Tue 12 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:00 | |||
10:30 12mTalk | Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System Research Papers Jun Huang Anhui University of Technology, Yang Yang Anhui University of Technology, Hang Yu Ant Group, Jianguo Li Ant Group, Xiao Zheng Anhui University of Technology | ||
10:42 12mTalk | Dynamic Graph Neural Networks-based Alert Link Prediction for Online Service Systems Research Papers Yiru Chen Fudan University, Chenxi Zhang Fudan University, Zhen Dong Fudan University, China, Dingyu Yang Alibaba Group, Xin Peng Fudan University, Jiayu Ou Alibaba Group, Hong Yang Fudan University, Zheshun Wu Alibaba Group, Xiaojun Qu Alibaba Group, Wei Li Alibaba Group | ||
11:06 12mTalk | Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion Research Papers Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:18 12mTalk | Vicious Cycles in Distributed Software SystemsRecorded talk Research Papers Shangshu Qian Purdue University, Wen Fan Purdue University, Lin Tan Purdue University, Yongle Zhang Purdue University Pre-print Media Attached | ||
11:30 12mTalk | Scene-Driven Exploration and GUI Modeling for Android AppsRecorded talk Research Papers Xiangyu Zhang , Lingling Fan Nankai University, Sen Chen Tianjin University, Yucheng Su Alibaba Group, Boyuan Li Nankai University Media Attached |
10:30 - 12:00 | Testing AI Systems 1NIER Track / Research Papers at Room C Chair(s): Leonardo Mariani University of Milano-Bicocca | ||
10:30 12mTalk | Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting Research Papers Li Tsz On The Hong Kong University of Science and Technology, Wenxi Zong Northeastern University, Yibo Wang Northeastern University, Haoye Tian University of Luxembourg, Ying Wang Northeastern University, Shing-Chi Cheung Hong Kong University of Science and Technology, Jeffrey Kramer Imperial College London Pre-print | ||
11:06 12mTalk | Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers Research Papers Zhen Li Huazhong University of Science and Technology, Ruqian Zhang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Ning Wang Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology, Shouhuai Xu University of Colorado Colorado Springs, Chen Chen University of Central Florida, Hai Jin Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology Pre-print | ||
11:18 12mTalk | The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models Research Papers Xin Zhou Singapore Management University, Singapore, Kisub Kim Singapore Management University, Singapore, Bowen Xu North Carolina State University, Jiakun Liu Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University Pre-print | ||
11:30 12mTalk | CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature SpaceRecorded talk Research Papers haibin zheng Zhejiang University of Technology, Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Haibo Jin Zhejiang University of Techonology Pre-print Media Attached |
10:30 - 12:00 | Infrastructure, Build, and LogsResearch Papers / Industry Showcase (Papers) / NIER Track / Journal-first Papers at Room D Chair(s): Fatemeh Hendijani Fard University of British Columbia, Arie van Deursen Delft University of Technology | ||
10:30 12mTalk | Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages Research Papers Zhenhao Li Concordia University, An Ran Chen University of Alberta, Xing Hu Zhejiang University, Xin Xia Huawei Technologies, Tse-Hsun (Peter) Chen Concordia University, Weiyi Shang University of Waterloo Pre-print | ||
11:42 12mTalk | LogOnline: A Semi-supervised Log-based Anomaly Detector Aided with Online Learning MechanismRecorded talk Research Papers Xuheng Wang Tsinghua University, Jiaxing Song Tsinghua University, Xu Zhang Microsoft Research, Junshu Tang Shanghai Jiao Tong University, Weihe Gao Tsinghua University, Qingwei Lin Microsoft, Xuheng Wang Tsinghua University Link to publication DOI Media Attached |
10:30 - 12:00 | Open Source and Software Ecosystems 1Research Papers / Tool Demonstrations at Room E Chair(s): Denys Poshyvanyk William & Mary | ||
10:30 12mTalk | An Empirical Study of Malicious Code In PyPI Ecosystem Research Papers Wenbo Guo School of Cyber Science and Engineering, Sichuan University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Cheng Huang School of Cyber Science and Engineering, Sichuan University, Yong Fang School of Cyber Science and Engineering, Sichuan University, Yang Liu Nanyang Technological University Pre-print | ||
10:42 12mTalk | Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem Research Papers Weiwei Xu Peking University, Hao He Carnegie Mellon University, Kai Gao University of Science and Technology Beijing, Minghui Zhou Peking University Pre-print | ||
10:54 12mTalk | Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem Research Papers Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Sen Chen Tianjin University, Zhengzi Xu Nanyang Technological University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University | ||
11:30 12mTalk | EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery Research Papers Chenyuan Zhang Xiamen University, Yanlin Wang Sun Yat-sen University, Zhao Wei Tencent, Yong Xu Tencent, Juhong Wang Tencent, Hui Li Xiamen University, Rongrong Ji Xiamen University Pre-print Media Attached | ||
11:42 12mTalk | Fork Entropy: Assessing the Diversity of Open Source Software Projects' ForksRecorded talk Research Papers Liang Wang Nanjing University, Zhiwen Zheng State Key Laboratory for Novel Software Technology, Nanjing University, Xiangchen Wu State Key Laboratory for Novel Software Technology, Nanjing University, Baihui Sang State Key Laboratory for Novel Software Technology, Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University Media Attached |
13:30 - 15:00 | Cloud and Distributed Systems 2Research Papers / Tool Demonstrations / Journal-first Papers / Industry Showcase (Papers) at Plenary Room 2 Chair(s): Tim Menzies North Carolina State University | ||
