Mon 11 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 10:00 | |||
08:30 30mSocial Event | Hello and Welcome (including brief introductions by the participants) New Faculty Symposium | ||
09:00 30mTalk | Breakout1: what questions do you have New Faculty Symposium | ||
09:30 30mTalk | Some Tips on Scoping a Research Agenda Before and After Tenure New Faculty Symposium Denys Poshyvanyk William & Mary |
08:30 - 10:00 | |||
08:30 90mTalk | AI for SE: Neural Language Models, Few-Shot Learning, and Adapters for Source Code Tutorials Mohamad Khajezade , Iman Saberi University of British Columbia Okanagan, Fatemeh Hendijani Fard University of British Columbia |
08:45 - 09:00 | |||
08:45 - 09:00 | |||
09:00 - 10:00 | |||
09:00 60mTalk | Invited Talk Doctoral Forum Lionel Briand University of Luxembourg; University of Ottawa |
09:00 - 10:00 | |||
09:00 60mTalk | An Exploration of Automated Software Testing, Verification, and Repair Strategies using ESBMC and ChatGPT [Workshop] CPAchecker Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil Link to publication |
10:30 - 12:00 | |||
10:30 30mTalk | Early Detection of Defects in Machine Learning Programs by Semi-Static Analysis Doctoral Forum Yiran Wang Linköping University | ||
11:00 30mTalk | Mutation Testing for supporting Smart Contract code inspection Doctoral Forum Morena Barboni University of Camerino | ||
11:30 30mTalk | Failure-based Testing: A Testing Paradigm in the Era of Large Language Models Doctoral Forum Li Tsz On The Hong Kong University of Science and Technology |
10:30 - 12:00 | |||
10:30 90mTalk | Language-Based Testing Tutorials Andreas Zeller CISPA Helmholtz Center for Information Security |
10:30 - 11:20 | |||
10:30 50mTalk | Machine Learning Security in the Real World [Workshop] ASYDE Maxime Cordy University of Luxembourg, Luxembourg |
10:30 - 12:00 | |||
10:30 20mTalk | Can ChatGPT Support CPAchecker with Useful Loop Invariants? [Workshop] CPAchecker Cedric Richter Carl von Ossietzky Universität Oldenburg / University of Oldenburg | ||
10:50 20mTalk | CPA-DF: A Tool for Configurable Interval Analysis to Boost Program Verification [Workshop] CPAchecker Po-Chun Chien LMU Munich Pre-print Media Attached File Attached | ||
11:10 20mTalk | A Unifying Approach for Control-Flow-Based Loop Abstraction [Workshop] CPAchecker Marian Lingsch-Rosenfeld LMU Munich Link to publication File Attached | ||
11:30 20mTalk | Backward Bounded Model Checking in CPAchecker [Workshop] CPAchecker Bas Laarakker University of Amsterdam |
10:30 - 12:00 | |||
10:30 30mTalk | (a) Community service; (b) The Chinese Experience New Faculty Symposium Dan Hao Peking University | ||
11:00 30mTalk | Career advice to young faculty from an ex-department chair New Faculty Symposium Tevfik Bultan University of California at Santa Barbara | ||
11:30 30mTalk | Challenges in teaching software engineering classes New Faculty Symposium Darko Marinov University of Illinois at Urbana-Champaign |
10:30 - 12:00 | |||
10:30 90mTalk | AI for SE: Neural Language Models, Few-Shot Learning, and Adapters for Source Code Tutorials Mohamad Khajezade , Iman Saberi University of British Columbia Okanagan, Fatemeh Hendijani Fard University of British Columbia |
11:20 - 12:00 | Session 1: AI and Intelligent Systems[Workshop] ASYDE at Room FR Chair(s): Gianluca Filippone University of L'Aquila, Italy | ||
11:20 20mTalk | Exploring Early Adopters' Perceptions of ChatGPT as a Code Generation Tool [Workshop] ASYDE Gian Luca Scoccia Gran Sasso Science Institute Pre-print | ||
11:40 20mTalk | Automated Negotiation - Preliminary results of a systematic mapping study [Workshop] ASYDE Mashal Afzal Memon University of L’Aquila, Italy, Gian Luca Scoccia Gran Sasso Science Institute, Marco Autili University of L'Aquila, Italy Pre-print File Attached |
13:30 - 15:00 | |||
13:30 30mTalk | Deferring Partial Analysis Execution for Soundness Doctoral Forum Anemone Kampkötter TU Dortmund | ||
14:00 30mTalk | Improve the Performance of Large Language Models on Code Generation Doctoral Forum Jinhao Dong Peking University | ||
14:30 30mTalk | Analysis and Tool-Support for Scalable and Reliable Imperative Deep Learning Programs Doctoral Forum Tatiana Castro Vélez City University of New York (CUNY) Graduate Center |
13:30 - 15:00 | |||
13:30 90mTalk | Dynamically Analyzing Python Programs with DynaPyt Tutorials |
13:30 - 14:20 | |||
13:30 50mTalk | Human-centred SE & CS in the age of ‘generative AI’ [Workshop] HCSE-CS John Grundy Monash University |
13:30 - 14:30 | |||
13:30 60mTalk | Software Model Checking: 20 Years and Beyond [Workshop] CPAchecker Dirk Beyer LMU Munich DOI Media Attached |
13:30 - 15:00 | |||
13:30 30mTalk | Finding your motivation in your academic career New Faculty Symposium Julia Lawall Inria | ||
14:00 30mTalk | The new faculty experience New Faculty Symposium Kevin Moran George Mason University | ||
14:30 30mTalk | Two dozen tips (from around the world) New Faculty Symposium Tim Menzies North Carolina State University |
13:30 - 15:00 | |||
13:30 90mTalk | An Introduction to Quantum Software Engineering Tutorials Jianjun Zhao Kyushu University |
13:40 - 15:00 | Session 2: Prioritization and Optimization[Workshop] ASYDE at Room FR Chair(s): Gian Luca Scoccia University of L'Aquila | ||
13:40 20mTalk | ICO: A Platform for Optimizing Highly Configurable Systems [Workshop] ASYDE Edouard Guegain Université de Lille, Amir Taherkordi University of Oslo, Clément Quinton Université de Lille | ||
14:00 30mTalk | Test Case Prioritization based on Neural Network Classification with Artifacts Traceability [Workshop] ASYDE Ioana-Claudia Rotaru Babes-Bolyai University, Cluj-Napoca, Romania, Andreea Vescan Babes-Bolyai University Pre-print File Attached | ||
14:30 30mTalk | Neural Network-based Test Case Prioritization in Continuous Integration [Workshop] ASYDE Andreea Vescan Babes-Bolyai University, Radu Găceanu Babes-Bolyai University, Cluj-Napoca, Romania, Arnold Szederjesi Babes-Bolyai University, Cluj-Napoca, Romania Pre-print File Attached |
14:20 - 15:00 | |||
14:20 20mTalk | Towards Developer-Centered Secure Coding Training [Workshop] HCSE-CS Vladislav Pikulin Monash University, Daiki Kubo Monash University, Kaveesha Nissanka Monash University, Sadeeptha Bandara Monash University, Muhammad Aiman Shamsiemon Monash University, Arissha Yasmin Monash University, Asangi Jayatilaka University of Adelaide, Anuradha Madugalla Monash University, Australia, Tanjila Kanij Monash University DOI | ||
14:40 20mTalk | DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm [Workshop] HCSE-CS Sri Harsha Mekala Deakin University, Zubair Baig Deakin University, Adnan Anwar Deakin University, Naeem Syed Deakin University DOI |
14:30 - 15:00 | |||
14:30 5mTalk | Enhancing CPAchecker: A Framework for Distributed Analyses [Workshop] CPAchecker Matthias Kettl LMU Munich | ||
14:35 5mTalk | Scaling Formal Verification: Parallel Analysis of Functions [Workshop] CPAchecker George Granberry Chalmers University of Technology | ||
14:40 5mTalk | Dual Approximated Reachability Model Checking in CPAchecker [Workshop] CPAchecker Marek Jankola LMU Munich | ||
14:45 5mTalk | Current State of Memory-Safety Analysis in CPAchecker [Workshop] CPAchecker Daniel Baier Ludwig Maximilian University of Munich | ||
14:50 5mTalk | CPAdaemon: Progress and Demo [Workshop] CPAchecker Henrik Wachowitz LMU Munich |
15:30 - 16:30 | |||
15:30 60mSocial Event | Speed-mentoring session Doctoral Forum |
15:30 - 17:00 | |||
15:30 90mTalk | Dynamically Analyzing Python Programs with DynaPyt Tutorials |
15:30 - 16:40 | Session 3: Contract and Microservices[Workshop] ASYDE at Room FR Chair(s): Gian Luca Scoccia University of L'Aquila | ||
15:30 20mTalk | Modelling Multi-Party Role-Based Access Control Policies for iContractML Smart Contracts [Workshop] ASYDE Issam Al-Azzoni Al Ain University of Science, United Arab Emirates, Reiko Heckel University of Leicester, United Kingdom File Attached | ||
15:50 20mTalk | Exploring Automatic Specification Repair in Dafny Programs [Workshop] ASYDE Alexandre Abreu University of Porto & INESC TEC, Nuno Macedo University of Porto; INESC TEC, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC File Attached | ||
16:10 20mTalk | Migrating from monoliths to microservices: enforcing correct coordination [Workshop] ASYDE Marco Autili University of L'Aquila, Italy, Gianluca Filippone University of L'Aquila, Italy, Massimo Tivoli University of L'Aquila |
15:30 - 16:30 | |||
15:30 20mTalk | Towards an Understanding of Developers’ Perceptions of Transparency in Software Development: A Preliminary Study [Workshop] HCSE-CS Humphrey Obie Monash University, Juliet Ukwella Durham College of Applied Arts & Technology, Kashumi Madampe Monash University, Australia, John Grundy Monash University, Mojtaba Shahin RMIT University, Australia DOI Media Attached | ||
15:50 20mTalk | Universal Design for Website Authentication [Workshop] HCSE-CS DOI | ||
16:10 20mTalk | A human-centric cybersecurity training tool for prioritising MSNAs [Workshop] HCSE-CS DOI |
15:30 - 17:00 | |||
15:30 20mTalk | Timeout Prediction for Software Analyses [Workshop] CPAchecker Nicola Thoben University of Oldenburg | ||
15:50 20mTalk | Real-World Software Verification with CPAchecker [Workshop] CPAchecker Thomas Lemberger LMU Munich | ||
16:10 20mTalk | Using CPAchecker in Teaching [Workshop] CPAchecker Jan Haltermann University of Oldenburg File Attached | ||
16:30 20mTalk | Handling Flaky Regression Tests in CPAchecker [Workshop] CPAchecker Philipp Wendler LMU Munich |
15:30 - 16:00 | |||
15:30 30mTalk | Breakout2: did we answer your questions? New Faculty Symposium |
16:00 - 17:00 | |||
16:00 60mPanel | Final panel, wrap-up New Faculty Symposium |
17:00 - 17:30 | |||
Tue 12 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
07:30 - 17:00 | RegistrationCatering | ||
09:00 - 10:00 | |||
09:00 60mTalk | Automating Software Evolution in the Linux Kernel Keynotes Julia Lawall Inria |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:30 - 12:00 | |||
10:30 12mTalk | Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System Research Papers Jun Huang Anhui University of Technology, Yang Yang Anhui University of Technology, Hang Yu Ant Group, Jianguo Li Ant Group, Xiao Zheng Anhui University of Technology | ||
10:42 12mTalk | Dynamic Graph Neural Networks-based Alert Link Prediction for Online Service Systems Research Papers Yiru Chen Fudan University, Chenxi Zhang Fudan University, Zhen Dong Fudan University, China, Dingyu Yang Alibaba Group, Xin Peng Fudan University, Jiayu Ou Alibaba Group, Hong Yang Fudan University, Zheshun Wu Alibaba Group, Xiaojun Qu Alibaba Group, Wei Li Alibaba Group | ||
