Tue 12 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:00 | |||
10:30 12mTalk | Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System Research Papers Jun Huang Anhui University of Technology, Yang Yang Anhui University of Technology, Hang Yu Ant Group, Jianguo Li Ant Group, Xiao Zheng Anhui University of Technology | ||
10:42 12mTalk | Dynamic Graph Neural Networks-based Alert Link Prediction for Online Service Systems Research Papers Yiru Chen Fudan University, Chenxi Zhang Fudan University, Zhen Dong Fudan University, China, Dingyu Yang Alibaba Group, Xin Peng Fudan University, Jiayu Ou Alibaba Group, Hong Yang Fudan University, Zheshun Wu Alibaba Group, Xiaojun Qu Alibaba Group, Wei Li Alibaba Group | ||
10:54 12mTalk | A Model-based Mode-Switching-Framework based on Security Vulnerability Scores Journal-first Papers Michael Riegler Johannes Kepler University Linz, Johannes Sametinger Johannes Kepler University Linz, Michael Vierhauser University of Innsbruck, Manuel Wimmer JKU Linz Link to publication DOI File Attached | ||
11:06 12mTalk | Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion Research Papers Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:18 12mTalk | Vicious Cycles in Distributed Software SystemsRecorded talk Research Papers Shangshu Qian Purdue University, Wen Fan Purdue University, Lin Tan Purdue University, Yongle Zhang Purdue University Pre-print Media Attached | ||
11:30 12mTalk | Scene-Driven Exploration and GUI Modeling for Android AppsRecorded talk Research Papers Xiangyu Zhang , Lingling Fan Nankai University, Sen Chen Tianjin University, Yucheng Su Alibaba Group, Boyuan Li Nankai University Media Attached |
10:30 - 12:00 | Testing AI Systems 1NIER Track / Research Papers at Room C Chair(s): Leonardo Mariani University of Milano-Bicocca | ||
10:30 12mTalk | Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting Research Papers Li Tsz On The Hong Kong University of Science and Technology, Wenxi Zong Northeastern University, Yibo Wang Northeastern University, Haoye Tian University of Luxembourg, Ying Wang Northeastern University, Shing-Chi Cheung Hong Kong University of Science and Technology, Jeffrey Kramer Imperial College London Pre-print | ||
10:42 12mTalk | SOCRATEST- Towards Autonomous Testing Agents via Conversational Large Language Models NIER Track Robert Feldt Chalmers University of Technology, Sweden, Sungmin Kang KAIST, Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo KAIST Pre-print File Attached | ||
10:54 12mResearch paper | Semantic Data Augmentation for Deep Learning Testing using Generative AI NIER Track sondess missaoui University of York, Simos Gerasimou University of York, Nicholas Matragkas Université Paris-Saclay, CEA, List. File Attached | ||
11:06 12mTalk | Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers Research Papers Zhen Li Huazhong University of Science and Technology, Ruqian Zhang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Ning Wang Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology, Shouhuai Xu University of Colorado Colorado Springs, Chen Chen University of Central Florida, Hai Jin Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology Pre-print | ||
11:18 12mTalk | The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models Research Papers Xin Zhou Singapore Management University, Singapore, Kisub Kim Singapore Management University, Singapore, Bowen Xu North Carolina State University, Jiakun Liu Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University Pre-print | ||
11:30 12mTalk | CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature SpaceRecorded talk Research Papers haibin zheng Zhejiang University of Technology, Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Haibo Jin Zhejiang University of Techonology Pre-print Media Attached |
10:30 - 12:00 | Open Source and Software Ecosystems 1Research Papers / Tool Demonstrations at Room E Chair(s): Denys Poshyvanyk William & Mary | ||
10:30 12mTalk | An Empirical Study of Malicious Code In PyPI Ecosystem Research Papers Wenbo Guo School of Cyber Science and Engineering, Sichuan University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Cheng Huang School of Cyber Science and Engineering, Sichuan University, Yong Fang School of Cyber Science and Engineering, Sichuan University, Yang Liu Nanyang Technological University Pre-print | ||
10:42 12mTalk | Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem Research Papers Weiwei Xu Peking University, Hao He Carnegie Mellon University, Kai Gao University of Science and Technology Beijing, Minghui Zhou Peking University Pre-print | ||
10:54 12mTalk | Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem Research Papers Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Sen Chen Tianjin University, Zhengzi Xu Nanyang Technological University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University | ||
11:06 12mTalk | Bus Factor Explorer Tool Demonstrations Egor Klimov JetBrains Research, Muhammad Umair Ahmed Bilkent University, Nikolai Sviridov JetBrains Research, Pouria Derakhshanfar JetBrains Research, Eray Tüzün Bilkent University, Vladimir Kovalenko JetBrains Research Media Attached | ||
11:30 12mTalk | EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery Research Papers Chenyuan Zhang Xiamen University, Yanlin Wang Sun Yat-sen University, Zhao Wei Tencent, Yong Xu Tencent, Juhong Wang Tencent, Hui Li Xiamen University, Rongrong Ji Xiamen University Pre-print Media Attached | ||
11:42 12mTalk | Fork Entropy: Assessing the Diversity of Open Source Software Projects' ForksRecorded talk Research Papers Liang Wang Nanjing University, Zhiwen Zheng State Key Laboratory for Novel Software Technology, Nanjing University, Xiangchen Wu State Key Laboratory for Novel Software Technology, Nanjing University, Baihui Sang State Key Laboratory for Novel Software Technology, Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University Media Attached |
13:30 - 15:00 | Cloud and Distributed Systems 2Research Papers / Tool Demonstrations / Journal-first Papers / Industry Showcase (Papers) at Plenary Room 2 Chair(s): Tim Menzies North Carolina State University | ||
13:30 12mTalk | EXPRESS 2.0: An Intelligent Service Management Framework for AIoT Systems in the Edge Tool Demonstrations Jia Xu School of Computer Science and Technology, Anhui University, Xiao Liu School of Information Technology, Deakin University, Wuzhen Pan School of Computer Science and Technology, Anhui University, Xuejun Li School of Computer Science and Technology, Anhui University, Aiting Yao School of Computer Science and Technology, Anhui University, Yun Yang Swinburne University of Technology Media Attached | ||
13:42 12mTalk | Prism: Revealing Hidden Functional Clusters of Massive Instances in Cloud Systems Research Papers Jinyang Liu The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Cong Feng Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Zengyin Yang Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
13:54 12mTalk | FaaSLight: General Application-Level Cold-Start Latency Optimization for Function-as-a-Service in Serverless Computing Journal-first Papers Xuanzhe Liu Peking University, Jinfeng Wen Peking University, Zhenpeng Chen University College London, Ding Li Peking University, Junkai Chen Peking University, China, Yi Liu Peking University, Haoyu Wang Huazhong University of Science and Technology, Xin Jin Peking University File Attached | ||
14:06 12mTalk | RocketHA: A High Availability Design Paradigm for Distributed Log-Based Storage System Industry Showcase (Papers) Juntao Ji Alibaba Cloud Computing Co. Ltd., Rongtong Jin Alibaba Cloud Computing Co. Ltd., Yubao Fu Alibaba Cloud Computing Co. Ltd., Yinyou Gu Alibaba Cloud Computing Co. Ltd., Tsung-han Tsai Alibaba Cloud Computing Co. Ltd., Qingshan Lin Alibaba Cloud Computing Co. Ltd. | ||