13:42 12mTalk | Prism: Revealing Hidden Functional Clusters of Massive Instances in Cloud Systems Research Papers Jinyang Liu The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Cong Feng Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Zengyin Yang Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
14:30 12mTalk | ConfTainter: Static Taint Analysis For Configuration OptionsRecorded talk Research Papers Teng Wang National University of Defense Technology, Haochen He National University of Defense Technology, Xiaodong Liu National University of Defense Technology, Shanshan Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Yu Jiang Tsinghua University, Qing Liao Harbin Institute of Technology, Wang Li National University of Defense Technology Pre-print Media Attached |
13:30 - 15:00 | Testing AI Systems 2NIER Track / Journal-first Papers / Research Papers at Room C Chair(s): Lwin Khin Shar Singapore Management University | ||
13:30 12mTalk | ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems Research Papers Shengyou Hu Nanjing University, Huayao Wu Nanjing University, Peng Wang Fudan University, Jing Chang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Yongjun Tu Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xiu Jiang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xintao Niu Nanjing University, Changhai Nie Nanjing University Pre-print Media Attached File Attached | ||
14:06 12mResearch paper | Generative Model-Based Testing on Decision-Making Policies Research Papers Zhuo Li Kyushu University, Xiongfei Wu Kyushu University, Derui Zhu Technical University of Munich, Mingfei Cheng Singapore Management University, Siyuan Chen Kyushu University, Fuyuan Zhang Kyushu University, Xiaofei Xie Singapore Management University, Lei Ma University of Alberta, Jianjun Zhao Kyushu University File Attached |
13:30 - 15:00 | Smart Contracts, Blockchain, Energy efficiency, and green softwareResearch Papers / NIER Track / Industry Showcase (Papers) / Tool Demonstrations / Journal-first Papers at Room D | ||
13:30 12mTalk | An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the Edge Research Papers Alessandro Tundo University of Milano-Bicocca, Marco Mobilio University of Milano Bicocca, Shashikant Ilager Vienna University of Technology, Ivona Brandic Vienna University of Technology, Ezio Bartocci TU Wien, Leonardo Mariani University of Milano-Bicocca Pre-print File Attached | ||
13:54 12mTalk | SmartCoCo: Checking Comment-code Inconsistency in Smart Contracts via Constraint Propagation and Binding Research Papers Sicheng Hao Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Xiaohui Liu Sun Yat-sen University DOI File Attached |
13:30 - 15:00 | Vulnerability and Security 1Research Papers / Journal-first Papers at Room E Chair(s): Fatemeh Hendijani Fard University of British Columbia | ||
13:30 12mTalk | A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering Research Papers Wentao Liang Institute of Software, Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences File Attached | ||
13:42 12mTalk | Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows Research Papers Pre-print File Attached | ||
13:54 12mTalk | Learning to Locate and Describe Vulnerabilities Research Papers Jian Zhang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xu Wang Beihang University, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University | ||
14:06 12mTalk | When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection Research Papers Xin-Cheng Wen Harbin Institute of Technology, Xinchen Wang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Yang Liu Nanyang Technological University, Zhaoquan Gu Harbin Institute of Technology | ||
14:30 12mTalk | SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices Research Papers Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Media Attached File Attached |
15:30 - 17:00 | Code Generation 1Research Papers / Tool Demonstrations / Journal-first Papers at Plenary Room 2 Chair(s): Kui Liu Huawei | ||
15:30 12mTalk | An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-trained Code Models Research Papers | ||
15:54 12mTalk | CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation Research Papers Mingwei Liu Fudan University, Tianyong Yang Fudan University, Yiling Lou Fudan University, Xueying Du Fudan University, Ying Wang Northeastern University, Xin Peng Fudan University Pre-print Media Attached | ||
16:18 12mTalk | Domain Adaptive Code Completion via Language Models and Decoupled Domain Databases Research Papers Ze Tang Software Institute, Nanjing University, Jidong Ge Nanjing University, Shangqing Liu Nanyang Technological University, Tingwei Zhu Nanjing University, Tongtong Xu Huawei, Liguo Huang Southern Methodist University, Bin Luo Nanjing University Pre-print Media Attached File Attached |
15:30 - 17:00 | Testing AI Systems 3Journal-first Papers / Research Papers / Industry Showcase (Papers) / NIER Track at Room C Chair(s): Mike Papadakis University of Luxembourg, Luxembourg | ||
15:30 12mResearch paper | Causality-Aided Trade-off Analysis for Machine Learning Fairness Research Papers Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Shuai Wang Hong Kong University of Science and Technology, Yanhui Li Nanjing University Pre-print | ||
16:06 12mTalk | Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks Research Papers Tamal Mondal IIT Hyderabad, Scott Barnett Deakin University, Akash Lal Microsoft Research, Jyothi Vedurada IIT Hyderabad Pre-print Media Attached |
15:30 - 17:00 | Web Development 1Journal-first Papers / Research Papers / Industry Showcase (Papers) at Room D Chair(s): Ben Hermann TU Dortmund | ||
15:30 12mTalk | Adaptive REST API Testing with Reinforcement Learning Research Papers Myeongsoo Kim Georgia Institute of Technology, Saurabh Sinha IBM Research, Alessandro Orso Georgia Institute of Technology Pre-print File Attached | ||