10:54 12mTalk | A Model-based Mode-Switching-Framework based on Security Vulnerability Scores Journal-first Papers Michael Riegler Johannes Kepler University Linz, Johannes Sametinger Johannes Kepler University Linz, Michael Vierhauser University of Innsbruck, Manuel Wimmer JKU Linz Link to publication DOI File Attached | ||
11:06 12mTalk | Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion Research Papers Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:18 12mTalk | Vicious Cycles in Distributed Software SystemsRecorded talk Research Papers Shangshu Qian Purdue University, Wen Fan Purdue University, Lin Tan Purdue University, Yongle Zhang Purdue University Pre-print Media Attached | ||
11:30 12mTalk | Scene-Driven Exploration and GUI Modeling for Android AppsRecorded talk Research Papers Xiangyu Zhang , Lingling Fan Nankai University, Sen Chen Tianjin University, Yucheng Su Alibaba Group, Boyuan Li Nankai University Media Attached |
10:30 - 12:00 | Testing AI Systems 1NIER Track / Research Papers at Room C Chair(s): Leonardo Mariani University of Milano-Bicocca | ||
10:30 12mTalk | Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting Research Papers Li Tsz On The Hong Kong University of Science and Technology, Wenxi Zong Northeastern University, Yibo Wang Northeastern University, Haoye Tian University of Luxembourg, Ying Wang Northeastern University, Shing-Chi Cheung Hong Kong University of Science and Technology, Jeffrey Kramer Imperial College London Pre-print | ||
10:42 12mTalk | SOCRATEST- Towards Autonomous Testing Agents via Conversational Large Language Models NIER Track Robert Feldt Chalmers University of Technology, Sweden, Sungmin Kang KAIST, Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo KAIST Pre-print File Attached | ||
10:54 12mResearch paper | Semantic Data Augmentation for Deep Learning Testing using Generative AI NIER Track sondess missaoui University of York, Simos Gerasimou University of York, Nicholas Matragkas Université Paris-Saclay, CEA, List. File Attached | ||
11:06 12mTalk | Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers Research Papers Zhen Li Huazhong University of Science and Technology, Ruqian Zhang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Ning Wang Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology, Shouhuai Xu University of Colorado Colorado Springs, Chen Chen University of Central Florida, Hai Jin Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology Pre-print | ||
11:18 12mTalk | The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models Research Papers Xin Zhou Singapore Management University, Singapore, Kisub Kim Singapore Management University, Singapore, Bowen Xu North Carolina State University, Jiakun Liu Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University Pre-print | ||
11:30 12mTalk | CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature SpaceRecorded talk Research Papers haibin zheng Zhejiang University of Technology, Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Haibo Jin Zhejiang University of Techonology Pre-print Media Attached |
10:30 - 12:00 | Open Source and Software Ecosystems 1Research Papers / Tool Demonstrations at Room E Chair(s): Denys Poshyvanyk William & Mary | ||
10:30 12mTalk | An Empirical Study of Malicious Code In PyPI Ecosystem Research Papers Wenbo Guo School of Cyber Science and Engineering, Sichuan University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Cheng Huang School of Cyber Science and Engineering, Sichuan University, Yong Fang School of Cyber Science and Engineering, Sichuan University, Yang Liu Nanyang Technological University Pre-print | ||
10:42 12mTalk | Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem Research Papers Weiwei Xu Peking University, Hao He Carnegie Mellon University, Kai Gao University of Science and Technology Beijing, Minghui Zhou Peking University Pre-print | ||
10:54 12mTalk | Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem Research Papers Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Sen Chen Tianjin University, Zhengzi Xu Nanyang Technological University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University | ||
11:06 12mTalk | Bus Factor Explorer Tool Demonstrations Egor Klimov JetBrains Research, Muhammad Umair Ahmed Bilkent University, Nikolai Sviridov JetBrains Research, Pouria Derakhshanfar JetBrains Research, Eray Tüzün Bilkent University, Vladimir Kovalenko JetBrains Research Media Attached | ||
11:30 12mTalk | EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery Research Papers Chenyuan Zhang Xiamen University, Yanlin Wang Sun Yat-sen University, Zhao Wei Tencent, Yong Xu Tencent, Juhong Wang Tencent, Hui Li Xiamen University, Rongrong Ji Xiamen University Pre-print Media Attached | ||
11:42 12mTalk | Fork Entropy: Assessing the Diversity of Open Source Software Projects' ForksRecorded talk Research Papers Liang Wang Nanjing University, Zhiwen Zheng State Key Laboratory for Novel Software Technology, Nanjing University, Xiangchen Wu State Key Laboratory for Novel Software Technology, Nanjing University, Baihui Sang State Key Laboratory for Novel Software Technology, Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University Media Attached |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:30 - 15:00 | Cloud and Distributed Systems 2Research Papers / Tool Demonstrations / Journal-first Papers / Industry Showcase (Papers) at Plenary Room 2 Chair(s): Tim Menzies North Carolina State University | ||
13:30 12mTalk | EXPRESS 2.0: An Intelligent Service Management Framework for AIoT Systems in the Edge Tool Demonstrations Jia Xu School of Computer Science and Technology, Anhui University, Xiao Liu School of Information Technology, Deakin University, Wuzhen Pan School of Computer Science and Technology, Anhui University, Xuejun Li School of Computer Science and Technology, Anhui University, Aiting Yao School of Computer Science and Technology, Anhui University, Yun Yang Swinburne University of Technology Media Attached | ||
13:42 12mTalk | Prism: Revealing Hidden Functional Clusters of Massive Instances in Cloud Systems Research Papers Jinyang Liu The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Cong Feng Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Zengyin Yang Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
13:54 12mTalk | FaaSLight: General Application-Level Cold-Start Latency Optimization for Function-as-a-Service in Serverless Computing Journal-first Papers Xuanzhe Liu Peking University, Jinfeng Wen Peking University, Zhenpeng Chen University College London, Ding Li Peking University, Junkai Chen Peking University, China, Yi Liu Peking University, Haoyu Wang Huazhong University of Science and Technology, Xin Jin Peking University File Attached | ||
14:06 12mTalk | RocketHA: A High Availability Design Paradigm for Distributed Log-Based Storage System Industry Showcase (Papers) Juntao Ji Alibaba Cloud Computing Co. Ltd., Rongtong Jin Alibaba Cloud Computing Co. Ltd., Yubao Fu Alibaba Cloud Computing Co. Ltd., Yinyou Gu Alibaba Cloud Computing Co. Ltd., Tsung-han Tsai Alibaba Cloud Computing Co. Ltd., Qingshan Lin Alibaba Cloud Computing Co. Ltd. | ||
14:18 12mTalk | Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective Journal-first Papers Xuanzhe Liu Peking University, Diandian Gu Peking University, Zhenpeng Chen University College London, Jinfeng Wen Peking University, Zili Zhang Peking University, Yun Ma Peking University, Haoyu Wang Huazhong University of Science and Technology, Xin Jin Peking University Link to publication | ||
14:30 12mTalk | ConfTainter: Static Taint Analysis For Configuration OptionsRecorded talk Research Papers Teng Wang National University of Defense Technology, Haochen He National University of Defense Technology, Xiaodong Liu National University of Defense Technology, Shanshan Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Yu Jiang Tsinghua University, Qing Liao Harbin Institute of Technology, Wang Li National University of Defense Technology Pre-print Media Attached |
13:30 - 15:00 | Testing AI Systems 2NIER Track / Journal-first Papers / Research Papers at Room C Chair(s): Lwin Khin Shar Singapore Management University | ||
13:30 12mTalk | ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems Research Papers Shengyou Hu Nanjing University, Huayao Wu Nanjing University, Peng Wang Fudan University, Jing Chang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Yongjun Tu Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xiu Jiang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xintao Niu Nanjing University, Changhai Nie Nanjing University Pre-print Media Attached File Attached | ||
13:42 12mTalk | Automating Bias Testing of LLMs NIER Track Sergio Morales Universitat Oberta de Catalunya, Robert Clarisó Universitat Oberta de Catalunya, Jordi Cabot Luxembourg Institute of Science and Technology Pre-print File Attached | ||
13:54 12mTalk | MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack NIER Track Qiang Hu University of Luxembourg, Yuejun GUo Luxembourg Institute of Science and Technology, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg File Attached | ||
14:06 12mResearch paper | Generative Model-Based Testing on Decision-Making Policies Research Papers Zhuo Li Kyushu University, Xiongfei Wu Kyushu University, Derui Zhu Technical University of Munich, Mingfei Cheng Singapore Management University, Siyuan Chen Kyushu University, Fuyuan Zhang Kyushu University, Xiaofei Xie Singapore Management University, Lei Ma University of Alberta, Jianjun Zhao Kyushu University File Attached | ||
14:18 12mTalk | Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems Journal-first Papers Hazem FAHMY University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa, Thomas Stifter IEE S.A. Link to publication DOI Pre-print File Attached | ||
14:30 12mTalk | Are We Ready to Embrace Generative AI for Software Q&A? NIER Track Bowen Xu North Carolina State University, Thanh-Dat Nguyen University of Melbourne, Le-Cong Thanh The University of Melbourne, Thong Hoang CSIRO's Data61, Jiakun Liu Singapore Management University, Kisub Kim Singapore Management University, Singapore, Chen GONG University of Virginia, Changan Niu Software Institute, Nanjing University, Chenyu Wang Singapore Management University, Xuan-Bach D. Le University of Melbourne, David Lo Singapore Management University |
13:30 - 15:00 | Vulnerability and Security 1Research Papers / Journal-first Papers at Room E Chair(s): Fatemeh Hendijani Fard University of British Columbia | ||
13:30 12mTalk | A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering Research Papers Wentao Liang Institute of Software, Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences File Attached | ||
13:42 12mTalk | Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value Flows Research Papers Pre-print File Attached | ||
