ASE 2023
Mon 11 - Fri 15 September 2023 Kirchberg, Luxembourg
Dates
Tracks
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 11 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

08:30 - 10:00
08:30
30m
Social Event
Hello and Welcome (including brief introductions by the participants)
New Faculty Symposium

09:00
30m
Talk
Breakout1: what questions do you have
New Faculty Symposium

09:30
30m
Talk
Some Tips on Scoping a Research Agenda Before and After Tenure
New Faculty Symposium
Denys Poshyvanyk William & Mary
08:30 - 10:00
AI for SETutorials at Room UK*
08:30
90m
Talk
AI for SE: Neural Language Models, Few-Shot Learning, and Adapters for Source Code
Tutorials
Mohamad Khajezade , Iman Saberi University of British Columbia Okanagan, Fatemeh Hendijani Fard University of British Columbia
08:45 - 09:00
08:45 - 09:00
Opening CPAchecker[Workshop] CPAchecker at Room PT
09:00 - 10:00
Invited TalkDoctoral Forum at Room A
09:00
60m
Talk
Invited Talk
Doctoral Forum
Lionel Briand University of Luxembourg; University of Ottawa
09:00 - 10:00
09:00
60m
Talk
An Exploration of Automated Software Testing, Verification, and Repair Strategies using ESBMC and ChatGPT
[Workshop] CPAchecker
Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil
Link to publication
10:30 - 12:00
Presentations 1Doctoral Forum at Room A
10:30
30m
Talk
Early Detection of Defects in Machine Learning Programs by Semi-Static Analysis
Doctoral Forum
Yiran Wang Linköping University
11:00
30m
Talk
Mutation Testing for supporting Smart Contract code inspection
Doctoral Forum
Morena Barboni University of Camerino
11:30
30m
Talk
Failure-based Testing: A Testing Paradigm in the Era of Large Language Models
Doctoral Forum
Li Tsz On The Hong Kong University of Science and Technology
10:30 - 12:00
Language-Based TestingTutorials at Room DE*
10:30
90m
Talk
Language-Based Testing
Tutorials
Andreas Zeller CISPA Helmholtz Center for Information Security
10:30 - 11:20
10:30
50m
Talk
Machine Learning Security in the Real World
[Workshop] ASYDE
Maxime Cordy University of Luxembourg, Luxembourg
10:30 - 12:00
Latest Analysis Techniques around CPAchecker[Workshop] CPAchecker at Room PT
10:30
20m
Talk
Can ChatGPT Support CPAchecker with Useful Loop Invariants?
[Workshop] CPAchecker
Cedric Richter Carl von Ossietzky Universität Oldenburg / University of Oldenburg
10:50
20m
Talk
CPA-DF: A Tool for Configurable Interval Analysis to Boost Program Verification
[Workshop] CPAchecker
Po-Chun Chien LMU Munich
Pre-print Media Attached File Attached
11:10
20m
Talk
A Unifying Approach for Control-Flow-Based Loop Abstraction
[Workshop] CPAchecker
Link to publication File Attached
11:30
20m
Talk
Backward Bounded Model Checking in CPAchecker
[Workshop] CPAchecker
Bas Laarakker University of Amsterdam
10:30 - 12:00
10:30
30m
Talk
(a) Community service; (b) The Chinese Experience
New Faculty Symposium
Dan Hao Peking University
11:00
30m
Talk
Career advice to young faculty from an ex-department chair
New Faculty Symposium
Tevfik Bultan University of California at Santa Barbara
11:30
30m
Talk
Challenges in teaching software engineering classes
New Faculty Symposium
Darko Marinov University of Illinois at Urbana-Champaign
10:30 - 12:00
AI for SETutorials at Room UK*
10:30
90m
Talk
AI for SE: Neural Language Models, Few-Shot Learning, and Adapters for Source Code
Tutorials
Mohamad Khajezade , Iman Saberi University of British Columbia Okanagan, Fatemeh Hendijani Fard University of British Columbia
11:20 - 12:00
Session 1: AI and Intelligent Systems[Workshop] ASYDE at Room FR
Chair(s): Gianluca Filippone University of L'Aquila, Italy
11:20
20m
Talk
Exploring Early Adopters' Perceptions of ChatGPT as a Code Generation Tool
[Workshop] ASYDE
Gian Luca Scoccia Gran Sasso Science Institute
Pre-print
11:40
20m
Talk
Automated Negotiation - Preliminary results of a systematic mapping study
[Workshop] ASYDE
Mashal Afzal Memon University of L’Aquila, Italy, Gian Luca Scoccia Gran Sasso Science Institute, Marco Autili University of L'Aquila, Italy
Pre-print File Attached
13:30 - 15:00
Presentations 2Doctoral Forum at Room A
13:30
30m
Talk
Deferring Partial Analysis Execution for Soundness
Doctoral Forum
14:00
30m
Talk
Improve the Performance of Large Language Models on Code Generation
Doctoral Forum
Jinhao Dong Peking University
14:30
30m
Talk
Analysis and Tool-Support for Scalable and Reliable Imperative Deep Learning Programs
Doctoral Forum
Tatiana Castro Vélez City University of New York (CUNY) Graduate Center
13:30 - 15:00
13:30
90m
Talk
Dynamically Analyzing Python Programs with DynaPyt
Tutorials
Aryaz Eghbali University of Stuttgart, Michael Pradel University of Stuttgart
13:30 - 14:20
13:30
50m
Talk
Human-centred SE & CS in the age of ‘generative AI’
[Workshop] HCSE-CS
John Grundy Monash University
13:30 - 14:30
13:30
60m
Talk
Software Model Checking: 20 Years and Beyond
[Workshop] CPAchecker
Dirk Beyer LMU Munich
DOI Media Attached
13:30 - 15:00
13:30
30m
Talk
Finding your motivation in your academic career
New Faculty Symposium
14:00
30m
Talk
The new faculty experience
New Faculty Symposium
Kevin Moran George Mason University
14:30
30m
Talk
Two dozen tips (from around the world)
New Faculty Symposium
Tim Menzies North Carolina State University
13:30 - 15:00
QuantumSETutorials at Room UK*
13:30
90m
Talk
An Introduction to Quantum Software Engineering
Tutorials
Jianjun Zhao Kyushu University
13:40 - 15:00
Session 2: Prioritization and Optimization[Workshop] ASYDE at Room FR
Chair(s): Gian Luca Scoccia University of L'Aquila
13:40
20m
Talk
ICO: A Platform for Optimizing Highly Configurable Systems
[Workshop] ASYDE
Edouard Guegain Université de Lille, Amir Taherkordi University of Oslo, Clément Quinton Université de Lille
14:00
30m
Talk
Test Case Prioritization based on Neural Network Classification with Artifacts Traceability
[Workshop] ASYDE
Ioana-Claudia Rotaru Babes-Bolyai University, Cluj-Napoca, Romania, Andreea Vescan Babes-Bolyai University
Pre-print File Attached
14:30
30m
Talk
Neural Network-based Test Case Prioritization in Continuous Integration
[Workshop] ASYDE
Andreea Vescan Babes-Bolyai University, Radu Găceanu Babes-Bolyai University, Cluj-Napoca, Romania, Arnold Szederjesi Babes-Bolyai University, Cluj-Napoca, Romania
Pre-print File Attached
14:20 - 15:00
HCSE-CS Session 1[Workshop] HCSE-CS at Room HU
14:20
20m
Talk
Towards Developer-Centered Secure Coding Training
[Workshop] HCSE-CS
Vladislav Pikulin Monash University, Daiki Kubo Monash University, Kaveesha Nissanka Monash University, Sadeeptha Bandara Monash University, Muhammad Aiman Shamsiemon Monash University, Arissha Yasmin Monash University, Asangi Jayatilaka University of Adelaide, Anuradha Madugalla Monash University, Australia, Tanjila Kanij Monash University
DOI
14:40
20m
Talk
DoS Attacks, Human Factors, and Evidence Extraction for the Industrial Internet of Things (IIoT) Paradigm
[Workshop] HCSE-CS
Sri Harsha Mekala Deakin University, Zubair Baig Deakin University, Adnan Anwar Deakin University, Naeem Syed Deakin University
DOI
14:30 - 15:00
Lightning Talks[Workshop] CPAchecker at Room PT
14:30
5m
Talk
Enhancing CPAchecker: A Framework for Distributed Analyses
[Workshop] CPAchecker
Matthias Kettl LMU Munich
14:35
5m
Talk
Scaling Formal Verification: Parallel Analysis of Functions
[Workshop] CPAchecker
George Granberry Chalmers University of Technology
14:40
5m
Talk
Dual Approximated Reachability Model Checking in CPAchecker
[Workshop] CPAchecker
Marek Jankola LMU Munich
14:45
5m
Talk
Current State of Memory-Safety Analysis in CPAchecker
[Workshop] CPAchecker
Daniel Baier Ludwig Maximilian University of Munich
14:50
5m
Talk
CPAdaemon: Progress and Demo
[Workshop] CPAchecker
Henrik Wachowitz LMU Munich
15:30 - 16:30
Speed-mentoring sessionDoctoral Forum at Room A
15:30
60m
Social Event
Speed-mentoring session
Doctoral Forum

15:30 - 17:00
15:30
90m
Talk
Dynamically Analyzing Python Programs with DynaPyt
Tutorials
Aryaz Eghbali University of Stuttgart, Michael Pradel University of Stuttgart
15:30 - 16:40
Session 3: Contract and Microservices[Workshop] ASYDE at Room FR
Chair(s): Gian Luca Scoccia University of L'Aquila
15:30
20m
Talk
Modelling Multi-Party Role-Based Access Control Policies for iContractML Smart Contracts
[Workshop] ASYDE
Issam Al-Azzoni Al Ain University of Science, United Arab Emirates, Reiko Heckel University of Leicester, United Kingdom
File Attached
15:50
20m
Talk
Exploring Automatic Specification Repair in Dafny Programs
[Workshop] ASYDE
Alexandre Abreu University of Porto & INESC TEC, Nuno Macedo University of Porto; INESC TEC, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC
File Attached
16:10
20m
Talk
Migrating from monoliths to microservices: enforcing correct coordination
[Workshop] ASYDE
Marco Autili University of L'Aquila, Italy, Gianluca Filippone University of L'Aquila, Italy, Massimo Tivoli University of L'Aquila
15:30 - 16:30
HCSE-CS Session 2[Workshop] HCSE-CS at Room HU
15:30
20m
Talk
Towards an Understanding of Developers’ Perceptions of Transparency in Software Development: A Preliminary Study
[Workshop] HCSE-CS
Humphrey Obie Monash University, Juliet Ukwella Durham College of Applied Arts & Technology, Kashumi Madampe Monash University, Australia, John Grundy Monash University, Mojtaba Shahin RMIT University, Australia
DOI Media Attached
15:50
20m
Talk
Universal Design for Website Authentication
[Workshop] HCSE-CS
Jacques Ophoff Abertay University, Karen Renaud University of Strathclyde
DOI
16:10
20m
Talk
A human-centric cybersecurity training tool for prioritising MSNAs
[Workshop] HCSE-CS
Vincent Depassier Andrés Bello National University, Romina Torres Adolfo Ibáñez University
DOI
15:30 - 17:00
Insights from Using CPAchecker[Workshop] CPAchecker at Room PT
15:30
20m
Talk
Timeout Prediction for Software Analyses
[Workshop] CPAchecker
Nicola Thoben University of Oldenburg
15:50
20m
Talk
Real-World Software Verification with CPAchecker
[Workshop] CPAchecker
Thomas Lemberger LMU Munich
16:10
20m
Talk
Using CPAchecker in Teaching
[Workshop] CPAchecker
Jan Haltermann University of Oldenburg
File Attached
16:30
20m
Talk
Handling Flaky Regression Tests in CPAchecker
[Workshop] CPAchecker
Philipp Wendler LMU Munich
15:30 - 16:00
15:30
30m
Talk
Breakout2: did we answer your questions?
New Faculty Symposium

16:00 - 17:00
16:00
60m
Panel
Final panel, wrap-up
New Faculty Symposium

17:00 - 17:30
Discussion and Closing[Workshop] CPAchecker at Room PT

Tue 12 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

07:30 - 17:00
RegistrationCatering
08:30 - 09:00
Opening Remarks Keynotes at Room C
09:00 - 10:00
KeynoteKeynotes at Room C
09:00
60m
Talk
Automating Software Evolution in the Linux Kernel
Keynotes
10:00 - 10:30
10:00
30m
Coffee break
Break
Catering