16:06 12mTalk | Increasing the Responsiveness of Web Applications by Introducing Lazy Loading Research Papers Alexi Turcotte Northeastern University, Satyajit Gokhale Northeastern University, Frank Tip Northeastern University | ||
16:30 12mTalk | Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI ChainRecorded talk Research Papers Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhenyu Wan Jiangxi Normal University, Zhenchang Xing , Changjing Wang Jiangxi Normal University, Jieshan Chen CSIRO's Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61 Media Attached |
15:30 - 17:00 | Testing Tools and TechniquesNIER Track / Research Papers / Tool Demonstrations at Room E Chair(s): Tim Menzies North Carolina State University | ||
16:06 12mTalk | AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection Research Papers Yintong Huo The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Pinjia He Chinese University of Hong Kong, Shenzhen, Zifan Xie Huazhong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
16:18 12mTalk | Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers Research Papers Yi Liu Nanyang Technological University, Yuekang Li University of New South Wales, Gelei Deng Nanyang Technological University, Felix Juefei-Xu Meta AI, Yao Du University of California, Irvine, Cen Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lei Ma University of Alberta, Yang Liu Nanyang Technological University, Yuekang Li University of New South Wales | ||
16:30 12mTalk | Software Entity Recognition with Noise-Robust LearningRecorded talk Research Papers Tai Nguyen University of Pennsylvania, Yifeng Di Purdue University, Joohan Lee University of Southern California, Muhao Chen University of Southern California, Tianyi Zhang Purdue University Pre-print Media Attached File Attached |
Wed 13 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:00 | Program Repair 1Tool Demonstrations / NIER Track / Journal-first Papers / Research Papers at Room C Chair(s): Arie van Deursen Delft University of Technology | ||
11:06 12mTalk | The Plastic Surgery Hypothesis in the Era of Large Language Models Research Papers Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Yifeng Ding University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign Pre-print | ||
11:18 12mResearch paper | GAMMA: Revisiting Template-based Automated Program Repair via Mask Prediction Research Papers Quanjun Zhang Nanjing University, Chunrong Fang Nanjing University, Tongke Zhang Nanjing University, Bowen Yu Nanjing University, Weisong Sun Nanjing University, Zhenyu Chen Nanjing University Pre-print Media Attached |
10:30 - 12:00 | Program AnalysisResearch Papers / Tool Demonstrations / NIER Track / Journal-first Papers at Room D Chair(s): Domenico Bianculli University of Luxembourg | ||
10:30 12mTalk | An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering Research Papers Prantik Chatterjee Indian Institute Of Technology Kanpur and MathWorks, Pankaj Kumar Kalita IIT Kanpur, Sumit Lahiri Indian Institute Of Technology Kanpur, Sujit Kumar Muduli IIT Kanpur, Vishal Singh Indian Institute of Technology Kanpur, Gourav Takhar Indian Institute of Technology Kanpur, Subhajit Roy IIT Kanpur | ||
10:42 12mTalk | Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis Research Papers Chenghang Shi SKLP, Institute of Computing Technology, CAS, Haofeng Li , Yulei Sui University of New South Wales, Sydney, Jie Lu SKLP, Institute of Computing Technology, CAS, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingling Xue UNSW Pre-print File Attached | ||
11:30 12mTalk | Precise Data-Driven Approximation for Program Analysis via FuzzingRecorded talk Research Papers Nikhil Parasaram University College London; ConsenSys Diligence, Earl T. Barr University College London; Google DeepMind, Sergey Mechtaev University College London, Marcel Böhme MPI-SP; Monash University Pre-print Media Attached | ||
11:42 12mTalk | Contrastive Learning for API Aspect AnalysisRecorded talk Research Papers G. M. Shahariar Ahsanullah University of Science and Technology, Tahmid Hasan Bangladesh University of Engineering and Technology, Anindya Iqbal Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Gias Uddin York University, Canada Pre-print Media Attached |
10:30 - 12:00 | Web Development 2Industry Showcase (Papers) / Research Papers / NIER Track / Journal-first Papers at Room E Chair(s): Hadar Ziv University of California, Irvine | ||
10:54 12mTalk | PTdetector: An Automated JavaScript Front-end Library Detector Research Papers Link to publication | ||
11:06 12mTalk | Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing Research Papers Shuyao Jiang The Chinese University of Hong Kong, Ruiying Zeng Fudan University, Zihao Rao Fudan University, Jiazhen Gu Chinese University of Hong Kong, Yangfan Zhou Fudan University, Michael Lyu The Chinese University of Hong Kong Pre-print |
13:30 - 15:00 | |||
13:30 12mTalk | Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models Research Papers Liran Wang Beihang University, Xunzhu Tang University of Luxembourg, Yichen He Beihang University, Changyu Ren Beihang University, Shuhua Shi Beihang University, Chaoran Yan Beihang University, Zhoujun Li Beihang University Pre-print File Attached | ||
13:42 12mTalk | From Commit Message Generation to History-Aware Commit Message Completion Research Papers Aleksandra Eliseeva JetBrains Research, Yaroslav Sokolov JetBrains, Egor Bogomolov JetBrains Research, Yaroslav Golubev JetBrains Research, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Timofey Bryksin JetBrains Research Pre-print File Attached | ||
13:54 12mTalk | Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis Research Papers Jingbo Lu University of New South Wales, Dongjie He UNSW, Wei Li University of New South Wales, Yaoqing Gao Huawei Toronto Research Center, Jingling Xue UNSW Pre-print File Attached | ||