13:54 12mTalk | Learning to Locate and Describe Vulnerabilities Research Papers Jian Zhang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xu Wang Beihang University, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University | ||
14:06 12mTalk | When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection Research Papers Xin-Cheng Wen Harbin Institute of Technology, Xinchen Wang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Yang Liu Nanyang Technological University, Zhaoquan Gu Harbin Institute of Technology | ||
14:18 12mTalk | The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study Journal-first Papers Emanuele Iannone University of Salerno, Roberta Guadagni University of Salerno, Filomena Ferrucci University of Salerno, Andrea De Lucia University of Salerno, Fabio Palomba University of Salerno Link to publication DOI Pre-print Media Attached | ||
14:30 12mTalk | SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices Research Papers Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Media Attached File Attached |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | Testing Tools and TechniquesNIER Track / Research Papers / Tool Demonstrations at Room E Chair(s): Tim Menzies North Carolina State University | ||
15:30 12mTalk | Modeling Programmer Attention as Scanpath Prediction NIER Track Aakash Bansal University of Notre Dame, Chia-Yi Su University of Notre Dame, Zachary Karas Vanderbilt University, Yifan Zhang Vanderbilt University, Yu Huang Vanderbilt University, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame | ||
15:42 12mTalk | On Automated Assistants for Software Development: The Role of LLMs NIER Track Pre-print File Attached | ||
15:54 12mTalk | SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts Tool Demonstrations Monika di Angelo TU Wien, Thomas Durieux TU Delft, João F. Ferreira INESC-ID and IST, University of Lisbon, Gernot Salzer TU Wien Pre-print File Attached | ||
16:06 12mTalk | AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection Research Papers Yintong Huo The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Pinjia He Chinese University of Hong Kong, Shenzhen, Zifan Xie Huazhong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
16:18 12mTalk | Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers Research Papers Yi Liu Nanyang Technological University, Yuekang Li University of New South Wales, Gelei Deng Nanyang Technological University, Felix Juefei-Xu Meta AI, Yao Du University of California, Irvine, Cen Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lei Ma University of Alberta, Yang Liu Nanyang Technological University, Yuekang Li University of New South Wales | ||
16:30 12mTalk | Software Entity Recognition with Noise-Robust LearningRecorded talk Research Papers Tai Nguyen University of Pennsylvania, Yifeng Di Purdue University, Joohan Lee University of Southern California, Muhao Chen University of Southern California, Tianyi Zhang Purdue University Pre-print Media Attached File Attached |
Wed 13 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:00 - 17:00 | RegistrationCatering | ||
08:30 - 09:00 | |||
08:30 12mTalk | SMT-Based Bounded Model Checking for Embedded ANSI-C Software Most Influential Papers (MIP) Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil, Bernd Fischer Stellenbosch University, Joao Marques-Silva IRIT, CNRS, Toulouse Link to publication File Attached | ||
08:42 12mTalk | Spectrum-Based Multiple Fault Localization Most Influential Papers (MIP) |
09:00 - 10:00 | |||
09:00 60mTalk | DIDACT: Large sequence models for software development activities Keynotes |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:00 - 10:55 | Industry Challenge (Competition)Industry Challenge (Competition) at Room FR Chair(s): Kui Liu Huawei | ||
10:00 10mTalk | Introduction of the Industry Challenge Track Industry Challenge (Competition) Kui Liu Huawei | ||
10:10 15mTalk | ACWRecommender: A Tool for Validating Actionable Warnings with Weak Supervision Industry Challenge (Competition) Zhipeng Xue , Zhipeng Gao Shanghai Institute for Advanced Study of Zhejiang University, Xing Hu Zhejiang University, Shanping Li | ||
10:25 15mTalk | An Automated and Flexible Multilingual Bug-Fix Dataset Construction System Industry Challenge (Competition) Wenkang Zhong Nanjing University, Chuanyi Li Nanjing University, Yunfei Zhang Nanjing University, Ziwen Ge Nanjing University, Jingyu Wang Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University | ||
10:40 15mTalk | A Closer Look at Different Difficulty Levels Code Generation Abilities of ChatGPT Industry Challenge (Competition) Dapeng Yan , Zhipeng Gao Shanghai Institute for Advanced Study of Zhejiang University, Zhiming Liu Southwest University Pre-print |
10:30 - 12:00 | Code Quality and Code SmellsTool Demonstrations / Journal-first Papers / Research Papers at Plenary Room 2 Chair(s): Bernd Fischer Stellenbosch University | ||
10:30 12mTalk | Contextuality of Code Representation Learning Research Papers Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas | ||
10:42 12mTalk | On-the-fly Improving Performance of Deep Code Models via Input Denoising Research Papers Pre-print File Attached | ||
10:54 12mTalk | Using Deep Learning to Automatically Improve Code Readability Research Papers Antonio Vitale University of Molise, Italy, Valentina Piantadosi University of Molise, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise Pre-print | ||
11:06 12mTalk | Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We? Research Papers Antonio Mastropaolo Università della Svizzera italiana, Massimiliano Di Penta University of Sannio, Italy, Gabriele Bavota Software Institute, USI Università della Svizzera italiana Pre-print File Attached | ||
11:18 12mTalk | How to Find Actionable Static Analysis Warnings: A Case Study with FindBugs Journal-first Papers Rahul Yedida , Hong Jin Kang UCLA, Huy Tu North Carolina State University, USA, Xueqi Yang NCSU, David Lo Singapore Management University, Tim Menzies North Carolina State University Link to publication DOI Authorizer link Pre-print | ||
11:30 12mTalk | Polyglot Code Smell Detection for Infrastructure as Code with GLITCH Tool Demonstrations Nuno Saavedra INESC-ID and IST, University of Lisbon, João Gonçalves INESC-ID and IST, University of Lisbon, Miguel Henriques INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC Pre-print File Attached | ||
11:42 12mTalk | Enhancing the defectiveness prediction of methods and classes via JIT Journal-first Papers Falessi Davide University of Rome Tor Vergata, Simone Mesiano Laureani University of Rome Tor Vergata, Jonida Çarka University of Rome Tor Vergata, Matteo Esposito University of Rome Tor Vergata, Daniel Alencar Da Costa University of Otago Link to publication DOI File Attached |
10:30 - 12:00 | Program AnalysisResearch Papers / Tool Demonstrations / NIER Track / Journal-first Papers at Room D Chair(s): Domenico Bianculli University of Luxembourg | ||
10:30 12mTalk | An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering Research Papers Prantik Chatterjee Indian Institute Of Technology Kanpur and MathWorks, Pankaj Kumar Kalita IIT Kanpur, Sumit Lahiri Indian Institute Of Technology Kanpur, Sujit Kumar Muduli IIT Kanpur, Vishal Singh Indian Institute of Technology Kanpur, Gourav Takhar Indian Institute of Technology Kanpur, Subhajit Roy IIT Kanpur | ||
10:42 12mTalk | Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis Research Papers Chenghang Shi SKLP, Institute of Computing Technology, CAS, Haofeng Li , Yulei Sui University of New South Wales, Sydney, Jie Lu SKLP, Institute of Computing Technology, CAS, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingling Xue UNSW Pre-print File Attached | ||
10:54 12mTalk | NRAgo: Solving SMT(NRA) Formulas with Gradient-based Optimization Tool Demonstrations Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kunhang Lv Institute of Software, Chinese Academy of Sciences, Pei Huang Stanford University, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yu Zhang Institute of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences File Attached | ||
11:06 12mTalk | Live Programming for Finite Model Finders NIER Track Allison Sullivan University of Texas at Arlington Pre-print File Attached | ||
11:18 12mTalk | Towards Robustness of Deep Program Processing Models -- Detection, Estimation and Enhancement Journal-first Papers Huangzhao Zhang Peking University, Zhiyi Fu Peking University, Ge Li Peking University, Lei Ma University of Alberta, Zhehao Zhao Peking University, Hua'an Yang Peking University, Yizhe Sun Peking University, Yang Liu Nanyang Technological University, Zhi Jin Peking University Link to publication DOI File Attached | ||
11:30 12mTalk | Precise Data-Driven Approximation for Program Analysis via FuzzingRecorded talk Research Papers Nikhil Parasaram University College London; ConsenSys Diligence, Earl T. Barr University College London; Google DeepMind, Sergey Mechtaev University College London, Marcel Böhme MPI-SP; Monash University Pre-print Media Attached | ||
11:42 12mTalk | Contrastive Learning for API Aspect AnalysisRecorded talk Research Papers G. M. Shahariar Ahsanullah University of Science and Technology, Tahmid Hasan Bangladesh University of Engineering and Technology, Anindya Iqbal Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Gias Uddin York University, Canada Pre-print Media Attached |
10:30 - 12:00 | Web Development 2Industry Showcase (Papers) / Research Papers / NIER Track / Journal-first Papers at Room E Chair(s): Hadar Ziv University of California, Irvine | ||
10:30 12mTalk | Metamorphic Testing for Web System Security Journal-first Papers Nazanin Bayati Chaleshtari University of Ottawa, Fabrizio Pastore University of Luxembourg, Arda Goknil SINTEF Digital, Lionel Briand University of Luxembourg; University of Ottawa Link to publication DOI Pre-print | ||
10:42 12mTalk | JavaScript Dead Code Identification, Elimination, and Empirical Assessment Journal-first Papers Ivano Malavolta Vrije Universiteit Amsterdam, Kishan Nirghin Vrije Universiteit Amsterdam, Gian Luca Scoccia Gran Sasso Science Institute, Simone Romano University of Salerno, Salvatore Lombardi University of Basilicata, Giuseppe Scanniello University of Salerno, Patricia Lago Vrije Universiteit Amsterdam File Attached | ||
10:54 12mTalk | PTdetector: An Automated JavaScript Front-end Library Detector Research Papers Link to publication | ||
11:06 12mTalk | Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing Research Papers Shuyao Jiang The Chinese University of Hong Kong, Ruiying Zeng Fudan University, Zihao Rao Fudan University, Jiazhen Gu Chinese University of Hong Kong, Yangfan Zhou Fudan University, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:18 12mTalk | Dramatically Improving Design Reviews at Google Industry Showcase (Papers) Link to publication | ||