10:30 - 12:00
Cloud and Distributed Systems 1Research Papers / Journal-first Papers at Plenary Room 2
10:30
12m
Talk
Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System
Research Papers
Jun Huang Anhui University of Technology, Yang Yang Anhui University of Technology, Hang Yu Ant Group, Jianguo Li Ant Group, Xiao Zheng Anhui University of Technology
10:42
12m
Talk
Dynamic Graph Neural Networks-based Alert Link Prediction for Online Service Systems
Research Papers
Yiru Chen Fudan University, Chenxi Zhang Fudan University, Zhen Dong Fudan University, China, Dingyu Yang Alibaba Group, Xin Peng Fudan University, Jiayu Ou Alibaba Group, Hong Yang Fudan University, Zheshun Wu Alibaba Group, Xiaojun Qu Alibaba Group, Wei Li Alibaba Group
10:54
12m
Talk
A Model-based Mode-Switching-Framework based on Security Vulnerability Scores
Journal-first Papers
Michael Riegler Johannes Kepler University Linz, Johannes Sametinger Johannes Kepler University Linz, Michael Vierhauser University of Innsbruck, Manuel Wimmer JKU Linz
Link to publication DOI File Attached
11:06
12m
Talk
Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion
Research Papers
Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong
Pre-print
11:18
12m
Talk
Vicious Cycles in Distributed Software SystemsRecorded talk
Research Papers
Shangshu Qian Purdue University, Wen Fan Purdue University, Lin Tan Purdue University, Yongle Zhang Purdue University
Pre-print Media Attached
11:30
12m
Talk
Scene-Driven Exploration and GUI Modeling for Android AppsRecorded talk
Research Papers
Xiangyu Zhang , Lingling Fan Nankai University, Sen Chen Tianjin University, Yucheng Su Alibaba Group, Boyuan Li Nankai University
Media Attached
10:30 - 12:00
Testing AI Systems 1NIER Track / Research Papers at Room C
Chair(s): Leonardo Mariani University of Milano-Bicocca
10:30
12m
Talk
Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting
Research Papers
Li Tsz On The Hong Kong University of Science and Technology, Wenxi Zong Northeastern University, Yibo Wang Northeastern University, Haoye Tian University of Luxembourg, Ying Wang Northeastern University, Shing-Chi Cheung Hong Kong University of Science and Technology, Jeffrey Kramer Imperial College London
Pre-print
10:42
12m
Talk
SOCRATEST- Towards Autonomous Testing Agents via Conversational Large Language Models
NIER Track
Robert Feldt Chalmers University of Technology, Sweden, Sungmin Kang KAIST, Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo KAIST
Pre-print File Attached
10:54
12m
Research paper
Semantic Data Augmentation for Deep Learning Testing using Generative AI
NIER Track
sondess missaoui University of York, Simos Gerasimou University of York, Nicholas Matragkas Université Paris-Saclay, CEA, List.
File Attached
11:06
12m
Talk
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Research Papers
Zhen Li Huazhong University of Science and Technology, Ruqian Zhang Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Ning Wang Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology, Shouhuai Xu University of Colorado Colorado Springs, Chen Chen University of Central Florida, Hai Jin Huazhong University of Science and Technology, Yating Li Huazhong University of Science and Technology
Pre-print
11:18
12m
Talk
The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models
Research Papers
Xin Zhou Singapore Management University, Singapore, Kisub Kim Singapore Management University, Singapore, Bowen Xu North Carolina State University, Jiakun Liu Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University
Pre-print
11:30
12m
Talk
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature SpaceRecorded talk
Research Papers
haibin zheng Zhejiang University of Technology, Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Haibo Jin Zhejiang University of Techonology
Pre-print Media Attached
10:30 - 12:00
Infrastructure, Build, and LogsResearch Papers / Industry Showcase (Papers) / NIER Track / Journal-first Papers at Room D
Chair(s): Fatemeh Hendijani Fard University of British Columbia, Arie van Deursen Delft University of Technology
10:30
12m
Talk
Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages
Research Papers
Zhenhao Li Concordia University, An Ran Chen University of Alberta, Xing Hu Zhejiang University, Xin Xia Huawei Technologies, Tse-Hsun (Peter) Chen Concordia University, Weiyi Shang University of Waterloo
Pre-print
10:42
12m
Talk
Log Parsing: How Far Can ChatGPT Go?
NIER Track
Van-Hoang Le The University of Newcastle, Hongyu Zhang Chongqing University
Pre-print
10:54
12m
Talk
On the usage, co-usage and migration of CI/CD tools: a qualitative analysis
Journal-first Papers
Pooya Rostami Mazrae University of Mons, Tom Mens University of Mons
11:06
12m
Talk
Predicting Compilation Resources for Adaptive Build in an Industrial Setting
Industry Showcase (Papers)
Junhao Hu Peking University, Chaozheng Wang The Chinese University of Hong Kong, Hailiang Huang Tencent Inc., Huang Luo Tencent Inc., Yu Jin Tencent Inc., Yuetang Deng Tencent, Tao Xie Peking University
11:30
12m
Talk
What Quality Aspects Influence the Adoption of Docker Images?
Journal-first Papers
Giovanni Rosa University of Molise, Simone Scalabrino University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana, Rocco Oliveto University of Molise
Link to publication Media Attached
11:42
12m
Talk
LogOnline: A Semi-supervised Log-based Anomaly Detector Aided with Online Learning MechanismRecorded talk
Research Papers
Xuheng Wang Tsinghua University, Jiaxing Song Tsinghua University, Xu Zhang Microsoft Research, Junshu Tang Shanghai Jiao Tong University, Weihe Gao Tsinghua University, Qingwei Lin Microsoft, Xuheng Wang Tsinghua University
Link to publication DOI Media Attached
10:30 - 12:00
Open Source and Software Ecosystems 1Research Papers / Tool Demonstrations at Room E
Chair(s): Denys Poshyvanyk William & Mary
10:30
12m
Talk
An Empirical Study of Malicious Code In PyPI Ecosystem
Research Papers
Wenbo Guo School of Cyber Science and Engineering, Sichuan University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Cheng Huang School of Cyber Science and Engineering, Sichuan University, Yong Fang School of Cyber Science and Engineering, Sichuan University, Yang Liu Nanyang Technological University
Pre-print
10:42
12m
Talk
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem
Research Papers
Weiwei Xu Peking University, Hao He Carnegie Mellon University, Kai Gao Peking University, Minghui Zhou Peking University
Pre-print
10:54
12m
Talk
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem
Research Papers
Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Sen Chen Tianjin University, Zhengzi Xu Nanyang Technological University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University
11:06
12m
Talk
Bus Factor Explorer
Tool Demonstrations
Egor Klimov JetBrains Research, Muhammad Umair Ahmed Bilkent University, Nikolai Sviridov JetBrains Research, Pouria Derakhshanfar JetBrains Research, Eray Tüzün Bilkent University, Vladimir Kovalenko JetBrains Research
Media Attached
11:30
12m
Talk
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery
Research Papers
Chenyuan Zhang Xiamen University, Yanlin Wang Sun Yat-sen University, Zhao Wei Tencent, Yong Xu Tencent, Juhong Wang Tencent, Hui Li Xiamen University, Rongrong Ji Xiamen University
Pre-print Media Attached
11:42
12m
Talk
Fork Entropy: Assessing the Diversity of Open Source Software Projects' ForksRecorded talk
Research Papers
Liang Wang Nanjing University, Zhiwen Zheng State Key Laboratory for Novel Software Technology, Nanjing University, Xiangchen Wu State Key Laboratory for Novel Software Technology, Nanjing University, Baihui Sang State Key Laboratory for Novel Software Technology, Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University
Media Attached
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:30 - 15:00
Cloud and Distributed Systems 2Research Papers / Tool Demonstrations / Journal-first Papers / Industry Showcase (Papers) at Plenary Room 2
Chair(s): Tim Menzies North Carolina State University
13:30
12m
Talk
EXPRESS 2.0: An Intelligent Service Management Framework for AIoT Systems in the Edge
Tool Demonstrations
Jia Xu School of Computer Science and Technology, Anhui University, Xiao Liu School of Information Technology, Deakin University, Wuzhen Pan School of Computer Science and Technology, Anhui University, Xuejun Li School of Computer Science and Technology, Anhui University, Aiting Yao School of Computer Science and Technology, Anhui University, Yun Yang Swinburne University of Technology
Media Attached
13:42
12m
Talk
Prism: Revealing Hidden Functional Clusters of Massive Instances in Cloud Systems
Research Papers
Jinyang Liu The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Cong Feng Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Zengyin Yang Computing and Networking Innovation Lab, Huawei Cloud Computing Technology Co., Ltd, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong
Pre-print File Attached
13:54
12m
Talk
FaaSLight: General Application-Level Cold-Start Latency Optimization for Function-as-a-Service in Serverless Computing
Journal-first Papers
Xuanzhe Liu Peking University, Jinfeng Wen Peking University, Zhenpeng Chen University College London, Ding Li Peking University, Junkai Chen Peking University, China, Yi Liu Peking University, Haoyu Wang Huazhong University of Science and Technology, Xin Jin Peking University
File Attached
14:06
12m
Talk
RocketHA: A High Availability Design Paradigm for Distributed Log-Based Storage System
Industry Showcase (Papers)
Juntao Ji Alibaba Cloud Computing Co. Ltd., Rongtong Jin Alibaba Cloud Computing Co. Ltd., Yubao Fu Alibaba Cloud Computing Co. Ltd., Yinyou Gu Alibaba Cloud Computing Co. Ltd., Tsung-han Tsai Alibaba Cloud Computing Co. Ltd., Qingshan Lin Alibaba Cloud Computing Co. Ltd.
14:18
12m
Talk
Rise of Distributed Deep Learning Training in the Big Model Era: From a Software Engineering Perspective
Journal-first Papers
Xuanzhe Liu Peking University, Diandian Gu Peking University, Zhenpeng Chen University College London, Jinfeng Wen Peking University, Zili Zhang Peking University, Yun Ma Peking University, Haoyu Wang Huazhong University of Science and Technology, Xin Jin Peking University
Link to publication
14:30
12m
Talk
ConfTainter: Static Taint Analysis For Configuration OptionsRecorded talk
Research Papers
Teng Wang National University of Defense Technology, Haochen He National University of Defense Technology, Xiaodong Liu National University of Defense Technology, Shanshan Li National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Yu Jiang Tsinghua University, Qing Liao Harbin Institute of Technology, Wang Li National University of Defense Technology
Pre-print Media Attached
13:30 - 15:00
Testing AI Systems 2NIER Track / Journal-first Papers / Research Papers at Room C
Chair(s): Lwin Khin Shar Singapore Management University
13:30
12m
Talk
ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems
Research Papers
Shengyou Hu Nanjing University, Huayao Wu Nanjing University, Peng Wang Fudan University, Jing Chang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Yongjun Tu Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xiu Jiang Guangdong OPPO Mobile Telecommunications Corp.,Ltd., Xintao Niu Nanjing University, Changhai Nie Nanjing University
Pre-print Media Attached File Attached
13:42
12m
Talk
Automating Bias Testing of LLMs
NIER Track
Sergio Morales Universitat Oberta de Catalunya, Robert Clarisó Universitat Oberta de Catalunya, Jordi Cabot Luxembourg Institute of Science and Technology
Pre-print File Attached
13:54
12m
Talk
MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial Attack
NIER Track
Qiang Hu University of Luxembourg, Yuejun GUo Luxembourg Institute of Science and Technology, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
File Attached
14:06
12m
Research paper
Generative Model-Based Testing on Decision-Making Policies
Research Papers
Zhuo Li Kyushu University, Xiongfei Wu Kyushu University, Derui Zhu Technical University of Munich, Mingfei Cheng Singapore Management University, Siyuan Chen Kyushu University, Fuyuan Zhang Kyushu University, Xiaofei Xie Singapore Management University, Lei Ma University of Alberta, Jianjun Zhao Kyushu University
File Attached
14:18
12m
Talk
Simulator-based Explanation and Debugging of Hazard-triggering Events in DNN-based Safety-critical Systems
Journal-first Papers
Hazem FAHMY University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa, Thomas Stifter IEE S.A.
Link to publication DOI Pre-print File Attached
14:30
12m
Talk
Are We Ready to Embrace Generative AI for Software Q&A?
NIER Track
Bowen Xu North Carolina State University, Thanh-Dat Nguyen University of Melbourne, Le-Cong Thanh The University of Melbourne, Thong Hoang CSIRO's Data61, Jiakun Liu Singapore Management University, Kisub Kim Singapore Management University, Singapore, Chen GONG University of Virginia, Changan Niu Software Institute, Nanjing University, Chenyu Wang Singapore Management University, Xuan-Bach D. Le University of Melbourne, David Lo Singapore Management University
13:30 - 15:00
Smart Contracts, Blockchain, Energy efficiency, and green softwareResearch Papers / NIER Track / Industry Showcase (Papers) / Tool Demonstrations / Journal-first Papers at Room D
13:30
12m
Talk
An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the Edge
Research Papers
Alessandro Tundo University of Milano-Bicocca, Marco Mobilio University of Milano Bicocca, Shashikant Ilager Vienna University of Technology, Ivona Brandic Vienna University of Technology, Ezio Bartocci TU Wien, Leonardo Mariani University of Milano-Bicocca
Pre-print File Attached
13:42
12m
Talk
Code Cloning in Smart Contracts on the Ethereum Platform: An Extended Replication Study
Journal-first Papers
Faizan Khan Plotly Technologies Inc., Istvan David McMaster University, Shane McIntosh University of Waterloo, Daniel Varro Linköping University / McGill University
Media Attached
13:54
12m
Talk
SmartCoCo: Checking Comment-code Inconsistency in Smart Contracts via Constraint Propagation and Binding
Research Papers
Sicheng Hao Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Xiaohui Liu Sun Yat-sen University
DOI File Attached
14:06
12m
Talk
RJoules: An Energy Measurement Tool for R
Tool Demonstrations
Rajrupa Chattaraj Indian Institute of Technology Tirupati, India, Sridhar Chimalakonda IIT Tirupati
Pre-print Media Attached File Attached
14:18
12m
Talk
Assessing the Impact of Refactoring Energy-Inefficient Code Patterns on Software Sustainability: An Industry Case StudyRecorded talk
Industry Showcase (Papers)
Rohit Mehra Accenture Labs, Priyavanshi Pathania Accenture Labs, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture, Adam P. Burden Accenture
Media Attached
14:30
12m
Talk
Green AI Quotient : Assessing Greenness of AI-based software and the way forwardRecorded talk
Industry Showcase (Papers)
Samarth Sikand Accenture Labs, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture
Media Attached
14:42
12m
Talk
Towards a Knowledge Base of Common Sustainability Weaknesses in Green Software DevelopmentRecorded talk
NIER Track
Priyavanshi Pathania Accenture Labs, Rohit Mehra Accenture Labs, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture, Adam P. Burden Accenture
Media Attached
13:30 - 15:00
Vulnerability and Security 1Research Papers / Journal-first Papers at Room E
Chair(s): Fatemeh Hendijani Fard University of British Columbia
13:30
12m
Talk
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering
Research Papers
Wentao Liang Institute of Software, Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Tianyue Luo Institute of Software, Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences
File Attached
13:42
12m
Talk
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value FlowsACM Distinguished Paper
Research Papers
Yujiang Gui UNSW Sydney, Dongjie He UNSW, Jingling Xue UNSW
Pre-print File Attached
13:54
12m
Talk
Learning to Locate and Describe Vulnerabilities
Research Papers
Jian Zhang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xu Wang Beihang University, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University
14:06
12m
Talk
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Research Papers
Xin-Cheng Wen Harbin Institute of Technology, Xinchen Wang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Yang Liu Nanyang Technological University, Zhaoquan Gu Harbin Institute of Technology
14:18
12m
Talk
The Secret Life of Software Vulnerabilities: A Large-Scale Empirical Study
Journal-first Papers
Emanuele Iannone University of Salerno, Roberta Guadagni University of Salerno, Filomena Ferrucci University of Salerno, Andrea De Lucia University of Salerno, Fabio Palomba University of Salerno
Link to publication DOI Pre-print Media Attached
14:30
12m
Talk
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices
Research Papers
Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Media Attached File Attached
15:00 - 15:30
15:00
30m
Coffee break
Break
Catering