14:06 12mTalk | What Makes Good In-context Demonstrations for Code Intelligence Tasks with LLMs? Research Papers Shuzheng Gao The Chinese University of Hong Kong, Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Hongyu Zhang Chongqing University, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
14:18 12mTalk | HexT5: Unified Pre-training for Stripped Binary Code Information InferenceRecorded talk Research Papers Jiaqi Xiong University of Science and Technology of China, Guoqiang Chen University of Science and Technology of China, Kejiang Chen University of Science and Technology of China, Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Weiming Zhang University of Science and Technology of China Media Attached File Attached | ||
14:30 12mTalk | Generating Variable Explanations via Zero-shot Prompt LearningRecorded talk Research Papers Chong Wang Fudan University, Yiling Lou Fudan University, Liu Junwei Fudan University, Xin Peng Fudan University Media Attached |
13:30 - 15:00 | Program Verification 1Research Papers / NIER Track / Tool Demonstrations at Room C Chair(s): Nico Rosner Amazon Web Services | ||
13:42 12mTalk | Demystifying Template-based Invariant Generation for Bit-Vector Programs Research Papers Peisen Yao Zhejing University, Jingyu Ke Shanghai Jiao Tong University, Jiahui Sun Zhejiang University, Hongfei Fu Shanghai Jiao Tong University, Rongxin Wu Xiamen University, Kui Ren Zhejiang University | ||
14:06 12mTalk | EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software Research Papers Yao Zhang Tianjin University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University, Sen Chen Tianjin University, Cen Zhang Nanyang Technological University, Xiaohong Li Tianjin University Pre-print File Attached | ||
14:18 12mTalk | Symbolic Fixpoint Algorithms for Logical LTL Games Research Papers Stanly Samuel Indian Institute of Science, India, Deepak D'Souza IISc Bangalore, Raghavan Komondoor Indian Institute of Science, India Pre-print Media Attached File Attached |
13:30 - 15:00 | Open Source and Software Ecosystems 2Research Papers / Journal-first Papers / Industry Showcase (Papers) at Room D Chair(s): Paul Grünbacher Johannes Kepler University Linz, Austria | ||
13:30 12mTalk | Personalized First Issue Recommender for Newcomers in Open Source Projects Research Papers Wenxin Xiao School of Computer Science, Peking University, Jingyue Li Norwegian University of Science and Technology, Hao He Carnegie Mellon University, Ruiqiao Qiu Beijing Institute of Technology, Minghui Zhou Peking University Pre-print | ||
13:42 12mTalk | Understanding and Enhancing Issue Prioritization in GitHub Research Papers Yingying He Nanjing University of Aeronautics and Astronautics, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University, Yasir Hussain Nanjing University of Aeronautics and Astronautics, Yu Zhou Nanjing University of Aeronautics and Astronautics | ||
13:55 12mResearch paper | Who is the Real Hero? Measuring Developer Contribution via Multi-dimensional Data Integration Research Papers Yuqiang Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University Pre-print | ||
14:21 12mTalk | To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems Research Papers Mukelabai Mukelabai The University of Zambia, Zambia, Christoph Derks Ruhr-University Bochum, Germany, Jacob Krüger Eindhoven University of Technology, Thorsten Berger Ruhr University Bochum File Attached | ||
14:34 12mTalk | LiSum: Open Source Software License Summarization with Multi-Task LearningRecorded talk Research Papers Linyu Li , Sihan Xu Nankai University, Yang Liu Nanyang Technological University, Ya Gao Nankai University, Xiangrui Cai Nankai University, Jiarun Wu Nankai University, Wenli Song Civil Aviation University of China, Zheli Liu Nankai University Pre-print Media Attached |
15:30 - 17:00 | Code Generation 2Research Papers / NIER Track / Tool Demonstrations at Plenary Room 2 Chair(s): Marianne Huchard LIRMM | ||
15:42 12mTalk | Fast and Reliable Program Synthesis via User Interaction Research Papers Yanju Chen University of California at Santa Barbara, Chenglong Wang Microsoft Research, Xinyu Wang University of Michigan, Osbert Bastani University of Pennsylvania, Yu Feng University of California at Santa Barbara File Attached | ||
15:55 12mTalk | From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining Research Papers Xiaoxue Ren Zhejiang University, Xinyuan Ye Australian National University, Dehai Zhao CSIRO's Data61, Zhenchang Xing , Xiaohu Yang Zhejiang University File Attached | ||
16:08 12mTalk | Generative Type Inference for Python Research Papers Yun Peng Chinese University of Hong Kong, Chaozheng Wang The Chinese University of Hong Kong, Wenxuan Wang Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
16:21 12mTalk | Compiler Auto-tuning via Critical Flag Selection Research Papers | ||
16:47 12mTalk | CAT-LM: Training Language Models on Aligned Code And Tests Research Papers Nikitha Rao Carnegie Mellon University, Kush Jain Carnegie Mellon University, Uri Alon Carnegie Mellon University, Claire Le Goues Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University Media Attached File Attached |
15:30 - 17:00 | Software Testing for Specialized Systems 1Research Papers / Journal-first Papers / NIER Track at Room C Chair(s): Fabrizio Pastore University of Luxembourg | ||
15:30 12mTalk | DCLink: Bridging Data Constraint Changes and Implementations in FinTech Systems Research Papers Wensheng Tang Hong Kong University of Science and Technology, Chengpeng Wang Hong Kong University of Science and Technology, Peisen Yao Zhejing University, Rongxin Wu Xiamen University, Xianjin Fu Ant Group, Gang Fan Ant Group, Charles Zhang Hong Kong University of Science and Technology File Attached | ||
15:42 12mTalk | Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks Research Papers Paschal Amusuo Purdue University, Ricardo Andrés Calvo Méndez Universidad Nacional de Colombia, Zhongwei Xu Xi'an JiaoTong University, Aravind Machiry Purdue University, James C. Davis Purdue University Pre-print Media Attached File Attached | ||