11:30 12mTalk | Characterizing Flaky Tests in Node.js ApplicationsRecorded talk NIER Track Xiaoning Chang Institute of Software, Chinese Academy of Sciences, Zheheng Liang Joint Laboratory on Cyberspace Security of China Southern Power Grid, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Zhenyue Long , Lei Cui Joint Laboratory on Cyberspace Security of China Southern Power Grid, Tao Huang Institute of Software Chinese Academy of Sciences Media Attached |
11:10 - 11:55 | Industry Challenge (Competition)Industry Challenge (Competition) at Room FR Chair(s): Kui Liu Huawei | ||
11:10 15mTalk | PreciseBugCollector: Extensible, Executable and Precise Bug-fix Collection Industry Challenge (Competition) He Ye Carnegie Mellon University, Zimin Chen KTH Royal Institute of Technology, Claire Le Goues Carnegie Mellon University Pre-print | ||
11:25 15mTalk | BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining Industry Challenge (Competition) Xuezhi Song Fudan University, Yijian Wu Fudan University, Junming Cao Fudan University, Bihuan Chen Fudan University, Yun Lin Shanghai Jiao Tong University, Zhengjie Lu Fudan University, Dingji Wang Fudan University, Xin Peng Fudan University | ||
11:40 15mIndustry talk | Function-level Vulnerability Detection Through Fusing Multi-Modal KnowledgeRecorded talk Industry Challenge (Competition) Chao Ni Zhejiang University, Xinrong Guo School of Software Technology, Zhejiang University, Yan Zhu Zhejiang University, xiaodanxu , Xiaohu Yang Zhejiang University Media Attached File Attached |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:30 - 15:00 | |||
13:30 12mTalk | Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models Research Papers Liran Wang Beihang University, Xunzhu Tang University of Luxembourg, Yichen He Beihang University, Changyu Ren Beihang University, Shuhua Shi Beihang University, Chaoran Yan Beihang University, Zhoujun Li Beihang University Pre-print File Attached | ||
13:42 12mTalk | From Commit Message Generation to History-Aware Commit Message Completion Research Papers Aleksandra Eliseeva JetBrains Research, Yaroslav Sokolov JetBrains, Egor Bogomolov JetBrains Research, Yaroslav Golubev JetBrains Research, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Timofey Bryksin JetBrains Research Pre-print File Attached | ||
13:54 12mTalk | Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis Research Papers Jingbo Lu University of New South Wales, Dongjie He UNSW, Wei Li University of New South Wales, Yaoqing Gao Huawei Toronto Research Center, Jingling Xue UNSW Pre-print File Attached | ||
14:06 12mTalk | What Makes Good In-context Demonstrations for Code Intelligence Tasks with LLMs? Research Papers Shuzheng Gao The Chinese University of Hong Kong, Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Hongyu Zhang Chongqing University, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
14:18 12mTalk | HexT5: Unified Pre-training for Stripped Binary Code Information InferenceRecorded talk Research Papers Jiaqi Xiong University of Science and Technology of China, Guoqiang Chen University of Science and Technology of China, Kejiang Chen University of Science and Technology of China, Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Weiming Zhang University of Science and Technology of China Media Attached File Attached | ||
14:30 12mTalk | Generating Variable Explanations via Zero-shot Prompt LearningRecorded talk Research Papers Chong Wang Fudan University, Yiling Lou Fudan University, Liu Junwei Fudan University, Xin Peng Fudan University Media Attached |
13:30 - 15:00 | Program Verification 1Research Papers / NIER Track / Tool Demonstrations at Room C Chair(s): Nico Rosner Amazon Web Services | ||
13:30 12mTalk | CPA-DF: A Tool for Configurable Interval Analysis to Boost Program Verification Tool Demonstrations Pre-print Media Attached File Attached | ||
13:42 12mTalk | Demystifying Template-based Invariant Generation for Bit-Vector Programs Research Papers Peisen Yao Zhejing University, Jingyu Ke Shanghai Jiao Tong University, Jiahui Sun Zhejiang University, Hongfei Fu Shanghai Jiao Tong University, Rongxin Wu Xiamen University, Kui Ren Zhejiang University | ||
13:54 12mTalk | PSMT: Satisfiability Modulo Theories Meets Probability Distribution NIER Track Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Pei Huang Stanford University, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print File Attached | ||
14:06 12mTalk | EndWatch: A Practical Method for Detecting Non-Termination in Real-World Software Research Papers Yao Zhang Tianjin University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University, Sen Chen Tianjin University, Cen Zhang Nanyang Technological University, Xiaohong Li Tianjin University Pre-print File Attached | ||
14:18 12mTalk | Symbolic Fixpoint Algorithms for Logical LTL Games Research Papers Stanly Samuel Indian Institute of Science, India, Deepak D'Souza IISc Bangalore, Raghavan Komondoor Indian Institute of Science, India Pre-print Media Attached File Attached | ||
14:30 12mTalk | SAT-verifiable LTL Satisfiability Checking via Graph Representation LearningRecorded talk NIER Track Weilin Luo Sun Yat-Sen University, Yuhang Zheng Sun Yat-Sen University, Rongzhen Ye Sun Yat-Sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Pingjia Liang Sun Yat-Sen University, Polong Chen Sun Yat-Sen University Media Attached |
13:30 - 15:00 | Open Source and Software Ecosystems 2Research Papers / Journal-first Papers / Industry Showcase (Papers) at Room D Chair(s): Paul Grünbacher Johannes Kepler University Linz, Austria | ||
13:30 12mTalk | Personalized First Issue Recommender for Newcomers in Open Source Projects Research Papers Wenxin Xiao School of Computer Science, Peking University, Jingyue Li Norwegian University of Science and Technology, Hao He Carnegie Mellon University, Ruiqiao Qiu Beijing Institute of Technology, Minghui Zhou Peking University Pre-print | ||
13:42 12mTalk | Understanding and Enhancing Issue Prioritization in GitHub Research Papers Yingying He Nanjing University of Aeronautics and Astronautics, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University, Yasir Hussain Nanjing University of Aeronautics and Astronautics, Yu Zhou Nanjing University of Aeronautics and Astronautics | ||
13:55 12mResearch paper | Who is the Real Hero? Measuring Developer Contribution via Multi-dimensional Data Integration Research Papers Yuqiang Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University Pre-print | ||
14:08 12mTalk | Predicting Health Indicators for Open Source Projects (using Hyperparameter Optimization) Journal-first Papers Tianpei Xia North Carolina State University, Wei Fu North Carolina State University, Rui Shu North Carolina State University, Rishabh Agrawal North Carolina State University, Tim Menzies North Carolina State University Link to publication DOI Pre-print | ||
14:21 12mTalk | To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems Research Papers Mukelabai Mukelabai The University of Zambia, Zambia, Christoph Derks Ruhr-University Bochum, Germany, Jacob Krüger Eindhoven University of Technology, Thorsten Berger Ruhr University Bochum File Attached | ||
14:34 12mTalk | LiSum: Open Source Software License Summarization with Multi-Task LearningRecorded talk Research Papers Linyu Li , Sihan Xu Nankai University, Yang Liu Nanyang Technological University, Ya Gao Nankai University, Xiangrui Cai Nankai University, Jiarun Wu Nankai University, Wenli Song Civil Aviation University of China, Zheli Liu Nankai University Pre-print Media Attached | ||
14:47 12mTalk | Open Source Software Tools for Data Management and Deep Model Training Automation Industry Showcase (Papers) Umut Tıraşoğlu ORDULU Corp., Abdussamet Türker ORDULU Corp., Adnan Ekici ORDULU Corp., Hayri Yiğit ORDULU Corp., Yusuf Enes Bölükbaşı ORDULU Corp., Toygar Akgun TOBB ETU |
13:30 - 14:30 | |||
13:30 15mTalk | RPCover: Recovering gRPC Dependency in Multilingual Projects Industry Challenge (Competition) Aoyang Fang Chinese University of Hong Kong, Shenzhen, Ruiyu Zhou Chinese University of Hong Kong, Shenzhen, Xiaoying Tang hinese University of Hong Kong, Shenzhen, Pinjia He Chinese University of Hong Kong, Shenzhen | ||
13:45 15mTalk | VALAR: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active Learning Industry Challenge (Competition) Pengcheng Liu , Yifei Lu Nanjing University, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University | ||
14:00 15mTalk | REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes Industry Challenge (Competition) Chaozheng Wang The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Yun Peng Chinese University of Hong Kong, Shuzheng Gao , Sirong Chen Harbin Institute of Technology, Shenzhen, Shuai Wang Hong Kong University of Science and Technology, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong | ||
14:15 15mTalk | Potential Solutions to Challenges in C Program Repair: A Practical Perspective Industry Challenge (Competition) Jifeng Xuan Wuhan University, Qi Xin Wuhan University, Liqian Chen National University of Defense Technology, China, Xiaoguang Mao National University of Defense Technology |
14:45 - 15:45 | |||
14:45 15mTalk | MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains Industry Challenge (Competition) Ningke Li Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Mingxi Feng Huazhong University of Science and Technology, Kailong Wang Huazhong University of Science and Technology, Meizhen Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
15:00 15mTalk | Minecraft: Automated Mining of Software Bug Fixes with Precise Code Context Industry Challenge (Competition) Sai Krishna Avula IIT Gandhinagar, Venkatesh Vobbilisetti NIT Raipur, Shouvick Mondal IIT Gandhinagar, India Pre-print Media Attached File Attached | ||
15:15 15mTalk | CiD4HMOS: A Solution to HarmonyOS Compatibility IssuesRecorded talk Industry Challenge (Competition) Tianzhi Ma , Yanjie Zhao Monash Univerisity, Li Li Beihang University, Liang Liu Nanjing University of Aeronautics and Astronautics Media Attached | ||
15:30 15mIndustry talk | Unifying Defect Prediction, Categorization, and Repair by Multi-task Deep LearningRecorded talk Industry Challenge (Competition) Chao Ni Zhejiang University, Kaiwen Yang Zhejiang University, Yan Zhu Zhejiang University, Xiang Chen Nantong University, Xiaohu Yang Zhejiang University Media Attached File Attached |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | Code Generation 2Research Papers / NIER Track / Tool Demonstrations at Plenary Room 2 Chair(s): Marianne Huchard LIRMM | ||
15:30 12mTalk | COMEX: A Tool for Generating Customized Source Code Representations Tool Demonstrations Debeshee Das Indian Institute of Technology Tirupati, Noble Saji Mathews University of Waterloo, Canada, Alex Mathai , Srikanth Tamilselvam IBM Research, Kranthi Sedamaki Indian Institute of Technology Tirupati, Sridhar Chimalakonda IIT Tirupati, Atul Kumar IBM India Research Labs Pre-print Media Attached File Attached | ||
