO, Université de Montréal, Jesús Sánchez Cuadrado , Houari Sahraoui Université de Montréal
Link to publication Pre-print
10:50
10m
Paper
Towards Gradual Multiparty Session TypingVirtual
Late Breaking Results
Sung-Shik Jongmans Open University of the Netherlands; CWI
11:00
20m
Research paper
Static Type Recommendation for PythonVirtual
Research Papers
Ke Sun Peking University, Yifan Zhao Peking University, Dan Hao Peking University, Lu Zhang Peking University
11:20
20m
Research paper
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial CodeVirtual
Research Papers
Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhiqiang Yuan School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing Australian National University, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61
11:40
20m
Research paper
Jasmine: A Static Analysis Framework for Spring Core TechnologiesVirtual
Research Papers
Miao Chen Beijing University of Posts and Telecommunications, Tengfei Tu Beijing University of Posts and Telecommunications, Hua Zhang Beijing University of Posts and Telecommunications, Qiaoyan Wen Beijing University of Posts and Telecommunications, Weihang Wang University of Southern California
13:30 - 15:30
Technical Session 13 - Application DomainsNIER Track / Research Papers / Journal-first Papers at Ballroom C East
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
13:30
20m
Research paper
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications
Research Papers
Hoan Anh Nguyen Amazon, Hung Phan , Samantha Syeda Khairunnesa Bradley University, Son Nguyen The University of Texas at Dallas, Aashish Yadavally University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Hridesh Rajan Iowa State University, Tien N. Nguyen University of Texas at Dallas
13:50
10m
Vision and Emerging Results
Property-Based Automated Repair of DeFi Protocols
NIER Track
Palina Tolmach Nanyang Technological University, Singapore, Institute of High Performance Computing, Agency for Science, Technology and Research (A*STAR), Singapore, Yi Li Nanyang Technological University, Singapore, Shang-Wei Lin Nanyang Technological University
Pre-print
14:00
20m
Research paper
Automatically Detecting Visual Bugs in HTML5 <canvas> Games
Research Papers
Finlay Macklon University of Alberta, Mohammad Reza Taesiri University of Alberta, Markos Viggiato University of Alberta, Stefan Antoszko University of Alberta, Natalia Romanova Prodigy Education, Dale Paas Prodigy Education, Cor-Paul Bezemer University of Alberta
14:20
10m
Vision and Emerging Results
Reflecting on Recurring Failures in IoT Development
NIER Track
Dharun Anandayuvaraj Purdue University, James C. Davis Purdue University, USA
14:30
20m
Research paper
Empirical Study of System Resources Abused by IoT AttackersVirtual
Research Papers
Zijing Yin Tsinghua University, Yiwen Xu Tsinghua University, Chijin Zhou Tsinghua University, Yu Jiang Tsinghua University
14:50
20m
Paper
Large-Scale Empirical Study of Inline Assembly on 7.6 Million Ethereum Smart ContractsVirtual
Journal-first Papers
Xiao Peng China EverBright Bank, Shuwei Song University of Electronic Science and Technology of China, Xiao Peng China EverBright Bank, Xiapu Luo Hong Kong Polytechnic University, Xiao Peng China EverBright Bank, Xiao Peng China EverBright Bank, Ting Chen University of Electronic Science and Technology of China, Jiachi Chen Sun Yat-Sen University, Tao Zhang Macau University of Science and Technology (MUST), Xiaosong Zhang University of Electronic Science and Technology of China
Link to publication DOI
15:10
20m
Research paper
Accelerating OCR-Based Widget Localization for Test Automation of GUI ApplicationsVirtual
Research Papers
Ju Qian Nanjing University of Aeronautics and Astronautics, Yingwei Ma Nanjing University of Aeronautics and Astronautics, Chenghao Lin Nanjing University of Aeronautics and Astronautics, Lin Chen Nanjing University
13:30 - 15:30
Technical Session 14 - Bug Prediction and LocalizationJournal-first Papers / Research Papers / NIER Track / Industry Showcase at Banquet A
Chair(s): David Lo Singapore Management University
13:30
20m
Research paper
How Useful is Code Change Information for Fault Localization in Continuous Integration?
Research Papers
An Ran Chen Concordia University, Tse-Hsun (Peter) Chen Concordia University, Junjie Chen Tianjin University
13:50
20m
Industry talk
Code Understanding Linter to Detect Variable Misuse
Industry Showcase
Yeonhee Ryou Samsung Research, Samsung Electronics, Sangwoo Joh Samsung Research, Samsung Electronics, Joonmo Yang Samsung Research, Samsung Electronics, Sujin Kim Samsung Research, Samsung Electronics, Youil Kim Samsung Research, Samsung Electronics
14:10
20m
Paper
Static Data-Flow Analysis for Software Product Lines in C
Journal-first Papers
Philipp Dominik Schubert Heinz Nixdorf Institut, Paderborn University, Paul Gazzillo University of Central Florida, Zachary Patterson University of Texas at Dallas, Julian Braha University of Central Florida, Fabian Schiebel Fraunhofer IEM, Ben Hermann Technical University Dortmund, Shiyi Wei University of Texas at Dallas, Eric Bodden University of Paderborn; Fraunhofer IEM
DOI
14:30
10m
Vision and Emerging Results
Boosting Spectrum-Based Fault Localization for Spreadsheets with Product Metrics in a Learning ApproachVirtual
NIER Track
Adil mukhtar Graz University of Technology, Birgit Hofer Graz University of Technology, Dietmar Jannach University of Klagenfurt, Franz Wotawa Graz University of Technology, Konstantin Schekotihin University of Klagenfurt
14:40
20m
Research paper
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault IsolationVirtual
Research Papers
Yi Song School of Computer Science, Wuhan University, Xiaoyuan Xie School of Computer Science, Wuhan University, China, Xihao Zhang School of Computer Science, Wuhan University, Quanming Liu School of Computer Science, Wuhan University, Ruizhi Gao Sonos Inc.
15:00
20m
Paper
Leveraging structural properties of source code graphs for just-in-time bug predictionVirtual
Journal-first Papers
Md Nadim University of Saskatchewan, Debajyoti Mondal University of Saskatchewan, Chanchal K. Roy University of Saskatchewan
13:30 - 15:30
Technical Session 15 - Compilers and LanguagesJournal-first Papers / Research Papers / Industry Showcase at Banquet B
Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign
13:30
20m
Research paper
