ASE 2024
Sun 27 October - Fri 1 November 2024 Sacramento, California, United States
Dates
Tue 29 Oct 2024
Wed 30 Oct 2024
Thu 31 Oct 2024
Tracks
ASE Catering
ASE Industry Showcase
ASE Journal-first Papers
ASE NIER Track
ASE Research Papers
ASE Tool Demonstrations
Plenary
Hide plenary sessions
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 29 Oct

Displayed time zone: Pacific Time (US & Canada) change

10:30 - 12:00
Test selection and prioritizationResearch Papers / Journal-first Papers / NIER Track at Camellia
Chair(s): Wing Lam George Mason University
11:15
15m
Talk
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection
Research Papers
Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Xiyue Zhang University of Oxford, Youcheng Sun University of Manchester, Marta Kwiatkowska University of Oxford, Jiming Chen Zhejiang University; Hangzhou Dianzi University, Peng Cheng Zhejiang University
11:30
15m
Talk
Hybrid Regression Test Selection by Integrating File and Method Dependences
Research Papers
Guofeng Zhang College of Computer, National University of Defense Technology, Luyao Liu College of Computer, National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Ji Wang National University of Defense Technology
DOI Pre-print
10:30 - 12:00
Requirement engineeringResearch Papers / NIER Track / Journal-first Papers at Carr
Chair(s): Lina Marsso University of Toronto
10:30
15m
Talk
Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach
Research Papers
Jialiang Wei EuroMov DHM, Univ Montpellier & IMT Mines Ales, Anne-Lise Courbis IMT Mines Alès, Thomas Lambolais IMT Mines Alès, Binbin Xu IMT Mines Alès, Pierre Louis Bernard University of Montpellier, Gerard Dray IMT Mines Alès, Walid Maalej University of Hamburg
Pre-print
10:45
15m
Talk
Efficient Slicing of Feature Models via Projected d-DNNF Compilation
Research Papers
Chico Sundermann University of Ulm, Jacob Loth University of Ulm, Thomas Thüm Paderborn University
11:15
15m
Talk
Blackbox Observability of Features and Feature Interactions
Research Papers
Kallistos Weis Saarland University, Leopoldo Teixeira Federal University of Pernambuco, Clemens Dubslaff Eindhoven University of Technology, Sven Apel Saarland University
Pre-print
11:30
15m
Talk
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects
Research Papers
Kexin Sun Nanjing University, Yiding Ren Nanjing University, Hongyu Kuang Nanjing University, Hui Gao Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University
Pre-print
10:30 - 12:00
Compiler and PLResearch Papers at Compagno
Chair(s): Bernd Fischer Stellenbosch University
10:30
15m
Talk
Shoot Yourself in the Foot — Efficient Code Causes Inefficiency in Compiler Optimizations
Research Papers
Fengjuan Gao Nanjing University of Science and Technology, Hongyu Chen Nanjing University, Yuewei Zhou Rice University, Ke Wang Visa Research
10:45
15m
Talk
Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation
Research Papers
Wenzhang Yang University of Science and Technology of China, Cuifeng Gao University of Science and Technology of China, Xiaoyuan Liu University of Science and Technology of China, Yuekang Li UNSW, Yinxing Xue University of Science and Technology of China
11:00
15m
Talk
Compiler Bug Isolation via Enhanced Test Program Mutation
Research Papers
Yujie Liu Peking University, Mingxuan Zhu Peking University, Jinhao Dong Peking University, Junzhe Yu Peking University, Dan Hao Peking University
11:15
15m
Talk
Incremental Context-free Grammar Inference in Black Box Settings
Research Papers
Feifei Li Tsinghua Shenzhen International Graduate School, Xiao Chen University of Newcastle, Xi Xiao Tsinghua Shenzhen International Graduate School, Tsinghua University, Xiaoyu Sun Australian National University, Australia, Chuan Chen Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China, Shaohua Wang Central University of Finance and Economics, Jitao Han Central University of Finance and Economics
11:30
15m
Talk
Typed and Confused: Studying the Unexpected Dangers of Gradual Typing
Research Papers
Dominic Troppmann CISPA Helmholtz Center for Information Security, Aurore Fass CISPA Helmholtz Center for Information Security, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security
11:45
15m
Talk
Refinement Types for Visualization
Research Papers
Jingtao Xia University of California, Santa Barbara, Junrui Liu University of California, Santa Barbara, Nicholas Brown University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Yu Feng University of California at Santa Barbara
10:30 - 12:00
Vulnerability and security1Research Papers / Tool Demonstrations at Gardenia
Chair(s): Curtis Atkisson UW
10:30
15m
Talk
REACT: IR-Level Patch Presence Test for Binary
Research Papers
Qi Zhan Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University
10:45
15m
Talk
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection
Research Papers
Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, David Lo Singapore Management University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Xiaolei Liu China Academy of Engineering Physics, Xingwei Lin Zhejiang University, Wei Liu Nanjing University
Media Attached
11:00
15m
Talk
Unveiling the Characteristics and Impact of Security Patch Evolution
Research Papers
Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zichao Wei Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Media Attached
11:15
15m
Talk
Compositional Security Analysis of Dynamic Component-based Systems
Research Papers
Narges Khakpour Newcastle University, UK, Charilaos Skandylas Linnaeus University
11:30
15m
Talk
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities
Research Papers
Susheng Wu Fudan University, Ruisi Wang Fudan University, Kaifeng Huang Tongji University, Yiheng Cao Fudan University, Wenyan Song Fudan University, Zhuotong Zhou Fudan University, China, Yiheng Huang Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University
Media Attached
10:30 - 12:00
SE for AI 1NIER Track / Journal-first Papers / Research Papers at Magnoila
Chair(s): Chengcheng Wan East China Normal University
10:30
15m
Talk
Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing
Research Papers
Yihui Xu Soochow University, Yanhui Li Nanjing University, Jun Wang Nanjing University, Xiaofang Zhang Soochow University
DOI
10:45
15m
Talk
Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training
Research Papers
Yangsen Wang Peking University, Yizhou Chen Peking University, Yifan Zhao Peking University, Zhihao Gong Peking University, Junjie Chen Tianjin University, Dan Hao Peking University
DOI Pre-print
13:30 - 15:00
LLM for SE 1Research Papers / NIER Track / Tool Demonstrations / Journal-first Papers at Camellia
Chair(s): Chengcheng Wan East China Normal University
13:30
15m
Talk
How Effective Do Code Language Models Understand Poor-Readability Code?
Research Papers
Chao Hu Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Fandong Meng WeChat AI, Tencent, Jie Zhou Tencent, Xiaodong Gu Shanghai Jiao Tong University
13:45
15m
Talk
An Empirical Study to Evaluate AIGC Detectors on Code Content
Research Papers
Jian Wang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University
Pre-print
14:15
15m
Talk
Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency
Research Papers
Zhang Yichi , Zixi Liu Nanjing University, Yang Feng Nanjing University, Baowen Xu Nanjing University
13:30 - 15:00
Web and UIResearch Papers / Industry Showcase / Tool Demonstrations at Carr
Chair(s): Mattia Fazzini University of Minnesota
13:30
15m
Talk
Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents
Research Papers
Shaoheng Cao Nanjing University, Renyi Chen Samsung Electronics(China)R&D Centre, Minxue Pan Nanjing University, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Xuandong Li Nanjing University
14:00
15m
Talk
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics
Research Papers
Yuanhong Lan Nanjing University, Yifei Lu Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University
14:15
15m
Talk
Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study
Research Papers
Yujia Fan Southern University of Science and Technology, Sinan Wang Southern University of Science and Technology, Zebang Fei Southern University of Science and Technology, Yao Qin Southern University of Science and Technology, Huaxuan Li Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology
13:30 - 15:00
Root-cause analysisResearch Papers at Compagno
Chair(s): Curtis Atkisson UW
13:30
15m
Talk
Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We?
Research Papers
Luan Pham RMIT University, Huong Ha RMIT University, Hongyu Zhang Chongqing University
Pre-print
13:45
15m
Talk
The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier
Research Papers
Yongqi Han Tongji University, Qingfeng Du Tongji University, Ying Huang Tongji University, Jiaqi Wu Zhejiang University, Fulong Tian Di-Matrix(Shanghai) Information Technology Co., Ltd, Cheng He Di-Matrix(Shanghai) Information Technology Co., Ltd