15:42 12mTalk | Fast and Reliable Program Synthesis via User Interaction Research Papers Yanju Chen University of California at Santa Barbara, Chenglong Wang Microsoft Research, Xinyu Wang University of Michigan, Osbert Bastani University of Pennsylvania, Yu Feng University of California at Santa Barbara File Attached | ||
15:55 12mTalk | From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining Research Papers Xiaoxue Ren Zhejiang University, Xinyuan Ye Australian National University, Dehai Zhao CSIRO's Data61, Zhenchang Xing , Xiaohu Yang Zhejiang University File Attached | ||
16:08 12mTalk | Generative Type Inference for Python Research Papers Yun Peng Chinese University of Hong Kong, Chaozheng Wang The Chinese University of Hong Kong, Wenxuan Wang Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong Pre-print File Attached | ||
16:21 12mTalk | Compiler Auto-tuning via Critical Flag Selection Research Papers | ||
16:34 12mTalk | Enhancing Code Safety in Quantum Intermediate Representation NIER Track File Attached | ||
16:47 12mTalk | CAT-LM: Training Language Models on Aligned Code And Tests Research Papers Nikitha Rao Carnegie Mellon University, Kush Jain Carnegie Mellon University, Uri Alon Carnegie Mellon University, Claire Le Goues Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University Media Attached File Attached |
15:30 - 17:00 | Software Testing for Specialized Systems 1Research Papers / Journal-first Papers / NIER Track at Room C Chair(s): Fabrizio Pastore University of Luxembourg | ||
15:30 12mTalk | DCLink: Bridging Data Constraint Changes and Implementations in FinTech Systems Research Papers Wensheng Tang Hong Kong University of Science and Technology, Chengpeng Wang Hong Kong University of Science and Technology, Peisen Yao Zhejing University, Rongxin Wu Xiamen University, Xianjin Fu Ant Group, Gang Fan Ant Group, Charles Zhang Hong Kong University of Science and Technology File Attached | ||
15:42 12mTalk | Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks Research Papers Paschal Amusuo Purdue University, Ricardo Andrés Calvo Méndez Universidad Nacional de Colombia, Zhongwei Xu Xi'an JiaoTong University, Aravind Machiry Purdue University, James C. Davis Purdue University Pre-print Media Attached File Attached | ||
15:54 12mTalk | WADIFF: A Differential Testing Framework for WebAssembly Runtimes Research Papers Shiyao Zhou The Hong Kong Polytechnic University, Muhui Jiang The Hong Kong Polytechnic University, Weimin Chen The Hong Kong Polytechnic University, Hao Zhou Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University File Attached | ||
16:06 12mTalk | T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure Journal-first Papers An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaowei Wang University of Manitoba Pre-print | ||
16:18 12mTalk | VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage Research Papers Xiaoyin Wang University of Texas at San Antonio, Tahmid Rafi University of Texas at San Antonio, Na Meng Virginia Tech File Attached | ||
16:30 12mTalk | PURLTL: Mining LTL Specification from Imperfect Traces in TestingRecorded talk NIER Track Bo Peng Sun Yat-Sen University, Pingjia Liang Sun Yat-Sen University, Tingchen Han Sun Yat-Sen University, Weilin Luo Sun Yat-Sen University, Jianfeng Du Guangdong University of Foreign Studies, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Rongzhen Ye Sun Yat-Sen University, Yuhang Zheng Sun Yat-Sen University Media Attached |
15:30 - 17:00 | Bug DetectionResearch Papers / Journal-first Papers at Room D Chair(s): Andreea Vescan Babes-Bolyai University | ||
15:30 12mTalk | A Comparative Study of Transformer-based Neural Text Representation Techniques on Bug Triaging Research Papers File Attached | ||
15:42 12mTalk | Duplicate Bug Report Detection: How Far Are We? Journal-first Papers Ting Zhang Singapore Management University, DongGyun Han Royal Holloway, University of London, Venkatesh Vinayakarao Chennai Mathematical Institute, Ivana Clairine Irsan Singapore Management University, Bowen Xu North Carolina State University, Ferdian Thung Singapore Management University, David Lo Singapore Management University, Lingxiao Jiang Singapore Management University Link to publication DOI File Attached | ||
15:54 12mTalk | Neural SZZ Algorithm Research Papers LingXiao Tang zhejiang university, Lingfeng Bao Zhejiang University, Xin Xia Huawei Technologies, Zhongdong Huang Zhejiang University Pre-print | ||
16:06 12mTalk | How to Train Your Neural Bug Detector: Artificial vs Real Bugs Research Papers Cedric Richter Carl von Ossietzky Universität Oldenburg / University of Oldenburg, Heike Wehrheim Carl von Ossietzky Universität Oldenburg / University of Oldenburg Pre-print File Attached | ||
16:18 12mTalk | Detection of Java Basic Thread Misuses Based on Static Event Analysis Research Papers Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Chi Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences File Attached | ||
16:30 12mFull-paper | On effort-aware metrics for defect prediction Journal-first Papers Jonida Çarka University of Rome Tor Vergata, Matteo Esposito University of Rome Tor Vergata, Falessi Davide University of Rome Tor Vergata DOI File Attached | ||
16:42 12mTalk | FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers Research Papers Eric Liu University of Toronto, Shengjie Xu University of Toronto, David Lie University of Toronto, Canada Pre-print File Attached |
15:30 - 17:00 | Autonomous Systems and AgentsResearch Papers / NIER Track / Journal-first Papers / Tool Demonstrations at Room E Chair(s): Alessio Gambi IMC University of Applied Sciences Krems | ||
15:30 12mTalk | TEASER: Simulation-based CAN Bus Regression Testing for Self-driving Cars Software Tool Demonstrations Christian Birchler Zurich University of Applied Sciences, Cyrill Rohrbach University of Bern, Switzerland, Hyeongkyun Kim University of Zurich, Switzerland, Alessio Gambi IMC University of Applied Sciences Krems, Tianhai Liu aicas GmbH, Germany, Jens Horneber aicas GmbH, Germany, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences Pre-print File Attached | ||
15:42 12mTalk | Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms Journal-first Papers Andrea Di Sorbo University of Sannio, Fiorella Zampetti University of Sannio, Italy, Corrado A. Visaggio University of Sannio, Italy, Massimiliano Di Penta University of Sannio, Italy, Sebastiano Panichella Zurich University of Applied Sciences File Attached | ||
15:54 12mTalk | Towards a Formal Framework for Normative Requirements Elicitation NIER Track Nick Feng University of Toronto, Lina Marsso University of Toronto, Sinem Getir Yaman University of York, UK, Beverley Townsend University of York, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Marsha Chechik University of Toronto File Attached | ||
16:06 12mTalk | Detecting Smart Home Automation Application Interferences with Domain Knowledge Research Papers Tao Wang Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Liwei Liu Institute of Software at Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print File Attached | ||
16:18 12mTalk | CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues Tool Demonstrations Xiufeng Xu Nanyang Technological University, Chenguang Zhu Meta, Yi Li Nanyang Technological University Pre-print Media Attached File Attached | ||
16:30 12mTalk | A Comprehensive Study on Code Clones in Automated Driving SoftwareRecorded talk Research Papers Ran Mo Central China Normal University, Yingjie Jiang Central China Normal University, Wenjing Zhan Central China Normal University, Dongyu Wang Central China Normal University, Zengyang Li Central China Normal University Pre-print Media Attached File Attached |
Thu 14 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:00 - 17:00 | RegistrationCatering | ||
08:30 - 09:00 | MIP awards and ASE 2024Most Influential Papers (MIP) / Keynotes at Room C Chair(s): Massimiliano Di Penta University of Sannio, Italy | ||
08:30 15mTalk | Automatically documenting program changes Most Influential Papers (MIP) File Attached | ||
08:45 12mTalk | ASE 2024 Teaser Keynotes |
09:00 - 10:00 | |||
09:00 60mTalk | Fault Localization: Research Opportunities and Challenges Keynotes Dan Hao Peking University |
10:00 - 10:30 | |||
10:00 30mCoffee break | Break Catering |
10:30 - 12:00 | Program Repair 2Research Papers / Journal-first Papers / NIER Track at Plenary Room 2 Chair(s): Shin Yoo KAIST | ||
10:30 12mTalk | An Empirical Study on Fine-tuning Large Language Models of Code for Automated Program Repair Research Papers Kai Huang , Xiangxin Meng Beihang University, Beijing, China, Jian Zhang Nanyang Technological University, Yang Liu Nanyang Technological University, Wenjie Wang University of Chinese Academy of Sciences, Shuhao Li Zhongguancun Laboratory, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory File Attached | ||
10:42 12mTalk | Estimating the Potential of Program Repair Search Spaces with Commit Analysis Journal-first Papers Khashayar Etemadi KTH Royal Institute of Technology, Niloofar Tarighat Sharif University of Technology, Siddharth Yadav IIIT-Delhi, Matias Martinez Universitat Politècnica de Catalunya (UPC), Martin Monperrus KTH Royal Institute of Technology Link to publication File Attached | ||
10:54 12mTalk | LeakPair: Proactive Repairing of Memory Leaks in Single Page Web Applications Research Papers Arooba Shahoor Kyungpook National University, Askar Yeltayuly Khamit Ulsan National Institute of Science and Technology, Jooyong Yi UNIST (Ulsan National Institute of Science and Technology), Dongsun Kim Kyungpook National University Pre-print Media Attached | ||
11:06 12mTalk | Automated Fixing of Web UI Tests via Iterative Element Matching Research Papers Yuanzhang Lin Beihang University, Guoyao Wen Huawei Technologies Co., Ltd., Xiang Gao Beihang University Pre-print Media Attached | ||
11:18 12mTalk | OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability with Attribute Checking Research Papers Wenjie Zhang Peking University, Guancheng Wang Peking University, China, Junjie Chen Tianjin University, Yingfei Xiong Peking University, Yong Liu Beijing University of Chemical Technology, Lu Zhang Peking University Pre-print File Attached | ||
11:30 12mTalk | Hot Patching Hot Fixes: Reflection and Perspectives NIER Track Pre-print File Attached |
10:30 - 12:00 | Software Testing for Specialized Systems 2Research Papers / Tool Demonstrations at Room C Chair(s): Zishuo Ding University of Waterloo | ||
10:30 12mTalk | Bridging the Gap between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations Research Papers Szymon Stradowski Nokia & Wrocław University of Science and Technology, Lech Madeyski Wroclaw University of Science and Technology Link to publication DOI Pre-print Media Attached | ||