15:30 - 17:00
15:30
12m
Talk
An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-trained Code Models
Research Papers
Jiaxing Liu Fudan University, Chaofeng Sha Fudan University, Xin Peng Fudan University
15:42
12m
Talk
CodeEditor: Learning to Edit Source Code with Pre-trained Models
Journal-first Papers
Jia Li Peking University, Ge Li Peking University, Li Zhuo , Zhi Jin Peking University, Xing Hu Zhejiang University, Kechi Zhang Peking University, China, Zhiyi Fu Peking University
Link to publication
15:54
12m
Talk
CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation
Research Papers
Mingwei Liu Fudan University, Tianyong Yang Fudan University, Yiling Lou Fudan University, Xueying Du Fudan University, Ying Wang Northeastern University, Xin Peng Fudan University
Pre-print Media Attached
16:06
12m
Talk
ArduinoProg: Towards Automating Arduino Programming
Tool Demonstrations
Imam Nur Bani Yusuf Singapore Management University, Singapore, Diyanah Binte Abdul Jamal Singapore Management University, Lingxiao Jiang Singapore Management University
Pre-print Media Attached
16:18
12m
Talk
Domain Adaptive Code Completion via Language Models and Decoupled Domain DatabasesACM Distinguished PaperRecorded talk
Research Papers
Ze Tang Software Institute, Nanjing University, Jidong Ge Nanjing University, Shangqing Liu Nanyang Technological University, Tingwei Zhu Nanjing University, Tongtong Xu Huawei, Liguo Huang Southern Methodist University, Bin Luo Nanjing University
Pre-print Media Attached File Attached
15:30 - 17:00
Testing AI Systems 3Journal-first Papers / Research Papers / Industry Showcase (Papers) / NIER Track at Room C
Chair(s): Mike Papadakis University of Luxembourg, Luxembourg
15:30
12m
Research paper
Causality-Aided Trade-off Analysis for Machine Learning Fairness
Research Papers
Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Shuai Wang Hong Kong University of Science and Technology, Yanhui Li Nanjing University
Pre-print
15:42
12m
Talk
Towards Self-Adaptive Machine Learning-Enabled Systems Through QoS-Aware Model Switching
NIER Track
Shubham Kulkarni IIIT Hyderabad, Arya Marda IIIT Hyderabad, Karthik Vaidhyanathan IIIT Hyderabad
Pre-print
15:54
12m
Talk
Challenges of Accurate and Efficient AutoML
Industry Showcase (Papers)
Swarnava Dey TCS Research, Avik Ghose TCS Research, Soumik Das Tata Consultancy Services Ltd.
File Attached
16:06
12m
Talk
Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks
Research Papers
Tamal Mondal IIT Hyderabad, Scott Barnett Deakin University, Akash Lal Microsoft Research, Jyothi Vedurada IIT Hyderabad
Pre-print Media Attached
16:18
12m
Talk
Evaluating Pre-Trained Models for User Feedback Analysis in Software Engineering: A Study on Classification of App-Reviews
Journal-first Papers
Mohammad Abdul Hadi University of British Columbia, Fatemeh Hendijani Fard University of British Columbia
File Attached
16:30
12m
Talk
Evolve the Model universe of a System UniverseRecorded talk
NIER Track
Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University
Media Attached
15:30 - 17:00
15:30
12m
Talk
Adaptive REST API Testing with Reinforcement Learning
Research Papers
Myeongsoo Kim Georgia Institute of Technology, Saurabh Sinha IBM Research, Alessandro Orso Georgia Institute of Technology
Pre-print File Attached
15:42
12m
Talk
Zero-Config Fuzzing for Microservices
Industry Showcase (Papers)
Wei Wang Google, Inc., Andrei Benea Google, Franjo Ivančić Google
Pre-print File Attached
15:54
12m
Talk
Automatic Extraction of Security-Rich Dataflow Diagrams for Microservice Applications written in Java
Journal-first Papers
Simon Schneider Hamburg University of Technology, Riccardo Scandariato Hamburg University of Technology
16:06
12m
Talk
Increasing the Responsiveness of Web Applications by Introducing Lazy Loading
Research Papers
Alexi Turcotte Northeastern University, Satyajit Gokhale Northeastern University, Frank Tip Northeastern University
16:18
12m
Talk
SLocator: Localizing the Origin of SQL Queries in Database-Backed Web ApplicationsRecorded talk
Journal-first Papers
Wei Liu Concordia University, Montreal, Canada, Tse-Hsun (Peter) Chen Concordia University
Media Attached
16:30
12m
Talk
Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI ChainRecorded talk
Research Papers
Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhenyu Wan Jiangxi Normal University, Zhenchang Xing , Changjing Wang Jiangxi Normal University, Jieshan Chen CSIRO's Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61
Media Attached
15:30 - 17:00
Testing Tools and TechniquesNIER Track / Research Papers / Tool Demonstrations at Room E
Chair(s): Tim Menzies North Carolina State University
15:30
12m
Talk
Modeling Programmer Attention as Scanpath Prediction
NIER Track
Aakash Bansal University of Notre Dame, Chia-Yi Su University of Notre Dame, Zachary Karas Vanderbilt University, Yifan Zhang Vanderbilt University, Yu Huang Vanderbilt University, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame
15:42
12m
Talk
On Automated Assistants for Software Development: The Role of LLMs
NIER Track
Mira Leung University of British Columbia, Gail Murphy University of British Columbia
Pre-print File Attached
15:54
12m
Talk
SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart Contracts
Tool Demonstrations
Monika di Angelo TU Wien, Thomas Durieux TU Delft, João F. Ferreira INESC-ID and IST, University of Lisbon, Gernot Salzer TU Wien
Pre-print File Attached
16:06
12m
Talk
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection
Research Papers
Yintong Huo The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Pinjia He Chinese University of Hong Kong, Shenzhen, Zifan Xie Huazhong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong
Pre-print
16:18
12m
Talk
Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers
Research Papers
Yi Liu Nanyang Technological University, Yuekang Li University of New South Wales, Gelei Deng Nanyang Technological University, Felix Juefei-Xu Meta AI, Yao Du University of California, Irvine, Cen Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yeting Li Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lei Ma University of Alberta, Yang Liu Nanyang Technological University, Yuekang Li University of New South Wales
16:30
12m
Talk
Software Entity Recognition with Noise-Robust LearningRecorded talk
Research Papers
Tai Nguyen University of Pennsylvania, Yifeng Di Purdue University, Joohan Lee University of Southern California, Muhao Chen University of Southern California, Tianyi Zhang Purdue University
Pre-print Media Attached File Attached

Wed 13 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

08:00 - 17:00
RegistrationCatering
08:30 - 09:00
MIP awardsMost Influential Papers (MIP) at Room C
Chair(s): Myra Cohen Iowa State University
08:30
12m
Talk
SMT-Based Bounded Model Checking for Embedded ANSI-C Software
Most Influential Papers (MIP)
Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil, Bernd Fischer Stellenbosch University, Joao Marques-Silva IRIT, CNRS, Toulouse
Link to publication File Attached
08:42
12m
Talk
Spectrum-Based Multiple Fault Localization
Most Influential Papers (MIP)
Rui Abreu Faculty of Engineering, University of Porto, Peter Zoeteweij , Arjan J.C. van Gemund
10:00 - 10:30
10:00
30m
Coffee break
Break
Catering

10:00 - 10:55
Industry Challenge (Competition)Industry Challenge (Competition) at Room FR
Chair(s): Kui Liu Huawei
10:00
10m
Talk
Introduction of the Industry Challenge Track
Industry Challenge (Competition)
Kui Liu Huawei
10:10
15m
Talk
ACWRecommender: A Tool for Validating Actionable Warnings with Weak Supervision
Industry Challenge (Competition)
Zhipeng Xue , Zhipeng Gao Shanghai Institute for Advanced Study of Zhejiang University, Xing Hu Zhejiang University, Shanping Li
10:25
15m
Talk
An Automated and Flexible Multilingual Bug-Fix Dataset Construction System
Industry Challenge (Competition)
Wenkang Zhong Nanjing University, Chuanyi Li Nanjing University, Yunfei Zhang Nanjing University, Ziwen Ge Nanjing University, Jingyu Wang Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University
10:40
15m
Talk
A Closer Look at Different Difficulty Levels Code Generation Abilities of ChatGPT
Industry Challenge (Competition)
Dapeng Yan , Zhipeng Gao Shanghai Institute for Advanced Study of Zhejiang University, Zhiming Liu Southwest University
Pre-print
10:30 - 12:00
Code Quality and Code SmellsTool Demonstrations / Journal-first Papers / Research Papers at Plenary Room 2
Chair(s): Bernd Fischer Stellenbosch University
10:30
12m
Talk
Contextuality of Code Representation Learning
Research Papers
Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas
10:42
12m
Talk
On-the-fly Improving Performance of Deep Code Models via Input Denoising
Research Papers
Zhao Tian Tianjin University, Junjie Chen Tianjin University, Xiangyu Zhang Purdue University
Pre-print File Attached
10:54
12m
Talk
Using Deep Learning to Automatically Improve Code Readability
Research Papers
Antonio Vitale University of Molise, Italy, Valentina Piantadosi University of Molise, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise
Pre-print
11:06
12m
Talk
Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We?
Research Papers
Antonio Mastropaolo Università della Svizzera italiana, Massimiliano Di Penta University of Sannio, Italy, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
Pre-print File Attached
11:18
12m
Talk
How to Find Actionable Static Analysis Warnings: A Case Study with FindBugs
Journal-first Papers
Rahul Yedida , Hong Jin Kang UCLA, Huy Tu North Carolina State University, USA, Xueqi Yang NCSU, David Lo Singapore Management University, Tim Menzies North Carolina State University
Link to publication DOI Authorizer link Pre-print
11:30
12m
Talk
Polyglot Code Smell Detection for Infrastructure as Code with GLITCH
Tool Demonstrations
Nuno Saavedra INESC-ID and IST, University of Lisbon, João Gonçalves INESC-ID and IST, University of Lisbon, Miguel Henriques INESC-ID and IST, University of Lisbon, João F. Ferreira INESC-ID and IST, University of Lisbon, Alexandra Mendes Faculty of Engineering, University of Porto & INESC TEC
Pre-print File Attached
11:42
12m
Talk
Enhancing the defectiveness prediction of methods and classes via JIT
Journal-first Papers
Falessi Davide University of Rome Tor Vergata, Simone Mesiano Laureani University of Rome Tor Vergata, Jonida Çarka University of Rome Tor Vergata, Matteo Esposito University of Rome Tor Vergata, Daniel Alencar Da Costa University of Otago
Link to publication DOI File Attached
10:30 - 12:00
Program Repair 1Tool Demonstrations / NIER Track / Journal-first Papers / Research Papers at Room C
Chair(s): Arie van Deursen Delft University of Technology
10:30
12m
Talk
Adonis: Practical and Efficient Control Flow Recovery through OS-Level Traces
Journal-first Papers
Xuanzhe Liu Peking University, Chengxu Yang Peking University, Ding Li Peking University, Yuhan Zhou Peking University, Shaofei Li Peking University, Jiali Chen Peking University, Zhenpeng Chen University College London
10:42
12m
Talk
BUGSC++: A Highly Usable Real World Defect Benchmark for C/C++
Tool Demonstrations
Gabin An KAIST, Minhyuk Kwon Suresoft Technologies, Kyunghwa Choi Suresoft Technologies, Jooyong Yi UNIST (Ulsan National Institute of Science and Technology), Shin Yoo KAIST
Link to publication Pre-print File Attached
10:54
12m
Talk
Better patching using LLM prompting, via Self-Consistency
NIER Track
Toufique Ahmed University of California at Davis, Prem Devanbu University of California at Davis
Pre-print
11:06
12m
Talk
The Plastic Surgery Hypothesis in the Era of Large Language Models
Research Papers
Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Yifeng Ding University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print
11:18
12m
Research paper
GAMMA: Revisiting Template-based Automated Program Repair via Mask Prediction
Research Papers
Quanjun Zhang Nanjing University, Chunrong Fang Nanjing University, Tongke Zhang Nanjing University, Bowen Yu Nanjing University, Weisong Sun Nanjing University, Zhenyu Chen Nanjing University
Pre-print Media Attached
11:30
12m
Talk
ExpressAPR: Efficient Patch Validation for Java Automated Program Repair Systems
Tool Demonstrations
Yuan-An Xiao Peking University, Chenyang Yang Peking University, Bo Wang Beijing Jiaotong University, Yingfei Xiong Peking University
Media Attached File Attached
10:30 - 12:00
Program AnalysisResearch Papers / Tool Demonstrations / NIER Track / Journal-first Papers at Room D
Chair(s): Domenico Bianculli University of Luxembourg
10:30
12m
Talk
An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering
Research Papers
Prantik Chatterjee Indian Institute Of Technology Kanpur and MathWorks, Pankaj Kumar Kalita IIT Kanpur, Sumit Lahiri Indian Institute Of Technology Kanpur, Sujit Kumar Muduli IIT Kanpur, Vishal Singh Indian Institute of Technology Kanpur, Gourav Takhar Indian Institute of Technology Kanpur, Subhajit Roy IIT Kanpur
10:42
12m
Talk
Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis
Research Papers
Chenghang Shi SKLP, Institute of Computing Technology, CAS, Haofeng Li , Yulei Sui University of New South Wales, Sydney, Jie Lu SKLP, Institute of Computing Technology, CAS, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingling Xue UNSW
Pre-print File Attached
10:54
12m
Talk
NRAgo: Solving SMT(NRA) Formulas with Gradient-based Optimization
Tool Demonstrations
Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Kunhang Lv Institute of Software, Chinese Academy of Sciences, Pei Huang Stanford University, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yu Zhang Institute of Software, Chinese Academy of Sciences, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
File Attached
11:06
12m
Talk
Live Programming for Finite Model Finders
NIER Track
Allison Sullivan University of Texas at Arlington
Pre-print File Attached
11:18
12m
Talk
Towards Robustness of Deep Program Processing Models -- Detection, Estimation and Enhancement
Journal-first Papers
Huangzhao Zhang Peking University, Zhiyi Fu Peking University, Ge Li Peking University, Lei Ma University of Alberta, Zhehao Zhao Peking University, Hua'an Yang Peking University, Yizhe Sun Peking University, Yang Liu Nanyang Technological University, Zhi Jin Peking University
Link to publication DOI File Attached
11:30
12m
Talk
Precise Data-Driven Approximation for Program Analysis via FuzzingRecorded talk
Research Papers
Nikhil Parasaram University College London; ConsenSys Diligence, Earl T. Barr University College London; Google DeepMind, Sergey Mechtaev University College London, Marcel Böhme MPI-SP; Monash University
Pre-print Media Attached
11:42
12m
Talk
Contrastive Learning for API Aspect AnalysisRecorded talk
Research Papers
G. M. Shahariar Ahsanullah University of Science and Technology, Tahmid Hasan Bangladesh University of Engineering and Technology, Anindya Iqbal Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Gias Uddin York University, Canada
Pre-print Media Attached
10:30 - 12:00
Web Development 2Industry Showcase (Papers) / Research Papers / NIER Track / Journal-first Papers at Room E
Chair(s): Hadar Ziv University of California, Irvine
10:30
12m
Talk
Metamorphic Testing for Web System Security
Journal-first Papers
Nazanin Bayati Chaleshtari University of Ottawa, Fabrizio Pastore University of Luxembourg, Arda Goknil SINTEF Digital, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication DOI Pre-print
10:42
12m
Talk
JavaScript Dead Code Identification, Elimination, and Empirical Assessment
Journal-first Papers
Ivano Malavolta Vrije Universiteit Amsterdam, Kishan Nirghin Vrije Universiteit Amsterdam, Gian Luca Scoccia Gran Sasso Science Institute, Simone Romano University of Salerno, Salvatore Lombardi University of Basilicata, Giuseppe Scanniello University of Salerno, Patricia Lago Vrije Universiteit Amsterdam
File Attached
10:54
12m
Talk
PTdetector: An Automated JavaScript Front-end Library Detector
Research Papers
Xinyue Liu University at Buffalo, SUNY, Lukasz Ziarek University at Buffalo
Link to publication
11:06
12m
Talk
Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing
Research Papers
Shuyao Jiang The Chinese University of Hong Kong, Ruiying Zeng Fudan University, Zihao Rao Fudan University, Jiazhen Gu Chinese University of Hong Kong, Yangfan Zhou Fudan University, Michael Lyu The Chinese University of Hong Kong
Pre-print
11:18
12m
Talk
Dramatically Improving Design Reviews at Google
Industry Showcase (Papers)
Link to publication
11:30
12m
Talk
Characterizing Flaky Tests in Node.js ApplicationsRecorded talk
NIER Track
Xiaoning Chang Institute of Software, Chinese Academy of Sciences, Zheheng Liang Joint Laboratory on Cyberspace Security of China Southern Power Grid, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Zhenyue Long , Lei Cui Joint Laboratory on Cyberspace Security of China Southern Power Grid, Tao Huang Institute of Software Chinese Academy of Sciences
Media Attached
11:10 - 11:55
Industry Challenge (Competition)Industry Challenge (Competition) at Room FR
Chair(s): Kui Liu Huawei
11:10
15m
Talk
PreciseBugCollector: Extensible, Executable and Precise Bug-fix Collection
Industry Challenge (Competition)
He Ye Carnegie Mellon University, Zimin Chen KTH Royal Institute of Technology, Claire Le Goues Carnegie Mellon University
Pre-print
11:25
15m
Talk
BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining
Industry Challenge (Competition)
Xuezhi Song Fudan University, Yijian Wu Fudan University, Junming Cao Fudan University, Bihuan Chen Fudan University, Yun Lin Shanghai Jiao Tong University, Zhengjie Lu Fudan University, Dingji Wang Fudan University, Xin Peng Fudan University
11:40
15m
Industry talk
Function-level Vulnerability Detection Through Fusing Multi-Modal KnowledgeRecorded talk
Industry Challenge (Competition)
Chao Ni Zhejiang University, Xinrong Guo School of Software Technology, Zhejiang University, Yan Zhu Zhejiang University, xiaodanxu , Xiaohu Yang Zhejiang University
Media Attached File Attached
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:30 - 15:00
Code SummarizationResearch Papers at Plenary Room 2
Chair(s): Ray Buse Google
13:30
12m
Talk
Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models
Research Papers
Liran Wang Beihang University, Xunzhu Tang University of Luxembourg, Yichen He Beihang University, Changyu Ren Beihang University, Shuhua Shi Beihang University, Chaoran Yan Beihang University, Zhoujun Li Beihang University
Pre-print File Attached
13:42
12m
Talk
From Commit Message Generation to History-Aware Commit Message Completion
Research Papers
Aleksandra Eliseeva JetBrains Research, Yaroslav Sokolov JetBrains, Egor Bogomolov JetBrains Research, Yaroslav Golubev JetBrains Research, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Timofey Bryksin JetBrains Research
Pre-print File Attached
13:54
12m
Talk
Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis
Research Papers
Jingbo Lu University of New South Wales, Dongjie He UNSW, Wei Li University of New South Wales, Yaoqing Gao Huawei Toronto Research Center, Jingling Xue UNSW
Pre-print File Attached
14:06
12m
Talk
What Makes Good In-context Demonstrations for Code Intelligence Tasks with LLMs?
Research Papers
Shuzheng Gao The Chinese University of Hong Kong, Xin-Cheng Wen Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Hongyu Zhang Chongqing University, Michael Lyu The Chinese University of Hong Kong
Pre-print File Attached
14:18
12m
Talk
HexT5: Unified Pre-training for Stripped Binary Code Information InferenceRecorded talk
Research Papers
Jiaqi Xiong University of Science and Technology of China, Guoqiang Chen University of Science and Technology of China, Kejiang Chen University of Science and Technology of China, Han Gao University of Science and Technology of China, Shaoyin Cheng University of Science and Technology of China, Weiming Zhang University of Science and Technology of China
Media Attached File Attached
14:30
12m
Talk
Generating Variable Explanations via Zero-shot Prompt LearningRecorded talk
Research Papers
Chong Wang Fudan University, Yiling Lou Fudan University, Liu Junwei Fudan University, Xin Peng Fudan University
Media Attached
13:30 - 15:00
Program Verification 1Research Papers / NIER Track / Tool Demonstrations at Room C
Chair(s): Nico Rosner Amazon Web Services
13:30
12m
Talk
CPA-DF: A Tool for Configurable Interval Analysis to Boost Program Verification
Tool Demonstrations
Dirk Beyer LMU Munich, Po-Chun Chien LMU Munich, Nian-Ze Lee LMU Munich
Pre-print Media Attached File Attached
13:42
12m
Talk
Demystifying Template-based Invariant Generation for Bit-Vector Programs
Research Papers
Peisen Yao Zhejing University, Jingyu Ke Shanghai Jiao Tong University, Jiahui Sun Zhejiang University, Hongfei Fu Shanghai Jiao Tong University, Rongxin Wu Xiamen University, Kui Ren Zhejiang University
13:54
12m
Talk
PSMT: Satisfiability Modulo Theories Meets Probability Distribution
NIER Track
Fuqi Jia Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Rui Han Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, Minghao Liu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Pei Huang Stanford University, Feifei Ma Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print File Attached
14:06
12m
Talk
EndWatch: A Practical Method for Detecting Non-Termination in Real-World SoftwareACM Distinguished Paper
Research Papers
Yao Zhang Tianjin University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University, Sen Chen Tianjin University, Cen Zhang Nanyang Technological University, Xiaohong Li Tianjin University
Pre-print File Attached
14:18
12m
Talk
Symbolic Fixpoint Algorithms for Logical LTL Games
Research Papers
Stanly Samuel Indian Institute of Science, India, Deepak D'Souza IISc Bangalore, Raghavan Komondoor Indian Institute of Science, India
Pre-print Media Attached File Attached
14:30
12m
Talk
SAT-verifiable LTL Satisfiability Checking via Graph Representation LearningRecorded talk
NIER Track
Weilin Luo Sun Yat-Sen University, Yuhang Zheng Sun Yat-Sen University, Rongzhen Ye Sun Yat-Sen University, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Jianfeng Du Guangdong University of Foreign Studies, Pingjia Liang Sun Yat-Sen University, Polong Chen Sun Yat-Sen University
Media Attached
13:30 - 15:00
Open Source and Software Ecosystems 2Research Papers / Journal-first Papers / Industry Showcase (Papers) at Room D
Chair(s): Paul Grünbacher Johannes Kepler University Linz, Austria
13:30
12m
Talk
Personalized First Issue Recommender for Newcomers in Open Source Projects
Research Papers
Wenxin Xiao School of Computer Science, Peking University, Jingyue Li Norwegian University of Science and Technology, Hao He Carnegie Mellon University, Ruiqiao Qiu Beijing Institute of Technology, Minghui Zhou Peking University
Pre-print
13:42
12m
Talk
Understanding and Enhancing Issue Prioritization in GitHub
Research Papers
Yingying He Nanjing University of Aeronautics and Astronautics, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University, Yasir Hussain Nanjing University of Aeronautics and Astronautics, Yu Zhou Nanjing University of Aeronautics and Astronautics
13:55
12m
Research paper
Who is the Real Hero? Measuring Developer Contribution via Multi-dimensional Data Integration
Research Papers
Yuqiang Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Yiran Zhang Nanyang Technological University, Yang Liu Nanyang Technological University
Pre-print
14:08
12m
Talk
Predicting Health Indicators for Open Source Projects (using Hyperparameter Optimization)
Journal-first Papers
Tianpei Xia North Carolina State University, Wei Fu North Carolina State University, Rui Shu North Carolina State University, Rishabh Agrawal North Carolina State University, Tim Menzies North Carolina State University
Link to publication DOI Pre-print
14:21
12m
Talk
To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems
Research Papers
Mukelabai Mukelabai The University of Zambia, Zambia, Christoph Derks Ruhr-University Bochum, Germany, Jacob Krüger Eindhoven University of Technology, Thorsten Berger Ruhr University Bochum
File Attached
14:34
12m
Talk
LiSum: Open Source Software License Summarization with Multi-Task LearningRecorded talk
Research Papers
Linyu Li , Sihan Xu Nankai University, Yang Liu Nanyang Technological University, Ya Gao Nankai University, Xiangrui Cai Nankai University, Jiarun Wu Nankai University, Wenli Song Civil Aviation University of China, Zheli Liu Nankai University
Pre-print Media Attached
14:47
12m
Talk
Open Source Software Tools for Data Management and Deep Model Training Automation
Industry Showcase (Papers)
Umut Tıraşoğlu ORDULU Corp., Abdussamet Türker ORDULU Corp., Adnan Ekici ORDULU Corp., Hayri Yiğit ORDULU Corp., Yusuf Enes Bölükbaşı ORDULU Corp., Toygar Akgun TOBB ETU
13:30 - 15:00
Code Change AnalysisResearch Papers / Journal-first Papers at Room E
Chair(s): Vladimir Kovalenko JetBrains Research
13:30
12m
Talk
Code Difference Guided Adversarial Example Generation for Deep Code Models
Research Papers
Zhao Tian Tianjin University, Junjie Chen Tianjin University, Zhi Jin Peking University
Pre-print File Attached
13:42
12m
Talk
DiffSearch: A Scalable and Precise Search Engine for Code Changes
Journal-first Papers
Luca Di Grazia University of Stuttgart, Paul Bredl University of Stuttgart, Michael Pradel University of Stuttgart
Link to publication DOI Pre-print File Attached
13:54
12m
Talk
ZC3 Zero-Shot Cross-Language Code Clone Detection
Research Papers
Jia Li , Chongyang Tao Peking University, Zhi Jin Peking University, Fang Liu Beihang University, Jia Li Peking University, Ge Li Peking University
Pre-print File Attached
14:06
12m
Talk
Persisting and Reusing Results of Static Program Analyses on a Large Scale
Research Papers
Johannes Düsing TU Dortmund University, Ben Hermann TU Dortmund, Ben Hermann TU Dortmund
Pre-print
14:18
12m
Talk
Optimizing Continuous Development By Detecting and Preventing Unnecessary Content Generation
Research Papers
Talank Baral George Mason University, Shanto Rahman The University of Texas at Austin, Bala Naren Chanumolu George Mason University, Basak Balci Ozyegin University, Tuna Tuncer Ozyegin University, August Shi The University of Texas at Austin, Wing Lam George Mason University
Pre-print Media Attached
14:30
12m
Talk
iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping AlgorithmRecorded talk
Research Papers
Neng Zhang School of Software Engineering, Sun Yat-sen University, ChenQinde School of Software Engineering, Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Ying Zou Queen's University, Kingston, Ontario
Pre-print Media Attached
13:30 - 14:30
Industry Challenge (Competition)Industry Challenge (Competition) at Room FR
Chair(s): Sun Jianwen
13:30
15m
Talk
RPCover: Recovering gRPC Dependency in Multilingual Projects
Industry Challenge (Competition)
Aoyang Fang Chinese University of Hong Kong, Shenzhen, Ruiyu Zhou Chinese University of Hong Kong, Shenzhen, Xiaoying Tang hinese University of Hong Kong, Shenzhen, Pinjia He Chinese University of Hong Kong, Shenzhen
13:45
15m
Talk
VALAR: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active Learning
Industry Challenge (Competition)
Pengcheng Liu , Yifei Lu Nanjing University, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Minxue Pan Nanjing University
14:00
15m
Talk
REEF: A Framework for Collecting Real-World Vulnerabilities and Fixes
Industry Challenge (Competition)
Chaozheng Wang The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Yun Peng Chinese University of Hong Kong, Shuzheng Gao , Sirong Chen Harbin Institute of Technology, Shenzhen, Shuai Wang Hong Kong University of Science and Technology, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong
14:15
15m
Talk
Potential Solutions to Challenges in C Program Repair: A Practical Perspective
Industry Challenge (Competition)
Jifeng Xuan Wuhan University, Qi Xin Wuhan University, Liqian Chen National University of Defense Technology, China, Xiaoguang Mao National University of Defense Technology
14:45 - 15:45
Industry Challenge (Competition)Industry Challenge (Competition) at Room FR
Chair(s): Sun Jianwen
14:45
15m
Talk
MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply Chains
Industry Challenge (Competition)
Ningke Li Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Mingxi Feng Huazhong University of Science and Technology, Kailong Wang Huazhong University of Science and Technology, Meizhen Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
15:00
15m
Talk
Minecraft: Automated Mining of Software Bug Fixes with Precise Code Context
Industry Challenge (Competition)
Sai Krishna Avula IIT Gandhinagar, Venkatesh Vobbilisetti NIT Raipur, Shouvick Mondal IIT Gandhinagar, India
Pre-print Media Attached File Attached
15:15
15m
Talk
CiD4HMOS: A Solution to HarmonyOS Compatibility IssuesRecorded talk
Industry Challenge (Competition)
Tianzhi Ma , Yanjie Zhao Monash Univerisity, Li Li Beihang University, Liang Liu Nanjing University of Aeronautics and Astronautics
Media Attached
15:30
15m
Industry talk
Unifying Defect Prediction, Categorization, and Repair by Multi-task Deep LearningRecorded talk
Industry Challenge (Competition)
Chao Ni Zhejiang University, Kaiwen Yang Zhejiang University, Yan Zhu Zhejiang University, Xiang Chen Nantong University, Xiaohu Yang Zhejiang University
Media Attached File Attached
15:00 - 15:30
15:00
30m
Coffee break
Break
Catering