14:00
15m
Talk
MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data
Research Papers
Wang yidan The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Zhouruixing Zhu Chinese University of Hong Kong, Shenzhen, Qiuai Fu Huawei Cloud Computing Technologies CO., LTD., Yuchi Ma Huawei Cloud Computing Technologies, Pinjia He Chinese University of Hong Kong, Shenzhen
14:15
15m
Talk
Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization
Research Papers
Lei Tao Nankai University, Shenglin Zhang Nankai University, ZedongJia Nankai University, Jinrui Sun Nankai University, Minghua Ma Microsoft Research, Zhengdan Li Nankai University, Yongqian Sun Nankai University, Canqun Yang National University of Defense Technology, Yuzhi Zhang Nankai University, Dan Pei Tsinghua University
13:30 - 15:00
Testing 1Research Papers / Industry Showcase at Gardenia
Chair(s): Jialun Cao Hong Kong University of Science and Technology
13:30
15m
Talk
Spotting Code Mutation for Predictive Mutation Testing
Research Papers
Yifan Zhao Peking University, Yizhou Chen Peking University, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Qingyuan Liang Peking University, Guoqing Wang Peking University, Dan Hao Peking University
13:45
15m
Talk
Efficient Detection of Test Interference in C Projects
Research Papers
Florian Eder LMU Munich, Stefan Winter Ulm University and LMU Munich
14:00
15m
Talk
MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing
Research Papers
Congying Xu The Hong Kong University of Science and Technology, China, Songqiang Chen The Hong Kong University of Science and Technology, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Valerio Terragni University of Auckland, Hengcheng Zhu The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology
14:15
15m
Talk
Approximation-guided Fairness Testing through Discriminatory Space Analysis
Research Papers
Zhenjiang Zhao Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan, Takahisa Toda The University of Electro-Communications, Takashi Kitamura
14:45
15m
Talk
Test Case Generation for Simulink Models using Model Fuzzing and State Solving
Research Papers
Zhuo Su KLISS, BNRist, School of Software, Tsinghua University, Zehong Yu KLISS, BNRist, School of Software, Tsinghua University, Dongyan Wang Information Technology Center, Renmin University of China, Wanli Chang College of Computer Science and Electronic Engineering, Hunan University, Bin Gu Beijing Institute of Control Engineering, Yu Jiang Tsinghua University
13:30 - 15:00
AndroidJournal-first Papers / Research Papers / Industry Showcase at Magnoila
Chair(s): Ziyao He University of California, Irvine
13:30
15m
Talk
How Does Code Optimization Impact Third-party Library Detection for Android Applications?ACM SigSoft Distinguished Paper Award
Research Papers
Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Tinghan Li Huazhong University of Science and Technology, Yiding Zhu Huazhong University of Science and Technology, Qinsheng Hou Shandong University; Qi An Xin Group Corp., Hai Jin Huazhong University of Science and Technology
Media Attached
13:45
15m
Talk
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
Research Papers
Jingnan Zheng National University of Singapore, Jiahao Liu National University of Singapore, An Zhang , Jun ZENG Huawei, Ziqi Yang Zhejiang University, Zhenkai Liang National University of Singapore, Tat-Seng Chua National University of Singapore
14:00
15m
Talk
A Longitudinal Analysis Of Replicas in the Wild Wild Android
Research Papers
Syeda Mashal Abbas Zaidi University of Waterloo, Shahpar Khan University of Waterloo, Parjanya Vyas University of Waterloo, Yousra Aafer University of Waterloo
15:30 - 16:30
Code generation 1Journal-first Papers / Research Papers / Industry Showcase at Camellia
Chair(s): Denys Poshyvanyk William & Mary
15:30
15m
Talk
AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models
Research Papers
Zhong Li , Chong Zhang Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Xuandong Li Nanjing University
16:15
15m
Talk
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code
Research Papers
jiafeng University of Electronic Science and Technology of China, Jiachen Liu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Chun Yong Chong Huawei, Chaozheng Wang The Chinese University of Hong Kong, Shan Gao Huawei, Xin Xia Huawei
Link to publication DOI Pre-print Media Attached
15:30 - 17:00
15:30
15m
Talk
AI-driven Java Performance Testing: Balancing Result Quality with Testing Time
Research Papers
Luca Traini University of L'Aquila, Federico Di Menna University of L'Aquila, Vittorio Cortellessa University of L'Aquila
DOI Pre-print
16:00
15m
Talk
Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code
Research Papers
Muzi Qu University of Chinese Academy of Sciences, Jie Liu Institute of Software, Chinese Academy of Sciences, Liangyi Kang Institute of Software, Chinese Academy of Sciences, Shuai Wang Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences, Tao Huang Institute of Software at Chinese Academy of Sciences
15:30 - 16:30
Program and Code translationResearch Papers / Tool Demonstrations at Compagno
Chair(s): Haiyan Zhao Peking University
15:30
15m
Talk
To Tag, or Not to Tag: Translating C’s Unions to Rust’s Tagged Unions
Research Papers
DOI
15:45
15m
Talk
Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data
Research Papers
Ming Zhu Virginia Tech, Mohimenul Karim Virginia Tech, Ismini Lourentzou Virginia Tech, Daphne Yao Virginia Tech
16:00
15m
Talk
A Joint Learning Model with Variational Interaction for Multilingual Program Translation
Research Papers
Yali Du Nanjing University, Hui Sun Nanjing University, National Key Laboratory for Novel Software Technology, China; Nanjing University, School of Artificial Intelligence, China, Ming Li Nanjing University
15:30 - 16:30
GDPR and privacyTool Demonstrations / Research Papers / Journal-first Papers at Gardenia
Chair(s): Lina Marsso University of Toronto
15:30
15m
Talk
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps
Research Papers
Ming Fan Xi'an Jiaotong University, Jifei Shi Xi'an Jiaotong University, Yin Wang Xi'an Jiaotong University, Le Yu Nanjing University of Posts and Telecommunications, Xicheng Zhang Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
15:45
15m
Talk
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-ProgramsACM SigSoft Distinguished Paper Award
Research Papers
Yin Wang Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Jiajia Li Ant Group, Wenbo Chen Ant Group, Shijie Li Ant Group, Yu Zhang Ant Group, Deqiang Han Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
16:30 - 17:30
Fuzzing 1Research Papers / Journal-first Papers / Industry Showcase / Tool Demonstrations at Camellia
Chair(s): Parnian Kamran University of California, Davis
16:30
12m
Talk
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing
Research Papers
Zhuotong Zhou Fudan University, China, Yongzhuo Yang Fudan University, Susheng Wu Fudan University, Yiheng Huang Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University
16:30 - 17:30
Program analysis 1Research Papers / Tool Demonstrations at Compagno
Chair(s): Mugdha Khedkar Heinz Nixdorf Institute at Paderborn University
16:30
15m
Talk
Parf: Adaptive Parameter Tuning for Abstract Interpretation
Research Papers
Zhongyi Wang Zhejiang University, China, Linyu Yang Zhejiang University, Mingshuai Chen Zhejiang University, Yixuan Bu Zhejiang University, Zhiyang Li Zhejiang University, Qiuye Wang Fermat Labs, Huawei Inc., Shengchao Qin Fermat Labs, Huawei, Xiao Yi Fermat Labs, Huawei Inc., Jianwei Yin Zhejiang University
16:45
15m
Talk
Discovering Likely Program Invariants for Persistent Memory
Research Papers
Zunchen Huang , Srivatsan Ravi University of Southern California, Chao Wang University of Southern California
16:30 - 17:30
Smart contract and block chain 1Journal-first Papers / Research Papers / Tool Demonstrations at Gardenia
Chair(s): Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis
16:30
15m
Talk
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts
Research Papers
Haijun Wang Xi’an Jiaotong University, Yurui Hu Xi'an Jiaotong University, Hao Wu Xi'an JiaoTong University, Dijun Liu Ant Group, Chenyang Peng Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
16:30 - 17:30
Program repair 1Research Papers / Tool Demonstrations / NIER Track at Magnoila
Chair(s): Vikram Nitin Columbia University
16:30
15m
Talk
Enhancing the Efficiency of Automated Program Repair via Greybox Analysis
Research Papers
YoungJae Kim Ulsan National Institute of Science and Technology, Yechan Park UNIST, Seungheon Han UNIST, Jooyong Yi UNIST
16:45
15m
Talk
VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair
Research Papers
Jian Zhang Nanyang Technological University, Chong Wang Nanyang Technological University, Anran Li Nanyang Technological University, Wenhan Wang University of Alberta, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University