15:54 12mTalk | WADIFF: A Differential Testing Framework for WebAssembly Runtimes Research Papers Shiyao Zhou The Hong Kong Polytechnic University, Muhui Jiang The Hong Kong Polytechnic University, Weimin Chen The Hong Kong Polytechnic University, Hao Zhou Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University File Attached | ||
16:18 12mTalk | VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage Research Papers Xiaoyin Wang University of Texas at San Antonio, Tahmid Rafi University of Texas at San Antonio, Na Meng Virginia Tech File Attached |
15:30 - 17:00 | Bug DetectionResearch Papers / Journal-first Papers at Room D Chair(s): Andreea Vescan Babes-Bolyai University | ||
15:30 12mTalk | A Comparative Study of Transformer-based Neural Text Representation Techniques on Bug Triaging Research Papers File Attached | ||
15:54 12mTalk | Neural SZZ Algorithm Research Papers LingXiao Tang zhejiang university, Lingfeng Bao Zhejiang University, Xin Xia Huawei Technologies, Zhongdong Huang Zhejiang University Pre-print | ||
16:06 12mTalk | How to Train Your Neural Bug Detector: Artificial vs Real Bugs Research Papers Cedric Richter Carl von Ossietzky Universität Oldenburg / University of Oldenburg, Heike Wehrheim Carl von Ossietzky Universität Oldenburg / University of Oldenburg Pre-print File Attached | ||
16:18 12mTalk | Detection of Java Basic Thread Misuses Based on Static Event Analysis Research Papers Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Chi Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences File Attached | ||
16:42 12mTalk | FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers Research Papers Eric Liu University of Toronto, Shengjie Xu University of Toronto, David Lie University of Toronto, Canada Pre-print File Attached |
15:30 - 17:00 | Autonomous Systems and AgentsResearch Papers / NIER Track / Journal-first Papers / Tool Demonstrations at Room E Chair(s): Alessio Gambi IMC University of Applied Sciences Krems | ||
16:06 12mTalk | Detecting Smart Home Automation Application Interferences with Domain Knowledge Research Papers Tao Wang Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Liwei Liu Institute of Software at Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print File Attached | ||
16:30 12mTalk | A Comprehensive Study on Code Clones in Automated Driving SoftwareRecorded talk Research Papers Ran Mo Central China Normal University, Yingjie Jiang Central China Normal University, Wenjing Zhan Central China Normal University, Dongyu Wang Central China Normal University, Zengyang Li Central China Normal University Pre-print Media Attached File Attached |
Thu 14 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
10:30 - 12:00 | Program Repair 2Research Papers / Journal-first Papers / NIER Track at Plenary Room 2 Chair(s): Shin Yoo KAIST | ||
10:30 12mTalk | An Empirical Study on Fine-tuning Large Language Models of Code for Automated Program Repair Research Papers Kai Huang , Xiangxin Meng Beihang University, Beijing, China, Jian Zhang Nanyang Technological University, Yang Liu Nanyang Technological University, Wenjie Wang University of Chinese Academy of Sciences, Shuhao Li Zhongguancun Laboratory, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory File Attached | ||
10:54 12mTalk | LeakPair: Proactive Repairing of Memory Leaks in Single Page Web Applications Research Papers Arooba Shahoor Kyungpook National University, Askar Yeltayuly Khamit Ulsan National Institute of Science and Technology, Jooyong Yi UNIST (Ulsan National Institute of Science and Technology), Dongsun Kim Kyungpook National University Pre-print Media Attached | ||
11:06 12mTalk | Automated Fixing of Web UI Tests via Iterative Element Matching Research Papers Yuanzhang Lin Beihang University, Guoyao Wen Huawei Technologies Co., Ltd., Xiang Gao Beihang University Pre-print Media Attached | ||
11:18 12mTalk | OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability with Attribute Checking Research Papers Wenjie Zhang Peking University, Guancheng Wang Peking University, China, Junjie Chen Tianjin University, Yingfei Xiong Peking University, Yong Liu Beijing University of Chemical Technology, Lu Zhang Peking University Pre-print File Attached |
10:30 - 12:00 | Software Testing for Specialized Systems 2Research Papers / Tool Demonstrations at Room C Chair(s): Zishuo Ding University of Waterloo | ||
10:30 12mTalk | Bridging the Gap between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations Research Papers Szymon Stradowski Nokia & Wrocław University of Science and Technology, Lech Madeyski Wroclaw University of Science and Technology Link to publication DOI Pre-print Media Attached | ||
10:42 12mTalk | Identify and Update Test Cases when Production Code Changes: A Transformer-based Approach Research Papers Xing Hu Zhejiang University, Zhuang Liu Zhejiang University, Xin Xia Huawei Technologies, Zhongxin Liu Zhejiang University, Tongtong Xu Huawei, Xiaohu Yang Zhejiang University | ||
10:54 12mTalk | Revisiting and Improving Retrieval-Augmented Deep Assertion Generation Research Papers Weifeng Sun , Hongyan Li Chongqing University, Meng Yan Chongqing University, Yan Lei Chongqing University, Hongyu Zhang Chongqing University, Hongyu Zhang Chongqing University | ||
11:18 12mTalk | QuraTest: Integrating Quantum Specific Features in Quantum Program Testing Research Papers Jiaming Ye Kyushu University, Shangzhou Xia Kyushu University, Fuyuan Zhang Kyushu University, Paolo Arcaini National Institute of Informatics
, Lei Ma University of Alberta, Jianjun Zhao Kyushu University, Fuyuki Ishikawa National Institute of Informatics File Attached | ||
11:42 12mTalk | LEAP: Efficient and Automated Test Method for NLP SoftwareRecorded talk Research Papers Mingxuan Xiao Hohai University, Yan Xiao National University of Singapore, Hai Dong RMIT University, Shunhui Ji Hohai University, Pengcheng Zhang Hohai University Media Attached |