10:42 12mTalk | Identify and Update Test Cases when Production Code Changes: A Transformer-based Approach Research Papers Xing Hu Zhejiang University, Zhuang Liu Zhejiang University, Xin Xia Huawei Technologies, Zhongxin Liu Zhejiang University, Tongtong Xu Huawei, Xiaohu Yang Zhejiang University | ||
10:54 12mTalk | Revisiting and Improving Retrieval-Augmented Deep Assertion Generation Research Papers Weifeng Sun , Hongyan Li Chongqing University, Meng Yan Chongqing University, Yan Lei Chongqing University, Hongyu Zhang Chongqing University, Hongyu Zhang Chongqing University | ||
11:06 12mTalk | Provengo: A Tool Suite for Scenario Driven Model-Based Testing Tool Demonstrations Michael Bar Sinai Provengo, Achiya Elyasaf Ben-Gurion University of the Negev, Gera Weiss Ben-Gurion University of the Negev, Yeshayahu Weiss Ben-Gurion University of the Negev Pre-print File Attached | ||
11:18 12mTalk | QuraTest: Integrating Quantum Specific Features in Quantum Program Testing Research Papers Jiaming Ye Kyushu University, Shangzhou Xia Kyushu University, Fuyuan Zhang Kyushu University, Paolo Arcaini National Institute of Informatics
, Lei Ma University of Alberta, Jianjun Zhao Kyushu University, Fuyuki Ishikawa National Institute of Informatics File Attached | ||
11:30 12mTalk | QuCAT: A Combinatorial Testing Tool for Quantum Software Tool Demonstrations Xinyi Wang Simula Research Laboratory, Paolo Arcaini National Institute of Informatics
, Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University Pre-print File Attached | ||
11:42 12mTalk | LEAP: Efficient and Automated Test Method for NLP SoftwareRecorded talk Research Papers Mingxuan Xiao Hohai University, Yan Xiao National University of Singapore, Hai Dong RMIT University, Shunhui Ji Hohai University, Pengcheng Zhang Hohai University Media Attached |
10:30 - 12:00 | Mobile Development 1Research Papers / Tool Demonstrations / Journal-first Papers at Room D Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security | ||
10:30 12mTalk | Taming Android Fragmentation through Lightweight Crowdsourced Testing Journal-first Papers Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Yonghui Liu Monash University, John Grundy Monash University, Li Li Beihang University Media Attached File Attached | ||
10:42 12mTalk | Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components Research Papers Zhijie Liu ShanghaiTech University, China, Liangfeng Zhang School of Information Science and Technology, ShanghaiTech University, Yutian Tang University of Glasgow File Attached | ||
10:54 12mTalk | Fine-Grained In-Context Permission Classification for Android Apps using Control-Flow Graph Embedding Research Papers Vikas K. Malviya Singapore Management University, Yan Naing Tun Singapore Management University, Chee Wei Leow Singapore Management University, Ailys Tee Xynyn Singapore Management University, Lwin Khin Shar Singapore Management University, Lingxiao Jiang Singapore Management University File Attached | ||
11:06 12mTalk | How Android Apps Break the Data Minimization Principle: An Empirical Study Research Papers Shaokun Zhang Peking University, Hanwen Lei Peking University, Yuanpeng Wang Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University Pre-print File Attached | ||
11:18 12mTalk | ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps Tool Demonstrations Shixin Zhang Institute of Software, Chinese Academy of Sciences, Shanna Li Beijing Jiaotong University, Xi Deng Institute of Software, Chinese Academy of Sciences, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Media Attached File Attached | ||
11:30 12mTalk | DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph Learning Research Papers Chunyang Meng Sun Yat-sen University, Shijie Song Sun Yat-sen University, Haogang Tong Sun Yat-sen University, Maolin Pan Sun Yat-sen University, Yang Yu Sun Yat-sen University Pre-print File Attached |
10:30 - 12:00 | Program Verification 2Research Papers / Tool Demonstrations / NIER Track at Room E Chair(s): Martin Kellogg New Jersey Institute of Technology | ||
10:30 12mTalk | Expediting Neural Network Verification via Network Reduction Research Papers Yuyi Zhong National University of Singapore, Singapore, Ruiwei Wang School of Computing, National University of Singapore, Siau-Cheng Khoo National University of Singapore Pre-print File Attached | ||
10:42 12mTalk | SMT Solver Validation Empowered by Large Pre-trained Language Models Research Papers Maolin Sun Nanjing University, Yibiao Yang Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Yuming Zhou Nanjing University Pre-print File Attached | ||
10:54 12mTalk | LIV: Invariant Validation Using Straight-Line Programs Tool Demonstrations Pre-print Media Attached File Attached | ||
11:06 12mTalk | CEGAR-PT: A Tool for Abstraction by Program Transformation Tool Demonstrations Pre-print Media Attached File Attached | ||
11:18 12mTalk | Symbolic Verification of Fuzzy Logic ModelsRecorded talk NIER Track Siang Zhao School of Computer, National University of Defense Technology, China, Zhongyang Li School of Computer, National University of Defense Technology, China, Zhenbang Chen National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China Pre-print Media Attached | ||
11:30 12mTalk | HOBAT: Batch Verification for Homogeneous Structural Neural NetworksRecorded talk Research Papers Media Attached File Attached |
10:40 - 12:00 | SATE - Software Engineering at the Era of LLMsSATE - Software Engineering at the Era of LLMs at Room FR Chair(s): Xin Xia Huawei Technologies | ||
10:40 40mTalk | Testing the Limits: What Breaks and How to Partially Fix LLM4ASE? SATE - Software Engineering at the Era of LLMs David Lo Singapore Management University Pre-print | ||
11:20 40mTalk | Deep Learning for Software Engineering SATE - Software Engineering at the Era of LLMs Denys Poshyvanyk William & Mary |
12:00 - 13:30 | |||
12:00 90mLunch | Lunch Catering |
13:20 - 15:20 | SATE - Software Engineering at the Era of LLMsSATE - Software Engineering at the Era of LLMs at Room FR Chair(s): Xin Xia Huawei Technologies | ||
13:20 40mTalk | Towards Better Software Quality in the Era of Large Language Models SATE - Software Engineering at the Era of LLMs Lingming Zhang University of Illinois at Urbana-Champaign | ||
14:00 40mTalk | Securing LLM-based Software Supply Chains SATE - Software Engineering at the Era of LLMs Audris Mockus Vilnius University & The University of Tennessee File Attached | ||
14:40 40mTalk | BEWARE: some of the deep learning rhetoric is misleading SATE - Software Engineering at the Era of LLMs Tim Menzies North Carolina State University Pre-print |
13:30 - 15:00 | Software Testing for Specialized Systems 3Journal-first Papers / Tool Demonstrations / Research Papers at Plenary Room 2 Chair(s): Xiaoyin Wang University of Texas at San Antonio | ||
13:30 12mTalk | An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software Research Papers Wenxuan Wang Chinese University of Hong Kong, Jingyuan Huang Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Chang Chen Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Michael Lyu The Chinese University of Hong Kong File Attached | ||
13:42 12mTalk | CoMSA: A modeling driven sampling approach for configuration performance testing Research Papers Yuanjie Xia University of Waterloo, Zishuo Ding University of Waterloo, Weiyi Shang University of Waterloo Pre-print Media Attached | ||
13:54 12mTalk | DroneReqValidator: Facilitating High Fidelity Simulation Testing for Uncrewed Aerial Systems Developers Tool Demonstrations Bohan Zhang Saint Louis University, Missouri, Yashaswini Shivalingaiah Saint Louis University, Missouri, Ankit Agrawal Saint Louis University, Missouri Pre-print Media Attached File Attached | ||
14:06 12mTalk | Effective Concurrency Testing for Go via Directional Primitive-constrained Interleaving Exploration Research Papers Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Yixin Yang Huazhong University of Science and Technology, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology, Hai Jin Huazhong University of Science and Technology File Attached | ||
14:18 12mTalk | Fuzzing for CPS Mutation Testing Research Papers Jaekwon Lee University of Luxembourg, Luxembourg, Enrico Viganò University of Luxembourg, Oscar Cornejo University of Milano Bicocca, Italy, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa Pre-print File Attached | ||
14:30 12mTalk | MUT4SLX: Fast Mutation Testing for Simulink Tool Demonstrations Halil Ibrahim Ceylan University of Antwerp, Onur Kilincceker University of Antwerp and Flanders Make vzw, Mutlu Beyazıt University of Antwerp and Flanders Make vzw, Serge Demeyer University of Antwerp; Flanders Make Media Attached File Attached | ||
14:42 12mTalk | Machine learning-based test selection for simulation-based testing of self-driving cars software Journal-first Papers Christian Birchler Zurich University of Applied Sciences, Sajad Khatiri USI-Lugnao & Zurich University of Applied Sciences, Bill Bosshard Meier Planungsdienste GmbH, Alessio Gambi IMC University of Applied Sciences Krems, Sebastiano Panichella Zurich University of Applied Sciences |
13:30 - 15:00 | Mobile Development 2Research Papers / Industry Showcase (Papers) / Journal-first Papers / Tool Demonstrations at Room D Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security | ||
13:30 12mTalk | Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps Journal-first Papers Mattia Fazzini University of Minnesota, Kevin Moran George Mason University, Carlos Bernal-Cárdenas Microsoft, Tyler Wendland University of Minnesota, Alessandro Orso Georgia Institute of Technology, Denys Poshyvanyk William & Mary | ||
13:42 12mTalk | AutoDebloater: Automated Android App Debloating Tool Demonstrations Jiakun Liu Singapore Management University, Xing Hu Zhejiang University, Ferdian Thung Singapore Management University, Shahar Maoz Tel Aviv University, Eran Toch Tel Aviv University, Debin Gao Singapore Management University, David Lo Singapore Management University | ||
13:54 12mTalk | ReuNify: A Step Towards Whole Program Analysis for React Native Android App Research Papers Yonghui Liu Monash University, Xiao Chen Monash University, Pei Liu Data61 at CSIRO, Australia, John Grundy Monash University, Chunyang Chen Monash University, Li Li Beihang University Pre-print | ||
14:06 12mTalk | WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs Research Papers Shi Meng Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Shenao Wang Xidian University, Kailong Wang Huazhong University of Science and Technology, Xusheng Xiao Arizona State University, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology | ||
14:18 12mTalk | Vision-based Widget Mapping for Test Migration across Mobile Platforms: Are We There Yet? Research Papers Ruihua Ji Nanjing University, Tingwei Zhu Nanjing University, Xiaoqing Zhu Nanjing University, Chunyang Chen Monash University, Minxue Pan Nanjing University, Tian Zhang Nanjing University | ||
14:30 12mTalk | Government Mobile Apps: Analysing Citizen Feedback via App Reviews Industry Showcase (Papers) Tooba Aamir Data61 at CSIRO, Australia, Mohan Baruwal Chhetri CSIRO’s Data61, M.A.P. Chamikara Data61 CSIRO Australia, Marthie Grobler CSIRO's Data61 |
13:30 - 15:00 | DebuggingResearch Papers / Industry Showcase (Papers) at Room E Chair(s): Carol Hanna University College London | ||
13:30 12mTalk | Coding and Debugging by Separating Secret Code toward Secure Remote Development Industry Showcase (Papers) Shinobu Saito NTT Media Attached File Attached | ||
13:42 12mTalk | Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count Research Papers Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Hao Zhang Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print | ||
13:54 12mResearch paper | PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis Research Papers Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Shuai Wang Hong Kong University of Science and Technology Pre-print | ||
14:06 12mTalk | The MAP metric in Information Retrieval Fault Localization Research Papers Media Attached File Attached | ||
14:18 12mTalk | Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial ExtrapolationRecorded talk Research Papers Zuoyan Zhang Information Engineering University, Bei Zhou Information Engineering University, Jiangwei Hao Information Engineering University, Hongru Yang Information Engineering University, Mengqi Cui Information Engineering University, Yuchang Zhou Information Engineering University, Guanghui Song Information Engineering University, Fei Li Information Engineering University, Jinchen Xu Information Engineering University, Jie Zhao State Key Laboratory of Mathematical Engineering and Advanced Computing Media Attached File Attached | ||
14:30 12mTalk | Information Retrieval-based Fault Localization for Concurrent ProgramsRecorded talk Research Papers Pre-print Media Attached |
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | FuzzingNIER Track / Journal-first Papers / Research Papers / Tool Demonstrations at Plenary Room 2 Chair(s): Lars Grunske Humboldt-Universität zu Berlin | ||
15:30 12mTalk | Fine-Grained Coverage-Based Fuzzing Journal-first Papers Wei-Cheng Wu University of Southern California, USA, Bernard Nongpoh CEA LIST, University Paris-Saclay, Marwan Nour CEA, LIST, Université Paris Saclay, Michaël Marcozzi CEA, LIST, Université Paris Saclay, Sébastien Bardin CEA LIST, University Paris-Saclay, Christophe Hauser Dartmouth College Link to publication File Attached | ||
15:42 12mTalk | MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure Research Papers Haoyu Wang College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University, Chuyue Xie College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Zan Wang Tianjin University, Qingchao Shen Tianjin University, Yingquan Zhao Tianjin University Pre-print File Attached | ||
15:54 12mTalk | Thunderkaller: Profiling and Improving the Performance of Syzkaller Research Papers Yang Lan Institute for Network Science and Cyberspace of Tsinghua University, Di Jin Brown University, Zhun Wang Institute for Network Science and Cyberspace of Tsinghua University, Wende Tan Tsinghua University, Zheyu Ma Tsinghua University, Chao Zhang Tsinghua University File Attached | ||
16:06 12mTalk | PHYFU: Fuzzing Modern Physics Simulation Engines Research Papers Dongwei Xiao Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology Link to publication DOI | ||
16:18 12mTalk | NaturalFuzz: Natural Input Generation for Big Data Analytics Research Papers Ahmad Humayun Virginia Tech, Yaoxuan Wu UCLA, Miryung Kim University of California at Los Angeles, USA, Muhammad Ali Gulzar Virginia Tech File Attached | ||
16:30 12mTalk | SpecFuzzer: A Tool for Inferring Class Specifications via Grammar-based Fuzzing Tool Demonstrations Facundo Molina IMDEA Software Institute, Marcelo d'Amorim North Carolina State University, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina Pre-print Media Attached File Attached | ||
16:42 12mTalk | Scalable Industrial Control System Analysis via XAI-based Gray-Box Fuzzing NIER Track Justin Kur Oakland University, Jingshu Chen Oakland University, Jun Huang City University of Hong Kong |
15:30 - 17:00 | Code Generation 3Research Papers / Journal-first Papers at Room C Chair(s): David Lo Singapore Management University | ||
15:30 12mTalk | Improving code extraction from coding screencasts using a code-aware encoder-decoder model Research Papers Abdulkarim Malkadi Florida State University, USA - Jazan University, KSA, Ahmad Tayeb Florida State University, USA, Sonia Haiduc Florida State University File Attached | ||
15:42 12mTalk | InfeRE: Step-by-Step Regex Generation via Chain of Inference Research Papers Shuai Zhang School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University Pre-print File Attached | ||
15:54 12mTalk | MELT: Mining Effective Lightweight Transformations from Pull Requests Research Papers Daniel Ramos Carnegie Mellon University, and INESC-ID, Hailie Mitchell Carnegie Mellon University, Ines Lynce INESC-ID/IST, Universidade de Lisboa, Vasco Manquinho INESC-ID; Universidade de Lisboa, Ruben Martins Carnegie Mellon University, Claire Le Goues Carnegie Mellon University Pre-print File Attached | ||
16:06 12mTalk | On the Evaluation of Neural Code Translation: Taxonomy and Benchmark Research Papers Mingsheng Jiao Shanghai Jiao Tong University, Tingrui Yu Shanghai Jiao Tong University, Xuan Li Shanghai Jiao Tong University, Guan Jie Qiu Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University Pre-print File Attached | ||
16:18 12mTalk | Out of the BLEU: How should we assess quality of the Code Generation models? Journal-first Papers Mikhail Evtikhiev JetBrains Research, Egor Bogomolov JetBrains Research, Yaroslav Sokolov JetBrains, Timofey Bryksin JetBrains Research Link to publication DOI Pre-print File Attached | ||
16:30 12mTalk | Pluggable Type Inference for Free Research Papers Martin Kellogg New Jersey Institute of Technology, Daniel Daskiewicz New Jersey Institute of Technology, Loi Ngo Duc Nguyen New Jersey Institute of Technology, Muyeed Ahmed New Jersey Institute of Technology, Michael D. Ernst University of Washington Link to publication Pre-print File Attached |
15:30 - 17:00 | Configuration and Version ManagementResearch Papers at Room D Chair(s): Shahar Maoz Tel Aviv University | ||
15:30 12mTalk | A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem Research Papers Wenke Li Huazhong University of Science and Technology, Feng Wu Tencent Technology (Shenzhen) Co. Ltd, Cai Fu Huazhong University of Science and Technology, Fan Zhou Tencent Technology (Shenzhen) Co. Ltd Link to publication DOI Pre-print | ||
15:42 12mTalk | Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem Research Papers Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Rabe Abdalkareem Omar Al-Mukhtar University, Emad Shihab Concordia Univeristy Pre-print | ||
15:55 12mTalk | ESRO: Experience Assisted Service Reliability against Outages Research Papers Sarthak Chakraborty Adobe Research, Shubham Agarwal Adobe Research, Shaddy Garg Adobe, Abhimanyu Sethia Indian Institute of Technology Kanpur, Udit Narayan Pandey Indian Institute of Technology Kanpur, Videh Aggarwal Indian Institute of Technology Kanpur, Shiv Saini Adobe Research File Attached | ||
16:08 12mTalk | Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks Research Papers Yang Hu University of Texas at Austin, Wenxi Wang University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Kenneth L. McMillan University of Texas at Austin, Mohit Tiwari University of Texas at Austin File Attached | ||
16:21 12mTalk | Merge Conflict Resolution: Classification or Generation? Research Papers Jinhao Dong Peking University, Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Yiling Lou Fudan University, Dan Hao Peking University Pre-print File Attached | ||
16:34 12mTalk | Repeated Builds During Code Review: An Empirical Study of the OpenStack Community Research Papers Rungroj Maipradit University of Waterloo, Dong Wang Kyushu University, Japan, Patanamon Thongtanunam University of Melbourne, Raula Gaikovina Kula Nara Institute of Science and Technology, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo Pre-print File Attached | ||
16:47 12mTalk | Automated Software Entity Matching Between Successive VersionsRecorded talk Research Papers Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Nan Niu University of Cincinnati, Yuxia Zhang Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Yanjie Jiang Beijing Institute of Technology DOI Media Attached |
15:30 - 17:00 | Vulnerability and Security 2Journal-first Papers / Industry Showcase (Papers) / Research Papers at Room E Chair(s): Ben Hermann TU Dortmund | ||
15:30 12mTalk | An Industrial Practice for Securing Android Apps in the Banking Domain Industry Showcase (Papers) Vikas K. Malviya Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Yan Naing Tun Singapore Management University, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University File Attached | ||
15:42 12mTalk | Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation Journal-first Papers Wuqi Zhang The Hong Kong University of Science and Technology, Lili Wei McGill University, Shing-Chi Cheung Hong Kong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shuqing Li The Chinese University of Hong Kong, Lu Liu The Hong Kong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong Link to publication DOI Pre-print File Attached | ||
15:54 12mTalk | Software Engineering Using Autonomous Agents: Are We There Yet?Recorded talk Industry Showcase (Papers) Samdyuti Suri Accenture Tech Labs, Sankar Narayan Das Accenture Tech Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India Media Attached | ||
16:06 12mTalk | DeFiWarder: Protecting DeFi Apps from Token Leaking VulnerabilitiesRecorded talk Research Papers Jianzhong Su Sun Yat-sen University, Xingwei Lin Ant Group, Zhiyuan Fang Sun Yat-sen University, Zhirong Zhu Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Wei Lv Ant Group, Jiashui Wang Zhejiang University Media Attached | ||
16:18 12mTalk | VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual DeviceRecorded talk Research Papers Yuwei Liu Institute of Software, Chinese Academy of Sciences, Siqi Chen Shanghai Jiao Tong University, Yuchong Xie Shanghai Jiao Tong University, Yanhao Wang Qi An Xin Group Corp., Libo Chen Shanghai Jiao Tong University, Bin Wang Beijing Institute of Computer Technology and Applications, Yingming Zeng Beijing Institute of Computer Technology and Applications, Zhi Xue Shanghai Jiao Tong University, Purui Su Institute of Software/CAS China Media Attached File Attached | ||