14:18 12mTalk | Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective Journal-first Papers Xuanzhe Liu Peking University, Diandian Gu Peking University, Zhenpeng Chen University College London, Jinfeng Wen Peking University, Zili Zhang Peking University, Yun Ma Peking University, Haoyu Wang Huazhong University of Science and Technology, Xin Jin Peking University Link to publication | ||
14:30 12mTalk | ConfTainter: Static Taint Analysis For Configuration OptionsRecorded talk Research Papers Teng Wang National University of Defense Technology, Haochen He National University of Defense Technology, Xiaodong Liu National University of Defense Technology, Shanshan Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Yu Jiang Tsinghua University, Qing Liao Harbin Institute of Technology, Wang Li National University of Defense Technology Pre-print Media Attached |
13:30 - 15:00 | Testing AI Systems 2NIER Track / Journal-first Papers / Research Papers at Room C Chair(s): Lwin Khin Shar Singapore Management University | ||
13:30 12mTalk | ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems Research Papers Shengyou Hu Nanjing University, Huayao Wu Nanjing University, Peng Wang Fudan University, Jing Chang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Yongjun Tu Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xiu Jiang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xintao Niu Nanjing University, Changhai Nie Nanjing University Pre-print Media Attached File Attached | ||
13:42 12mTalk | Automating Bias Testing of LLMs NIER Track Sergio Morales Universitat Oberta de Catalunya, Robert Clarisó Universitat Oberta de Catalunya, Jordi Cabot Luxembourg Institute of Science and Technology Pre-print File Attached | ||
13:54 12mTalk | MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack NIER Track Qiang Hu University of Luxembourg, Yuejun GUo Luxembourg Institute of Science and Technology, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg File Attached | ||
14:06 12mResearch paper | Generative Model-Based Testing on Decision-Making Policies Research Papers Zhuo Li Kyushu University, Xiongfei Wu Kyushu University, Derui Zhu Technical University of Munich, Mingfei Cheng Singapore Management University, Siyuan Chen Kyushu University, Fuyuan Zhang Kyushu University, Xiaofei Xie Singapore Management University, Lei Ma University of Alberta, Jianjun Zhao Kyushu University File Attached | ||
14:18 12mTalk | Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems Journal-first Papers Hazem FAHMY University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa, Thomas Stifter IEE S.A. Link to publication DOI Pre-print File Attached | ||
14:30 12mTalk | Are We Ready to Embrace Generative AI for Software Q&A? NIER Track Bowen Xu North Carolina State University, Thanh-Dat Nguyen University of Melbourne, Le-Cong Thanh The University of Melbourne, Thong Hoang CSIRO's Data61, Jiakun Liu Singapore Management University, Kisub Kim Singapore Management University, Singapore, Chen GONG University of Virginia, Changan Niu Software Institute, Nanjing University, Chenyu Wang Singapore Management University, Xuan-Bach D. Le University of Melbourne, David Lo Singapore Management University |
13:30 - 15:00 | Vulnerability and Security 1Research Papers / Journal-first Papers at Room E Chair(s): Fatemeh Hendijani Fard University of British Columbia | ||
13:30 12mTalk | A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering Research Papers Wentao Liang Institute of Software, Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences File Attached | ||
13:42 12mTalk | Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows Research Papers Pre-print File Attached | ||
13:54 12mTalk | Learning to Locate and Describe Vulnerabilities Research Papers Jian Zhang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xu Wang Beihang University, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University | ||
14:06 12mTalk | When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection Research Papers Xin-Cheng Wen Harbin Institute of Technology, Xinchen Wang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Yang Liu Nanyang Technological University, Zhaoquan Gu Harbin Institute of Technology | ||
14:18 12mTalk | The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study Journal-first Papers Emanuele Iannone University of Salerno, Roberta Guadagni University of Salerno, Filomena Ferrucci University of Salerno, Andrea De Lucia University of Salerno, Fabio Palomba University of Salerno Link to publication DOI Pre-print Media Attached | ||
14:30 12mTalk | SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices Research Papers Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Media Attached File Attached |
15:30 - 17:00 | Testing Tools and TechniquesNIER Track / Research Papers / Tool Demonstrations at Room E Chair(s): Tim Menzies North Carolina State University | ||
15:30 12mTalk | Modeling Programmer Attention as Scanpath Prediction NIER Track Aakash Bansal University of Notre Dame, Chia-Yi Su University of Notre Dame, Zachary Karas Vanderbilt University, Yifan Zhang Vanderbilt University, Yu Huang Vanderbilt University, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame | ||
15:42 12mTalk | On Automated Assistants for Software Development: The Role of LLMs NIER Track Pre-print File Attached | ||
15:54 12mTalk | SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts Tool Demonstrations Monika di Angelo TU Wien, Thomas Durieux TU Delft, João F. Ferreira INESC-ID and IST, University of Lisbon, Gernot Salzer TU Wien Pre-print File Attached | ||
16:06 12mTalk | AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection Research Papers Yintong Huo The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Pinjia He Chinese University of Hong Kong, Shenzhen, Zifan Xie Huazhong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
16:18 12mTalk | Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers Research Papers Yi Liu Nanyang Technological University, Yuekang Li University of New South Wales, Gelei Deng Nanyang Technological University, Felix Juefei-Xu Meta AI, Yao Du University of California, Irvine, Cen Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lei Ma University of Alberta, Yang Liu Nanyang Technological University, Yuekang Li University of New South Wales | ||
16:30 12mTalk | Software Entity Recognition with Noise-Robust LearningRecorded talk Research Papers Tai Nguyen University of Pennsylvania, Yifeng Di Purdue University, Joohan Lee University of Southern California, Muhao Chen University of Southern California, Tianyi Zhang Purdue University Pre-print Media Attached File Attached |
Wed 13 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:00 | Code Quality and Code SmellsTool Demonstrations / Journal-first Papers / Research Papers at Plenary Room 2 Chair(s): Bernd Fischer Stellenbosch University | ||
10:30 12mTalk | Contextuality of Code Representation Learning Research Papers Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas | ||
10:42 12mTalk | On-the-fly Improving Performance of Deep Code Models via Input Denoising Research Papers Pre-print File Attached | ||
10:54 12mTalk | Using Deep Learning to Automatically Improve Code Readability Research Papers Antonio Vitale University of Molise, Italy, Valentina Piantadosi University of Molise, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise Pre-print | ||
11:06 12mTalk | Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We? Research Papers Antonio Mastropaolo Università della Svizzera italiana, Massimiliano Di Penta University of Sannio, Italy, Gabriele Bavota Software Institute, USI Università della Svizzera italiana Pre-print File Attached | ||
11:18 12mTalk | How to Find Actionable Static Analysis Warnings: A Case Study with FindBugs Journal-first Papers Rahul Yedida , Hong Jin Kang UCLA, Huy Tu North Carolina State University, USA, Xueqi Yang NCSU, David Lo Singapore Management University, Tim Menzies North Carolina State University Link to publication DOI Authorizer link Pre-print | ||
11:30 12mTalk | Polyglot Code Smell Detection for Infrastructure as Code with GLITCH Tool Demonstrations Nuno Saavedra INESC-ID and IST, University of Lisbon, João Gonçalves INESC-ID and IST, University of Lisbon, Miguel Henriques INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC Pre-print File Attached | ||
11:42 12mTalk | Enhancing the defectiveness prediction of methods and classes via JIT Journal-first Papers Falessi Davide University of Rome Tor Vergata, Simone Mesiano Laureani University of Rome Tor Vergata, Jonida Çarka University of Rome Tor Vergata, Matteo Esposito University of Rome Tor Vergata, Daniel Alencar Da Costa University of Otago Link to publication DOI File Attached |
10:30 - 12:00 | Program AnalysisResearch Papers / Tool Demonstrations / NIER Track / Journal-first Papers at Room D Chair(s): Domenico Bianculli University of Luxembourg | ||
10:30 12mTalk | An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering Research Papers Prantik Chatterjee Indian Institute Of Technology Kanpur and MathWorks, Pankaj Kumar Kalita IIT Kanpur, Sumit Lahiri Indian Institute Of Technology Kanpur, Sujit Kumar Muduli IIT Kanpur, Vishal Singh Indian Institute of Technology Kanpur, Gourav Takhar Indian Institute of Technology Kanpur, Subhajit Roy IIT Kanpur | ||
10:42 12mTalk | Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis Research Papers Chenghang Shi SKLP, Institute of Computing Technology, CAS, Haofeng Li , Yulei Sui University of New South Wales, Sydney, Jie Lu SKLP, Institute of Computing Technology, CAS, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingling Xue UNSW Pre-print File Attached | ||
10:54 12mTalk | NRAgo: Solving SMT(NRA) Formulas with Gradient-based Optimization Tool Demonstrations Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kunhang Lv Institute of Software, Chinese Academy of Sciences, Pei Huang Stanford University, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yu Zhang Institute of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences File Attached | ||
11:06 12mTalk | Live Programming for Finite Model Finders NIER Track Allison Sullivan University of Texas at Arlington Pre-print File Attached | ||
11:18 12mTalk | Towards Robustness of Deep Program Processing Models -- Detection, Estimation and Enhancement Journal-first Papers Huangzhao Zhang Peking University, Zhiyi Fu Peking University, Ge Li Peking University, Lei Ma University of Alberta, Zhehao Zhao Peking University, Hua'an Yang Peking University, Yizhe Sun Peking University, Yang Liu Nanyang Technological University, Zhi Jin Peking University Link to publication DOI File Attached | ||
11:30 12mTalk | Precise Data-Driven Approximation for Program Analysis via FuzzingRecorded talk Research Papers Nikhil Parasaram University College London; ConsenSys Diligence, Earl T. Barr University College London; Google DeepMind, Sergey Mechtaev University College London, Marcel Böhme MPI-SP; Monash University Pre-print Media Attached | ||
11:42 12mTalk | Contrastive Learning for API Aspect AnalysisRecorded talk Research Papers G. M. Shahariar Ahsanullah University of Science and Technology, Tahmid Hasan Bangladesh University of Engineering and Technology, Anindya Iqbal Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Gias Uddin York University, Canada Pre-print Media Attached |
10:30 - 12:00 | Web Development 2Industry Showcase (Papers) / Research Papers / NIER Track / Journal-first Papers at Room E Chair(s): Hadar Ziv University of California, Irvine | ||
10:30 12mTalk | Metamorphic Testing for Web System Security Journal-first Papers Nazanin Bayati Chaleshtari University of Ottawa, Fabrizio Pastore University of Luxembourg, Arda Goknil SINTEF Digital, Lionel Briand University of Luxembourg; University of Ottawa Link to publication DOI Pre-print | ||
10:42 12mTalk | JavaScript Dead Code Identification, Elimination, and Empirical Assessment Journal-first Papers Ivano Malavolta Vrije Universiteit Amsterdam, Kishan Nirghin Vrije Universiteit Amsterdam, Gian Luca Scoccia Gran Sasso Science Institute, Simone Romano University of Salerno, Salvatore Lombardi University of Basilicata, Giuseppe Scanniello University of Salerno, Patricia Lago Vrije Universiteit Amsterdam File Attached | ||
10:54 12mTalk | PTdetector: An Automated JavaScript Front-end Library Detector Research Papers Link to publication | ||
11:06 12mTalk | Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing Research Papers Shuyao Jiang The Chinese University of Hong Kong, Ruiying Zeng Fudan University, Zihao Rao Fudan University, Jiazhen Gu Chinese University of Hong Kong, Yangfan Zhou Fudan University, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:18 12mTalk | Dramatically Improving Design Reviews at Google Industry Showcase (Papers) Link to publication | ||
11:30 12mTalk | Characterizing Flaky Tests in Node.js ApplicationsRecorded talk NIER Track Xiaoning Chang Institute of Software, Chinese Academy of Sciences, Zheheng Liang Joint Laboratory on Cyberspace Security of China Southern Power Grid, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Zhenyue Long , Lei Cui Joint Laboratory on Cyberspace Security of China Southern Power Grid, Tao Huang Institute of Software Chinese Academy of Sciences Media Attached |
13:30 - 15:00 | |||
13:30 12mTalk | Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models Research Papers Liran Wang Beihang University, Xunzhu Tang University of Luxembourg, Yichen He Beihang University, Changyu Ren Beihang University, Shuhua Shi Beihang University, Chaoran Yan Beihang University, Zhoujun Li Beihang University Pre-print File Attached | ||
13:42 12mTalk | From Commit Message Generation to History-Aware Commit Message Completion Research Papers Aleksandra Eliseeva JetBrains Research, Yaroslav Sokolov JetBrains, Egor Bogomolov JetBrains Research, Yaroslav Golubev JetBrains Research, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Timofey Bryksin JetBrains Research Pre-print File Attached | ||
13:54 12mTalk | Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis Research Papers Jingbo Lu University of New South Wales, Dongjie He UNSW, Wei Li University of New South Wales, Yaoqing Gao Huawei Toronto Research Center, Jingling Xue UNSW Pre-print File Attached | ||
14:06 12mTalk | What Makes Good In-context Demonstrations for Code Intelligence Tasks with LLMs? Research Papers Shuzheng Gao The Chinese University of Hong Kong, Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Hongyu Zhang Chongqing University, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
14:18 12mTalk | HexT5: Unified Pre-training for Stripped Binary Code Information InferenceRecorded talk Research Papers Jiaqi Xiong University of Science and Technology of China, Guoqiang Chen University of Science and Technology of China, Kejiang Chen University of Science and Technology of China, Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Weiming Zhang University of Science and Technology of China Media Attached File Attached | ||
14:30 12mTalk | Generating Variable Explanations via Zero-shot Prompt LearningRecorded talk Research Papers Chong Wang Fudan University, Yiling Lou Fudan University, Liu Junwei Fudan University, Xin Peng Fudan University Media Attached |
13:30 - 15:00 | Program Verification 1Research Papers / NIER Track / Tool Demonstrations at Room C Chair(s): Nico Rosner Amazon Web Services | ||
13:30 12mTalk | CPA-DF: A Tool for Configurable Interval Analysis to Boost Program Verification Tool Demonstrations Pre-print Media Attached File Attached | ||
13:42 12mTalk | Demystifying Template-based Invariant Generation for Bit-Vector Programs Research Papers Peisen Yao Zhejing University, Jingyu Ke Shanghai Jiao Tong University, Jiahui Sun Zhejiang University, Hongfei Fu Shanghai Jiao Tong University, Rongxin Wu Xiamen University, Kui Ren Zhejiang University | ||
13:54 12mTalk | PSMT: Satisfiability Modulo Theories Meets Probability Distribution NIER Track Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Pei Huang Stanford University, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print File Attached | ||
14:06 12mTalk | EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software Research Papers Yao Zhang Tianjin University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University, Sen Chen Tianjin University, Cen Zhang Nanyang Technological University, Xiaohong Li Tianjin University Pre-print File Attached | ||
14:18 12mTalk | Symbolic Fixpoint Algorithms for Logical LTL Games Research Papers Stanly Samuel Indian Institute of Science, India, Deepak D'Souza IISc Bangalore, Raghavan Komondoor Indian Institute of Science, India Pre-print Media Attached File Attached | ||
14:30 12mTalk | SAT-verifiable LTL Satisfiability Checking via Graph Representation LearningRecorded talk NIER Track Weilin Luo Sun Yat-Sen University, Yuhang Zheng Sun Yat-Sen University, Rongzhen Ye Sun Yat-Sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Pingjia Liang Sun Yat-Sen University, Polong Chen Sun Yat-Sen University Media Attached |
13:30 - 15:00 | Open Source and Software Ecosystems 2Research Papers / Journal-first Papers / Industry Showcase (Papers) at Room D Chair(s): Paul Grünbacher Johannes Kepler University Linz, Austria | ||
13:30 12mTalk | Personalized First Issue Recommender for Newcomers in Open Source Projects Research Papers Wenxin Xiao School of Computer Science, Peking University, Jingyue Li Norwegian University of Science and Technology, Hao He Carnegie Mellon University, Ruiqiao Qiu Beijing Institute of Technology, Minghui Zhou Peking University Pre-print | ||
13:42 12mTalk | Understanding and Enhancing Issue Prioritization in GitHub Research Papers Yingying He Nanjing University of Aeronautics and Astronautics, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University, Yasir Hussain Nanjing University of Aeronautics and Astronautics, Yu Zhou Nanjing University of Aeronautics and Astronautics | ||
13:55 12mResearch paper | Who is the Real Hero? Measuring Developer Contribution via Multi-dimensional Data Integration Research Papers Yuqiang Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University Pre-print | ||
14:08 12mTalk | Predicting Health Indicators for Open Source Projects (using Hyperparameter Optimization) Journal-first Papers Tianpei Xia North Carolina State University, Wei Fu North Carolina State University, Rui Shu North Carolina State University, Rishabh Agrawal North Carolina State University, Tim Menzies North Carolina State University Link to publication DOI Pre-print | ||
14:21 12mTalk | To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems Research Papers Mukelabai Mukelabai The University of Zambia, Zambia, Christoph Derks Ruhr-University Bochum, Germany, Jacob Krüger Eindhoven University of Technology, Thorsten Berger Ruhr University Bochum File Attached | ||
14:34 12mTalk | LiSum: Open Source Software License Summarization with Multi-Task LearningRecorded talk Research Papers Linyu Li , Sihan Xu Nankai University, Yang Liu Nanyang Technological University, Ya Gao Nankai University, Xiangrui Cai Nankai University, Jiarun Wu Nankai University, Wenli Song Civil Aviation University of China, Zheli Liu Nankai University Pre-print Media Attached | ||
14:47 12mTalk | Open Source Software Tools for Data Management and Deep Model Training Automation Industry Showcase (Papers) Umut Tıraşoğlu ORDULU Corp., Abdussamet Türker ORDULU Corp., Adnan Ekici ORDULU Corp., Hayri Yiğit ORDULU Corp., Yusuf Enes Bölükbaşı ORDULU Corp., Toygar Akgun TOBB ETU |
15:30 - 17:00 | Code Generation 2Research Papers / NIER Track / Tool Demonstrations at Plenary Room 2 Chair(s): Marianne Huchard LIRMM | ||
15:30 12mTalk | COMEX: A Tool for Generating Customized Source Code Representations Tool Demonstrations Debeshee Das Indian Institute of Technology Tirupati, Noble Saji Mathews University of Waterloo, Canada, Alex Mathai , Srikanth Tamilselvam IBM Research, Kranthi Sedamaki Indian Institute of Technology Tirupati, Sridhar Chimalakonda IIT Tirupati, Atul Kumar IBM India Research Labs Pre-print Media Attached File Attached | ||
15:42 12mTalk | Fast and Reliable Program Synthesis via User Interaction Research Papers Yanju Chen University of California at Santa Barbara, Chenglong Wang Microsoft Research, Xinyu Wang University of Michigan, Osbert Bastani University of Pennsylvania, Yu Feng University of California at Santa Barbara File Attached | ||
15:55 12mTalk | From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining Research Papers Xiaoxue Ren Zhejiang University, Xinyuan Ye Australian National University, Dehai Zhao CSIRO's Data61, Zhenchang Xing , Xiaohu Yang Zhejiang University File Attached | ||
16:08 12mTalk | Generative Type Inference for Python Research Papers Yun Peng Chinese University of Hong Kong, Chaozheng Wang The Chinese University of Hong Kong, Wenxuan Wang Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
16:21 12mTalk | Compiler Auto-tuning via Critical Flag Selection Research Papers | ||
16:34 12mTalk | Enhancing Code Safety in Quantum Intermediate Representation NIER Track File Attached | ||
16:47 12mTalk | CAT-LM: Training Language Models on Aligned Code And Tests Research Papers Nikitha Rao Carnegie Mellon University, Kush Jain Carnegie Mellon University, Uri Alon Carnegie Mellon University, Claire Le Goues Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University Media Attached File Attached |
15:30 - 17:00 | Software Testing for Specialized Systems 1Research Papers / Journal-first Papers / NIER Track at Room C Chair(s): Fabrizio Pastore University of Luxembourg | ||
15:30 12mTalk | DCLink: Bridging Data Constraint Changes and Implementations in FinTech Systems Research Papers Wensheng Tang Hong Kong University of Science and Technology, Chengpeng Wang Hong Kong University of Science and Technology, Peisen Yao Zhejing University, Rongxin Wu Xiamen University, Xianjin Fu Ant Group, Gang Fan Ant Group, Charles Zhang Hong Kong University of Science and Technology File Attached | ||
15:42 12mTalk | Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks Research Papers Paschal Amusuo Purdue University, Ricardo Andrés Calvo Méndez Universidad Nacional de Colombia, Zhongwei Xu Xi'an JiaoTong University, Aravind Machiry Purdue University, James C. Davis Purdue University Pre-print Media Attached File Attached | ||
15:54 12mTalk | WADIFF: A Differential Testing Framework for WebAssembly Runtimes Research Papers Shiyao Zhou The Hong Kong Polytechnic University, Muhui Jiang The Hong Kong Polytechnic University, Weimin Chen The Hong Kong Polytechnic University, Hao Zhou Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University File Attached | ||
16:06 12mTalk | T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure Journal-first Papers An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaowei Wang University of Manitoba Pre-print | ||
16:18 12mTalk | VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage Research Papers Xiaoyin Wang University of Texas at San Antonio, Tahmid Rafi University of Texas at San Antonio, Na Meng Virginia Tech File Attached | ||
16:30 12mTalk | PURLTL: Mining LTL Specification from Imperfect Traces in TestingRecorded talk NIER Track Bo Peng Sun Yat-Sen University, Pingjia Liang Sun Yat-Sen University, Tingchen Han Sun Yat-Sen University, Weilin Luo Sun Yat-Sen University, Jianfeng Du Guangdong University of Foreign Studies, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Rongzhen Ye Sun Yat-Sen University, Yuhang Zheng Sun Yat-Sen University Media Attached |