10:30 - 12:00 | Mobile Development 1Research Papers / Tool Demonstrations / Journal-first Papers at Room D Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security | ||
10:42 12mTalk | Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components Research Papers Zhijie Liu ShanghaiTech University, China, Liangfeng Zhang School of Information Science and Technology, ShanghaiTech University, Yutian Tang University of Glasgow File Attached | ||
10:54 12mTalk | Fine-Grained In-Context Permission Classification for Android Apps using Control-Flow Graph Embedding Research Papers Vikas K. Malviya Singapore Management University, Yan Naing Tun Singapore Management University, Chee Wei Leow Singapore Management University, Ailys Tee Xynyn Singapore Management University, Lwin Khin Shar Singapore Management University, Lingxiao Jiang Singapore Management University File Attached | ||
11:06 12mTalk | How Android Apps Break the Data Minimization Principle: An Empirical Study Research Papers Shaokun Zhang Peking University, Hanwen Lei Peking University, Yuanpeng Wang Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University Pre-print File Attached | ||
11:30 12mTalk | DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph Learning Research Papers Chunyang Meng Sun Yat-sen University, Shijie Song Sun Yat-sen University, Haogang Tong Sun Yat-sen University, Maolin Pan Sun Yat-sen University, Yang Yu Sun Yat-sen University Pre-print File Attached |
10:30 - 12:00 | Program Verification 2Research Papers / Tool Demonstrations / NIER Track at Room E Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
10:30 12mTalk | Expediting Neural Network Verification via Network Reduction Research Papers Yuyi Zhong National University of Singapore, Singapore, Ruiwei Wang School of Computing, National University of Singapore, Siau-Cheng Khoo National University of Singapore Pre-print File Attached | ||
10:42 12mTalk | SMT Solver Validation Empowered by Large Pre-trained Language Models Research Papers Maolin Sun Nanjing University, Yibiao Yang Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Yuming Zhou Nanjing University Pre-print File Attached | ||
11:30 12mTalk | HOBAT: Batch Verification for Homogeneous Structural Neural NetworksRecorded talk Research Papers Media Attached File Attached |
13:30 - 15:00 | Software Testing for Specialized Systems 3Journal-first Papers / Tool Demonstrations / Research Papers at Plenary Room 2 Chair(s): Xiaoyin Wang University of Texas at San Antonio | ||
13:30 12mTalk | An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software Research Papers Wenxuan Wang Chinese University of Hong Kong, Jingyuan Huang Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Chang Chen Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Michael Lyu The Chinese University of Hong Kong File Attached | ||
13:42 12mTalk | CoMSA: A modeling driven sampling approach for configuration performance testing Research Papers Yuanjie Xia University of Waterloo, Zishuo Ding University of Waterloo, Weiyi Shang University of Waterloo Pre-print Media Attached | ||
14:06 12mTalk | Effective Concurrency Testing for Go via Directional Primitive-constrained Interleaving Exploration Research Papers Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Yixin Yang Huazhong University of Science and Technology, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology, Hai Jin Huazhong University of Science and Technology File Attached | ||
14:18 12mTalk | Fuzzing for CPS Mutation Testing Research Papers Jaekwon Lee University of Luxembourg, Luxembourg, Enrico Viganò University of Luxembourg, Oscar Cornejo University of Milano Bicocca, Italy, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa Pre-print File Attached |
13:30 - 15:00 | Mobile Development 2Research Papers / Industry Showcase (Papers) / Journal-first Papers / Tool Demonstrations at Room D Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security | ||
13:54 12mTalk | ReuNify: A Step Towards Whole Program Analysis for React Native Android App Research Papers Yonghui Liu Monash University, Xiao Chen Monash University, Pei Liu Data61 at CSIRO, Australia, John Grundy Monash University, Chunyang Chen Monash University, Li Li Beihang University Pre-print | ||
14:06 12mTalk | WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs Research Papers Shi Meng Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Shenao Wang Xidian University, Kailong Wang Huazhong University of Science and Technology, Xusheng Xiao Arizona State University, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology | ||
14:18 12mTalk | Vision-based Widget Mapping for Test Migration across Mobile Platforms: Are We There Yet? Research Papers Ruihua Ji Nanjing University, Tingwei Zhu Nanjing University, Xiaoqing Zhu Nanjing University, Chunyang Chen Monash University, Minxue Pan Nanjing University, Tian Zhang Nanjing University |
13:30 - 15:00 | DebuggingResearch Papers / Industry Showcase (Papers) at Room E Chair(s): Carol Hanna University College London | ||
13:42 12mTalk | Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count Research Papers Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Hao Zhang Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print | ||
13:54 12mResearch paper | PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis Research Papers Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Shuai Wang Hong Kong University of Science and Technology Pre-print | ||
14:06 12mTalk | The MAP metric in Information Retrieval Fault Localization Research Papers Media Attached File Attached | ||