Wed 30 Oct

Displayed time zone: Pacific Time (US & Canada) change

10:30 - 12:00
AIWareResearch Papers / Journal-first Papers at Camellia
Chair(s): Vladimir Filkov University of California at Davis, USA
10:30
15m
Talk
Imperceptible Content Poisoning in LLM-Powered Applications
Research Papers
Quan Zhang Tsinghua University, Chijin Zhou Tsinghua University, Gwihwan Go Tsinghua University, Binqi Zeng Central South University, Heyuan Shi Central South University, Zichen Xu The Nanchang University, Yu Jiang Tsinghua University
10:45
15m
Talk
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners’ Perspective
Research Papers
Xiao Yu Huawei, Zexian Zhang Wuhan University of Technology, Feifei Niu University of Ottawa, Xing Hu Zhejiang University, Xin Xia Huawei, John Grundy Monash University
Media Attached
11:15
15m
Talk
Efficient Detection of Toxic Prompts in Large Language Models
Research Papers
Yi Liu Nanyang Technological University, Huijia Sun ShanghaiTech University, Ling Shi Nanyang Technological University, Gelei Deng Nanyang Technological University, Yuqi Chen ShanghaiTech University, Junzhe Yu ShanghaiTech University, Yang Liu Nanyang Technological University
11:30
15m
Talk
Exploring ChatGPT App Ecosystem: Distribution, Deployment and SecurityACM SigSoft Distinguished Paper Award
Research Papers
Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Liuhuo Wan University of Queensland, Tian Yang Ooi University of Queensland, Ruomai Ren University of Queensland, Guangdong Bai University of Queensland
11:45
15m
Talk
DataRecipe — How to Cook the Data for CodeLLM?
Research Papers
Kisub Kim Singapore Management University, Singapore, Jounghoon Kim Chinese University of Hong Kong, Hong Kong, Byeongjo Park Chungbuk National University, Korea, Dongsun Kim Korea University, Chun Yong Chong Monash University Malaysia, Yuan Wang Independent Researcher, Hong Kong, Tiezhu Sun University of Luxembourg, Xunzhu Tang University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg
10:30 - 12:00
Log and trace; failure and faultResearch Papers / Industry Showcase at Carr
Chair(s): Yiming Tang Rochester Institute of Technology
10:30
15m
Talk
Demonstration-Free: Towards More Practical Log Parsing with Large Language Models
Research Papers
Yi Xiao , Van-Hoang Le The University of Newcastle, Hongyu Zhang Chongqing University
10:45
15m
Talk
Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing
Research Papers
Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Yifan Wu Peking University, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Pinjia He Chinese University of Hong Kong, Shenzhen
11:00
15m
Talk
Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach
Research Papers
Vittoriano Muttillo University of Teramo, Claudio Di Sipio University of l'Aquila, Riccardo Rubei University of L'Aquila, Luca Berardinelli Johannes Kepler University Linz, MohammadHadi Dehghani Johannes Kepler University Linz
11:30
15m
Talk
FAIL: Analyzing Software Failures from the News Using LLMs
Research Papers
Dharun Anandayuvaraj Purdue University, Matthew Campbell Purdue University, Arav Tewari Purdue University, James C. Davis Purdue University
DOI Pre-print
11:45
15m
Talk
Do not neglect what's on your hands: localizing software faults with exception trigger streamACM SigSoft Distinguished Paper Award
Research Papers
Xihao Zhang School of Computer Science, Wuhan University, Yi Song School of Computer Science, Wuhan University, Xiaoyuan Xie Wuhan University, Qi Xin Wuhan University, Chenliang Xing School of Computer Science, Wuhan University
10:30 - 12:00
Program analysis 2Research Papers / Industry Showcase at Compagno
Chair(s): Qingkai Shi Nanjing University
10:30
15m
Talk
Semantic-Enhanced Indirect Call Analysis with Large Language Models
Research Papers
Baijun Cheng Peking University, Cen Zhang Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology, Yao Guo Peking University, Xiangqun Chen Peking University
10:45
15m
Talk
Scaler: Efficient and Effective Cross Flow Analysis
Research Papers
Steven (Jiaxun) Tang University of Massachusetts Amherst, Mingcan Xiang University of Massachusetts Amherst, Yang Wang The Ohio State University, Bo Wu Colorado School of Mines, Jianjun Chen Bytedance, Tongping Liu ByteDance
11:00
15m
Talk
AXA: Cross-Language Analysis through Integration of Single-Language Analyses
Research Papers
Tobias Roth TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Julius Näumann TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE
Link to publication DOI Pre-print
11:15
15m
Talk
TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning
Research Papers
Zirui Song The Chinese University of Hong Kong, YuTong Zhou The Chinese University of Hong Kong, Shuaike Dong Ant Group, Ke Zhang , Kehuan Zhang The Chinese University of Hong Kong
11:45
15m
Talk
Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects
Research Papers
Nick Feng University of Toronto, Lina Marsso University of Toronto, Marsha Chechik University of Toronto
10:30 - 12:00
Code generation 2Research Papers / Tool Demonstrations at Gardenia
Chair(s): Yangruibo Ding Columbia University
10:30
15m
Talk
Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation
Research Papers
Xinyu Gao , Yun Xiong Fudan University, Deze Wang National University of Defense Technology, Zhenhan Guan Fudan University, Zejian Shi Fudan University, Haofen Wang Tongji University, Shanshan Li National University of Defense Technology
Pre-print
10:45
15m
Talk
Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates
Research Papers
Zhihong Sun Shandong Normal University, Yao Wan Huazhong University of Science and Technology, Jia Li , Hongyu Zhang Chongqing University, Zhi Jin Peking University, Ge Li Peking University, Chen Lyu Shandong Normal University
11:00
15m
Talk
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization
Research Papers
Zhi Chen Singapore Management University, Lingxiao Jiang Singapore Management University
Pre-print
11:15
15m
Talk
JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models
Research Papers
Jialun Cao Hong Kong University of Science and Technology, Zhiyong Chen Nanjing University, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Chang Xu Nanjing University
11:45
15m
Talk
Contextualized Data-Wrangling Code Generation in Computational Notebooks
Research Papers
Junjie Huang The Chinese University of Hong Kong, Daya Guo Sun-yat Sen University, Chenglong Wang Microsoft Research, Jiazhen Gu Chinese University of Hong Kong, Shuai Lu Microsoft Research, Jeevana Priya Inala Microsoft Research, Cong Yan Microsoft Research, Jianfeng Gao Microsoft Research, Nan Duan Microsoft Research, Michael Lyu The Chinese University of Hong Kong
10:30 - 12:00
Testing 2Research Papers / Industry Showcase at Magnoila
Chair(s): Wing Lam George Mason University
10:30
15m
Talk
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests
Research Papers
Mouxiang Chen Zhejiang University, Zhongxin Liu Zhejiang University, He Tao Zhejiang University, Yusu Hong Zhejiang University, David Lo Singapore Management University, Xin Xia Huawei, JianLing Sun Zhejiang University
10:45
15m
Talk
Reducing Test Runtime by Transforming Test FixturesACM SigSoft Distinguished Paper Award
Research Papers
Chengpeng Li University of Texas at Austin, Abdelrahman Baz The University of Texas at Austin, August Shi The University of Texas at Austin
11:00
15m
Talk
Efficient Incremental Code Coverage Analysis for Regression Test Suites
Research Papers
Jiale Amber Wang University of Waterloo, Kaiyuan Wang Google, Pengyu Nie University of Waterloo
11:15
15m
Talk
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness DetectionACM SigSoft Distinguished Paper Award
Research Papers
Huan Xie Chongqing University, Yan Lei Chongqing University, Maojin Li Chongqing University, Meng Yan Chongqing University, Sheng Zhang Chongqing University
11:30
15m
Talk
A Combinatorial Testing Approach to Surrogate Model Construction
Research Papers
Sunny Shree The University of Texas at Arlington, Krishna Khadka The University of Texas at Arlington, Jeff Yu Lei University of Texas at Arlington, Raghu Kacker National Institute of Standards and Technology, D. Richard Kuhn National Institute of Standards and Technology
13:30 - 15:00
LLM for SE 2NIER Track / Research Papers / Industry Showcase / Tool Demonstrations at Camellia
Chair(s): Wenxi Wang University of Virgina
13:30
15m
Talk
A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How
Research Papers
Chaozheng Wang The Chinese University of Hong Kong, Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Chun Yong Chong Huawei, Shan Gao Huawei, Michael Lyu The Chinese University of Hong Kong
14:00
15m
Talk
Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks
Research Papers
jiawei lu Zhejiang University, Haoye Wang Hangzhou City University, Zhongxin Liu Zhejiang University, Keyu Liang Zhejiang University, Lingfeng Bao Zhejiang University, Xiaohu Yang Zhejiang University
14:15
15m
Talk
WaDec: Decompile WebAssembly Using Large Language Model
Research Papers
Xinyu She Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
13:30 - 15:00
VerificationResearch Papers / Tool Demonstrations at Carr