15:30 - 17:00 | Bug DetectionResearch Papers / Journal-first Papers at Room D Chair(s): Andreea Vescan Babes-Bolyai University | ||
15:30 12mTalk | A Comparative Study of Transformer-based Neural Text Representation Techniques on Bug Triaging Research Papers File Attached | ||
15:42 12mTalk | Duplicate Bug Report Detection: How Far Are We? Journal-first Papers Ting Zhang Singapore Management University, DongGyun Han Royal Holloway, University of London, Venkatesh Vinayakarao Chennai Mathematical Institute, Ivana Clairine Irsan Singapore Management University, Bowen Xu North Carolina State University, Ferdian Thung Singapore Management University, David Lo Singapore Management University, Lingxiao Jiang Singapore Management University Link to publication DOI File Attached | ||
15:54 12mTalk | Neural SZZ Algorithm Research Papers LingXiao Tang zhejiang university, Lingfeng Bao Zhejiang University, Xin Xia Huawei Technologies, Zhongdong Huang Zhejiang University Pre-print | ||
16:06 12mTalk | How to Train Your Neural Bug Detector: Artificial vs Real Bugs Research Papers Cedric Richter Carl von Ossietzky Universität Oldenburg / University of Oldenburg, Heike Wehrheim Carl von Ossietzky Universität Oldenburg / University of Oldenburg Pre-print File Attached | ||
16:18 12mTalk | Detection of Java Basic Thread Misuses Based on Static Event Analysis Research Papers Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Chi Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences File Attached | ||
16:30 12mFull-paper | On effort-aware metrics for defect prediction Journal-first Papers Jonida Çarka University of Rome Tor Vergata, Matteo Esposito University of Rome Tor Vergata, Falessi Davide University of Rome Tor Vergata DOI File Attached | ||
16:42 12mTalk | FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers Research Papers Eric Liu University of Toronto, Shengjie Xu University of Toronto, David Lie University of Toronto, Canada Pre-print File Attached |
15:30 - 17:00 | Autonomous Systems and AgentsResearch Papers / NIER Track / Journal-first Papers / Tool Demonstrations at Room E Chair(s): Alessio Gambi IMC University of Applied Sciences Krems | ||
15:30 12mTalk | TEASER: Simulation-based CAN Bus Regression Testing for Self-driving Cars Software Tool Demonstrations Christian Birchler Zurich University of Applied Sciences, Cyrill Rohrbach University of Bern, Switzerland, Hyeongkyun Kim University of Zurich, Switzerland, Alessio Gambi IMC University of Applied Sciences Krems, Tianhai Liu aicas GmbH, Germany, Jens Horneber aicas GmbH, Germany, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences Pre-print File Attached | ||
15:42 12mTalk | Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms Journal-first Papers Andrea Di Sorbo University of Sannio, Fiorella Zampetti University of Sannio, Italy, Corrado A. Visaggio University of Sannio, Italy, Massimiliano Di Penta University of Sannio, Italy, Sebastiano Panichella Zurich University of Applied Sciences File Attached | ||
15:54 12mTalk | Towards a Formal Framework for Normative Requirements Elicitation NIER Track Nick Feng University of Toronto, Lina Marsso University of Toronto, Sinem Getir Yaman University of York, UK, Beverley Townsend University of York, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Marsha Chechik University of Toronto File Attached | ||
16:06 12mTalk | Detecting Smart Home Automation Application Interferences with Domain Knowledge Research Papers Tao Wang Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Liwei Liu Institute of Software at Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print File Attached | ||
16:18 12mTalk | CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues Tool Demonstrations Xiufeng Xu Nanyang Technological University, Chenguang Zhu Meta, Yi Li Nanyang Technological University Pre-print Media Attached File Attached | ||
16:30 12mTalk | A Comprehensive Study on Code Clones in Automated Driving SoftwareRecorded talk Research Papers Ran Mo Central China Normal University, Yingjie Jiang Central China Normal University, Wenjing Zhan Central China Normal University, Dongyu Wang Central China Normal University, Zengyang Li Central China Normal University Pre-print Media Attached File Attached |
Thu 14 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:00 | Program Repair 2Research Papers / Journal-first Papers / NIER Track at Plenary Room 2 Chair(s): Shin Yoo KAIST | ||
10:30 12mTalk | An Empirical Study on Fine-tuning Large Language Models of Code for Automated Program Repair Research Papers Kai Huang , Xiangxin Meng Beihang University, Beijing, China, Jian Zhang Nanyang Technological University, Yang Liu Nanyang Technological University, Wenjie Wang University of Chinese Academy of Sciences, Shuhao Li Zhongguancun Laboratory, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory File Attached | ||
10:42 12mTalk | Estimating the Potential of Program Repair Search Spaces with Commit Analysis Journal-first Papers Khashayar Etemadi KTH Royal Institute of Technology, Niloofar Tarighat Sharif University of Technology, Siddharth Yadav IIIT-Delhi, Matias Martinez Universitat Politècnica de Catalunya (UPC), Martin Monperrus KTH Royal Institute of Technology Link to publication File Attached | ||
10:54 12mTalk | LeakPair: Proactive Repairing of Memory Leaks in Single Page Web Applications Research Papers Arooba Shahoor Kyungpook National University, Askar Yeltayuly Khamit Ulsan National Institute of Science and Technology, Jooyong Yi UNIST (Ulsan National Institute of Science and Technology), Dongsun Kim Kyungpook National University Pre-print Media Attached | ||
11:06 12mTalk | Automated Fixing of Web UI Tests via Iterative Element Matching Research Papers Yuanzhang Lin Beihang University, Guoyao Wen Huawei Technologies Co., Ltd., Xiang Gao Beihang University Pre-print Media Attached | ||
11:18 12mTalk | OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability with Attribute Checking Research Papers Wenjie Zhang Peking University, Guancheng Wang Peking University, China, Junjie Chen Tianjin University, Yingfei Xiong Peking University, Yong Liu Beijing University of Chemical Technology, Lu Zhang Peking University Pre-print File Attached | ||
11:30 12mTalk | Hot Patching Hot Fixes: Reflection and Perspectives NIER Track Pre-print File Attached |
10:30 - 12:00 | Software Testing for Specialized Systems 2Research Papers / Tool Demonstrations at Room C Chair(s): Zishuo Ding University of Waterloo | ||
10:30 12mTalk | Bridging the Gap between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations Research Papers Szymon Stradowski Nokia & Wrocław University of Science and Technology, Lech Madeyski Wroclaw University of Science and Technology Link to publication DOI Pre-print Media Attached | ||
10:42 12mTalk | Identify and Update Test Cases when Production Code Changes: A Transformer-based Approach Research Papers Xing Hu Zhejiang University, Zhuang Liu Zhejiang University, Xin Xia Huawei Technologies, Zhongxin Liu Zhejiang University, Tongtong Xu Huawei, Xiaohu Yang Zhejiang University | ||
10:54 12mTalk | Revisiting and Improving Retrieval-Augmented Deep Assertion Generation Research Papers Weifeng Sun , Hongyan Li Chongqing University, Meng Yan Chongqing University, Yan Lei Chongqing University, Hongyu Zhang Chongqing University, Hongyu Zhang Chongqing University | ||
11:06 12mTalk | Provengo: A Tool Suite for Scenario Driven Model-Based Testing Tool Demonstrations Michael Bar Sinai Provengo, Achiya Elyasaf Ben-Gurion University of the Negev, Gera Weiss Ben-Gurion University of the Negev, Yeshayahu Weiss Ben-Gurion University of the Negev Pre-print File Attached | ||