Cornucopia: A Framework for Feedback Guided Generation of Binaries
Research Papers
Vidush Singhal Purdue University, Akul Abhilash Pillai Purdue University, Charitha Saumya Purdue University, Milind Kulkarni Purdue University, Aravind Machiry Purdue University
13:50
20m
Paper
CSMITHEDGE: More Effective Compiler Testing by Handling Undefined Behaviour Less Conservatively
Journal-first Papers
Karine Even-Mendoza Imperial College London, Cristian Cadar Imperial College London, UK, Alastair F. Donaldson Imperial College London
14:10
20m
Research paper
Compiler Testing using Template Java ProgramsACM SIGSOFT Distinguished Paper Award
Research Papers
Zhiqiang Zang University of Texas at Austin, Nathan Wiatrek The University of Texas at Austin, Milos Gligoric University of Texas at Austin, August Shi University of Texas at Austin
DOI Pre-print
14:30
20m
Industry talk
Towards Understanding the Performance of Rust
Industry Showcase
Yuchen Zhang Stevens Institute of Technology, Yunhang Zhang The University of Utah, Georgios Portokalidis Stevens Institute of Technology, Jun Xu The University of Utah
14:50
20m
Research paper
TransRepair: Context-aware Program Repair for Compilation ErrorsVirtual
Research Papers
Xueyang Li SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Shangqing Liu Nanyang Technological University, Ruitao Feng Nanyang Technological University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Xiaofei Xie Singapore Management University, Singapore, Kai Chen SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Yang Liu Nanyang Technological University
15:10
20m
Research paper
Enriching Compiler Testing with Real Program from Bug ReportVirtual
Research Papers
Hao Zhong Shanghai Jiao Tong University
13:30 - 15:30
Technical Session 16 - Software VulnerabilitiesResearch Papers / Journal-first Papers at Gold A
Chair(s): Mohamed Wiem Mkaouer Rochester Institute of Technology
13:30
20m
Research paper
Data Leakage in Notebooks: Static Detection and Better Processes
Research Papers
Chenyang Yang , Rachel A Brower-Sinning Carnegie Mellon Software Engineering Institute, Grace Lewis Carnegie Mellon Software Engineering Institute, Christian Kästner Carnegie Mellon University
13:50
20m
Research paper
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as CodeVirtual
Research Papers
Nuno Saavedra INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon
Pre-print
14:10
20m
Paper
SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-Flow AnalysisVirtual
Journal-first Papers
Mohan Cui Fudan University, Chengjun Chen Fudan University, Hui Xu Fudan University, Yangfan Zhou Fudan University
14:30
20m
Research paper
Precise (Un)Affected Version Analysis for Web VulnerabilitiesVirtual
Research Papers
ShiYoukun Fudan University, Yuan Zhang Fudan University, Tianhan Luo Fudan University, Xiangyu Mao Fudan University, Min Yang Fudan University
14:50
20m
Research paper
Leveraging Practitioners' Feedback to Improve a Security LinterVirtual
Research Papers
Sofia Reis Instituto Superior Técnico, U. Lisboa & INESC-ID, Rui Abreu Faculty of Engineering, University of Porto, Portugal, Marcelo d'Amorim Federal University of Pernambuco, Daniel Fortunato INESC-ID, University of Porto
15:10
20m
Research paper
Insight: Exploring Cross-Ecosystem Vulnerability ImpactsVirtual
Research Papers
Meiqiu Xu Northeastern University, China, Ying Wang Northeastern University, China, Shing-Chi Cheung Hong Kong University of Science and Technology, Hai Yu Northeastern University, China, Zhiliang Zhu Northeastern University, China
16:00 - 18:00
Technical Session 19 - Formal Methods and Models IResearch Papers / Journal-first Papers / Tool Demonstrations at Ballroom C East
Chair(s): Michalis Famelis Université de Montréal
16:00
20m
Research paper
Automatic Comment Generation via Multi-Pass Deliberation
Research Papers
Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences
16:20
10m
Demonstration
Building recommender systems for modelling languages with DroidVirtual
Tool Demonstrations
Lissette Almonte Universidad Autónoma de Madrid, Esther Guerra Universidad Autónoma de Madrid, Iván Cantador Universidad Autónoma de Madrid, Juan de Lara Autonomous University of Madrid
Pre-print Media Attached
16:30
10m
Demonstration
RobSimVer: A Tool for RoboSim Modeling and AnalysisVirtual
Tool Demonstrations
Dehui Du East China Normal University, Ana Cavalcanti University of York, JihuiNie East China Normal University
16:40
20m
Research paper
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural NetworksVirtual
Research Papers
Zhaodi Zhang East China Normal University, Yiting Wu East China Normal University, Si Liu ETH Zurich, Jing Liu East China Normal University, Min Zhang East China Normal University
17:00
20m
Research paper
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded VerificationVirtual
Research Papers
Yunfan Zhang Peking University, Ruidong Zhu Peking University, Yingfei Xiong Peking University, Tao Xie Peking University
17:20
20m
Paper
Demystifying Performance Regressions in String SolversVirtual
Journal-first Papers
Yao Zhang , Xiaofei Xie Singapore Management University, Singapore, Yi Li Nanyang Technological University, Singapore, Yun Lin National University of Singapore, Sen Chen Tianjin University, Yang Liu Nanyang Technological University, Xiaohong Li TianJin University
Link to publication DOI
17:40
20m
Research paper
Detecting Semantic Code Clones by Building AST-based Markov Chains ModelVirtual
Research Papers
Yueming Wu Nanyang Technological University, Siyue Feng Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
16:00 - 18:00
Technical Session 18 - Testing IIResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A
Chair(s): Darko Marinov University of Illinois at Urbana-Champaign
16:00
10m
Demonstration
Shibboleth: Hybrid Patch Correctness Assessment in Automated Program Repair
Tool Demonstrations
Ali Ghanbari Iowa State University, Andrian Marcus University of Texas at Dallas
16:10
20m
Research paper
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems
Research Papers
Tomasz Kuchta Samsung Electronics, Bartosz Zator Samsung Electronics
DOI Pre-print
16:30
10m
Demonstration
Maktub: Lightweight Robot System Test Creation and Automation
Tool Demonstrations
Amr Moussa North Carolina State University, John-Paul Ore North Carolina State University
16:40
20m
Paper
Cerebro: Static Subsuming Mutant Selection