15:30 - 17:00
15:30
12m
Talk
COMEX: A Tool for Generating Customized Source Code Representations
Tool Demonstrations
Debeshee Das Indian Institute of Technology Tirupati, Noble Saji Mathews University of Waterloo, Canada, Alex Mathai , Srikanth Tamilselvam IBM Research, Kranthi Sedamaki Indian Institute of Technology Tirupati, Sridhar Chimalakonda IIT Tirupati, Atul Kumar IBM India Research Labs
Pre-print Media Attached File Attached
15:42
12m
Talk
Fast and Reliable Program Synthesis via User Interaction
Research Papers
Yanju Chen University of California at Santa Barbara, Chenglong Wang Microsoft Research, Xinyu Wang University of Michigan, Osbert Bastani University of Pennsylvania, Yu Feng University of California at Santa Barbara
File Attached
15:55
12m
Talk
From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining
Research Papers
Xiaoxue Ren Zhejiang University, Xinyuan Ye Australian National University, Dehai Zhao CSIRO's Data61, Zhenchang Xing , Xiaohu Yang Zhejiang University
File Attached
16:08
12m
Talk
Generative Type Inference for PythonACM Distinguished Paper
Research Papers
Yun Peng Chinese University of Hong Kong, Chaozheng Wang The Chinese University of Hong Kong, Wenxuan Wang Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong
Pre-print File Attached
16:21
12m
Talk
Compiler Auto-tuning via Critical Flag Selection
Research Papers
Mingxuan Zhu Peking University, Dan Hao Peking University
16:34
12m
Talk
Enhancing Code Safety in Quantum Intermediate Representation
NIER Track
Junjie Luo Kyushu University, Jianjun Zhao Kyushu University
File Attached
16:47
12m
Talk
CAT-LM: Training Language Models on Aligned Code And Tests
Research Papers
Nikitha Rao Carnegie Mellon University, Kush Jain Carnegie Mellon University, Uri Alon Carnegie Mellon University, Claire Le Goues Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University
Media Attached File Attached
15:30 - 17:00
Software Testing for Specialized Systems 1Research Papers / Journal-first Papers / NIER Track at Room C
Chair(s): Fabrizio Pastore University of Luxembourg
15:30
12m
Talk
DCLink: Bridging Data Constraint Changes and Implementations in FinTech Systems
Research Papers
Wensheng Tang Hong Kong University of Science and Technology, Chengpeng Wang Hong Kong University of Science and Technology, Peisen Yao Zhejing University, Rongxin Wu Xiamen University, Xianjin Fu Ant Group, Gang Fan Ant Group, Charles Zhang Hong Kong University of Science and Technology
File Attached
15:42
12m
Talk
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks
Research Papers
Paschal Amusuo Purdue University, Ricardo Andrés Calvo Méndez Universidad Nacional de Colombia, Zhongwei Xu Xi'an JiaoTong University, Aravind Machiry Purdue University, James C. Davis Purdue University
Pre-print Media Attached File Attached
15:54
12m
Talk
WADIFF: A Differential Testing Framework for WebAssembly Runtimes
Research Papers
Shiyao Zhou The Hong Kong Polytechnic University, Muhui Jiang The Hong Kong Polytechnic University, Weimin Chen The Hong Kong Polytechnic University, Hao Zhou Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Xiapu Luo Hong Kong Polytechnic University
File Attached
16:06
12m
Talk
T-Evos: A Large-Scale Longitudinal Study on CI Test Execution and Failure
Journal-first Papers
An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaowei Wang University of Manitoba
Pre-print
16:18
12m
Talk
VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage
Research Papers
Xiaoyin Wang University of Texas at San Antonio, Tahmid Rafi University of Texas at San Antonio, Na Meng Virginia Tech
File Attached
16:30
12m
Talk
PURLTL: Mining LTL Specification from Imperfect Traces in TestingRecorded talk
NIER Track
Bo Peng Sun Yat-Sen University, Pingjia Liang Sun Yat-Sen University, Tingchen Han Sun Yat-Sen University, Weilin Luo Sun Yat-Sen University, Jianfeng Du Guangdong University of Foreign Studies, Hai Wan School of Data and Computer Science, Sun Yat-sen University, Rongzhen Ye Sun Yat-Sen University, Yuhang Zheng Sun Yat-Sen University
Media Attached
15:30 - 17:00
Bug DetectionResearch Papers / Journal-first Papers at Room D
Chair(s): Andreea Vescan Babes-Bolyai University
15:30
12m
Talk
A Comparative Study of Transformer-based Neural Text Representation Techniques on Bug Triaging
Research Papers
Atish Kumar Dipongkor University of Central Florida, Kevin Moran George Mason University
File Attached
15:42
12m
Talk
Duplicate Bug Report Detection: How Far Are We?
Journal-first Papers
Ting Zhang Singapore Management University, DongGyun Han Royal Holloway, University of London, Venkatesh Vinayakarao Chennai Mathematical Institute, Ivana Clairine Irsan Singapore Management University, Bowen Xu North Carolina State University, Ferdian Thung Singapore Management University, David Lo Singapore Management University, Lingxiao Jiang Singapore Management University
Link to publication DOI File Attached
15:54
12m
Talk
Neural SZZ Algorithm
Research Papers
LingXiao Tang zhejiang university, Lingfeng Bao Zhejiang University, Xin Xia Huawei Technologies, Zhongdong Huang Zhejiang University
Pre-print
16:06
12m
Talk
How to Train Your Neural Bug Detector: Artificial vs Real Bugs
Research Papers
Cedric Richter Carl von Ossietzky Universität Oldenburg / University of Oldenburg, Heike Wehrheim Carl von Ossietzky Universität Oldenburg / University of Oldenburg
Pre-print File Attached
16:18
12m
Talk
Detection of Java Basic Thread Misuses Based on Static Event Analysis
Research Papers
Baoquan Cui Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Chi Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
File Attached
16:30
12m
Full-paper
On effort-aware metrics for defect prediction
Journal-first Papers
Jonida Çarka University of Rome Tor Vergata, Matteo Esposito University of Rome Tor Vergata, Falessi Davide University of Rome Tor Vergata
DOI File Attached
16:42
12m
Talk
FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers
Research Papers
Eric Liu University of Toronto, Shengjie Xu University of Toronto, David Lie University of Toronto, Canada
Pre-print File Attached
15:30 - 17:00
Autonomous Systems and AgentsResearch Papers / NIER Track / Journal-first Papers / Tool Demonstrations at Room E
Chair(s): Alessio Gambi IMC University of Applied Sciences Krems
15:30
12m
Talk
TEASER: Simulation-based CAN Bus Regression Testing for Self-driving Cars Software
Tool Demonstrations
Christian Birchler Zurich University of Applied Sciences, Cyrill Rohrbach University of Bern, Switzerland, Hyeongkyun Kim University of Zurich, Switzerland, Alessio Gambi IMC University of Applied Sciences Krems, Tianhai Liu aicas GmbH, Germany, Jens Horneber aicas GmbH, Germany, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences
Pre-print File Attached
15:42
12m
Talk
Automated Identification and Qualitative Characterization of Safety Concerns Reported in UAV Software Platforms
Journal-first Papers
Andrea Di Sorbo University of Sannio, Fiorella Zampetti University of Sannio, Italy, Corrado A. Visaggio University of Sannio, Italy, Massimiliano Di Penta University of Sannio, Italy, Sebastiano Panichella Zurich University of Applied Sciences
File Attached
15:54
12m
Talk
Towards a Formal Framework for Normative Requirements Elicitation
NIER Track
Nick Feng University of Toronto, Lina Marsso University of Toronto, Sinem Getir Yaman University of York, UK, Beverley Townsend University of York, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Marsha Chechik University of Toronto
File Attached
16:06
12m
Talk
Detecting Smart Home Automation Application Interferences with Domain KnowledgeACM Distinguished Paper
Research Papers
Tao Wang Institute of Software at Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Liwei Liu Institute of Software at Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print File Attached
16:18
12m
Talk
CompSuite: A Dataset of Java Library Upgrade Incompatibility Issues
Tool Demonstrations
Xiufeng Xu Nanyang Technological University, Chenguang Zhu Meta, Yi Li Nanyang Technological University
Pre-print Media Attached File Attached
16:30
12m
Talk
A Comprehensive Study on Code Clones in Automated Driving SoftwareRecorded talk
Research Papers
Ran Mo Central China Normal University, Yingjie Jiang Central China Normal University, Wenjing Zhan Central China Normal University, Dongyu Wang Central China Normal University, Zengyang Li Central China Normal University
Pre-print Media Attached File Attached

Thu 14 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

08:00 - 17:00
RegistrationCatering
08:30 - 09:00
MIP awards and ASE 2024Most Influential Papers (MIP) / Keynotes at Room C
Chair(s): Massimiliano Di Penta University of Sannio, Italy
08:30
15m
Talk
Automatically documenting program changes
Most Influential Papers (MIP)
Ray Buse Google, Westley Weimer University of Michigan
File Attached
08:45
12m
Talk
ASE 2024 Teaser
Keynotes

09:00 - 10:00
KeynoteKeynotes at Room C
09:00
60m
Talk
Fault Localization: Research Opportunities and Challenges
Keynotes
Dan Hao Peking University
10:00 - 10:30
10:00
30m
Coffee break
Break
Catering