11:18 12mTalk | QuraTest: Integrating Quantum Specific Features in Quantum Program Testing Research Papers Jiaming Ye Kyushu University, Shangzhou Xia Kyushu University, Fuyuan Zhang Kyushu University, Paolo Arcaini National Institute of Informatics
, Lei Ma University of Alberta, Jianjun Zhao Kyushu University, Fuyuki Ishikawa National Institute of Informatics File Attached | ||
11:30 12mTalk | QuCAT: A Combinatorial Testing Tool for Quantum Software Tool Demonstrations Xinyi Wang Simula Research Laboratory, Paolo Arcaini National Institute of Informatics
, Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University Pre-print File Attached | ||
11:42 12mTalk | LEAP: Efficient and Automated Test Method for NLP SoftwareRecorded talk Research Papers Mingxuan Xiao Hohai University, Yan Xiao National University of Singapore, Hai Dong RMIT University, Shunhui Ji Hohai University, Pengcheng Zhang Hohai University Media Attached |
10:30 - 12:00 | Mobile Development 1Research Papers / Tool Demonstrations / Journal-first Papers at Room D Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security | ||
10:30 12mTalk | Taming Android Fragmentation through Lightweight Crowdsourced Testing Journal-first Papers Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Yonghui Liu Monash University, John Grundy Monash University, Li Li Beihang University Media Attached File Attached | ||
10:42 12mTalk | Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components Research Papers Zhijie Liu ShanghaiTech University, China, Liangfeng Zhang School of Information Science and Technology, ShanghaiTech University, Yutian Tang University of Glasgow File Attached | ||
10:54 12mTalk | Fine-Grained In-Context Permission Classification for Android Apps using Control-Flow Graph Embedding Research Papers Vikas K. Malviya Singapore Management University, Yan Naing Tun Singapore Management University, Chee Wei Leow Singapore Management University, Ailys Tee Xynyn Singapore Management University, Lwin Khin Shar Singapore Management University, Lingxiao Jiang Singapore Management University File Attached | ||
11:06 12mTalk | How Android Apps Break the Data Minimization Principle: An Empirical Study Research Papers Shaokun Zhang Peking University, Hanwen Lei Peking University, Yuanpeng Wang Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University Pre-print File Attached | ||
11:18 12mTalk | ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps Tool Demonstrations Shixin Zhang Institute of Software, Chinese Academy of Sciences, Shanna Li Beijing Jiaotong University, Xi Deng Institute of Software, Chinese Academy of Sciences, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Media Attached File Attached | ||
11:30 12mTalk | DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph Learning Research Papers Chunyang Meng Sun Yat-sen University, Shijie Song Sun Yat-sen University, Haogang Tong Sun Yat-sen University, Maolin Pan Sun Yat-sen University, Yang Yu Sun Yat-sen University Pre-print File Attached |
10:30 - 12:00 | Program Verification 2Research Papers / Tool Demonstrations / NIER Track at Room E Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
10:30 12mTalk | Expediting Neural Network Verification via Network Reduction Research Papers Yuyi Zhong National University of Singapore, Singapore, Ruiwei Wang School of Computing, National University of Singapore, Siau-Cheng Khoo National University of Singapore Pre-print File Attached | ||
10:42 12mTalk | SMT Solver Validation Empowered by Large Pre-trained Language Models Research Papers Maolin Sun Nanjing University, Yibiao Yang Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Yuming Zhou Nanjing University Pre-print File Attached | ||
10:54 12mTalk | LIV: Invariant Validation Using Straight-Line Programs Tool Demonstrations Pre-print Media Attached File Attached | ||
11:06 12mTalk | CEGAR-PT: A Tool for Abstraction by Program Transformation Tool Demonstrations Pre-print Media Attached File Attached | ||
11:18 12mTalk | Symbolic Verification of Fuzzy Logic ModelsRecorded talk NIER Track Siang Zhao School of Computer, National University of Defense Technology, China, Zhongyang Li School of Computer, National University of Defense Technology, China, Zhenbang Chen National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China Pre-print Media Attached | ||
11:30 12mTalk | HOBAT: Batch Verification for Homogeneous Structural Neural NetworksRecorded talk Research Papers Media Attached File Attached |
13:30 - 15:00 | Software Testing for Specialized Systems 3Journal-first Papers / Tool Demonstrations / Research Papers at Plenary Room 2 Chair(s): Xiaoyin Wang University of Texas at San Antonio | ||
13:30 12mTalk | An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software Research Papers Wenxuan Wang Chinese University of Hong Kong, Jingyuan Huang Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Chang Chen Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Michael Lyu The Chinese University of Hong Kong File Attached | ||
13:42 12mTalk | CoMSA: A modeling driven sampling approach for configuration performance testing Research Papers Yuanjie Xia University of Waterloo, Zishuo Ding University of Waterloo, Weiyi Shang University of Waterloo Pre-print Media Attached | ||
13:54 12mTalk | DroneReqValidator: Facilitating High Fidelity Simulation Testing for Uncrewed Aerial Systems Developers Tool Demonstrations Bohan Zhang Saint Louis University, Missouri, Yashaswini Shivalingaiah Saint Louis University, Missouri, Ankit Agrawal Saint Louis University, Missouri Pre-print Media Attached File Attached | ||
14:06 12mTalk | Effective Concurrency Testing for Go via Directional Primitive-constrained Interleaving Exploration Research Papers Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Yixin Yang Huazhong University of Science and Technology, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology, Hai Jin Huazhong University of Science and Technology File Attached | ||
14:18 12mTalk | Fuzzing for CPS Mutation Testing Research Papers Jaekwon Lee University of Luxembourg, Luxembourg, Enrico Viganò University of Luxembourg, Oscar Cornejo University of Milano Bicocca, Italy, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa Pre-print File Attached | ||
14:30 12mTalk | MUT4SLX: Fast Mutation Testing for Simulink Tool Demonstrations Halil Ibrahim Ceylan University of Antwerp, Onur Kilincceker University of Antwerp and Flanders Make vzw, Mutlu Beyazıt University of Antwerp and Flanders Make vzw, Serge Demeyer University of Antwerp; Flanders Make Media Attached File Attached | ||
14:42 12mTalk | Machine learning-based test selection for simulation-based testing of self-driving cars software Journal-first Papers Christian Birchler Zurich University of Applied Sciences, Sajad Khatiri USI-Lugnao & Zurich University of Applied Sciences, Bill Bosshard Meier Planungsdienste GmbH, Alessio Gambi IMC University of Applied Sciences Krems, Sebastiano Panichella Zurich University of Applied Sciences |
13:30 - 15:00 | Mobile Development 2Research Papers / Industry Showcase (Papers) / Journal-first Papers / Tool Demonstrations at Room D Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security | ||
13:30 12mTalk | Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps Journal-first Papers Mattia Fazzini University of Minnesota, Kevin Moran George Mason University, Carlos Bernal-Cárdenas Microsoft, Tyler Wendland University of Minnesota, Alessandro Orso Georgia Institute of Technology, Denys Poshyvanyk William & Mary | ||
13:42 12mTalk | AutoDebloater: Automated Android App Debloating Tool Demonstrations Jiakun Liu Singapore Management University, Xing Hu Zhejiang University, Ferdian Thung Singapore Management University, Shahar Maoz Tel Aviv University, Eran Toch Tel Aviv University, Debin Gao Singapore Management University, David Lo Singapore Management University | ||