Chair(s): Tevfik Bultan University of California at Santa Barbara
13:30
15m
Talk
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant InferenceACM SigSoft Distinguished Paper Award
Research Papers
Guangyuan Wu Nanjing University, Weining Cao Nanjing University, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University
13:45
15m
Talk
LLM-Generated Invariants for Bounded Model Checking Without Loop UnrollingACM SigSoft Distinguished Paper Award
Research Papers
Muhammad A. A. Pirzada The University of Manchester, Giles Reger University of Manchester, Ahmed Bhayat Independent Scholar, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil
Link to publication DOI
14:00
15m
Talk
Proof Automation with Large Language Models
Research Papers
Minghai Lu Purdue University, Benjamin Delaware Purdue University, Tianyi Zhang Purdue University
Pre-print
14:15
15m
Talk
Verifying the Option Type With Rely-Guarantee Reasoning
Research Papers
James Yoo University of Washington, Michael D. Ernst University of Washington, René Just University of Washington
Link to publication DOI
13:30 - 15:00
Anomaly and fault detectionResearch Papers / NIER Track at Compagno
Chair(s): Xing Hu Zhejiang University
13:30
15m
Talk
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice
Research Papers
Rui Ren DAMO Academy, Alibaba Group Hangzhou, China, Jingbang Yang DAMO Academy, Alibaba Group Hangzhou, China, Linxiao Yang DAMO Academy, Alibaba Group Hangzhou, China, Xinyue Gu DAMO Academy, Alibaba Group Hangzhou, China, Liang Sun DAMO Academy, Alibaba Group Hangzhou, China
13:45
15m
Talk
ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems
Research Papers
Yongqian Sun Nankai University, Binpeng Shi Nankai University, Mingyu Mao Nankai University, Minghua Ma Microsoft Research, Sibo Xia Nankai University, Shenglin Zhang Nankai University, Dan Pei Tsinghua University
14:00
15m
Talk
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality
Research Papers
Yifan Liao Shanghai Jiao Tong University / National University of Singapore, Ming Xu Shanghai Jiao Tong University / National University of Singapore, Yun Lin Shanghai Jiao Tong University, Xiwen Teoh National University of Singapore, Xiaofei Xie Singapore Management University, Ruitao Feng Singapore Management University, Frank Liauw Government Technology Agency Singapore, Hongyu Zhang Chongqing University, Jin Song Dong National University of Singapore
DOI Pre-print
14:15
15m
Talk
End-to-End AutoML for Unsupervised Log Anomaly Detection
Research Papers
Shenglin Zhang Nankai University, Yuhe Ji Nankai University, Jiaqi Luan Nankai University, Xiaohui Nie Computer Network Information Center at Chinese Academy of Sciences, Zi`ang Cheng Nankai University, Minghua Ma Microsoft Research, Yongqian Sun Nankai University, Dan Pei Tsinghua University
13:30 - 15:00
Autonomous SystemsResearch Papers / Journal-first Papers / Industry Showcase at Gardenia
Chair(s): Qingkai Shi Nanjing University
13:30
15m
Talk
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing
Research Papers
An Guo Nanjing University, Yuan Zhou Nanyang Technological University, Haoxiang Tian Nanyang Technological University, Chunrong Fang Nanjing University, Yunjian Sun Nanjing University, Weisong Sun Nanyang Technological University, Xinyu Gao , Luu Anh Tuan Nanyang Technological University, Yang Liu Nanyang Technological University, Zhenyu Chen Nanjing University
Pre-print
13:45
15m
Talk
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems
Research Papers
Mohammad Hossein Amini University of Ottawa, Shiva Nejati University of Ottawa
14:15
15m
Talk
LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language ModelsACM SigSoft Distinguished Paper Award
Research Papers
Shuncheng Tang University of Science and Technology of China, Zhenya Zhang Kyushu University, Japan, Jixiang Zhou University of Science and Technology of China, Lei Wang National University of Defense Technology, Yuan Zhou Zhejiang Sci-Tech University, Yinxing Xue University of Science and Technology of China
14:30
15m
Talk
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutationACM SigSoft Distinguished Paper Award
Research Papers
Shiwei Feng Purdue University, Yapeng Ye Purdue University, Qingkai Shi Nanjing University, Zhiyuan Cheng Purdue University, Xiangzhe Xu Purdue University, Siyuan Cheng Purdue University, Hongjun Choi DGIST, Xiangyu Zhang Purdue University
13:30 - 15:00
13:30
15m
Talk
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera
Research Papers
Yifan Xie , Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Ying Wang Northeastern University, Jun Ma National University of Defense Technology, Xiaoling Li National University of Defense Technology, Haoran Liu National University of Defense Technology, Ying Fu National University of Defense Technology, Liao Xiangke National University of Defense Technology
14:00
15m
Talk
Detect Hidden Dependency to Untangle Commits
Research Papers
Mengdan Fan , Wei Zhang Peking University, Haiyan Zhao Peking University, Guangtai Liang Huawei Cloud Computing Technologies, Zhi Jin Peking University
14:15
15m
Talk
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries
Research Papers
Igor Wodiany University of Manchester, Antoniu Pop University of Manchester, Mikel Luján University of Manchester
DOI Pre-print
14:30
15m
Talk
Balancing the Quality and Cost of Updating Dependencies
Research Papers
Damien Jaime Université Paris Nanterre & LIP6, Pascal Poizat Université Paris Nanterre & LIP6, Joyce El Haddad Université Paris Dauphine - PSL , Thomas Degueule CNRS
15:30 - 16:30
SE for AI 2NIER Track / Research Papers at Camellia
Chair(s): Wenxi Wang University of Virgina
15:30
15m
Talk
UFront: Toward A Unified MLIR Frontend for Deep Learning
Research Papers
Guoqing Bao Shanghai Enflame Technology Co., Ltd., Heng Shi Shanghai Jiao Tong University, Shanghai Enflame Technology Co., Ltd., Chengyi Cui Shanghai Enflame Technology Co., Ltd., Yalin Zhang Shanghai Enflame Technology Co., Ltd., Jianguo Yao Shanghai Jiao Tong University; Shanghai Enflame Technology
15:45
15m
Talk
FIPSER: Improving Fairness Testing of DNN by Seed Prioritization
Research Papers
Junwei Chen East China Normal University, Yueling Zhang East China Normal University, Lingfeng Zhang East China Normal University, Min Zhang East China Normal University, Chengcheng Wan East China Normal University, Ting Su East China Normal University, Geguang Pu East China Normal University, China
16:00
15m
Talk
Prioritizing Test Inputs for DNNs Using Training Dynamics
Research Papers
Jian Shen Nanjing University, Zhong Li , Minxue Pan Nanjing University, Xuandong Li Nanjing University
15:30 - 16:30
Program repair 2Research Papers at Compagno
Chair(s): Xing Hu Zhejiang University
15:30
15m
Talk
Repairing Regex-Dependent String Functions
Research Papers
Nariyoshi Chida NTT Social Informatics Laboratories, Tachio Terauchi Waseda University
15:45
15m
Talk
FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments
Research Papers
Fang Liu Beihang University, Zhenwei Liu Beihang University, Qianhui Zhao Beihang University, Jing Jiang Beihang University, Li Zhang Beihang University, Zian Sun Beihang University, Ge Li Peking University, Zhongqi Li Huawei Cloud Computing Technologies Co., Ltd., Yuchi Ma Huawei Cloud Computing Technologies
16:00
15m
Talk
Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair
Research Papers
Guochang Li Zhejiang University, Chen Zhi Zhejiang University, Jialiang Chen Zhejiang University, Junxiao Han , Shuiguang Deng Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies
16:15
15m
Talk
Enhancing Automated Program Repair with Solution Design
Research Papers
Jiuang Zhao Beihang University, Donghao Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Zitian Yang Beihang University, Fang Liu Beihang University
15:30 - 16:30
Software processResearch Papers / Industry Showcase / Journal-first Papers at Gardenia
Chair(s): Tim Menzies North Carolina State University
15:30
15m
Talk
An Explainable Automated Model for Measuring Software Engineer Contribution
Research Papers
Yue Li Nanjing University, He Zhang Nanjing University, Yuzhe Jin Nanjing University, Zhong Ren State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University Nanjing, Jiangsu, China, Liming Dong Nanjing University, Jun Lyu Nanjing University, Lanxin Yang Nanjing University, David Lo Singapore Management University, Dong Shao Nanjing University
15:45
15m
Talk
Context-Aware Automated Sprint Plan Generation for Agile Software DevelopmentACM SigSoft Distinguished Paper Award
Research Papers
Elvan Kula Delft University of Technology, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology
15:30 - 16:30
Fuzzing 2Industry Showcase / NIER Track / Research Papers at Magnoila
Chair(s): Marcel Böhme MPI-SP, Bochum
15:30
15m
Talk
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration
Research Papers
Dohyun Ryu The Pennsylvania State University, Giyeol Kim The Pennsylvania State University, Daeun Lee Pusan National University, Seongjin Kim The Pennsylvania State University, Seungjin Bae The Pennsylvania State University, Junghwan Rhee University of Central Oklahoma, Taegyu Kim The Pennsylvania State University