10:30 - 12:00
10:30
12m
Talk
An Empirical Study on Fine-tuning Large Language Models of Code for Automated Program RepairACM Distinguished Paper
Research Papers
Kai Huang , Xiangxin Meng Beihang University, Beijing, China, Jian Zhang Nanyang Technological University, Yang Liu Nanyang Technological University, Wenjie Wang University of Chinese Academy of Sciences, Shuhao Li Zhongguancun Laboratory, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory
File Attached
10:42
12m
Talk
Estimating the Potential of Program Repair Search Spaces with Commit Analysis
Journal-first Papers
Khashayar Etemadi KTH Royal Institute of Technology, Niloofar Tarighat Sharif University of Technology, Siddharth Yadav IIIT-Delhi, Matias Martinez Universitat Politècnica de Catalunya (UPC), Martin Monperrus KTH Royal Institute of Technology
Link to publication File Attached
10:54
12m
Talk
LeakPair: Proactive Repairing of Memory Leaks in Single Page Web ApplicationsACM Distinguished Paper
Research Papers
Arooba Shahoor Kyungpook National University, Askar Yeltayuly Khamit Ulsan National Institute of Science and Technology, Jooyong Yi UNIST (Ulsan National Institute of Science and Technology), Dongsun Kim Kyungpook National University
Pre-print Media Attached
11:06
12m
Talk
Automated Fixing of Web UI Tests via Iterative Element Matching
Research Papers
Yuanzhang Lin Beihang University, Guoyao Wen Huawei Technologies Co., Ltd., Xiang Gao Beihang University
Pre-print Media Attached
11:18
12m
Talk
OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability with Attribute Checking
Research Papers
Wenjie Zhang Peking University, Guancheng Wang Peking University, China, Junjie Chen Tianjin University, Yingfei Xiong Peking University, Yong Liu Beijing University of Chemical Technology, Lu Zhang Peking University
Pre-print File Attached
11:30
12m
Talk
Hot Patching Hot Fixes: Reflection and Perspectives
NIER Track
Carol Hanna University College London, Justyna Petke University College London
Pre-print File Attached
10:30 - 12:00
Software Testing for Specialized Systems 2Research Papers / Tool Demonstrations at Room C
Chair(s): Zishuo Ding University of Waterloo
10:30
12m
Talk
Bridging the Gap between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations
Research Papers
Szymon Stradowski Nokia & Wrocław University of Science and Technology, Lech Madeyski Wroclaw University of Science and Technology
Link to publication DOI Pre-print Media Attached
10:42
12m
Talk
Identify and Update Test Cases when Production Code Changes: A Transformer-based Approach
Research Papers
Xing Hu Zhejiang University, Zhuang Liu Zhejiang University, Xin Xia Huawei Technologies, Zhongxin Liu Zhejiang University, Tongtong Xu Huawei, Xiaohu Yang Zhejiang University
10:54
12m
Talk
Revisiting and Improving Retrieval-Augmented Deep Assertion Generation
Research Papers
Weifeng Sun , Hongyan Li Chongqing University, Meng Yan Chongqing University, Yan Lei Chongqing University, Hongyu Zhang Chongqing University, Hongyu Zhang Chongqing University
11:06
12m
Talk
Provengo: A Tool Suite for Scenario Driven Model-Based Testing
Tool Demonstrations
Michael Bar Sinai Provengo, Achiya Elyasaf Ben-Gurion University of the Negev, Gera Weiss Ben-Gurion University of the Negev, ‪Yeshayahu Weiss‬‏ Ben-Gurion University of the Negev
Pre-print File Attached
11:18
12m
Talk
QuraTest: Integrating Quantum Specific Features in Quantum Program Testing
Research Papers
Jiaming Ye Kyushu University, Shangzhou Xia Kyushu University, Fuyuan Zhang Kyushu University, Paolo Arcaini National Institute of Informatics , Lei Ma University of Alberta, Jianjun Zhao Kyushu University, Fuyuki Ishikawa National Institute of Informatics
File Attached
11:30
12m
Talk
QuCAT: A Combinatorial Testing Tool for Quantum Software
Tool Demonstrations
Xinyi Wang Simula Research Laboratory, Paolo Arcaini National Institute of Informatics , Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University
Pre-print File Attached
11:42
12m
Talk
LEAP: Efficient and Automated Test Method for NLP SoftwareRecorded talk
Research Papers
Mingxuan Xiao Hohai University, Yan Xiao National University of Singapore, Hai Dong RMIT University, Shunhui Ji Hohai University, Pengcheng Zhang Hohai University
Media Attached
10:30 - 12:00
Mobile Development 1Research Papers / Tool Demonstrations / Journal-first Papers at Room D
Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security
10:30
12m
Talk
Taming Android Fragmentation through Lightweight Crowdsourced Testing
Journal-first Papers
Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Yonghui Liu Monash University, John Grundy Monash University, Li Li Beihang University
Media Attached File Attached
10:42
12m
Talk
Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components
Research Papers
Zhijie Liu ShanghaiTech University, China, Liangfeng Zhang School of Information Science and Technology, ShanghaiTech University, Yutian Tang University of Glasgow
File Attached
10:54
12m
Talk
Fine-Grained In-Context Permission Classification for Android Apps using Control-Flow Graph Embedding
Research Papers
Vikas K. Malviya Singapore Management University, Yan Naing Tun Singapore Management University, Chee Wei Leow Singapore Management University, Ailys Tee Xynyn Singapore Management University, Lwin Khin Shar Singapore Management University, Lingxiao Jiang Singapore Management University
File Attached
11:06
12m
Talk
How Android Apps Break the Data Minimization Principle: An Empirical Study
Research Papers
Shaokun Zhang Peking University, Hanwen Lei Peking University, Yuanpeng Wang Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University
Pre-print File Attached
11:18
12m
Talk
ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android Apps
Tool Demonstrations
Shixin Zhang Institute of Software, Chinese Academy of Sciences, Shanna Li Beijing Jiaotong University, Xi Deng Institute of Software, Chinese Academy of Sciences, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Media Attached File Attached
11:30
12m
Talk
DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph LearningACM Distinguished Paper
Research Papers
Chunyang Meng Sun Yat-sen University, Shijie Song Sun Yat-sen University, Haogang Tong Sun Yat-sen University, Maolin Pan Sun Yat-sen University, Yang Yu Sun Yat-sen University
Pre-print File Attached
10:30 - 12:00
Program Verification 2Research Papers / Tool Demonstrations / NIER Track at Room E
Chair(s): Martin Kellogg New Jersey Institute of Technology
10:30
12m
Talk
Expediting Neural Network Verification via Network Reduction
Research Papers
Yuyi Zhong National University of Singapore, Singapore, Ruiwei Wang School of Computing, National University of Singapore, Siau-Cheng Khoo National University of Singapore
Pre-print File Attached
10:42
12m
Talk
SMT Solver Validation Empowered by Large Pre-trained Language Models
Research Papers
Maolin Sun Nanjing University, Yibiao Yang Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Haoxiang Jia Huazhong University of Science and Technology, Yuming Zhou Nanjing University
Pre-print File Attached
10:54
12m
Talk
LIV: Invariant Validation Using Straight-Line Programs
Tool Demonstrations
Martin Spiessl LMU Munich, Dirk Beyer LMU Munich
Pre-print Media Attached File Attached
11:06
12m
Talk
CEGAR-PT: A Tool for Abstraction by Program Transformation
Tool Demonstrations
Dirk Beyer LMU Munich, Marian Lingsch-Rosenfeld LMU Munich, Martin Spiessl LMU Munich
Pre-print Media Attached File Attached
11:18
12m
Talk
Symbolic Verification of Fuzzy Logic ModelsRecorded talk
NIER Track
Siang Zhao School of Computer, National University of Defense Technology, China, Zhongyang Li School of Computer, National University of Defense Technology, China, Zhenbang Chen National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China
Pre-print Media Attached
11:30
12m
Talk
HOBAT: Batch Verification for Homogeneous Structural Neural NetworksRecorded talk
Research Papers
Jingyang Li Shanghai Jiao Tong University, Guoqiang Li Shanghai Jiao Tong University
Media Attached File Attached
10:40 - 12:00
SATE - Software Engineering at the Era of LLMsSATE - Software Engineering at the Era of LLMs at Room FR
Chair(s): Xin Xia Huawei Technologies
10:40
40m
Talk
Testing the Limits: What Breaks and How to Partially Fix LLM4ASE?
SATE - Software Engineering at the Era of LLMs
David Lo Singapore Management University
Pre-print
11:20
40m
Talk
Deep Learning for Software Engineering
SATE - Software Engineering at the Era of LLMs
Denys Poshyvanyk William & Mary
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:20 - 15:20
SATE - Software Engineering at the Era of LLMsSATE - Software Engineering at the Era of LLMs at Room FR
Chair(s): Xin Xia Huawei Technologies
13:20
40m
Talk
Towards Better Software Quality in the Era of Large Language Models
SATE - Software Engineering at the Era of LLMs
Lingming Zhang University of Illinois at Urbana-Champaign
14:00
40m
Talk
Securing LLM-based Software Supply Chains
SATE - Software Engineering at the Era of LLMs
Audris Mockus Vilnius University & The University of Tennessee
File Attached
14:40
40m
Talk
BEWARE: some of the deep learning rhetoric is misleading
SATE - Software Engineering at the Era of LLMs
Tim Menzies North Carolina State University
Pre-print
13:30 - 15:00
Software Testing for Specialized Systems 3Journal-first Papers / Tool Demonstrations / Research Papers at Plenary Room 2
Chair(s): Xiaoyin Wang University of Texas at San Antonio
13:30
12m
Talk
An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software
Research Papers
Wenxuan Wang Chinese University of Hong Kong, Jingyuan Huang Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Chang Chen Chinese University of Hong Kong, Jiazhen Gu Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Michael Lyu The Chinese University of Hong Kong
File Attached
13:42
12m
Talk
CoMSA: A modeling driven sampling approach for configuration performance testing
Research Papers
Yuanjie Xia University of Waterloo, Zishuo Ding University of Waterloo, Weiyi Shang University of Waterloo
Pre-print Media Attached
13:54
12m
Talk
DroneReqValidator: Facilitating High Fidelity Simulation Testing for Uncrewed Aerial Systems Developers
Tool Demonstrations
Bohan Zhang Saint Louis University, Missouri, Yashaswini Shivalingaiah Saint Louis University, Missouri, Ankit Agrawal Saint Louis University, Missouri
Pre-print Media Attached File Attached
14:06
12m
Talk
Effective Concurrency Testing for Go via Directional Primitive-constrained Interleaving Exploration
Research Papers
Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Yixin Yang Huazhong University of Science and Technology, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology, Hai Jin Huazhong University of Science and Technology
File Attached
14:18
12m
Talk
Fuzzing for CPS Mutation Testing
Research Papers
Jaekwon Lee University of Luxembourg, Luxembourg, Enrico Viganò University of Luxembourg, Oscar Cornejo University of Milano Bicocca, Italy, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Pre-print File Attached
14:30
12m
Talk
MUT4SLX: Fast Mutation Testing for Simulink
Tool Demonstrations
Halil Ibrahim Ceylan University of Antwerp, Onur Kilincceker University of Antwerp and Flanders Make vzw, Mutlu Beyazıt University of Antwerp and Flanders Make vzw, Serge Demeyer University of Antwerp; Flanders Make
Media Attached File Attached
14:42
12m
Talk
Machine learning-based test selection for simulation-based testing of self-driving cars software
Journal-first Papers
Christian Birchler Zurich University of Applied Sciences, Sajad Khatiri USI-Lugnao & Zurich University of Applied Sciences, Bill Bosshard Meier Planungsdienste GmbH, Alessio Gambi IMC University of Applied Sciences Krems, Sebastiano Panichella Zurich University of Applied Sciences
13:30 - 15:00
Testing AI Systems 4Research Papers / NIER Track at Room C
13:30
12m
Talk
Mutation-based Fault Localization of Deep Neural NetworksACM Distinguished Paper
Research Papers
Ali Ghanbari Iowa State University, Deepak-George Thomas Dept. of Computer Science, Iowa State University, Muhammad Arbab Arshad Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University
Pre-print
13:42
12m
Talk
Fault Localization for Buggy Deep Learning Framework Conversions in Image Recognition
NIER Track
Nikolaos Louloudakis University of Edinburgh, Perry Gibson University of Glasgow, José Cano University of Glasgow, Ajitha Rajan University of Edinburgh
Pre-print File Attached
13:54
12m
Talk
Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Graph Execution
NIER Track
Raffi Khatchadourian City University of New York (CUNY) Hunter College, Tatiana Castro Vélez City University of New York (CUNY) Graduate Center, Mehdi Bagherzadeh Oakland University, Nan Jia City University of New York (CUNY) Graduate Center, Anita Raja City University of New York (CUNY) Hunter College
Pre-print Media Attached
14:06
12m
Talk
AutoConf : Automated Configuration of Unsupervised Learning Systems using Metamorphic Testing and Bayesian Optimization
Research Papers
Lwin Khin Shar Singapore Management University, Arda Goknil SINTEF Digital, Erik Johannes Husom SINTEF Digital, Sagar Sen , Yan Naing Tun Singapore Management University, Kisub Kim Singapore Management University, Singapore
File Attached
14:18
12m
Talk
An Intentional Forgetting-Driven Self-Healing Method For Deep Reinforcement Learning SystemsRecorded talk
Research Papers
Ahmed Haj Yahmed École Polytechnique de Montréal, Rached Bouchoucha Polytechnique Montréal, Houssem Ben Braiek Polytechnique Montréal, Foutse Khomh Polytechnique Montréal
Pre-print Media Attached
14:30
12m
Talk
A Majority Invariant Approach to Patch Robustness Certification for Deep Learning ModelsRecorded talk
NIER Track
Qilin Zhou City University of Hong Kong, Zhengyuan Wei City University of Hong Kong, Hong Kong, Haipeng Wang City University of Hong Kong, Wing-Kwong Chan City University of Hong Kong, Hong Kong
Pre-print Media Attached
13:30 - 15:00
Mobile Development 2Research Papers / Industry Showcase (Papers) / Journal-first Papers / Tool Demonstrations at Room D
Chair(s): Jordan Samhi CISPA Helmholtz Center for Information Security
13:30
12m
Talk
Enhancing Mobile App Bug Reporting via Real-Time Understanding of Reproduction Steps
Journal-first Papers
Mattia Fazzini University of Minnesota, Kevin Moran George Mason University, Carlos Bernal-Cárdenas Microsoft, Tyler Wendland University of Minnesota, Alessandro Orso Georgia Institute of Technology, Denys Poshyvanyk William & Mary
13:42
12m
Talk
AutoDebloater: Automated Android App Debloating
Tool Demonstrations
Jiakun Liu Singapore Management University, Xing Hu Zhejiang University, Ferdian Thung Singapore Management University, Shahar Maoz Tel Aviv University, Eran Toch Tel Aviv University, Debin Gao Singapore Management University, David Lo Singapore Management University
13:54
12m
Talk
ReuNify: A Step Towards Whole Program Analysis for React Native Android App
Research Papers
Yonghui Liu Monash University, Xiao Chen Monash University, Pei Liu Data61 at CSIRO, Australia, John Grundy Monash University, Chunyang Chen Monash University, Li Li Beihang University
Pre-print
14:06
12m
Talk
WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
Research Papers
Shi Meng Beijing University of Posts and Telecommunications, Liu Wang Beijing University of Posts and Telecommunications, Shenao Wang Xidian University, Kailong Wang Huazhong University of Science and Technology, Xusheng Xiao Arizona State University, Guangdong Bai University of Queensland, Haoyu Wang Huazhong University of Science and Technology
14:18
12m
Talk
Vision-based Widget Mapping for Test Migration across Mobile Platforms: Are We There Yet?
Research Papers
Ruihua Ji Nanjing University, Tingwei Zhu Nanjing University, Xiaoqing Zhu Nanjing University, Chunyang Chen Monash University, Minxue Pan Nanjing University, Tian Zhang Nanjing University
14:30
12m
Talk
Government Mobile Apps: Analysing Citizen Feedback via App Reviews
Industry Showcase (Papers)
Tooba Aamir Data61 at CSIRO, Australia, Mohan Baruwal Chhetri CSIRO’s Data61, M.A.P. Chamikara Data61 CSIRO Australia, Marthie Grobler CSIRO's Data61
13:30 - 15:00
DebuggingResearch Papers / Industry Showcase (Papers) at Room E
Chair(s): Carol Hanna University College London
13:30
12m
Talk
Coding and Debugging by Separating Secret Code toward Secure Remote Development
Industry Showcase (Papers)
Media Attached File Attached
13:42
12m
Talk
Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count
Research Papers
Xutong Ma State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, Hao Zhang Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print
13:54
12m
Research paper
PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis
Research Papers
Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Shuai Wang Hong Kong University of Science and Technology
Pre-print
14:06
12m
Talk
The MAP metric in Information Retrieval Fault Localization
Research Papers
Thomas Hirsch Graz University of Technology, Birgit Hofer Graz University of Technology
Media Attached File Attached
14:18
12m
Talk
Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial ExtrapolationRecorded talk
Research Papers
Zuoyan Zhang Information Engineering University, Bei Zhou Information Engineering University, Jiangwei Hao Information Engineering University, Hongru Yang Information Engineering University, Mengqi Cui Information Engineering University, Yuchang Zhou Information Engineering University, Guanghui Song Information Engineering University, Fei Li Information Engineering University, Jinchen Xu Information Engineering University, Jie Zhao Information Engineering University
Media Attached File Attached
14:30
12m
Talk
Information Retrieval-based Fault Localization for Concurrent ProgramsRecorded talk
Research Papers
Shuai Shao University of Connecticut, Tingting Yu University of Connecticut
Pre-print Media Attached
15:00 - 15:30
15:00
30m
Coffee break
Break
Catering

15:30 - 17:00
FuzzingNIER Track / Journal-first Papers / Research Papers / Tool Demonstrations at Plenary Room 2
Chair(s): Lars Grunske Humboldt-Universität zu Berlin
15:30
12m
Talk
Fine-Grained Coverage-Based Fuzzing
Journal-first Papers
Wei-Cheng Wu University of Southern California, USA, Bernard Nongpoh CEA LIST, University Paris-Saclay, Marwan Nour CEA, LIST, Université Paris Saclay, Michaël Marcozzi CEA, LIST, Université Paris Saclay, Sébastien Bardin CEA LIST, University Paris-Saclay, Christophe Hauser Dartmouth College
Link to publication File Attached
15:42
12m
Talk
MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure
Research Papers
Haoyu Wang College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University, Chuyue Xie College of Intelligence and Computing, Tianjin University, Shuang Liu Tianjin University, Zan Wang Tianjin University, Qingchao Shen Tianjin University, Yingquan Zhao Tianjin University
Pre-print File Attached
15:54
12m
Talk
Thunderkaller: Profiling and Improving the Performance of Syzkaller
Research Papers
Yang Lan Institute for Network Science and Cyberspace of Tsinghua University, Di Jin Brown University, Zhun Wang Institute for Network Science and Cyberspace of Tsinghua University, Wende Tan Tsinghua University, Zheyu Ma Tsinghua University, Chao Zhang Tsinghua University
File Attached
16:06
12m
Talk
PHYFU: Fuzzing Modern Physics Simulation EnginesACM Distinguished Paper
Research Papers
Dongwei Xiao Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
Link to publication DOI
16:18
12m
Talk
NaturalFuzz: Natural Input Generation for Big Data Analytics
Research Papers
Ahmad Humayun Virginia Tech, Yaoxuan Wu UCLA, Miryung Kim University of California at Los Angeles, USA, Muhammad Ali Gulzar Virginia Tech
File Attached
16:30
12m
Talk
SpecFuzzer: A Tool for Inferring Class Specifications via Grammar-based Fuzzing
Tool Demonstrations
Facundo Molina IMDEA Software Institute, Marcelo d'Amorim North Carolina State University, Nazareno Aguirre University of Rio Cuarto and CONICET, Argentina
Pre-print Media Attached File Attached
16:42
12m
Talk
Scalable Industrial Control System Analysis via XAI-based Gray-Box Fuzzing
NIER Track
Justin Kur Oakland University, Jingshu Chen Oakland University, Jun Huang City University of Hong Kong
15:30 - 17:00
Code Generation 3Research Papers / Journal-first Papers at Room C
Chair(s): David Lo Singapore Management University
15:30
12m
Talk
Improving code extraction from coding screencasts using a code-aware encoder-decoder model
Research Papers
Abdulkarim Malkadi Florida State University, USA - Jazan University, KSA, Ahmad Tayeb Florida State University, USA, Sonia Haiduc Florida State University
File Attached
15:42
12m
Talk
InfeRE: Step-by-Step Regex Generation via Chain of Inference
Research Papers
Shuai Zhang School of Software, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University
Pre-print File Attached
15:54
12m
Talk
MELT: Mining Effective Lightweight Transformations from Pull Requests
Research Papers
Daniel Ramos Carnegie Mellon University, and INESC-ID, Hailie Mitchell Carnegie Mellon University, Ines Lynce INESC-ID/IST, Universidade de Lisboa, Vasco Manquinho INESC-ID; Universidade de Lisboa, Ruben Martins Carnegie Mellon University, Claire Le Goues Carnegie Mellon University
Pre-print File Attached
16:06
12m
Talk
On the Evaluation of Neural Code Translation: Taxonomy and Benchmark
Research Papers
Mingsheng Jiao Shanghai Jiao Tong University, Tingrui Yu Shanghai Jiao Tong University, Xuan Li Shanghai Jiao Tong University, Guan Jie Qiu Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University
Pre-print File Attached
16:18
12m
Talk
Out of the BLEU: How should we assess quality of the Code Generation models?
Journal-first Papers
Mikhail Evtikhiev JetBrains Research, Egor Bogomolov JetBrains Research, Yaroslav Sokolov JetBrains, Timofey Bryksin JetBrains Research
Link to publication DOI Pre-print File Attached
16:30
12m
Talk
Pluggable Type Inference for Free
Research Papers
Martin Kellogg New Jersey Institute of Technology, Daniel Daskiewicz New Jersey Institute of Technology, Loi Ngo Duc Nguyen New Jersey Institute of Technology, Muyeed Ahmed New Jersey Institute of Technology, Michael D. Ernst University of Washington
Link to publication Pre-print File Attached
15:30 - 17:00
Configuration and Version ManagementResearch Papers at Room D
Chair(s): Shahar Maoz Tel Aviv University
15:30
12m
Talk
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem
Research Papers
Wenke Li Huazhong University of Science and Technology, Feng Wu Tencent Technology (Shenzhen) Co. Ltd, Cai Fu Huazhong University of Science and Technology, Fan Zhou Tencent Technology (Shenzhen) Co. Ltd
Link to publication DOI Pre-print
15:42
12m
Talk
Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem
Research Papers
Suhaib Mujahid Mozilla, Diego Costa Concordia University, Canada, Rabe Abdalkareem Omar Al-Mukhtar University, Emad Shihab Concordia Univeristy
Pre-print
15:55
12m
Talk
ESRO: Experience Assisted Service Reliability against Outages
Research Papers
Sarthak Chakraborty Adobe Research, Shubham Agarwal Adobe Research, Shaddy Garg Adobe, Abhimanyu Sethia Indian Institute of Technology Kanpur, Udit Narayan Pandey Indian Institute of Technology Kanpur, Videh Aggarwal Indian Institute of Technology Kanpur, Shiv Saini Adobe Research
File Attached
16:08
12m
Talk
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks
Research Papers
Yang Hu University of Texas at Austin, Wenxi Wang University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin, Kenneth L. McMillan University of Texas at Austin, Mohit Tiwari University of Texas at Austin
File Attached
16:21
12m
Talk
Merge Conflict Resolution: Classification or Generation?
Research Papers
Jinhao Dong Peking University, Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Yiling Lou Fudan University, Dan Hao Peking University
Pre-print File Attached
16:34
12m
Talk
Repeated Builds During Code Review: An Empirical Study of the OpenStack Community
Research Papers
Rungroj Maipradit University of Waterloo, Dong Wang Kyushu University, Japan, Patanamon Thongtanunam University of Melbourne, Raula Gaikovina Kula Nara Institute of Science and Technology, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo
Pre-print File Attached
16:47
12m
Talk
Automated Software Entity Matching Between Successive VersionsRecorded talk
Research Papers
Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Nan Niu University of Cincinnati, Yuxia Zhang Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Yanjie Jiang Beijing Institute of Technology
DOI Media Attached
15:30 - 17:00
Vulnerability and Security 2Journal-first Papers / Industry Showcase (Papers) / Research Papers at Room E
Chair(s): Ben Hermann TU Dortmund
15:30
12m
Talk
An Industrial Practice for Securing Android Apps in the Banking Domain
Industry Showcase (Papers)
Vikas K. Malviya Singapore Management University, Phong Phan i-Sprint Innovations Pte. Ltd, Yan Naing Tun Singapore Management University, Albert Ching i-Sprint Innovations Pte. Ltd, Lwin Khin Shar Singapore Management University
File Attached
15:42
12m
Talk
Combatting Front-Running in Smart Contracts: Attack Mining, Benchmark Construction and Vulnerability Detector Evaluation
Journal-first Papers
Wuqi Zhang The Hong Kong University of Science and Technology, Lili Wei McGill University, Shing-Chi Cheung Hong Kong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Shuqing Li The Chinese University of Hong Kong, Lu Liu The Hong Kong University of Science and Technology, Michael Lyu The Chinese University of Hong Kong
Link to publication DOI Pre-print File Attached
15:54
12m
Talk
Software Engineering Using Autonomous Agents: Are We There Yet?Recorded talk
Industry Showcase (Papers)
Samdyuti Suri Accenture Tech Labs, Sankar Narayan Das Accenture Tech Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India
Media Attached
16:06
12m
Talk
DeFiWarder: Protecting DeFi Apps from Token Leaking VulnerabilitiesRecorded talk
Research Papers
Jianzhong Su Sun Yat-sen University, Xingwei Lin Ant Group, Zhiyuan Fang Sun Yat-sen University, Zhirong Zhu Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Wei Lv Ant Group, Jiashui Wang Zhejiang University & Ant Group
Media Attached
16:18
12m
Talk
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual DeviceRecorded talk
Research Papers
Yuwei Liu Institute of Software, Chinese Academy of Sciences, Siqi Chen Shanghai Jiao Tong University, Yuchong Xie Shanghai Jiao Tong University, Yanhao Wang Qi An Xin Group Corp., Libo Chen Shanghai Jiao Tong University, Bin Wang Beijing Institute of Computer Technology and Applications, Yingming Zeng Beijing Institute of Computer Technology and Applications, Zhi Xue Shanghai Jiao Tong University, Purui Su Institute of Software/CAS China
Media Attached File Attached
16:30
12m
Talk
Smart Prompt Advisor: Multi-objective Prompt Framework for Consistency and Best PracticesRecorded talk
Industry Showcase (Papers)
Kanchanjot Kaur Phokela Accenture, Samarth Sikand Accenture Labs, Kapil Singi Accenture, Kuntal Dey Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India
Media Attached
15:40 - 17:40
SATE - Software Engineering at the Era of LLMsSATE - Software Engineering at the Era of LLMs at Room FR
Chair(s): Xin Xia Huawei Technologies
15:40
40m
Talk
Is State-of-the-Art LLM A Silver Bullet to Automated Software Engineering?
SATE - Software Engineering at the Era of LLMs
Xing Hu Zhejiang University
16:20
40m
Talk
In the Era of AI and LLMs: how to test and robustify Machine-Learning software
SATE - Software Engineering at the Era of LLMs
Yves Le Traon University of Luxembourg, Luxembourg
17:00
40m
Talk
Software Development with Large Language Models
SATE - Software Engineering at the Era of LLMs
Cuiyun Gao Harbin Institute of Technology

Fri 15 Sep

Displayed time zone: Amsterdam, Berlin, Bern, Rome, Stockholm, Vienna change

08:30 - 10:00
Requirements Tutorials at Room DE
08:30
90m
Talk
Social, Legal, Ethical, Empathetic and Cultural Requirements: from Elicitation to Verification
Tutorials
Sinem Getir Yaman University of York, UK, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Beverley Townsend University of York
File Attached
08:30 - 10:00
RefineryTutorials at Room PT*
08:30
90m
Talk
Refinery: Model Generation with Refinement
Tutorials
Oszkár Semeráth Budapest University of Technology and Economics, Kristóf Marussy Budapest University of Technology and Economics, Daniel Varro Linköping University / McGill University
09:00 - 10:00
Openning and Keynote 1[Workshop] A-Mobile at Room FR
09:00
60m
Keynote
On the Soundness of Android Static Analysis
[Workshop] A-Mobile
Jordan Samhi CISPA Helmholtz Center for Information Security
Media Attached
09:00 - 10:00
09:00
60m
Talk
Present to Future: Forging the Future of Quantum Software Testing
[Workshop] A-TEST
Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University
File Attached
10:30 - 12:00
Requirements Tutorials at Room DE
10:30
90m
Talk
Social, Legal, Ethical, Empathetic and Cultural Requirements: from Elicitation to Verification
Tutorials
Sinem Getir Yaman University of York, UK, Ana Cavalcanti University of York, Radu Calinescu University of York, UK, Beverley Townsend University of York
File Attached
10:30 - 11:30
Keynote 2[Workshop] A-Mobile at Room FR
Chair(s): Ting Zhang Singapore Management University
10:30
60m
Keynote
Linking Static Analysis Warnings of Android Apps with App User Reviews
[Workshop] A-Mobile
Lili Wei McGill University
10:30 - 12:00
Technical papers 1[Workshop] A-TEST at Room UK
10:30
30m
Talk
Evaluating the Effectiveness of Neuroevolution for Automated GUI-Based Software Testing
[Workshop] A-TEST
Daniel Zimmermann FZI Research Center for Information Technology, Patrick Deubel FZI Research Center for Information Technology, Anne Koziolek Karlsruhe Institute of Technology
File Attached
11:00
30m
Talk
Automated Test Case Generation for Service Composition from Event Logs
[Workshop] A-TEST
Sebastien Salva LIMOS, IUT CA, UCA, Jarod Sue LIMOS, UCA
11:30
30m
Talk
Exploring Android Apps Using Motif ActionsRecorded talk
[Workshop] A-TEST
Michael Auer University of Passau, Gordon Fraser University of Passau
Media Attached File Attached
11:30 - 12:00
Papers Presentation[Workshop] A-Mobile at Room FR
Chair(s): Ting Zhang Singapore Management University
11:30
10m
Talk
Ecological Impact of Native versus Cross-Platform Mobile Apps: a Preliminary Study
[Workshop] A-Mobile
Vincent Frattaroli Inside App, Olivier Le Goaër LIUPPA, Université de Pau et des Pays de l'Adour, Olivier Philippot Greenspector
Media Attached File Attached
11:40
10m
Talk
Cross-platform mobile app development: the IscteSpots experience
[Workshop] A-Mobile
Joao Carlos Cambaia Gomes de Almeida , Fernando Brito e Abreu ISCTE-IUL, Duarte Almeida Iscte - Instituto Universitário de Lisboa
11:50
10m
Talk
Detecting Temporal Inconsistency in Biased Datasets for Android Malware Detection
[Workshop] A-Mobile
Haonan Hu Southern University of Science and Technology, Yue Liu , Yanjie Zhao Monash Univerisity, Yonghui Liu Monash University, Xiaoyu Sun Australian National University, Australia, Kla Tantithamthavorn Monash University, Li Li Beihang University
13:30 - 15:00
Frama-C Tutorials at Room PT*
13:30
90m
Tutorial
Collaborative Analysis and Verification of C Programs with Frama-C
Tutorials
Frederic Loulergue Université d'Orléans
13:30 - 15:00
Technical papers 2[Workshop] A-TEST at Room UK
13:30
30m
Talk
Improving AFLGo’s directed fuzzing by considering indirect function calls
[Workshop] A-TEST
Fabian Jezuita Fraunhofer Institute for Open Communication Systems
14:00
30m
Talk
Static Test Case Prioritization strategies for Grammar-based Testing
[Workshop] A-TEST
Moeketsi Raselimo Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin, Bernd Fischer Stellenbosch University
14:30
30m
Paper
Test Case Recommendations with Distributed Representation of Code Syntactic FeaturesRecorded talk
[Workshop] A-TEST
Mosab Rezaei Northern Illinois University, Hamed Alhoori Dept. of Computer Science at the Northern Illinois University, Mona Rahimi Dept. of Computer Science at the Northern Illinois University
DOI Authorizer link Media Attached
15:30 - 17:00
Frama-C Tutorials at Room PT*
15:30
90m
Tutorial
Collaborative Analysis and Verification of C Programs with Frama-C
Tutorials
Frederic Loulergue Université d'Orléans
15:30 - 16:50
Technical papers 3[Workshop] A-TEST at Room UK
15:30
20m
Talk
Continuous Domain Input Abstraction and Fault Detection Capability in Combinatorial Testing
[Workshop] A-TEST
Yavuz Koroglu Graz University of Technology, Franz Wotawa Graz University of Technology
File Attached
15:50
20m
Talk
GUI-Based Software Testing: An Automated Approach Using GPT-4 and Selenium WebDriver
[Workshop] A-TEST
Daniel Zimmermann FZI Research Center for Information Technology, Anne Koziolek Karlsruhe Institute of Technology
File Attached
16:10
20m
Talk
Chouette: An Automated Cross-Platform UI Crawler for Improving App Quality
[Workshop] A-TEST
Terrence Wong Duolingo
Pre-print
16:30
20m
Talk
An Empirical Study on the Adoption of Scripted GUI Testing for Android Apps
[Workshop] A-TEST
Ruizhen Gu University of Sheffield, José Miguel Rojas The University of Sheffield
Pre-print

Accepted Papers

Title
A Comparative Study of Transformer-based Neural Text Representation Techniques on Bug Triaging
Research Papers
File Attached
A Comprehensive Study on Code Clones in Automated Driving SoftwareRecorded talk
Research Papers
Pre-print Media Attached File Attached
Adaptive REST API Testing with Reinforcement Learning
Research Papers
Pre-print File Attached
A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem
Research Papers
Link to publication DOI Pre-print
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering
Research Papers
File Attached
An Empirical Study of Malicious Code In PyPI Ecosystem
Research Papers
Pre-print
An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-trained Code Models
Research Papers
An Empirical Study on Fine-tuning Large Language Models of Code for Automated Program RepairACM Distinguished Paper
Research Papers
File Attached
An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the Edge
Research Papers
Pre-print File Attached
An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation Software
Research Papers
File Attached
An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software Engineering
Research Papers
An Intentional Forgetting-Driven Self-Healing Method For Deep Reinforcement Learning SystemsRecorded talk
Research Papers
Pre-print Media Attached
Are They All Good? Studying Practitioners' Expectations on the Readability of Log Messages
Research Papers
Pre-print
Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers
Research Papers
ATOM: Automated Black-Box Testing of Multi-Label Image Classification Systems
Research Papers
Pre-print Media Attached File Attached
AutoConf : Automated Configuration of Unsupervised Learning Systems using Metamorphic Testing and Bayesian Optimization
Research Papers
File Attached
AutoLog: A Log Sequence Synthesis Framework for Anomaly Detection
Research Papers
Pre-print
Automated Fixing of Web UI Tests via Iterative Element Matching
Research Papers
Pre-print Media Attached
Automated Software Entity Matching Between Successive VersionsRecorded talk
Research Papers
DOI Media Attached
Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer Analysis
Research Papers
Pre-print File Attached
Bridging the Gap between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen Considerations
Research Papers
Link to publication DOI Pre-print Media Attached
CAT-LM: Training Language Models on Aligned Code And Tests
Research Papers
Media Attached File Attached
Causality-Aided Trade-off Analysis for Machine Learning Fairness
Research Papers
Pre-print
Cell2Doc: ML Pipeline for Generating Documentation in Computational Notebooks
Research Papers
Pre-print Media Attached
CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature SpaceRecorded talk
Research Papers
Pre-print Media Attached
Code Difference Guided Adversarial Example Generation for Deep Code Models
Research Papers
Pre-print File Attached
CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code Generation
Research Papers
Pre-print Media Attached
Compiler Auto-tuning via Critical Flag Selection
Research Papers
CoMSA: A modeling driven sampling approach for configuration performance testing
Research Papers
Pre-print Media Attached
ConfTainter: Static Taint Analysis For Configuration OptionsRecorded talk
Research Papers
Pre-print Media Attached
Contextuality of Code Representation Learning
Research Papers
Contrastive Learning for API Aspect AnalysisRecorded talk
Research Papers
Pre-print Media Attached
DCLink: Bridging Data Constraint Changes and Implementations in FinTech Systems
Research Papers
File Attached
DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph LearningACM Distinguished Paper
Research Papers
Pre-print File Attached
DeFiWarder: Protecting DeFi Apps from Token Leaking VulnerabilitiesRecorded talk
Research Papers
Media Attached
Delving into Commit-Issue Correlation to Enhance Commit Message Generation Models
Research Papers
Pre-print File Attached
Demystifying Template-based Invariant Generation for Bit-Vector Programs
Research Papers
Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference Count
Research Papers
Pre-print
Detecting Smart Home Automation Application Interferences with Domain KnowledgeACM Distinguished Paper
Research Papers
Pre-print File Attached
Detection of Java Basic Thread Misuses Based on Static Event Analysis
Research Papers
File Attached
Domain Adaptive Code Completion via Language Models and Decoupled Domain DatabasesACM Distinguished PaperRecorded talk
Research Papers
Pre-print Media Attached File Attached
Dynamic Graph Neural Networks-based Alert Link Prediction for Online Service Systems
Research Papers
EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link Recovery
Research Papers
Pre-print Media Attached
Effective Concurrency Testing for Go via Directional Primitive-constrained Interleaving Exploration
Research Papers
File Attached
Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial ExtrapolationRecorded talk
Research Papers
Media Attached File Attached
EndWatch: A Practical Method for Detecting Non-Termination in Real-World SoftwareACM Distinguished Paper
Research Papers
Pre-print File Attached
Enhancing Malware Detection for Android Apps: Detecting Fine-granularity Malicious Components
Research Papers
File Attached
ESRO: Experience Assisted Service Reliability against Outages
Research Papers
File Attached
Expediting Neural Network Verification via Network Reduction
Research Papers
Pre-print File Attached
Fast and Reliable Program Synthesis via User Interaction
Research Papers
File Attached
Fine-Grained In-Context Permission Classification for Android Apps using Control-Flow Graph Embedding
Research Papers
File Attached
Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural Networks
Research Papers
File Attached
FLUX: Finding Bugs with LLVM IR Based Unit Test Crossovers
Research Papers
Pre-print File Attached
Fork Entropy: Assessing the Diversity of Open Source Software Projects' ForksRecorded talk
Research Papers
Media Attached
From Commit Message Generation to History-Aware Commit Message Completion
Research Papers
Pre-print File Attached
From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI Chaining
Research Papers
File Attached
Fuzzing for CPS Mutation Testing
Research Papers
Pre-print File Attached
GAMMA: Revisiting Template-based Automated Program Repair via Mask Prediction
Research Papers
Pre-print Media Attached
Generating Variable Explanations via Zero-shot Prompt LearningRecorded talk
Research Papers
Media Attached
Generative Model-Based Testing on Decision-Making Policies
Research Papers
File Attached
Generative Type Inference for PythonACM Distinguished Paper
Research Papers
Pre-print File Attached
HexT5: Unified Pre-training for Stripped Binary Code Information InferenceRecorded talk
Research Papers
Media Attached File Attached
HOBAT: Batch Verification for Homogeneous Structural Neural NetworksRecorded talk
Research Papers
Media Attached File Attached
How Android Apps Break the Data Minimization Principle: An Empirical Study
Research Papers
Pre-print File Attached
How to Train Your Neural Bug Detector: Artificial vs Real Bugs
Research Papers
Pre-print File Attached
iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping AlgorithmRecorded talk
Research Papers
Pre-print Media Attached
Identify and Update Test Cases when Production Code Changes: A Transformer-based Approach
Research Papers
Improving code extraction from coding screencasts using a code-aware encoder-decoder model
Research Papers
File Attached
Increasing the Responsiveness of Web Applications by Introducing Lazy Loading
Research Papers
InfeRE: Step-by-Step Regex Generation via Chain of Inference
Research Papers
Pre-print File Attached
Information Retrieval-based Fault Localization for Concurrent ProgramsRecorded talk
Research Papers
Pre-print Media Attached
LeakPair: Proactive Repairing of Memory Leaks in Single Page Web ApplicationsACM Distinguished Paper
Research Papers
Pre-print Media Attached
LEAP: Efficient and Automated Test Method for NLP SoftwareRecorded talk
Research Papers
Media Attached
Learning to Locate and Describe Vulnerabilities
Research Papers
Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI ChainRecorded talk
Research Papers
Media Attached
LiSum: Open Source Software License Summarization with Multi-Task LearningRecorded talk
Research Papers
Pre-print Media Attached
LogOnline: A Semi-supervised Log-based Anomaly Detector Aided with Online Learning MechanismRecorded talk
Research Papers
Link to publication DOI Media Attached
Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional Diffusion
Research Papers
Pre-print
MELT: Mining Effective Lightweight Transformations from Pull Requests
Research Papers
Pre-print File Attached
Merge Conflict Resolution: Classification or Generation?
Research Papers
Pre-print File Attached
Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value FlowsACM Distinguished Paper
Research Papers
Pre-print File Attached
Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem
Research Papers
MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler Infrastructure
Research Papers
Pre-print File Attached
Mutation-based Fault Localization of Deep Neural NetworksACM Distinguished Paper
Research Papers
Pre-print
NaturalFuzz: Natural Input Generation for Big Data Analytics
Research Papers
File Attached
Neural SZZ Algorithm
Research Papers
Pre-print
Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential Prompting
Research Papers
Pre-print
On the Evaluation of Neural Code Translation: Taxonomy and Benchmark
Research Papers
Pre-print File Attached
On-the-fly Improving Performance of Deep Code Models via Input Denoising
Research Papers
Pre-print File Attached
Optimizing Continuous Development By Detecting and Preventing Unnecessary Content Generation
Research Papers
Pre-print Media Attached
OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL Reachability with Attribute Checking
Research Papers
Pre-print File Attached
PERFCE: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality Analysis
Research Papers
Pre-print
Persisting and Reusing Results of Static Program Analyses on a Large Scale
Research Papers
Pre-print
Personalized First Issue Recommender for Newcomers in Open Source Projects
Research Papers
Pre-print
PHYFU: Fuzzing Modern Physics Simulation EnginesACM Distinguished Paper
Research Papers
Link to publication DOI
Pluggable Type Inference for Free
Research Papers
Link to publication Pre-print File Attached
Precise Data-Driven Approximation for Program Analysis via FuzzingRecorded talk
Research Papers
Pre-print Media Attached
Prism: Revealing Hidden Functional Clusters of Massive Instances in Cloud Systems
Research Papers
Pre-print File Attached
PTdetector: An Automated JavaScript Front-end Library Detector
Research Papers
Link to publication
QuraTest: Integrating Quantum Specific Features in Quantum Program Testing
Research Papers
File Attached
Repeated Builds During Code Review: An Empirical Study of the OpenStack Community
Research Papers
Pre-print File Attached
ReuNify: A Step Towards Whole Program Analysis for React Native Android App
Research Papers
Pre-print
Revealing Performance Issues in Server-side WebAssembly Runtimes via Differential Testing
Research Papers
Pre-print
Revisiting and Improving Retrieval-Augmented Deep Assertion Generation
Research Papers
Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code Classifiers
Research Papers
Pre-print
Scene-Driven Exploration and GUI Modeling for Android AppsRecorded talk
Research Papers
Media Attached
SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding Practices
Research Papers
Media Attached File Attached
SmartCoCo: Checking Comment-code Inconsistency in Smart Contracts via Constraint Propagation and Binding
Research Papers
DOI File Attached
SMT Solver Validation Empowered by Large Pre-trained Language Models
Research Papers
Pre-print File Attached
Software Entity Recognition with Noise-Robust LearningRecorded talk
Research Papers
Pre-print Media Attached File Attached
Symbolic Fixpoint Algorithms for Logical LTL Games
Research Papers
Pre-print Media Attached File Attached
Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks
Research Papers
Pre-print Media Attached File Attached
The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language Models
Research Papers
Pre-print
The MAP metric in Information Retrieval Fault Localization
Research Papers
Media Attached File Attached
The Plastic Surgery Hypothesis in the Era of Large Language Models
Research Papers
Pre-print
Thunderkaller: Profiling and Improving the Performance of Syzkaller
Research Papers
File Attached
To Share, or Not to Share: Exploring Test-Case Reusability in Fork Ecosystems
Research Papers
File Attached
Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We?
Research Papers
Pre-print File Attached
Twin Graph-based Anomaly Detection via Attentive Multi-Modal Learning for Microservice System
Research Papers
Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis
Research Papers
Pre-print File Attached
Understanding and Enhancing Issue Prioritization in GitHub
Research Papers
Understanding and Remediating Open-Source License Incompatibilities in the PyPI Ecosystem
Research Papers
Pre-print
Using Deep Learning to Automatically Improve Code Readability
Research Papers
Pre-print
VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual DeviceRecorded talk
Research Papers
Media Attached File Attached
Vicious Cycles in Distributed Software SystemsRecorded talk
Research Papers
Pre-print Media Attached
Vision-based Widget Mapping for Test Migration across Mobile Platforms: Are We There Yet?
Research Papers
VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage
Research Papers
File Attached
WADIFF: A Differential Testing Framework for WebAssembly Runtimes
Research Papers
File Attached
WeMinT: Tainting Sensitive Data Leaks in WeChat Mini-Programs
Research Papers
What Makes Good In-context Demonstrations for Code Intelligence Tasks with LLMs?
Research Papers
Pre-print File Attached
When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection
Research Papers
Where to Go Now? Finding Alternatives for Declining Packages in the npm Ecosystem
Research Papers
Pre-print
Who is the Real Hero? Measuring Developer Contribution via Multi-dimensional Data Integration
Research Papers
Pre-print
ZC3 Zero-Shot Cross-Language Code Clone Detection
Research Papers
Pre-print File Attached

Call for Papers

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2023 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:

  • Requirements and Design
    • requirements elicitation and management, traceability analysis;
    • architecture and design;
    • modeling and model-driven engineering;
    • software product lines;
    • component-based, service-oriented systems;
    • OO/Aspect-oriented.
  • Testing and Analysis
    • regression, mutation, model-based testing;
    • program analysis;
    • program synthesis;
    • program repairs.
  • Tools and Processes
    • release engineering and DevOps;
    • configuration and release management;
    • Agile processes.
  • Maintenance and Evolution
    • debugging and fault-localization;
    • refactoring and reengineering;
    • reverse engineering;
    • software reuse;
    • API design and management.
  • Formal Aspects of Software Engineering
    • formal methods, validation and verification;
    • programming languages;
    • specification languages, DSLs.
  • AI and Software Engineering
    • search-based software engineering;
    • recommender systems;
    • autonomous and self-adapting systems;
    • AI for SE;
    • SE for AI.
  • Software Analytics
    • mining software repositories;
    • apps and app store analysis.
  • Human Aspects of Software Engineering
    • program comprehension;
    • systematic reviews, code inspection;
    • human-computer interface;
    • software visualization;
    • crowd-based software engineering;
    • distributed and collaborative software engineering.
  • Social Aspects of Software Engineering
    • green and sustainable technologies;
    • software economics;
    • ethics in software engineering.
  • Dependability, Safety, and Reliability
    • privacy and security;
    • reliability;
    • safety;
    • performance.

ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.


Submission Categories and Evaluation Criteria

We solicit submissions in two categories:

Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:

  • clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
  • articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
  • show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.

Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:

  • clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
  • present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
  • carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.

Papers in both categories should:

  • discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
  • provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
  • include an adequate use of the English language, absence of major ambiguity, and with clearly readable figures and tables;
  • adhere to the formatting instructions provided below.

New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.


Originality

Papers submitted to ASE 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2023. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.

To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.


Double-Anonymous Review Process

The ASE 2023 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:

  • Authors’ names and affiliated institution names must be omitted from the submission.
  • All references to the author’s prior work should be in the third person.
  • Authors are encouraged to title their submission differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.

Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.


Artifact Availability and Supplementary Material

We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.

Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:

https://ineed.coffee/5205/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance/

Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2023 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.


ACM Policy on Research Involving Humans

If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects

It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.


Formatting and Submission Guidelines

Abstracts and papers must be submitted electronically through the ASE 2023 HotCRP submission site: https://ase2023.hotcrp.com/. All submissions must be in English.

For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interests. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.

All submissions must be in PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option).

Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.

Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.

The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs.


Accepted Papers

Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.

After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommended a change for clarity or accuracy with the paper content.

We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include, but are not limited to, Figshare and Zenodo.

If a submission is accepted, at least one author of the paper is required to register for ASE 2023 and present the paper.


Questions and Comments

If you have any further questions, please contact the PC chairs at cbird@microsoft.com and f.sarro@ucl.ac.uk .

</