16:30 12mTalk | Smart Prompt Advisor: Multi-objective Prompt Framework for Consistency and Best PracticesRecorded talk Industry Showcase (Papers) Kanchanjot Kaur Phokela Accenture, Samarth Sikand Accenture Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India Media Attached |
15:40 - 17:40 | SATE - Software Engineering at the Era of LLMsSATE - Software Engineering at the Era of LLMs at Room FR Chair(s): Xin Xia Huawei Technologies | ||
15:40 40mTalk | Is State-of-the-Art LLM A Silver Bullet to Automated Software Engineering? SATE - Software Engineering at the Era of LLMs Xing Hu Zhejiang University | ||
16:20 40mTalk | In the Era of AI and LLMs: how to test and robustify Machine-Learning software SATE - Software Engineering at the Era of LLMs Yves Le Traon University of Luxembourg, Luxembourg | ||
17:00 40mTalk | Software Development with Large Language Models SATE - Software Engineering at the Era of LLMs Cuiyun Gao Harbin Institute of Technology |
Fri 15 SepDisplayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change
08:30 - 10:00 | |||
08:30 90mTalk | Social, Legal, Ethical, Empathetic and Cultural Requirements: from Elicitation to Verification Tutorials Sinem Getir Yaman University of York, UK, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Beverley Townsend University of York File Attached |
08:30 - 10:00 | |||
08:30 90mTalk | Refinery: Model Generation with Refinement Tutorials Oszkár Semeráth Budapest University of Technology and Economics, Kristóf Marussy Budapest University of Technology and Economics, Daniel Varro Linköping University / McGill University |
09:00 - 10:00 | |||
09:00 60mKeynote | On the Soundness of Android Static Analysis [Workshop] A-Mobile Jordan Samhi CISPA Helmholtz Center for Information Security Media Attached |
09:00 - 10:00 | |||
09:00 60mTalk | Present to Future: Forging the Future of Quantum Software Testing [Workshop] A-TEST Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University File Attached |
10:30 - 12:00 | |||
10:30 90mTalk | Social, Legal, Ethical, Empathetic and Cultural Requirements: from Elicitation to Verification Tutorials Sinem Getir Yaman University of York, UK, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Beverley Townsend University of York File Attached |
10:30 - 11:30 | |||
10:30 60mKeynote | Linking Static Analysis Warnings of Android Apps with App User Reviews [Workshop] A-Mobile Lili Wei McGill University |
10:30 - 12:00 | |||
10:30 30mTalk | Evaluating the Effectiveness of Neuroevolution for Automated GUI-Based Software Testing [Workshop] A-TEST Daniel Zimmermann FZI Research Center for Information Technology, Patrick Deubel FZI Research Center for Information Technology, Anne Koziolek Karlsruhe Institute of Technology File Attached | ||
11:00 30mTalk | Automated Test Case Generation for Service Composition from Event Logs [Workshop] A-TEST | ||
11:30 30mTalk | Exploring Android Apps Using Motif ActionsRecorded talk [Workshop] A-TEST Media Attached File Attached |
11:30 - 12:00 | Papers Presentation[Workshop] A-Mobile at Room FR Chair(s): Ting Zhang Singapore Management University | ||
11:30 10mTalk | Ecological Impact of Native versus Cross-Platform Mobile Apps: a Preliminary Study [Workshop] A-Mobile Vincent Frattaroli Inside App, Olivier Le Goaër LIUPPA, Université de Pau et des Pays de l'Adour, Olivier Philippot Greenspector Media Attached File Attached | ||
11:40 10mTalk | Cross-platform mobile app development: the IscteSpots experience [Workshop] A-Mobile Joao Carlos Cambaia Gomes de Almeida , Fernando Brito e Abreu ISCTE-IUL, Duarte Almeida Iscte - Instituto Universitário de Lisboa | ||
11:50 10mTalk | Detecting Temporal Inconsistency in Biased Datasets for Android Malware Detection [Workshop] A-Mobile Haonan Hu Southern University of Science and Technology, Yue Liu , Yanjie Zhao Monash Univerisity, Yonghui Liu Monash University, Xiaoyu Sun Australian National University, Australia, Kla Tantithamthavorn Monash University, Li Li Beihang University |
13:30 - 15:00 | |||
13:30 90mTutorial | Collaborative Analysis and Verification of C Programs with Frama-C Tutorials Frederic Loulergue Université d'Orléans |
13:30 - 15:00 | |||
13:30 30mTalk | Improving AFLGo’s directed fuzzing by considering indirect function calls [Workshop] A-TEST Fabian Jezuita Fraunhofer Institute for Open Communication Systems | ||
14:00 30mTalk | Static Test Case Prioritization strategies for Grammar-based Testing [Workshop] A-TEST Moeketsi Raselimo Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin, Bernd Fischer Stellenbosch University | ||
14:30 30mPaper | Test Case Recommendations with Distributed Representation of Code Syntactic FeaturesRecorded talk [Workshop] A-TEST Mosab Rezaei Northern Illinois University, Hamed Alhoori Dept. of Computer Science at the Northern Illinois University, Mona Rahimi Dept. of Computer Science at the Northern Illinois University DOI Authorizer link Media Attached |
15:30 - 17:00 | |||
15:30 90mTutorial | Collaborative Analysis and Verification of C Programs with Frama-C Tutorials Frederic Loulergue Université d'Orléans |
15:30 - 16:50 | |||
15:30 20mTalk | Continuous Domain Input Abstraction and Fault Detection Capability in Combinatorial Testing [Workshop] A-TEST File Attached | ||
15:50 20mTalk | GUI-Based Software Testing: An Automated Approach Using GPT-4 and Selenium WebDriver [Workshop] A-TEST Daniel Zimmermann FZI Research Center for Information Technology, Anne Koziolek Karlsruhe Institute of Technology File Attached | ||
16:10 20mTalk | Chouette: An Automated Cross-Platform UI Crawler for Improving App Quality [Workshop] A-TEST Terrence Wong Duolingo Pre-print | ||
16:30 20mTalk | An Empirical Study on the Adoption of Scripted GUI Testing for Android Apps [Workshop] A-TEST Pre-print |
Accepted Papers
Call for Papers
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2023 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:
- Requirements and Design
- requirements elicitation and management, traceability analysis;
- architecture and design;
- modeling and model-driven engineering;
- software product lines;
- component-based, service-oriented systems;
- OO/Aspect-oriented.
- Testing and Analysis
- regression, mutation, model-based testing;
- program analysis;
- program synthesis;
- program repairs.
- Tools and Processes
- release engineering and DevOps;
- configuration and release management;
- Agile processes.
- Maintenance and Evolution
- debugging and fault-localization;
- refactoring and reengineering;
- reverse engineering;
- software reuse;
- API design and management.
- Formal Aspects of Software Engineering
- formal methods, validation and verification;
- programming languages;
- specification languages, DSLs.
- AI and Software Engineering
- search-based software engineering;
- recommender systems;
- autonomous and self-adapting systems;
- AI for SE;
- SE for AI.
- Software Analytics
- mining software repositories;
- apps and app store analysis.
- Human Aspects of Software Engineering
- program comprehension;
- systematic reviews, code inspection;
- human-computer interface;
- software visualization;
- crowd-based software engineering;
- distributed and collaborative software engineering.
- Social Aspects of Software Engineering
- green and sustainable technologies;
- software economics;
- ethics in software engineering.
- Dependability, Safety, and Reliability
- privacy and security;
- reliability;
- safety;
- performance.
ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.
Submission Categories and Evaluation Criteria
We solicit submissions in two categories:
Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:
- clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
- articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
- show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.
Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:
- clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
- present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
- carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.
Papers in both categories should:
- discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
- provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
- include an adequate use of the English language, absence of major ambiguity, and with clearly readable figures and tables;
- adhere to the formatting instructions provided below.
New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.
Originality
Papers submitted to ASE 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2023. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.
To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.
Double-Anonymous Review Process
The ASE 2023 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
- Authors’ names and affiliated institution names must be omitted from the submission.
- All references to the author’s prior work should be in the third person.
- Authors are encouraged to title their submission differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.
Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.
Artifact Availability and Supplementary Material
We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.
Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:
Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2023 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.
ACM Policy on Research Involving Humans
If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects
It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.
Formatting and Submission Guidelines
Abstracts and papers must be submitted electronically through the ASE 2023 HotCRP submission site: https://ase2023.hotcrp.com/. All submissions must be in English.
For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interests. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.
All submissions must be in PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran}
without including the compsoc
or compsocconf
option).
Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.
The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs.
Accepted Papers
Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.
After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommended a change for clarity or accuracy with the paper content.
We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include, but are not limited to, Figshare and Zenodo.
If a submission is accepted, at least one author of the paper is required to register for ASE 2023 and present the paper.
Questions and Comments
If you have any further questions, please contact the PC chairs at cbird@microsoft.com and f.sarro@ucl.ac.uk .