14:18 12mTalk | Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial ExtrapolationRecorded talk Research Papers Zuoyan Zhang Information Engineering University, Bei Zhou Information Engineering University, Jiangwei Hao Information Engineering University, Hongru Yang Information Engineering University, Mengqi Cui Information Engineering University, Yuchang Zhou Information Engineering University, Guanghui Song Information Engineering University, Fei Li Information Engineering University, Jinchen Xu Information Engineering University, Jie Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Media Attached File Attached | ||
14:30 12mTalk | Information Retrieval-based Fault Localization for Concurrent ProgramsRecorded talk Research Papers Pre-print Media Attached |
15:30 - 17:00 | FuzzingNIER Track / Journal-first Papers / Research Papers / Tool Demonstrations at Plenary Room 2 Chair(s): Lars Grunske Humboldt-Universität zu Berlin | ||
15:42 12mTalk | MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure Research Papers Haoyu Wang College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University, Chuyue Xie College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Zan Wang Tianjin University, Qingchao Shen Tianjin University, Yingquan Zhao Tianjin University Pre-print File Attached | ||
15:54 12mTalk | Thunderkaller: Profiling and Improving the Performance of Syzkaller Research Papers Yang Lan Institute for Network Science and Cyberspace of Tsinghua University, Di Jin Brown University, Zhun Wang Institute for Network Science and Cyberspace of Tsinghua University, Wende Tan Tsinghua University, Zheyu Ma Tsinghua University, Chao Zhang Tsinghua University File Attached | ||
16:06 12mTalk | PHYFU: Fuzzing Modern Physics Simulation Engines Research Papers Dongwei Xiao Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology Link to publication DOI | ||
16:18 12mTalk | NaturalFuzz: Natural Input Generation for Big Data Analytics Research Papers Ahmad Humayun Virginia Tech, Yaoxuan Wu UCLA, Miryung Kim University of California at Los Angeles, USA, Muhammad Ali Gulzar Virginia Tech File Attached |
15:30 - 17:00 | Code Generation 3Research Papers / Journal-first Papers at Room C Chair(s): David Lo Singapore Management University | ||
15:30 12mTalk | Improving code extraction from coding screencasts using a code-aware encoder-decoder model Research Papers Abdulkarim Malkadi Florida State University, USA - Jazan University, KSA, Ahmad Tayeb Florida State University, USA, Sonia Haiduc Florida State University File Attached | ||
15:42 12mTalk | InfeRE: Step-by-Step Regex Generation via Chain of Inference Research Papers Shuai Zhang School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University Pre-print File Attached | ||
15:54 12mTalk | MELT: Mining Effective Lightweight Transformations from Pull Requests Research Papers Daniel Ramos Carnegie Mellon University, and INESC-ID, Hailie Mitchell Carnegie Mellon University, Ines Lynce INESC-ID/IST, Universidade de Lisboa, Vasco Manquinho INESC-ID; Universidade de Lisboa, Ruben Martins Carnegie Mellon University, Claire Le Goues Carnegie Mellon University Pre-print File Attached | ||
16:06 12mTalk | On the Evaluation of Neural Code Translation: Taxonomy and Benchmark Research Papers Mingsheng Jiao Shanghai Jiao Tong University, Tingrui Yu Shanghai Jiao Tong University, Xuan Li Shanghai Jiao Tong University, Guan Jie Qiu Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University Pre-print File Attached | ||
16:30 12mTalk | Pluggable Type Inference for Free Research Papers Martin Kellogg New Jersey Institute of Technology, Daniel Daskiewicz New Jersey Institute of Technology, Loi Ngo Duc Nguyen New Jersey Institute of Technology, Muyeed Ahmed New Jersey Institute of Technology, Michael D. Ernst University of Washington Link to publication Pre-print File Attached |
15:30 - 17:00 | Configuration and Version ManagementResearch Papers at Room D Chair(s): Shahar Maoz Tel Aviv University | ||
15:30 12mTalk | A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem Research Papers Wenke Li Huazhong University of Science and Technology, Feng Wu Tencent Technology (Shenzhen) Co. Ltd, Cai Fu Huazhong University of Science and Technology, Fan Zhou Tencent Technology (Shenzhen) Co. Ltd Link to publication DOI Pre-print | ||
15:42 12mTalk | Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem Research Papers Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Rabe Abdalkareem Omar Al-Mukhtar University, Emad Shihab Concordia Univeristy Pre-print | ||
15:55 12mTalk | ESRO: Experience Assisted Service Reliability against Outages Research Papers Sarthak Chakraborty Adobe Research, Shubham Agarwal Adobe Research, Shaddy Garg Adobe, Abhimanyu Sethia Indian Institute of Technology Kanpur, Udit Narayan Pandey Indian Institute of Technology Kanpur, Videh Aggarwal Indian Institute of Technology Kanpur, Shiv Saini Adobe Research File Attached | ||
16:08 12mTalk | Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks Research Papers Yang Hu University of Texas at Austin, Wenxi Wang University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Kenneth L. McMillan University of Texas at Austin, Mohit Tiwari University of Texas at Austin File Attached | ||
16:21 12mTalk | Merge Conflict Resolution: Classification or Generation? Research Papers Jinhao Dong Peking University, Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Yiling Lou Fudan University, Dan Hao Peking University Pre-print File Attached | ||
16:34 12mTalk | Repeated Builds During Code Review: An Empirical Study of the OpenStack Community Research Papers Rungroj Maipradit University of Waterloo, Dong Wang Kyushu University, Japan, Patanamon Thongtanunam University of Melbourne, Raula Gaikovina Kula Nara Institute of Science and Technology, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo Pre-print File Attached | ||
16:47 12mTalk | Automated Software Entity Matching Between Successive VersionsRecorded talk Research Papers Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Nan Niu University of Cincinnati, Yuxia Zhang Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Yanjie Jiang Beijing Institute of Technology DOI Media Attached |