Thu 31 Oct

Displayed time zone: Pacific Time (US & Canada) change

10:30 - 12:00
Release engineeringResearch Papers / NIER Track / Industry Showcase at Camellia
Chair(s): Parnian Kamran University of California, Davis
10:30
15m
Talk
GPP: A Graph-Powered Prioritizer for Code Review Requests
Research Papers
Lanxin Yang Nanjing University, Jinwei Xu Nanjing University, He Zhang Nanjing University, Fanghao Wu Nanjing University, Jun Lyu Nanjing University, Yue Li Nanjing University, Alberto Bacchelli University of Zurich
11:00
15m
Talk
Understanding the Implications of Changes to Build Systems
Research Papers
Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Calgary, Shane McIntosh University of Waterloo
DOI Pre-print
11:15
15m
Talk
Developer-Defined Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns
Research Papers
Mingyang Yin University of Waterloo, Yutaro Kashiwa Nara Institute of Science and Technology, Keheliya Gallaba Centre for Software Excellence, Huawei Canada, Mahmoud Alfadel University of Calgary, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo
DOI Pre-print
10:30 - 12:00
Cloud and Systems Research Papers / Journal-first Papers / Industry Showcase at Carr
Chair(s): Amel Bennaceur The Open University, UK
10:30
15m
Talk
FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows
Research Papers
Yilun Wang Anhui University, Pengfei Chen Sun Yat-sen University, Hui Dou Anhui University, Yiwen Zhang Anhui University, Guangba  Yu Sun Yat-sen University, Zilong He Sun Yat-sen University, Haiyu Huang Sun Yat-sen University
Pre-print
11:15
15m
Talk
Microservice Decomposition Techniques: An Independent Tool Comparison
Research Papers
Yingying Wang University of British Columbia, Sarah Bornais The University of British Columbia, Julia Rubin The University of British Columbia
Pre-print
10:30 - 12:00
Program analysis 3Industry Showcase / Research Papers at Compagno
Chair(s): Xusheng Xiao Arizona State University
10:30
15m
Talk
Language-Agnostic Static Analysis of Probabilistic Programs
Research Papers
Markus Böck TU Wien, Michael Schröder TU Wien, Jürgen Cito TU Wien
10:45
15m
Talk
What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing
Research Papers
Chenyang Yang , Yining Hong Carnegie Mellon University, Grace Lewis Carnegie Mellon Software Engineering Institute, Tongshuang Wu Carnegie Mellon University, Christian Kästner Carnegie Mellon University
11:00
15m
Talk
Interrogation Testing of Program Analyzers for Soundness and Precision Issues
Research Papers
David Kaindlstorfer TU Wien, Austria, Anastasia Isychev TU Wien, Valentin Wüstholz ConsenSys, Maria Christakis TU Wien
11:15
15m
Talk
Constraint-Based Test Oracles for Program Analyzers
Research Papers
Markus Fleischmann TU Wien, Austria, David Kaindlstorfer TU Wien, Austria, Anastasia Isychev TU Wien, Valentin Wüstholz ConsenSys, Maria Christakis TU Wien
11:30
15m
Talk
Program Synthesis Meets Visual What-Comes-Next Puzzles
Research Papers
Sumit Lahiri Indian Institute of Technology Kanpur, Pankaj Kumar Kalita IIT Kanpur, Akshay Kumar Chittora Indian Institute of Technology Kanpur, Varun Vankudre Indian Institute of Technology Kanpur, Subhajit Roy IIT Kanpur
10:30 - 12:00
Test generationResearch Papers / Journal-first Papers at Gardenia
Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign
10:30
15m
Talk
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input GenerationACM SigSoft Distinguished Paper Award
Research Papers
Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Xuanhua Shi Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
11:00
15m
Talk
Effective Unit Test Generation for Java Null Pointer Exceptions
Research Papers
Myungho Lee Korea University, Jiseong Bak Korea University, Seokhyeon Moon , Yoon-Chan Jhi Technology Research, Samsung SDS, Seoul, South Korea, Hakjoo Oh Korea University
11:15
15m
Talk
SlicePromptTest4J: High-coverage Test Generation using LLM via Method Slicing
Research Papers
Zejun Wang Peking University, Kaibo Liu Peking University, Ge Li Peking University, Zhi Jin Peking University
11:30
15m
Talk
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning
Research Papers
Davide Corradini University of Verona, Zeno Montolli University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona
11:45
15m
Talk
On the Evaluation of Large Language Models in Unit Test Generation
Research Papers
Lin Yang Tianjin University, Chen Yang Tianjin University, Shutao Gao Tianjin University, Weijing Wang College of Intelligence and Computing, Tianjin University, Bo Wang Beijing Jiaotong University, Qihao Zhu DeepSeek-AI, Xiao Chu Huawei Cloud Computing Co. Ltd., Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Guangtai Liang Huawei Cloud Computing Technologies, Qianxiang Wang Huawei Technologies Co., Ltd, Junjie Chen Tianjin University
Pre-print
10:30 - 12:00
Vulnerability and security2NIER Track / Research Papers / Tool Demonstrations at Magnoila
Chair(s): Yiming Tang Rochester Institute of Technology
10:30
15m
Talk
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
Research Papers
Yu Zhao , Lina Gong Nanjing University of Aeronautics and Astronautic, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Yongwei Wang Shanghai Institute for Advanced Study and College of Computer Science, Zhejiang University, Mingqiang Wei School of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Fei Wu College of Computer Science and Technology in Zhejiang University
10:45
15m
Talk
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation
Research Papers
Md Shafiuzzaman University of California at Santa Barbara, Achintya Desai University of California Santa Barbara, Laboni Sarker University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara
11:00
15m
Talk
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
Research Papers
Yulun Wu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
11:15
15m
Talk
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
Research Papers
Wenkai Li Hainan University, Xiaoqi Li Hainan University, Zongwei Li Hainan University, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory
Link to publication DOI Pre-print Media Attached
13:30 - 15:00
Testing 3Tool Demonstrations / Journal-first Papers / Research Papers / Industry Showcase / NIER Track at Camellia
Chair(s): Yi Song School of Computer Science, Wuhan University
13:30
12m
Talk
General and Practical Property-based Testing for Android AppsACM SigSoft Distinguished Paper Award
Research Papers
Yiheng Xiong East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Jingling Sun University of Electronic Science and Technology of China, Geguang Pu East China Normal University, China, Zhendong Su ETH Zurich
Pre-print
13:30 - 15:00
Code generation 3Industry Showcase / Journal-first Papers / Research Papers at Carr
Chair(s): Jialun Cao Hong Kong University of Science and Technology
13:30
15m
Talk
Test-Driven Development and LLM-based Code Generation
Research Papers
Noble Saji Mathews University of Waterloo, Canada, Mei Nagappan University of Waterloo
13:45
15m
Talk
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven RefinementACM SigSoft Distinguished Paper Award
Research Papers
Huan Zhang Nanjing University, Wei Cheng Nanjing University, Yuhan Wu Nanjing University, Wei Hu Nanjing University
13:30 - 15:00
Bug detection and predictionResearch Papers / Journal-first Papers at Compagno
Chair(s): Tim Menzies North Carolina State University
13:30
15m
Talk
Towards Effective Static Type-Error Detection for Python
Research Papers
Wonseok Oh Korea University, Hakjoo Oh Korea University
13:45
15m
Talk
Detecting Element Accessing Bugs in C++ Sequence Containers
Research Papers
zhilin li , Xutong Ma Institute of Software, Chinese Academy of Sciences, Beijing, China, Mengze Hu Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences
14:15
15m
Talk
NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers
Research Papers
Gichan Lee Hanyang University, Hansae Ju Hanyang University, Scott Uk-Jin Lee Hanyang University
13:30 - 15:00
Software MergeResearch Papers / Journal-first Papers at Gardenia
Chair(s): Haiyan Zhao Peking University
13:30
15m
Talk
Evaluation of Version Control Merge Tools
Research Papers
Benedikt Schesch ETH Zurich, Ryan Featherman UW CSE, Ben Roberts UW CSE, Kenneth J Yang UW CSE, Michael D. Ernst University of Washington