Journal-first Papers
Aayush Garg University of Luxembourg, Milos Ojdanic University of Luxembourg, Renzo Degiovanni SnT, University of Luxembourg, Thierry Titcheu Chekam SES S.A. & University of Luxembourg (SnT), Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Link to publication DOI
17:00
20m
Research paper
Natural Test Generation for Precise Testing of Question Answering SoftwareVirtual
Research Papers
Qingchao Shen Tianjin University, Junjie Chen Tianjin University, Jie M. Zhang King's College London, Haoyu Wang College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Menghan Tian College of Intelligence and Computing, Tianjin University
Pre-print
17:20
20m
Paper
GloBug: Using global data in Fault LocalizationVirtual
Journal-first Papers
Nima Miryeganeh University of Calgary, Sepehr Hashtroudi University of Calgary, Hadi Hemmati University of Calgary
Link to publication DOI
17:40
20m
Research paper
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test GenerationVirtual
Research Papers
Zhichao Zhou School of Information Science and Technology, ShanghaiTech University, Yuming Zhou Nanjing University, Chunrong Fang Nanjing University, Zhenyu Chen Nanjing University, Yutian Tang ShanghaiTech University
DOI Pre-print
16:00 - 18:00
Technical Session 17 - SE for AIResearch Papers / Late Breaking Results / NIER Track / Tool Demonstrations at Banquet B
Chair(s): Tim Menzies North Carolina State University
16:00
10m
Vision and Emerging Results
On the Naturalness of Bytecode Instructions
NIER Track
Yoon-ho Choi Handong Global University, Jaechang Nam Handong Global University
16:10
20m
Research paper
A Light Bug Triage Framework for Applying Large Pre-trained Language Model
Research Papers
Jaehyung Lee Pohang University of Science and Technology, Pohang , Hwanjo Yu Pohang University of Science and Technology, Pohang, HanKisun Samsung Research
16:30
10m
Vision and Emerging Results
Global Decision Making Over Deep Variability in Feedback-Driven Software Development
NIER Track
Jörg Kienzle McGill University, Canada, Benoit Combemale University of Rennes; Inria; IRISA, Gunter Mussbacher McGill University, Omar Alam Trent University, Francis Bordeleau École de Technologie Supérieure (ETS), Lola Burgueño University of Malaga, Gregor Engels Paderborn University, Jessie Galasso-Carbonnel Université de Montréal, Jean-Marc Jézéquel Univ Rennes - IRISA, Bettina Kemme McGill University, Canada, Sébastien Mosser McMaster University, Houari Sahraoui Université de Montréal, Maximilian Schiedermeier McGill University, Eugene Syriani Université de Montréal
16:40
20m
Research paper
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices ArchitectureACM SIGSOFT Distinguished Paper Award
Research Papers
Vikram Nitin Columbia University, Shubhi Asthana IBM Research, Baishakhi Ray Columbia University, Rahul Krishna IBM Research
Pre-print
17:00
10m
Demonstration
Answering Software Deployment Questions via Neural Machine Reading at ScaleVirtual
Tool Demonstrations
Guan Jie Qiu School of Software, Shanghai Jiao Tong University, Diwei Chen School of Software, Shanghai Jiao Tong University, Shuai Zhang School of Software, Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, China, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University
17:10
20m
Research paper
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language ModelsVirtual
Research Papers
Xianchang Luo University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Zhenchang Xing Australian National University, Jiamou Sun Australian National University
17:30
10m
Vision and Emerging Results
Test-Driven Multi-Task Learning with Functionally Equivalent Code Transformation for Neural Code GenerationVirtual
NIER Track
Xin Wang Wuhan University, Xiao Liu School of Information Technology, Deakin University, Pingyi Zhou Noah’s Ark Lab, Huawei Technologies, Qixia Liu China Mobile Communications Corporation, Jin Liu Wuhan University, Hao Wu Yunnan University, Xiaohui Cui Wuhan University
17:40
10m
Paper
Towards Using Data-Influence Methods to Detect Noisy Samples in Source Code CorporaVirtual
Late Breaking Results
Anh T. V. Dau FPT Software AI Center, Nghi D. Q. Bui Singapore Management University, Thang Nguyen-Duc FPT Software AI Center, Hoang Thanh-Tung Vietnam National University
16:00 - 18:00
Technical Session 20 - Web, Cloud, NetworkingJournal-first Papers / Late Breaking Results / Research Papers / Tool Demonstrations / Industry Showcase at Gold A
Chair(s): Karine Even-Mendoza Imperial College London
16:00
20m
Paper
Mutation-based Analysis of Queueing Network Performance Models -- Journal First Research
Journal-first Papers
Thomas Laurent Lero & University College Dublin, Paolo Arcaini National Institute of Informatics , Catia Trubiani Gran Sasso Science Institute, Anthony Ventresque University College Dublin & Lero, Ireland
Link to publication DOI
16:20
10m
Demonstration
WebMonitor: https://youtu.be/hqVw0JU3k9c
Tool Demonstrations
Ennio Visconti TU Wien, Christos Tsigkanos University of Bern, Switzerland, Laura Nenzi University of Trieste
16:30
20m
Research paper
Exploiting Epochs and Symmetries in Analysing MPI Programs
Research Papers
Rishabh Ranjan IIT Delhi, Ishita Agrawal IIT Delhi, Subodh Sharma IIT Delhi
16:50
20m
Paper
MLASP: Machine learning assisted capacity planning
Journal-first Papers
Arthur Vitui Concordia University, Tse-Hsun (Peter) Chen Concordia University
Link to publication DOI
17:10
20m
Research paper
Graph based Incident Extraction and Diagnosis in Large-Scale Online SystemsVirtual
Research Papers
Zilong He Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yu Luo Tencent Inc., Qiuyu Yan Tencent Inc., Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Guangba  Yu Sun Yat-Sen University, Fangyuan Li Tencent Inc.
17:30
10m
Paper
ESAVE: Estimating Server and Virtual Machine EnergyVirtual
Late Breaking Results
Priyavanshi Pathania Accenture Labs, Rohit Mehra Accenture Labs, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture, Adam P. Burden Accenture
17:40
20m
Industry talk
MCDA Framework for Edge-Aware Multi-Cloud Hybrid Architecture RecommendationVirtual
Industry Showcase
Manish Ahuja Accenture Labs, Narendranath Sukhavasi Accenture Labs, Swapnajeet Choudhury Accenture Labs, Kaushik Amar Das Accenture Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vikrant Kaulgud Accenture Labs, India

Thu 13 Oct

Displayed time zone: Eastern Time (US & Canada) change

10:00 - 12:00
Technical Session 23 - SecurityTool Demonstrations / Journal-first Papers / Late Breaking Results / Research Papers at Ballroom C East
Chair(s): John-Paul Ore North Carolina State University
10:00
10m
Demonstration
V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities
Tool Demonstrations
Vipawan Jarukitpipat Mahidol University, Xiao Peng China EverBright Bank, Xiao Peng China EverBright Bank, Chaiyong Ragkhitwetsagul Mahidol University, Thailand, Morakot Choetkiertikul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University, Raula Gaikovina Kula Nara Institute of Science and Technology, Bodin Chinthanet Nara Institute of Science and Technology, Takashi Ishio Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology
10:10
20m
Paper
Automatic Detection of Java Cryptographic API Misuses: Are We There Yet?
Journal-first Papers
Ying Zhang Virginia Tech, USA, Md Mahir Asef Kabir Virginia Tech, Ya Xiao Virginia Tech, Daphne Yao Virginia Tech, Na Meng Virginia Tech
DOI Pre-print
10:30
10m
Demonstration
A transformer-based IDE plugin for vulnerability detectionVirtual
Tool Demonstrations
Cláudia Mamede FEUP, U.Porto, Eduard Pinconschi FEUP, U.Porto, Rui Abreu Faculty of Engineering, University of Porto, Portugal
10:40
10m
Demonstration
Quacky: Quantitative Access Control Permissiveness Analyzer
Tool Demonstrations
William Eiers University of California at Santa Barbara, USA, Ganesh Sankaran University of California Santa Barbara, Albert Li University of California Santa Barbara, Emily O'Mahony University of California Santa Barbara, Benjamin Prince University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara
10:50
10m
Paper
Towards Robust Models of Code via Energy-Based Learning on Auxiliary DatasetsVirtual
Late Breaking Results
Nghi D. Q. Bui Singapore Management University, Yijun Yu Huawei Ireland Research Center
11:00
10m
Demonstration
Xscope: Hunting for Cross-Chain Bridge AttacksVirtual
Tool Demonstrations
Jiashuo Zhang Peking University, China, Jianbo Gao Peking University, Yue Li Peking University, Ziming Chen Peking University, Zhi Guan Peking University, Zhong Chen
11:10
20m
Research paper
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase ApproachVirtual
Research Papers
Zhuo Zhang Chongqing University, Yan Lei Chongqing University, Meng Yan Chongqing University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Jiachi Chen Sun Yat-Sen University, Shangwen Wang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology
10:00 - 12:00
Technical Session 22 - Code Summarization and RecommendationResearch Papers / NIER Track / Journal-first Papers / Industry Showcase at Banquet A
Chair(s): Houari Sahraoui Université de Montréal
10:00
20m
Research paper
Identifying Solidity Smart Contract API Documentation Errors
Research Papers
Chenguang Zhu The University of Texas at Austin, Ye Liu Nanyang Technological University, Xiuheng Wu Nanyang Technological University, Singapore, Yi Li Nanyang Technological University, Singapore
Pre-print
10:20
10m
Vision and Emerging Results
Few-shot training LLMs for project-specific code-summarization
NIER Track
Toufique Ahmed University of California at Davis, Prem Devanbu Department of Computer Science, University of California, Davis
DOI Pre-print
10:30
20m
Research paper
Answer Summarization for Technical Queries: Benchmark and New Approach
Research Papers
Chengran Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Ferdian Thung Singapore Management University, Yucen Shi Singapore Management University, Ting Zhang Singapore Management University, Zhou Yang Singapore Management University, Xin Zhou , Jieke Shi Singapore Management University, Junda He Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University
10:50
20m
Paper
Code Structure Guided Transformer for Source Code SummarizationVirtual
Journal-first Papers
Shuzheng Gao Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Yulan He University of Warwick, Jichuan Zeng The Chinese University of Hong Kong, Lun Yiu Nie Tsinghua University, Xin Xia Huawei Software Engineering Application Technology Lab, Michael Lyu The Chinese University of Hong Kong
11:10
10m
Vision and Emerging Results
Taming Multi-Output Recommenders for Software EngineeringVirtual
NIER Track
Christoph Treude University of Melbourne
11:20
20m
Industry talk
MV-HAN: A Hybrid Attentive Networks based Multi-View Learning Model for Large-scale Contents RecommendationVirtual
Industry Showcase
Ge Fan Tencent Inc., Chaoyun Zhang Tencent Inc., Kai Wang Tencent Inc., Junyang Chen Shenzhen University
DOI Pre-print
11:40
20m
Research paper
Which Exception Shall We Throw?Virtual
Research Papers
Hao Zhong Shanghai Jiao Tong University
10:00 - 12:00
Technical Session 21 - SE for AI IIResearch Papers / Late Breaking Results / NIER Track / Journal-first Papers at Banquet B
Chair(s): Andrea Stocco Università della Svizzera italiana (USI)
10:00
20m
Research paper
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks
Research Papers
Simin Chen University of Texas at Dallas, USA, Mirazul Haque UT Dallas, Cong Liu University of Texas at Dallas, USA, Wei Yang University of Texas at Dallas
10:20
10m
Paper
Prototyping Deep Learning Applications with Non-Experts: An Assistant Proposition
Late Breaking Results
Gustavo Rodrigues dos Reis, Adrian Mos NAVER LABS Europe, Cyril Labbé LIG - UGA, Mario Cortes Cornax LIG - UGA
10:30
20m
Research paper
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided MethodVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Xiaoyuan Xie School of Computer Science, Wuhan University, China, Pengbo Yin School of Computer Science, Wuhan University, Songqiang Chen School of Computer Science, Wuhan University
10:50
20m
Paper
Faults in Deep Reinforcement Learning Programs: A Taxonomy and A Detection ApproachVirtual
Journal-first Papers
Amin Nikanjam École Polytechnique de Montréal, Mohammad Mehdi Morovati École Polytechnique de Montréal, Foutse Khomh Polytechnique Montréal, Houssem Ben Braiek École Polytechnique de Montréal
Link to publication DOI Authorizer link
11:10
20m
Research paper
Towards Understanding the Faults of JavaScript-Based Deep Learning SystemsVirtual
Research Papers
Lili Quan Tianjin University, Qianyu Guo College of Intelligence and Computing, Tianjin University, Xiaofei Xie Singapore Management University, Singapore, Sen Chen Tianjin University, Xiaohong Li TianJin University, Yang Liu Nanyang Technological University
11:30
10m
Vision and Emerging Results
An Empirical Study on Numerical Bugs in Deep Learning ProgramsVirtual
NIER Track
Gan Wang , Zan Wang Tianjin University, China, Junjie Chen Tianjin University, Xiang Chen Nantong University, Ming Yan College of Intelligence and Computing, Tianjin University