13:54 12mTalk | ReuNify: A Step Towards Whole Program Analysis for React Native Android App Research Papers Yonghui Liu Monash University, Xiao Chen Monash University, Pei Liu Data61 at CSIRO, Australia, John Grundy Monash University, Chunyang Chen Monash University, Li Li Beihang University Pre-print | ||
14:06 12mTalk | WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs Research Papers Shi Meng Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Shenao Wang Xidian University, Kailong Wang Huazhong University of Science and Technology, Xusheng Xiao Arizona State University, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology | ||
14:18 12mTalk | Vision-based Widget Mapping for Test Migration across Mobile Platforms: Are We There Yet? Research Papers Ruihua Ji Nanjing University, Tingwei Zhu Nanjing University, Xiaoqing Zhu Nanjing University, Chunyang Chen Monash University, Minxue Pan Nanjing University, Tian Zhang Nanjing University | ||
14:30 12mTalk | Government Mobile Apps: Analysing Citizen Feedback via App Reviews Industry Showcase (Papers) Tooba Aamir Data61 at CSIRO, Australia, Mohan Baruwal Chhetri CSIRO’s Data61, M.A.P. Chamikara Data61 CSIRO Australia, Marthie Grobler CSIRO's Data61 |
13:30 - 15:00 | DebuggingResearch Papers / Industry Showcase (Papers) at Room E Chair(s): Carol Hanna University College London | ||
13:30 12mTalk | Coding and Debugging by Separating Secret Code toward Secure Remote Development Industry Showcase (Papers) Shinobu Saito NTT Media Attached File Attached | ||
13:42 12mTalk | Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count Research Papers Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Hao Zhang Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print | ||
13:54 12mResearch paper | PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis Research Papers Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Shuai Wang Hong Kong University of Science and Technology Pre-print | ||
14:06 12mTalk | The MAP metric in Information Retrieval Fault Localization Research Papers Media Attached File Attached | ||
14:18 12mTalk | Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial ExtrapolationRecorded talk Research Papers Zuoyan Zhang Information Engineering University, Bei Zhou Information Engineering University, Jiangwei Hao Information Engineering University, Hongru Yang Information Engineering University, Mengqi Cui Information Engineering University, Yuchang Zhou Information Engineering University, Guanghui Song Information Engineering University, Fei Li Information Engineering University, Jinchen Xu Information Engineering University, Jie Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Media Attached File Attached | ||
14:30 12mTalk | Information Retrieval-based Fault Localization for Concurrent ProgramsRecorded talk Research Papers Pre-print Media Attached |
15:30 - 17:00 | FuzzingNIER Track / Journal-first Papers / Research Papers / Tool Demonstrations at Plenary Room 2 Chair(s): Lars Grunske Humboldt-Universität zu Berlin | ||
15:30 12mTalk | Fine-Grained Coverage-Based Fuzzing Journal-first Papers Wei-Cheng Wu University of Southern California, USA, Bernard Nongpoh CEA LIST, University Paris-Saclay, Marwan Nour CEA, LIST, Université Paris Saclay, Michaël Marcozzi CEA, LIST, Université Paris Saclay, Sébastien Bardin CEA LIST, University Paris-Saclay, Christophe Hauser Dartmouth College Link to publication File Attached | ||
15:42 12mTalk | MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure Research Papers Haoyu Wang College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University, Chuyue Xie College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Zan Wang Tianjin University, Qingchao Shen Tianjin University, Yingquan Zhao Tianjin University Pre-print File Attached | ||
15:54 12mTalk | Thunderkaller: Profiling and Improving the Performance of Syzkaller Research Papers Yang Lan Institute for Network Science and Cyberspace of Tsinghua University, Di Jin Brown University, Zhun Wang Institute for Network Science and Cyberspace of Tsinghua University, Wende Tan Tsinghua University, Zheyu Ma Tsinghua University, Chao Zhang Tsinghua University File Attached | ||
16:06 12mTalk | PHYFU: Fuzzing Modern Physics Simulation Engines Research Papers Dongwei Xiao Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology Link to publication DOI | ||
16:18 12mTalk | NaturalFuzz: Natural Input Generation for Big Data Analytics Research Papers Ahmad Humayun Virginia Tech, Yaoxuan Wu UCLA, Miryung Kim University of California at Los Angeles, USA, Muhammad Ali Gulzar Virginia Tech File Attached | ||
16:30 12mTalk | SpecFuzzer: A Tool for Inferring Class Specifications via Grammar-based Fuzzing Tool Demonstrations Facundo Molina IMDEA Software Institute, Marcelo d'Amorim North Carolina State University, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina Pre-print Media Attached File Attached | ||
16:42 12mTalk | Scalable Industrial Control System Analysis via XAI-based Gray-Box Fuzzing NIER Track Justin Kur Oakland University, Jingshu Chen Oakland University, Jun Huang City University of Hong Kong |
15:30 - 17:00 | Code Generation 3Research Papers / Journal-first Papers at Room C Chair(s): David Lo Singapore Management University | ||
15:30 12mTalk | Improving code extraction from coding screencasts using a code-aware encoder-decoder model Research Papers Abdulkarim Malkadi Florida State University, USA - Jazan University, KSA, Ahmad Tayeb Florida State University, USA, Sonia Haiduc Florida State University File Attached | ||
15:42 12mTalk | InfeRE: Step-by-Step Regex Generation via Chain of Inference Research Papers Shuai Zhang School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University Pre-print File Attached | ||
15:54 12mTalk | MELT: Mining Effective Lightweight Transformations from Pull Requests Research Papers Daniel Ramos Carnegie Mellon University, and INESC-ID, Hailie Mitchell Carnegie Mellon University, Ines Lynce INESC-ID/IST, Universidade de Lisboa, Vasco Manquinho INESC-ID; Universidade de Lisboa, Ruben Martins Carnegie Mellon University, Claire Le Goues Carnegie Mellon University Pre-print File Attached | ||
16:06 12mTalk | On the Evaluation of Neural Code Translation: Taxonomy and Benchmark Research Papers Mingsheng Jiao Shanghai Jiao Tong University, Tingrui Yu Shanghai Jiao Tong University, Xuan Li Shanghai Jiao Tong University, Guan Jie Qiu Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University Pre-print File Attached | ||
16:18 12mTalk | Out of the BLEU: How should we assess quality of the Code Generation models? Journal-first Papers Mikhail Evtikhiev JetBrains Research, Egor Bogomolov JetBrains Research, Yaroslav Sokolov JetBrains, Timofey Bryksin JetBrains Research Link to publication DOI Pre-print File Attached | ||
16:30 12mTalk | Pluggable Type Inference for Free Research Papers Martin Kellogg New Jersey Institute of Technology, Daniel Daskiewicz New Jersey Institute of Technology, Loi Ngo Duc Nguyen New Jersey Institute of Technology, Muyeed Ahmed New Jersey Institute of Technology, Michael D. Ernst University of Washington Link to publication Pre-print File Attached |
15:30 - 17:00 | Configuration and Version ManagementResearch Papers at Room D Chair(s): Shahar Maoz Tel Aviv University | ||
15:30 12mTalk | A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem Research Papers Wenke Li Huazhong University of Science and Technology, Feng Wu Tencent Technology (Shenzhen) Co. Ltd, Cai Fu Huazhong University of Science and Technology, Fan Zhou Tencent Technology (Shenzhen) Co. Ltd Link to publication DOI Pre-print | ||
15:42 12mTalk | Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem Research Papers Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Rabe Abdalkareem Omar Al-Mukhtar University, Emad Shihab Concordia Univeristy Pre-print | ||