15:30 - 17:00 | Vulnerability and Security 2Journal-first Papers / Industry Showcase (Papers) / Research Papers at Room E Chair(s): Ben Hermann TU Dortmund | ||
16:06 12mTalk | DeFiWarder: Protecting DeFi Apps from Token Leaking VulnerabilitiesRecorded talk Research Papers Jianzhong Su Sun Yat-sen University, Xingwei Lin Ant Group, Zhiyuan Fang Sun Yat-sen University, Zhirong Zhu Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Wei Lv Ant Group, Jiashui Wang Zhejiang University Media Attached | ||
16:18 12mTalk | VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual DeviceRecorded talk Research Papers Yuwei Liu Institute of Software, Chinese Academy of Sciences, Siqi Chen Shanghai Jiao Tong University, Yuchong Xie Shanghai Jiao Tong University, Yanhao Wang Qi An Xin Group Corp., Libo Chen Shanghai Jiao Tong University, Bin Wang Beijing Institute of Computer Technology and Applications, Yingming Zeng Beijing Institute of Computer Technology and Applications, Zhi Xue Shanghai Jiao Tong University, Purui Su Institute of Software/CAS China Media Attached File Attached |
Accepted Papers
Call for Papers
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2023 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:
- Requirements and Design
- requirements elicitation and management, traceability analysis;
- architecture and design;
- modeling and model-driven engineering;
- software product lines;
- component-based, service-oriented systems;
- OO/Aspect-oriented.
- Testing and Analysis
- regression, mutation, model-based testing;
- program analysis;
- program synthesis;
- program repairs.
- Tools and Processes
- release engineering and DevOps;
- configuration and release management;
- Agile processes.
- Maintenance and Evolution
- debugging and fault-localization;
- refactoring and reengineering;
- reverse engineering;
- software reuse;
- API design and management.
- Formal Aspects of Software Engineering
- formal methods, validation and verification;
- programming languages;
- specification languages, DSLs.
- AI and Software Engineering
- search-based software engineering;
- recommender systems;
- autonomous and self-adapting systems;
- AI for SE;
- SE for AI.
- Software Analytics
- mining software repositories;
- apps and app store analysis.
- Human Aspects of Software Engineering
- program comprehension;
- systematic reviews, code inspection;
- human-computer interface;
- software visualization;
- crowd-based software engineering;
- distributed and collaborative software engineering.
- Social Aspects of Software Engineering
- green and sustainable technologies;
- software economics;
- ethics in software engineering.
- Dependability, Safety, and Reliability
- privacy and security;
- reliability;
- safety;
- performance.
ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.
Submission Categories and Evaluation Criteria
We solicit submissions in two categories:
Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:
- clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
- articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
- show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.
Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:
- clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
- present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
- carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.
Papers in both categories should:
- discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
- provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
- include an adequate use of the English language, absence of major ambiguity, and with clearly readable figures and tables;
- adhere to the formatting instructions provided below.
New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.
Originality
Papers submitted to ASE 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2023. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.
To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.
Double-Anonymous Review Process
The ASE 2023 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
- Authors’ names and affiliated institution names must be omitted from the submission.
- All references to the author’s prior work should be in the third person.
- Authors are encouraged to title their submission differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.
Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.
Artifact Availability and Supplementary Material
We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.
Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:
Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2023 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.
ACM Policy on Research Involving Humans
If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects
It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.
Formatting and Submission Guidelines
Abstracts and papers must be submitted electronically through the ASE 2023 HotCRP submission site: https://ase2023.hotcrp.com/. All submissions must be in English.
For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interests. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.
All submissions must be in PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran}
without including the compsoc
or compsocconf
option).
Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.
The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs.
Accepted Papers
Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.
After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommended a change for clarity or accuracy with the paper content.
We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include, but are not limited to, Figshare and Zenodo.
If a submission is accepted, at least one author of the paper is required to register for ASE 2023 and present the paper.
Questions and Comments
If you have any further questions, please contact the PC chairs at cbird@microsoft.com and f.sarro@ucl.ac.uk .