11:40
20m
Research paper
Toward Improving the Robustness of Deep Learning Models via Model TransformationVirtual
Research Papers
Yingyi Zhang College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Jiajun Jiang Tianjin University, Hanmo You College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University
10:00 - 12:00
Technical Session 24 - Human AspectsResearch Papers / Journal-first Papers / NIER Track at Gold A
Chair(s): Silvia Abrahão Universitat Politècnica de València
10:00
20m
Research paper
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing
Research Papers
Yanqi Su Australian National University, Zheming Han , Zhenchang Xing Australian National University, Xin Xia Huawei Software Engineering Application Technology Lab, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Qinghua Lu CSIRO’s Data61
10:20
20m
Research paper
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication
Research Papers
Mia Mohammad Imran Virginia Commonwealth University, Yashasvi Jain Drexel University, Preetha Chatterjee Drexel University, USA, Kostadin Damevski Virginia Commonwealth University
Pre-print
10:40
10m
Vision and Emerging Results
End-to-End Rationale Reconstruction
NIER Track
Mouna Dhaouadi University of Montreal, Bentley Oakes Université de Montréal, Michalis Famelis Université de Montréal
Pre-print
10:50
20m
Paper
Towards digitalization of requirements: Generating context-sensitive user stories from diverse specifications
Journal-first Papers
Padmalata Nistala Tata Consultancy Services Research, Asha Rajbhoj TCS Research, Vinay Kulkarni Tata Consultancy Services Research, Shivani Soni TCS Research, Kesav Vithal Nori IIIT Hyderabad, Raghu Reddy IIT Hyderabad
Link to publication DOI
11:10
20m
Paper
Which neural network makes more explainable decisions? An approach towards measuring explainabilityVirtual
Journal-first Papers
Mengdi Zhang Singapore Management University, Singapore, Jun Sun Singapore Management University, Jingyi Wang Zhejiang University
Link to publication DOI
11:30
20m
Paper
Automatically Identifying the Quality of Developer Chats for Post Hoc UseVirtual
Journal-first Papers
Preetha Chatterjee Drexel University, USA, Kostadin Damevski Virginia Commonwealth University, Nicholas A. Kraft UserVoice, Lori Pollock University of Delaware
Link to publication Media Attached
13:30 - 15:30
Technical Session 25 - Software RepairsNIER Track / Research Papers / Tool Demonstrations at Ballroom C East
Chair(s): Yannic Noller National University of Singapore
13:30
20m
Research paper
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications
Research Papers
Simón Gutiérrez Brida University of Rio Cuarto and CONICET, Argentina, Germán Regis Universidad Nacional de Río Cuarto, Guolong Zheng University of Nebraska Lincoln, Hamid Bagheri University of Nebraska-Lincoln, ThanhVu Nguyen George Mason University, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
13:50
20m
Research paper
Repairing Failure-inducing Inputs with Input Reflection
Research Papers
Yan Xiao National University of Singapore, Yun Lin National University of Singapore, Ivan Beschastnikh University of British Columbia, Changsheng SUN , David Rosenblum George Mason University, Jin Song Dong National University of Singapore
14:10
10m
Demonstration
ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic Relation
Tool Demonstrations
Jiawei He , Zhida Bao Harbin Engineering University, Quanjun Zhang Nanjing University, Weisong Sun State Key Laboratory for Novel Software Technology, Nanjing University, Jiawei Liu Nanjing University, Chunrong Fang Nanjing University, Yun Lin National University of Singapore
14:20
20m
Research paper
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program RepairVirtual
Research Papers
Deheng Yang National University of Defense Technology, Xiaoguang Mao National University of Defense Technology, Liqian Chen National University of Defense Technology, China, Xuezheng Xu Academy of Military Sciences, Beijing, China, Yan Lei Chongqing University, David Lo Singapore Management University, Jiayu He National University of Defense Technology, Changsha, China
14:40
10m
Vision and Emerging Results
Multi-objective Optimization-based Bug-fixing Template Mining for Automated Program RepairVirtual
NIER Track
Misoo Kim Sungkyunkwan University, Youngkyoung Kim Sungkyunkwan University, Kicheol Kim SungKyunKwan University, Eunseok Lee Sungkyunkwan University
14:50
20m
Research paper
StandUp4NPR: Standardizing Setup for Empirically Comparing Neural Program Repair SystemsVirtual
Research Papers
Wenkang Zhong State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongliang Ge State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Hongfei Ai State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Chuanyi Li State Key Laboratory for Novel Software Technology, Nanjing University, Kui Liu Huawei Software Engineering Application Technology Lab, Jidong Ge , Bin Luo Software Institute, Nanjing University
13:30 - 15:30
Technical Session 27 - Dynamic and Concolic AnalysisResearch Papers / NIER Track / Journal-first Papers at Banquet A
Chair(s): ThanhVu Nguyen George Mason University
13:30
20m
Research paper
LISSA: Lazy Initialization with Specialized Solver Aid
Research Papers
Juan Manuel Copia IMDEA Software Institute; Universidad Politécnica de Madrid, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina, Alessandra Gorla IMDEA Software Institute, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
13:50
10m
Vision and Emerging Results
Outcome-Preserving Input Reduction for Scientific Data Analysis Workflows
NIER Track
Anh Duc Vu Humboldt-Universität zu Berlin, Timo Kehrer University of Bern, Christos Tsigkanos University of Bern, Switzerland
Pre-print
14:00
20m
Research paper
SymFusion: Hybrid Instrumentation for Concolic Execution
Research Papers
Emilio Coppa Sapienza University of Rome, Heng Yin UC Riverside, Camil Demetrescu Sapienza University Rome
Pre-print
14:20
20m
Research paper
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel
Research Papers
David Fernandez-Amoros UNED, Ruben Heradio UNED (Universidad Nacional de Educacion a Distancia), Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Alexander Egyed Johannes Kepler University Linz
14:40
20m
Paper
A Practical Approach for Dynamic Taint Tracking with Control-Flow RelationshipsVirtual
Journal-first Papers
Katherine Hough , Jonathan Bell Northeastern University
Link to publication DOI Pre-print Media Attached
15:00
20m
Research paper
Prioritized Constraint-Aided Dynamic Partial-Order ReductionVirtual
Research Papers
Jie Su Xidian University, Cong Tian Xidian University, Zuchao Yang Xidian University, Jiyu Yang Xidian University, Bin Yu Xidian University, Zhenhua Duan Xidian University
13:30 - 15:30
Technical Session 26 - Testing IIIResearch Papers / Industry Showcase at Banquet B
Chair(s): Owolabi Legunsen Cornell University
13:30
20m
Research paper
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing
Research Papers
Tahmid Rafi University of Texas at San Antonio, Xueling Zhang Rochester Institute of Technology, Xiaoyin Wang University of Texas at San Antonio
13:50
20m
Research paper
Neuroevolution-Based Generation of Tests and Oracles for Games
Research Papers
Patric Feldmeier University of Passau, Gordon Fraser University of Passau
Pre-print
14:10
20m
Industry talk
WOLFFI: A fault injection platform for learning AIOps models
Industry Showcase
Frank Bagehorn IBM Research, Jesus Rios IBM Research, Saurabh Jha IBM Research, Robert Filepp IBM Research, Larisa Shwartz IBM T.J. Watson Research, Naoki Abe IBM, Xi Yang IBM Research
14:30
20m
Research paper
Learning to Construct Better Mutation FaultsVirtualACM SIGSOFT Distinguished Paper Award
Research Papers
Zhao Tian Tianjin University, Junjie Chen Tianjin University, Qihao Zhu Peking University, Junjie Yang College of Intelligence and Computing, Tianjin University, Lingming Zhang University of Illinois at Urbana-Champaign
DOI Pre-print
14:50
20m
Research paper
Differentially Testing Database Transactions for Fun and ProfitVirtual
Research Papers
Ziyu Cui Institute of Software, Chinese Academy of Sciences, Wensheng Dou Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qianwang Dai Institute of Software, Chinese Academy of Sciences, Jiansen Song , Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences
13:30 - 15:30
Technical Session 28 - Safety-Critical and Self-Adaptive SystemsIndustry Showcase / Tool Demonstrations / Research Papers / Late Breaking Results / NIER Track at Room 128
Chair(s): Eunsuk Kang Carnegie Mellon University
13:30
10m
Demonstration
SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems
Tool Demonstrations
Alberto D. Rodriguez University of Notre Dame, Timothy Newman University of Notre Dame, Katherine R. Dearstyne University of Notre Dame, Jane Cleland-Huang University of Notre Dame
13:40
20m
Research paper
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior PatternsVirtual
Research Papers
Haoxiang Tian Institute of Software, Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences, China, Jiren Yan Institute of Software, Chinese Academy of Sciences, Yan Jiang Institute of Software, Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Shuo Li Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences
14:00
20m
Research paper
Consistent Scene Graph Generation by Constraint OptimizationVirtual
Research Papers
Boqi Chen McGill University, Kristóf Marussy Budapest University of Technology and Economics, Sebastian Pilarski McGill University, Oszkár Semeráth Budapest University of Technology and Economics, Daniel Varro McGill University / Budapest University of Technology and Economics
14:20
20m
Industry talk
A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial ProcessesVirtual
Industry Showcase
Firas Bayram Department of Mathematics and Computer Science, Karlstad University, Sweden, Bestoun S. Ahmed Karlstad University Sweden, Erik Hallin Uddeholms AB, Sweden, Anton Engman Uddeholms AB, Sweden
Pre-print
14:40
10m
Paper
SML4ADS: An Open DSML for Autonomous Driving Scenario Representation and GenerationVirtual
Late Breaking Results
Bo Li East China Normal University, Dehui Du East China Normal University, Sicong Chen East China Normal University, Minjun Wei East China Normal University, Chenghang Zheng East China Normal University, Xinyuan Zhang East China Normal University
14:50
10m
Vision and Emerging Results
XSA: eXplainable Self-AdaptationVirtual
NIER Track
Matteo Camilli Free University of Bozen-Bolzano, Raffaela Mirandola Politecnico di Milano, Patrizia Scandurra University of Bergamo, Italy
File Attached
15:00
20m
Industry talk
Design-Space Exploration for Decision-Support Software
Industry Showcase
Ate Penders Thales Research & Technology, Ana Lucia Varbanescu University of Twente, Gregor Pavlin Thales Research & Technology, Henk Sips Delft University of Technology
16:00 - 18:00
Technical Session 29 - AI for SE IIResearch Papers / Journal-first Papers at Ballroom C East
Chair(s): Tim Menzies North Carolina State University
16:00
20m
Research paper
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs?
Research Papers
Cedric Richter University of Oldenburg, Jan Haltermann University of Oldenburg, Marie-Christine Jakobs Technical University of Darmstadt, Felix Pauck Paderborn University, Germany, Stefan Schott Paderborn University, Heike Wehrheim University of Oldenburg
DOI Pre-print Media Attached File Attached
16:20
20m
Research paper
Learning Contract Invariants Using Reinforcement Learning
Research Papers
Junrui Liu University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Bryan Tan Amazon Web Services, Işıl Dillig University of Texas at Austin, Yu Feng University of California at Santa Barbara
16:40
20m
Research paper
Compressing Pre-trained Models of Code into 3 MB
Research Papers
Jieke Shi Singapore Management University, Zhou Yang Singapore Management University, Bowen Xu School of Information Systems, Singapore Management University, Hong Jin Kang Singapore Management University, Singapore, David Lo Singapore Management University
DOI Pre-print Media Attached
17:00
20m
Research paper
A Transferable Time Series Forecasting Service using Deep Transformer model for Online SystemsVirtual
Research Papers
Tao Huang Tencent, Pengfei Chen Sun Yat-Sen University, Jingrun Zhang School of Data and Computer Science, Sun Yat-sen University, Ruipeng Li Tencent, Rui Wang Tencent
17:20
20m
Paper
The Weights can be Harmful: Pareto Search versus Weighted Search in Multi-Objective Search-Based Software EngineeringVirtual
Journal-first Papers
Tao Chen Loughborough University, Miqing Li University of Birmingham
Pre-print
17:40
20m
Research paper
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering DatasetsVirtual
Research Papers
Zhong Li Nanjing, Minxue Pan Nanjing University, Yu Pei Hong Kong Polytechnic University, Tian Zhang Nanjing University, Linzhang Wang Nanjing University, Xuandong Li Nanjing University
16:00 - 18:00
Technical Session 31 - Code Similarities and RefactoringResearch Papers / Tool Demonstrations / Journal-first Papers at Banquet A
Chair(s): Hua Ming Oakland University
16:00
20m
Research paper
Reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications
Research Papers
Alexi Turcotte Northeastern University, Mark W. Aldrich Tufts University, Frank Tip Northeastern University
16:20
20m
Paper
How Software Refactoring Impacts Execution Time