15:55 12mTalk | ESRO: Experience Assisted Service Reliability against Outages Research Papers Sarthak Chakraborty Adobe Research, Shubham Agarwal Adobe Research, Shaddy Garg Adobe, Abhimanyu Sethia Indian Institute of Technology Kanpur, Udit Narayan Pandey Indian Institute of Technology Kanpur, Videh Aggarwal Indian Institute of Technology Kanpur, Shiv Saini Adobe Research File Attached | ||
16:08 12mTalk | Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks Research Papers Yang Hu University of Texas at Austin, Wenxi Wang University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Kenneth L. McMillan University of Texas at Austin, Mohit Tiwari University of Texas at Austin File Attached | ||
16:21 12mTalk | Merge Conflict Resolution: Classification or Generation? Research Papers Jinhao Dong Peking University, Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Yiling Lou Fudan University, Dan Hao Peking University Pre-print File Attached | ||
16:34 12mTalk | Repeated Builds During Code Review: An Empirical Study of the OpenStack Community Research Papers Rungroj Maipradit University of Waterloo, Dong Wang Kyushu University, Japan, Patanamon Thongtanunam University of Melbourne, Raula Gaikovina Kula Nara Institute of Science and Technology, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo Pre-print File Attached | ||
16:47 12mTalk | Automated Software Entity Matching Between Successive VersionsRecorded talk Research Papers Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Nan Niu University of Cincinnati, Yuxia Zhang Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Yanjie Jiang Beijing Institute of Technology DOI Media Attached |
15:30 - 17:00 | Vulnerability and Security 2Journal-first Papers / Industry Showcase (Papers) / Research Papers at Room E Chair(s): Ben Hermann TU Dortmund | ||
15:30 12mTalk | An Industrial Practice for Securing Android Apps in the Banking Domain Industry Showcase (Papers) Vikas K. Malviya Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Yan Naing Tun Singapore Management University, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University File Attached | ||
15:42 12mTalk | Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation Journal-first Papers Wuqi Zhang The Hong Kong University of Science and Technology, Lili Wei McGill University, Shing-Chi Cheung Hong Kong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shuqing Li The Chinese University of Hong Kong, Lu Liu The Hong Kong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong Link to publication DOI Pre-print File Attached | ||
15:54 12mTalk | Software Engineering Using Autonomous Agents: Are We There Yet?Recorded talk Industry Showcase (Papers) Samdyuti Suri Accenture Tech Labs, Sankar Narayan Das Accenture Tech Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India Media Attached | ||
16:06 12mTalk | DeFiWarder: Protecting DeFi Apps from Token Leaking VulnerabilitiesRecorded talk Research Papers Jianzhong Su Sun Yat-sen University, Xingwei Lin Ant Group, Zhiyuan Fang Sun Yat-sen University, Zhirong Zhu Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Wei Lv Ant Group, Jiashui Wang Zhejiang University Media Attached | ||
16:18 12mTalk | VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual DeviceRecorded talk Research Papers Yuwei Liu Institute of Software, Chinese Academy of Sciences, Siqi Chen Shanghai Jiao Tong University, Yuchong Xie Shanghai Jiao Tong University, Yanhao Wang Qi An Xin Group Corp., Libo Chen Shanghai Jiao Tong University, Bin Wang Beijing Institute of Computer Technology and Applications, Yingming Zeng Beijing Institute of Computer Technology and Applications, Zhi Xue Shanghai Jiao Tong University, Purui Su Institute of Software/CAS China Media Attached File Attached | ||
16:30 12mTalk | Smart Prompt Advisor: Multi-objective Prompt Framework for Consistency and Best PracticesRecorded talk Industry Showcase (Papers) Kanchanjot Kaur Phokela Accenture, Samarth Sikand Accenture Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India Media Attached |
Accepted Papers
Call for Papers
ASE is inviting journal-first presentations for papers published recently in prestigious software engineering journals. This will both enrich the ASE program as well as offer the authors an opportunity to speak to the community. The journal-first manuscripts are published through the journals and will not be part of the ASE proceedings. The journal-first papers will be listed in the conference program. At least one author of each presentation accepted for the journal-first program must register and attend the conference to present the paper.
Scope
We invite applications for journal papers published in:
- Automated Software Engineering Journal (ASEJ, Springer)
- IEEE Transaction of Software Engineering (IEEE TSE)
- ACM Transactions on Software Engineering and Methodology (ACM TOSEM)
- Empirical Software Engineering Journal (EMSE, Springer)
- Journal of Systems and Software (JSS, Elsevier)
A journal-first presentation submitted to ASE 2023 must adhere to the following criteria:
- The paper was accepted for publication after January 1st 2022.
- The paper is in the scope of the conference, as defined in the call for ASE 2023 research papers
- The paper does not exclusively report a secondary study, e.g., systematic reviews, mapping studies, surveys.
- The paper reports completely new research results and/or presents novel contributions that significantly extend and were not previously reported in prior work. The paper does not extend prior work solely with additional proofs or algorithms (or other such details presented for completeness), additional empirical results, or minor enhancements or variants of the results presented in the prior work. As a rough guide, a journal-first paper should have at least 70% new content over and above the content of previous publications. As such, the expectation is that an extension of a full 8-10 page conference or workshop paper would not be deemed a journal-first paper.
- The paper has not been presented at, and is not under consideration for, journal-first programs of other conferences.
How to Submit
Authors of manuscripts that respect these criteria are invited to submit a one-page presentation proposal consisting of the paper’s title, the paper’s authors, an extended abstract, the name of the presenter, and a pointer to the original journal paper at the journal’s Web site. Each journal first paper should be presented by a different author, but there is no limitation on the number of papers accepted per author. If the paper is not online yet, then specify so. The original paper should also be uploaded during submission. If the journal paper is related to or builds on a previously published work (such as a tool demo or a poster), then the proposal must clearly and explicitly justify why the paper should be considered a journal first paper.
The submission link is: https://ase2023-jf.hotcrp.com/
Evaluation and Selection
Authors will be invited to present their paper at ASE 2023 after a check that the paper is in scope for the conference and it adheres to the criteria above. As the papers have already been reviewed and accepted by the journals, they will not be reviewed again for technical content. In the case that an exceptionally high number of submissions is received, not all papers will be selected. Priority will be given to the papers that:
Increase opportunities for authors to attend ASE, who might not otherwise attend. In particular, priority will be given to papers whose specified presenter is not presenting other JF papers.
Best fit the technical program, offering a balance across the conference topics.
Would be ineligible as a journal-first presentation at the next SE3 conference (ICSE/FSE/ASE) – because its acceptance date precedes the next conference’s window of journal acceptance dates for JF presentations.