13:45
15m
Talk
Semistructured Merge with Language-Specific Syntactic Separators
Research Papers
Guilherme Cavalcanti Federal Institute of Pernambuco, Brazil, Paulo Borba Federal University of Pernambuco, Leonardo dos Anjos Federal University of Pernambuco, Jonatas Clementino Federal University of Pernambuco
14:30
15m
Talk
Revisiting the Conflict-Resolving Problem from a Semantic Perspective
Research Papers
Jinhao Dong Peking University, Jun Sun Singapore Management University, Yun Lin Shanghai Jiao Tong University, Yedi Zhang National University of Singapore, Murong Ma National University of Singapore, Jin Song Dong National University of Singapore, Dan Hao Peking University
13:30 - 15:00
Code and issue reportResearch Papers at Magnoila
Chair(s): Baishakhi Ray Columbia University, New York; AWS AI Lab
13:30
15m
Talk
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code
Research Papers
Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences
DOI Pre-print
13:45
15m
Talk
Understanding Code Changes Practically with Small-Scale Language Models
Research Papers
Cong Li Zhejiang University; Ant Group, Zhaogui Xu Ant Group, Peng Di Ant Group, Dongxia Wang Zhejiang University, Zheng Li Ant Group, Qian Zheng Ant Group
14:00
15m
Talk
DRMiner: Extracting Latent Design Rationale from Jira Issue LogsACM SigSoft Distinguished Paper Award
Research Papers
Jiuang Zhao Beihang University, Zitian Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Donghao Yang Beihang University, Xin Tan Beihang University
14:15
15m
Talk
An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation
Research Papers
Zhiquan Huang Sun Yat-sen University, Yuan Huang Sun Yat-sen University, Xiangping Chen Sun Yat-sen University, Xiaocong Zhou School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China, Changlin Yang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
14:30
15m
Talk
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection
Research Papers
Weilong Li School of Computer Science and Engineering,Sun Yat-sen University, Jintian Lu College of Computer Science and Engineering, Jishou University, Ruizhi Xiao School of Computer Science and Engineering,Sun Yat-sen University, Pengfei Shao China Southern Power Grid Digital Grid Group Information and Telecommunication Technology Co., Ltd., Shuyuan Jin School of Computer Science and Engineering,Sun Yat-sen University
14:45
15m
Talk
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT
Research Papers
Lili Bo Yangzhou University, wangjie ji Yangzhou University, Xiaobing Sun Yangzhou University, Ting Zhang Singapore Management University, Xiaoxue Wu Yangzhou University, Ying Wei Yangzhou University
15:30 - 16:30
Smart contract and block chain 2NIER Track / Research Papers / Tool Demonstrations at Camellia
Chair(s): Vladimir Filkov University of California at Davis, USA
15:30
15m
Talk
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models
Research Papers
Cong Wu The University of Hong Kong, Jing Chen Wuhan University, Ziwei Wang Wuhan University, Ruichao Liang Wuhan University, Ruiying Du Wuhan University
15:45
15m
Talk
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis
Research Papers
Yin Wu Xi'an Jiaotong University, Xiaofei Xie Singapore Management University, Chenyang Peng Xi'an Jiaotong University, Dijun Liu Ant Group, Hao Wu Xi'an JiaoTong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University
15:30 - 16:30
15:30
15m
Talk
iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring
Research Papers
Di Wu , Fangwen Mu Institute of Software, Chinese Academy of Sciences, Lin Shi Beihang University, Zhaoqiang Guo Software Engineering Application Technology Lab, Huawei, China, Kui Liu Huawei, Weiguang Zhuang Beihang University, Yuqi Zhong Beihang University, Li Zhang Beihang University
15:45
15m
Talk
A Position-Aware Approach to Decomposing God Classes
Research Papers
Tianyi Chen Beijing Institute of Technology, Yanjie Jiang Peking University, Fu Fan Beijing Institute of Technology, Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology
16:00
15m
Talk
Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network
Research Papers
Di Cui Xidian University, Jiaqi Wang Xidian University, Qiangqiang Wang Xidian University, Peng Ji Xidian University, Minglang Qiao Xidian University, Yutong Zhao University of Central Missouri, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University
15:30 - 16:30
Code completionResearch Papers / NIER Track at Compagno
Chair(s): Baishakhi Ray Columbia University, New York; AWS AI Lab
15:30
15m
Talk
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models
Research Papers
Xueyang Li Institute of Information Engineering, Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Shangqing Liu Nanyang Technological University, Lu Xiang SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Kun Sun Institute of Information Engineering, Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiapu Luo Hong Kong Polytechnic University, Yang Liu Nanyang Technological University
15:45
15m
Talk
DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation
Research Papers
Xinran Yu Nanjing University, Chun Li Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University
16:00
15m
Talk
GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph
Research Papers
Wei Liu Nanjing University, Ailun Yu Peking University, Daoguang Zan Institute of Software, Chinese Academy of Sciences, Bo Shen Huawei Cloud Computing Technologies Co., Ltd., Wei Zhang Peking University, Haiyan Zhao Peking University, Zhi Jin Peking University, Qianxiang Wang Huawei Technologies Co., Ltd
15:30 - 16:30
Malicious code and packageResearch Papers / Industry Showcase at Gardenia
Chair(s): Curtis Atkisson UW
15:30
15m
Talk
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code
Research Papers
Jiachi Chen Sun Yat-sen University, Qingyuan Zhong Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Kaiwen Ning Sun Yat-sen University, Yongkun Liu Sun Yat-sen University, Zenan Xu Tencent AI Lab, Zhe Zhao Tencent AI Lab, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University
15:45
15m
Talk
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching
Research Papers
Yiheng Huang Fudan University, Ruisi Wang Fudan University, Wen Zheng Fudan University, Zhuotong Zhou Fudan University, China, Susheng Wu Fudan University, Shulin Ke Fudan University, Bihuan Chen Fudan University, Shan Gao Huawei, Xin Peng Fudan University
16:00
15m
Talk
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection
Research Papers
Xiaobing Sun Yangzhou University, Xingan Gao Yangzhou University, Sicong Cao Yangzhou University, Lili Bo Yangzhou University, Xiaoxue Wu Yangzhou University, Kaifeng Huang Tongji University
Media Attached
15:30 - 16:30
SE for AI 3Research Papers at Magnoila
Chair(s): Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis
15:30
15m
Talk
DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation
Research Papers
Yanzhou Mu , Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Xiang Chen Nantong University, Zhixiang Cao Xi'an Jiaotong University, Peiran Yang State Key Laboratory for Novel Software Technology, Nanjing University, China, Yinglong Zou Nanjing University, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University
15:45
15m
Talk
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment
Research Papers
Yinglong Zou Nanjing University, Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Jiawei Liu University of Illinois at Urbana-Champaign, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University
16:00
15m
Talk
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators
Research Papers
Mingyi Zhou Monash University, Xiang Gao Beihang University, Xiao Chen University of Newcastle, Chunyang Chen TU Munich, John Grundy Monash University, Li Li Beihang University
16:15
15m
Talk
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models
Research Papers
Zhibo Zhang Huazhong University of Science and Technology, Wuxia Bai Huazhong University of Science and Technology, Yuxi Li Huazhong University of Science and Technology, Mark Huasong Meng National University of Singapore, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Li Li Beihang University, Jun Wang Post Luxembourg, Haoyu Wang Huazhong University of Science and Technology