Journal-first Papers
Luca Traini University of L'Aquila, Daniele Di Pompeo University of L'Aquila, Michele Tucci Charles University, Bin Lin Radboud University, Simone Scalabrino University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana, Michele Lanza Software Institute - USI, Lugano, Rocco Oliveto University of Molise, Vittorio Cortellessa University of L'Aquila
Link to publication DOI Authorizer link
16:40
20m
Research paper
Learning to Synthesize Relational Invariants
Research Papers
Jingbo Wang University of Southern California, Chao Wang USC
17:00
10m
Demonstration
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE
Tool Demonstrations
Eman Abdullah AlOmar Stevens Institute of Technology, Anton Ivanov HSE University, Zarina Kurbatova JetBrains Research, Yaroslav Golubev JetBrains Research, Mohamed Wiem Mkaouer Rochester Institute of Technology, Ali Ouni ETS Montreal, University of Quebec, Timofey Bryksin JetBrains Research, Le Nguyen Rochester Institute of Technology, Amit Kini Rochester Institute of Technology, Aditya Thakur Rochester Institute of Technology
DOI Pre-print
17:10
20m
Research paper
TreeCen: Building Tree Graph for Scalable Semantic Code Clone DetectionVirtual
Research Papers
Yutao Hu Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Junru Peng Xidian University, Yueming Wu Nanyang Technological University, Junjie Shan KTH Royal Institute of Technology, Hai Jin Huazhong University of Science and Technology
17:30
10m
Demonstration
Trimmer: Context-Specific Code ReductionVirtual
Tool Demonstrations
Aatira Anum Ahmad Lahore University of Management Sciences, Mubashir Anwar University of Illinois Urbana-Champaign, Hashim Sharif University of Illinois at Urbana-Champaign, Ashish Gehani SRI, Fareed Zaffar Lahore University of Management Sciences
17:40
20m
Research paper
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software DebloatingVirtual
Research Papers
Qi Xin Wuhan University, Qirun Zhang Georgia Institute of Technology, Alessandro Orso Georgia Tech
16:00 - 18:00
Technical Session 32 - Formal Methods and Models IITool Demonstrations / Journal-first Papers / Research Papers at Banquet B
Chair(s): Khouloud Gaaloul University of Michigan - Dearborn
16:00
10m
Demonstration
CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow Memory
Tool Demonstrations
Bernd Fischer Stellenbosch University, South Africa, Salvatore La Torre Università degli Studi di Salerno, Gennaro Parlato University of Molise, Peter Schrammel University of Sussex and Diffblue Ltd
16:10
20m
Research paper
Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses
Research Papers
Elias Kuiter Otto-von-Guericke-University Magdeburg, Sebastian Krieter University of Ulm, Chico Sundermann University of Ulm, Thomas Thüm University of Ulm, Gunter Saake University of Magdeburg, Germany
16:30
20m
Paper
A three-valued model abstraction framework for PCTL* stochastic model checkingVirtual
Journal-first Papers
Yang Liu Shanghai Maritime University/National University of Singapore, Yan Ma Nanjing University of Finance and Economics / National University of Singapore, Yongsheng Yang Shanghai Maritime University
File Attached
16:50
20m
Research paper
Finding and Understanding Incompleteness Bugs in SMT SolversVirtual
Research Papers
Mauro Bringolf ETH Zurich, Dominik Winterer ETH Zurich, Zhendong Su ETH Zurich
17:10
20m
Research paper
Checking LTL Satisfiability via End-to-end LearningVirtual
Research Papers
Weilin Luo School of Computer Science and Engineering, Sun Yat-sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Delong Zhang SUN YAT-SEN UNIVERSITY, Jianfeng Du Guangdong University of Foreign Studies, Hengdi Su SUN YAT-SEN UNIVERSITY
17:30
20m
Research paper
QVIP: An ILP-based Formal Verification Approach for Quantized Neural NetworksVirtual
Research Papers
Yedi Zhang ShanghaiTech University, Zhe Zhao ShanghaiTech University, Guangke Chen ShanghaiTech University, Fu Song ShanghaiTech University, Min Zhang East China Normal University, Taolue Chen Birkbeck University of London, Jun Sun Singapore Management University
16:00 - 18:00
Technical Session 30 - Builds and DependenciesJournal-first Papers / Research Papers / Tool Demonstrations at Room 128
Chair(s): Christian Kästner Carnegie Mellon University
16:00
20m
Research paper
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem
Research Papers
Wei Tang Tsinghua University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Wu Jiahui Nanyang Technological University, shouguo yang Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Yi Li Nanyang Technological University, Singapore, Ping Luo Tsinghua University, Yang Liu Nanyang Technological University
16:20
10m
Demonstration
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics
Tool Demonstrations
Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Rohan Sethi Loyola University Chicago, Sohini Thota Loyola University Chicago, Shilpika University of California at Davis, Allan J. Miller Loyola University Chicago, Wenxin Jiang Purdue University, Emmanuel S. Amobi Loyola University Chicago, Austin Pinderski Duke University, Loyola University Chicago, Konstantin Läufer Loyola University Chicago, Nicholas J. Hayward Loyola University Chicago, Neil Klingensmith Loyola University Chicago, James C. Davis Purdue University, USA, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory
16:30
20m
Research paper
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM
Research Papers
Jasmine Latendresse Concordia University, Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Emad Shihab Concordia University
16:50
20m
Research paper
Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS ProjectsVirtual
Research Papers
Yiwen Wu National University of Defense Technology, Yang Zhang National University of Defense Technology, China, Kele Xu National University of Defense Technology, Tao Wang National University of Defense Technology, Huaimin Wang National University of Defense Technology
17:10
20m
Paper
CIT-daily: A Combinatorial Interaction Testing-Based Daily Build ProcessVirtual
Journal-first Papers
Hanefi Mercan Sabanci University, Atakan Aytar Sabanci University, Giray Coskun Sabanci University, Dilara Müstecep Sabanci University, Gülsüm Uzer Sabanci University, Cemal Yilmaz Sabancı University
Link to publication DOI
17:30
20m
Research paper
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability RecoveryVirtual
Research Papers
Hui Gao Nanjing University, Hongyu Kuang Nanjing University, Kexin Sun Nanjing University, Xiaoxing Ma Nanjing University, Alexander Egyed Johannes Kepler University Linz, Patrick Mäder Technische Universität Ilmenau, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University
Pre-print Media Attached

Accepted Papers

Title
ADEPT: A Testing Platform for Simulated Autonomous DrivingVirtual
Tool Demonstrations
Answering Software Deployment Questions via Neural Machine Reading at ScaleVirtual
Tool Demonstrations
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE
Tool Demonstrations
DOI Pre-print
A transformer-based IDE plugin for vulnerability detectionVirtual
Tool Demonstrations
Augur: Dynamic Taint Analysis for Asynchronous JavaScript
Tool Demonstrations
AUSERA: Automated Security Vulnerability Detection for Android AppsVirtual
Tool Demonstrations
Building recommender systems for modelling languages with DroidVirtual
Tool Demonstrations
Pre-print Media Attached
CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow Memory
Tool Demonstrations
ecoCode: a SonarQube Plugin to Remove Energy Smells from Android Projects
Tool Demonstrations
DOI File Attached
ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic Relation
Tool Demonstrations
FlexType: A Plug-and-Play Framework for Type Inference Models
Tool Demonstrations
Pre-print
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts
Tool Demonstrations
Pre-print
LiveRef: a Tool for Live Refactoring Java Code
Tool Demonstrations
Maktub: Lightweight Robot System Test Creation and Automation
Tool Demonstrations
Quacky: Quantitative Access Control Permissiveness Analyzer
Tool Demonstrations
RobSimVer: A Tool for RoboSim Modeling and AnalysisVirtual
Tool Demonstrations
SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems
Tool Demonstrations
Shibboleth: Hybrid Patch Correctness Assessment in Automated Program Repair
Tool Demonstrations
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics
Tool Demonstrations
Trimmer: Context-Specific Code ReductionVirtual
Tool Demonstrations
V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities
Tool Demonstrations
WebMonitor: https://youtu.be/hqVw0JU3k9c
Tool Demonstrations
Xscope: Hunting for Cross-Chain Bridge AttacksVirtual
Tool Demonstrations

Call for Papers

The objective of the ASE 2022 Tool Demonstrations Track is to excite the software engineering community about new advances in our field through compelling demonstrations that help advance research and practice. The track is a highly interactive venue where researchers and practitioners can demonstrate their tools and discuss them with attendees.

Highlighting scientific contributions through concrete artifacts is a critical supplement to the traditional ASE research papers. A demonstration provides the opportunity to communicate how the scientific approach has been implemented or how a specific hypothesis has been assessed, including details such as implementation and usage issues, data models and representations, APIs for tool and data access. Authors of regular research papers are thus encouraged to submit an accompanying tool demonstration paper, stating clearly the contributions of the tool paper over the research paper. We also encourage tool demonstrations that focus on real-world applicability of the underlying ideas, e.g., by references to industrial case studies.

Papers submitted to the tool demonstration track should describe (a) novel early tool prototypes or (b) novel aspects of mature tools. The submissions must clearly communicate the following information to the audience:

  • the envisioned users;
  • the software engineering challenge the tool addresses;
  • the methodology it implies for its users;
  • the results of validation studies already conducted (for mature tools) or the design of planned studies (for early prototypes).

Submission

Papers must be submitted electronically through the HotCRP submission site by Fri 27 May 2022 and must:

  • All submissions must be in PDF format and conform, at time of submission, to the ACM Proceedings Template at https://www.acm.org/publications/proceedings-template for both LaTeX and Word users. LaTeX users must use the provided acmart.cls and ACM-Reference-Format.bst without modification, enable the conference format in the preamble of the document (i.e., \documentclass[sigconf,review]{acmart}), and use the ACM reference format for the bibliography (i.e., \bibliographystyle{ACM-Reference-Format}). This is the same format as the research track.
  • All submissions must be in English.
  • A demonstration submission must not exceed four pages (including all text, references, and figures);
  • Authors are encouraged to submit a short video (between three and five minutes long) illustrating the demonstration. The video should be made available on YouTube at the time of submission. Videos should (i) provide an overview of the tool’s capabilities; (ii) walk through (some of) the tool capabilities; (iii) where appropriate, provide clarifying voice-over and/or annotation highlights; and (iv) be engaging and exciting for the watcher!
  • Authors are encouraged to make their code and datasets open source, and to provide a URL for the code and datasets with the submission;
  • A submission must not have been previously published in a demonstration form and must not simultaneously be submitted to another symposium other than ASE;
  • Submissions for the tool track do NOT follow a double-blind review process. If a tool track submission is accompanying a submission to the research track (which is double-blind), please email the tool demonstration track chairs, notifying them about this. The chairs will ensure that tool papers and research papers are reviewed by different people, to avoid revealing the authorship of research papers.

Tools and Artifacts

The authors should make the demonstrated tool available online. When appropriate, we also encourage the authors to open-source the code of the tool and make its evaluation artifacts available online. The URLs of the tool and its accompanying artifacts should be added at the end of the abstract.

Videos

Authors are required to prepare an up to 5 minutes video demonstrating the tool. For consistency, we require ALL videos to be uploaded to YouTube and made available by the time of submission. The URL of the YouTube video should be added at the end of the abstract.

The video should:

  • provide an overview of the tool’s capabilities and show the major tool features in detail;
  • provide clarifying voice-over and/or annotation highlights;
  • be engaging and exciting for the audience!

Please note that authors of successful submissions will have the opportunity to revise the paper, the video (and its hosting location), the code, and the datasets by the camera-ready deadline.

Submissions that do not comply with the instructions will be rejected without review.

Evaluation

Each submission will be reviewed by at least three members of the tool demonstrations program committee. The evaluation criteria include:

  • the relevance of the proposed tool for the ASE audience;
  • the technical soundness of the demonstrated tool;
  • the originality of its underlying ideas;
  • the degree to which the submission considers the relevant literature;
  • the quality and usefulness of the accompanied artifacts: video, tool, code, and evaluation datasets.

For further information, please feel free to contact the track chairs.

Accepted Papers

After acceptance, the list of paper authors cannot be changed under any circumstances; the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommended a change for clarity or accuracy with respect to the paper content.