Accepted Papers

Title
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection
Research Papers
Media Attached
AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models
Research Papers
A Combinatorial Testing Approach to Surrogate Model Construction
Research Papers
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis
Research Papers
AI-driven Java Performance Testing: Balancing Result Quality with Testing Time
Research Papers
DOI Pre-print
A Joint Learning Model with Variational Interaction for Multilingual Program Translation
Research Papers
A Longitudinal Analysis Of Replicas in the Wild Wild Android
Research Papers
An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation
Research Papers
An Empirical Study to Evaluate AIGC Detectors on Code Content
Research Papers
Pre-print
An Explainable Automated Model for Measuring Software Engineer Contribution
Research Papers
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven RefinementACM SigSoft Distinguished Paper Award
Research Papers
A Position-Aware Approach to Decomposing God Classes
Research Papers
Approximation-guided Fairness Testing through Discriminatory Space Analysis
Research Papers
ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems
Research Papers
A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How
Research Papers
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models
Research Papers
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects
Research Papers
Pre-print
AXA: Cross-Language Analysis through Integration of Single-Language Analyses
Research Papers
Link to publication DOI Pre-print
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests
Research Papers
Balancing the Quality and Cost of Updating Dependencies
Research Papers
Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents
Research Papers
Blackbox Observability of Features and Feature Interactions
Research Papers
Pre-print
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems
Research Papers
Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study
Research Papers
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT
Research Papers
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
Research Papers
Link to publication DOI Pre-print Media Attached
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
Research Papers
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness DetectionACM SigSoft Distinguished Paper Award
Research Papers
Compiler Bug Isolation via Enhanced Test Program Mutation
Research Papers
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code
Research Papers
Link to publication DOI Pre-print Media Attached
Compositional Security Analysis of Dynamic Component-based Systems
Research Papers
Constraint-Based Test Oracles for Program Analyzers
Research Papers
Context-Aware Automated Sprint Plan Generation for Agile Software DevelopmentACM SigSoft Distinguished Paper Award
Research Papers
Contextualized Data-Wrangling Code Generation in Computational Notebooks
Research Papers
DataRecipe — How to Cook the Data for CodeLLM?
Research Papers
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning
Research Papers
Demonstration-Free: Towards More Practical Log Parsing with Large Language Models
Research Papers
Detect Hidden Dependency to Untangle Commits
Research Papers
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality
Research Papers
DOI Pre-print
Detecting Element Accessing Bugs in C++ Sequence Containers
Research Papers
Developer-Defined Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns
Research Papers
DOI Pre-print
DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation
Research Papers
Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects
Research Papers
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration
Research Papers
Discovering Likely Program Invariants for Persistent Memory
Research Papers
Do not neglect what's on your hands: localizing software faults with exception trigger streamACM SigSoft Distinguished Paper Award
Research Papers
DRMiner: Extracting Latent Design Rationale from Jira Issue LogsACM SigSoft Distinguished Paper Award
Research Papers
DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation
Research Papers
Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code
Research Papers
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators
Research Papers
Effective Unit Test Generation for Java Null Pointer Exceptions
Research Papers
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
Research Papers
Efficient Detection of Test Interference in C Projects
Research Papers
Efficient Detection of Toxic Prompts in Large Language Models
Research Papers
Efficient Incremental Code Coverage Analysis for Regression Test Suites
Research Papers
Efficient Slicing of Feature Models via Projected d-DNNF Compilation
Research Papers
End-to-End AutoML for Unsupervised Log Anomaly Detection
Research Papers
Enhancing Automated Program Repair with Solution Design
Research Papers
Enhancing the Efficiency of Automated Program Repair via Greybox Analysis
Research Papers
Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing
Research Papers
DOI
Evaluation of Version Control Merge Tools
Research Papers
Exploring ChatGPT App Ecosystem: Distribution, Deployment and SecurityACM SigSoft Distinguished Paper Award
Research Papers
Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair
Research Papers
FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows
Research Papers
Pre-print
FAIL: Analyzing Software Failures from the News Using LLMs
Research Papers
DOI Pre-print
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection
Research Papers
FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments
Research Papers
FIPSER: Improving Fairness Testing of DNN by Seed Prioritization
Research Papers
General and Practical Property-based Testing for Android AppsACM SigSoft Distinguished Paper Award
Research Papers
Pre-print
Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach
Research Papers
Pre-print
Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization
Research Papers
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps
Research Papers
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models
Research Papers
GPP: A Graph-Powered Prioritizer for Code Review Requests
Research Papers
GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph
Research Papers
How Does Code Optimization Impact Third-party Library Detection for Android Applications?ACM SigSoft Distinguished Paper Award
Research Papers
Media Attached
How Effective Do Code Language Models Understand Poor-Readability Code?
Research Papers
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera
Research Papers
Hybrid Regression Test Selection by Integrating File and Method Dependences
Research Papers
DOI Pre-print
Imperceptible Content Poisoning in LLM-Powered Applications
Research Papers
Incremental Context-free Grammar Inference in Black Box Settings
Research Papers
Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks
Research Papers
Interrogation Testing of Program Analyzers for Soundness and Precision Issues
Research Papers
iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring
Research Papers
JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models
Research Papers
Language-Agnostic Static Analysis of Probabilistic Programs
Research Papers
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries
Research Papers
DOI Pre-print
LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language ModelsACM SigSoft Distinguished Paper Award
Research Papers
Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency
Research Papers
LLM-Generated Invariants for Bounded Model Checking Without Loop UnrollingACM SigSoft Distinguished Paper Award
Research Papers
Link to publication DOI
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant InferenceACM SigSoft Distinguished Paper Award
Research Papers
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing
Research Papers
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
Research Papers
Microservice Decomposition Techniques: An Independent Tool Comparison
Research Papers
Pre-print
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-ProgramsACM SigSoft Distinguished Paper Award
Research Papers
MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing
Research Papers
MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data
Research Papers
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment
Research Papers
Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training
Research Papers
DOI Pre-print
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics
Research Papers
NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers
Research Papers
On the Evaluation of Large Language Models in Unit Test Generation
Research Papers
Pre-print
Parf: Adaptive Parameter Tuning for Abstract Interpretation
Research Papers
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code
Research Papers
DOI Pre-print
Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation
Research Papers
Pre-print
Prioritizing Test Inputs for DNNs Using Training Dynamics
Research Papers
Program Synthesis Meets Visual What-Comes-Next Puzzles
Research Papers
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization
Research Papers
Pre-print
Proof Automation with Large Language Models
Research Papers
Pre-print
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection
Research Papers
REACT: IR-Level Patch Presence Test for Binary
Research Papers
Reducing Test Runtime by Transforming Test FixturesACM SigSoft Distinguished Paper Award
Research Papers
Refinement Types for Visualization
Research Papers
Repairing Regex-Dependent String Functions
Research Papers
Revisiting the Conflict-Resolving Problem from a Semantic Perspective
Research Papers
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code
Research Papers
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutationACM SigSoft Distinguished Paper Award
Research Papers
Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We?
Research Papers
Pre-print
Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation
Research Papers
Scaler: Efficient and Effective Cross Flow Analysis
Research Papers
Semantic-Enhanced Indirect Call Analysis with Large Language Models
Research Papers
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models
Research Papers
Semistructured Merge with Language-Specific Syntactic Separators
Research Papers
Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data
Research Papers
Shoot Yourself in the Foot — Efficient Code Causes Inefficiency in Compiler Optimizations
Research Papers
Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates
Research Papers
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts
Research Papers
SlicePromptTest4J: High-coverage Test Generation using LLM via Method Slicing
Research Papers
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice
Research Papers
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection
Research Papers
Media Attached
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing
Research Papers
Pre-print
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching
Research Papers
Spotting Code Mutation for Predictive Mutation Testing
Research Papers
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation
Research Papers
Test Case Generation for Simulink Models using Model Fuzzing and State Solving
Research Papers
Test-Driven Development and LLM-based Code Generation
Research Papers
The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier
Research Papers
Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network
Research Papers
To Tag, or Not to Tag: Translating C’s Unions to Rust’s Tagged Unions
Research Papers
DOI
Towards Effective Static Type-Error Detection for Python
Research Papers
Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach
Research Papers
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input GenerationACM SigSoft Distinguished Paper Award
Research Papers
Typed and Confused: Studying the Unexpected Dangers of Gradual Typing
Research Papers
TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning
Research Papers
UFront: Toward A Unified MLIR Frontend for Deep Learning
Research Papers
Understanding Code Changes Practically with Small-Scale Language Models
Research Papers
Understanding the Implications of Changes to Build Systems
Research Papers
DOI Pre-print
Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing
Research Papers
Unveiling the Characteristics and Impact of Security Patch Evolution
Research Papers
Media Attached
Verifying the Option Type With Rely-Guarantee Reasoning
Research Papers
Link to publication DOI
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities
Research Papers
Media Attached
VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair
Research Papers
WaDec: Decompile WebAssembly Using Large Language Model
Research Papers
What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing
Research Papers
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners’ Perspective
Research Papers
Media Attached

Call for Papers

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2024 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:

  • Requirements and Design
    • requirements elicitation and management, traceability analysis;
    • architecture and design;
    • modeling and model-driven engineering;
    • software product lines;
    • component-based, service-oriented systems;
    • OO/Aspect-oriented.
  • Testing and Analysis
    • regression, mutation, model-based testing;
    • program analysis;
    • program synthesis;
    • program repairs.
  • Tools and Processes
    • release engineering and DevOps;
    • configuration and release management;
    • Agile processes.
  • Maintenance and Evolution
    • debugging and fault-localization;
    • refactoring and reengineering;
    • reverse engineering;
    • software reuse;
    • API design and management.
  • Formal Aspects of Software Engineering
    • formal methods, validation and verification;
    • programming languages;
    • specification languages, DSLs.
  • AI and Software Engineering
    • search-based software engineering;
    • recommender systems;
    • autonomous and self-adapting systems;
    • AI for SE;
    • SE for AI.
  • Software Analytics
    • mining software repositories;
    • apps and app store analysis.
  • Human Aspects of Software Engineering
    • program comprehension;
    • systematic reviews, code inspection;
    • human-computer interface;
    • software visualization;
    • crowd-based software engineering;
    • distributed and collaborative software engineering.
  • Social Aspects of Software Engineering
    • green and sustainable technologies;
    • software economics;
    • ethics in software engineering.
  • Dependability, Safety, and Reliability
    • privacy and security;
    • reliability;
    • safety;
    • performance.

ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.


Submission Categories and Evaluation Criteria

We solicit submissions in two categories:

Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:

  • clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
  • articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
  • show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.

Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:

  • clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
  • present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
  • carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.

Papers in both categories should:

  • discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
  • provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
  • include an adequate use of the English language, absence of major ambiguity, and clearly readable figures and tables;
  • adhere to the formatting instructions provided below.

New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.


Originality

Papers submitted to ASE 2024 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2024. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.

To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.


Double Anonymous Review Process

The ASE 2024 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:

  • Authors’ names and affiliated institution names must be omitted from the submission.
  • All references to the author’s prior work should be in the third person.
  • Authors are encouraged to title their submissions differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.

Further advice, guidance, and explanation about the double-anonymous review process can be found on the Q&A page.


Artifact Availability and Supplementary Material

We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.

Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:

https://ineed.coffee/5205/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance/

Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2024 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.


ACM Policy on Research Involving Humans

If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects

It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.


Formatting and Submission Guidelines

Abstracts and papers must be submitted electronically through the ASE 2024 HotCRP submission site: https://ase2024.hotcrp.com/. All submissions must be in English.

For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interest. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.

All submissions must be in PDF format and conform, at time of submission, to the to the ACM Proceedings Template: https://www.acm.org/publications/proceedings-template. LaTeX users must use the \documentclass[sigconf,review,anonymous]{acmart} option.

Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.

Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.

The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs.

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.

Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors. The collection process has started and will roll out as a requirement throughout 2022. We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.


Accepted Papers

Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.

After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommend a change for clarity or accuracy with the paper content.

We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include but are not limited to, Figshare and Zenodo.

If a submission is accepted, at least one author of the paper is required to register for ASE 2024 and present the paper.


Questions and Comments

If you have any further questions, please contact the PC chairs at rayb@cs.columbia.edu and zhmh@pku.edu.cn.

:
: