Tue 29 OctDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 12:00 | Test selection and prioritizationResearch Papers / Journal-first Papers / NIER Track at Camellia Chair(s): Wing Lam George Mason University | ||
11:15 15mTalk | FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection Research Papers Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Xiyue Zhang University of Oxford, Youcheng Sun University of Manchester, Marta Kwiatkowska University of Oxford, Jiming Chen Zhejiang University; Hangzhou Dianzi University, Peng Cheng Zhejiang University | ||
11:30 15mTalk | Hybrid Regression Test Selection by Integrating File and Method Dependences Research Papers Guofeng Zhang College of Computer, National University of Defense Technology, Luyao Liu College of Computer, National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Ji Wang National University of Defense Technology DOI Pre-print |
10:30 - 12:00 | Requirement engineeringResearch Papers / NIER Track / Journal-first Papers at Carr Chair(s): Lina Marsso University of Toronto | ||
10:30 15mTalk | Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach Research Papers Jialiang Wei EuroMov DHM, Univ Montpellier & IMT Mines Ales, Anne-Lise Courbis IMT Mines Alès, Thomas Lambolais IMT Mines Alès, Binbin Xu IMT Mines Alès, Pierre Louis Bernard University of Montpellier, Gerard Dray IMT Mines Alès, Walid Maalej University of Hamburg Pre-print | ||
10:45 15mTalk | Efficient Slicing of Feature Models via Projected d-DNNF Compilation Research Papers | ||
11:15 15mTalk | Blackbox Observability of Features and Feature Interactions Research Papers Kallistos Weis Saarland University, Leopoldo Teixeira Federal University of Pernambuco, Clemens Dubslaff Eindhoven University of Technology, Sven Apel Saarland University Pre-print | ||
11:30 15mTalk | AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects Research Papers Kexin Sun Nanjing University, Yiding Ren Nanjing University, Hongyu Kuang Nanjing University, Hui Gao Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University Pre-print |
10:30 - 12:00 | |||
10:30 15mTalk | Shoot Yourself in the Foot — Efficient Code Causes Inefficiency in Compiler Optimizations Research Papers Fengjuan Gao Nanjing University of Science and Technology, Hongyu Chen Nanjing University, Yuewei Zhou Rice University, Ke Wang Visa Research | ||
10:45 15mTalk | Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation Research Papers Wenzhang Yang University of Science and Technology of China, Cuifeng Gao University of Science and Technology of China, Xiaoyuan Liu University of Science and Technology of China, Yuekang Li UNSW, Yinxing Xue University of Science and Technology of China | ||
11:00 15mTalk | Compiler Bug Isolation via Enhanced Test Program Mutation Research Papers Yujie Liu Peking University, Mingxuan Zhu Peking University, Jinhao Dong Peking University, Junzhe Yu Peking University, Dan Hao Peking University | ||
11:15 15mTalk | Incremental Context-free Grammar Inference in Black Box Settings Research Papers Feifei Li Tsinghua Shenzhen International Graduate School, Xiao Chen University of Newcastle, Xi Xiao Tsinghua Shenzhen International Graduate School, Tsinghua University, Xiaoyu Sun Australian National University, Australia, Chuan Chen Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China, Shaohua Wang Central University of Finance and Economics, Jitao Han Central University of Finance and Economics | ||
11:30 15mTalk | Typed and Confused: Studying the Unexpected Dangers of Gradual Typing Research Papers Dominic Troppmann CISPA Helmholtz Center for Information Security, Aurore Fass CISPA Helmholtz Center for Information Security, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security | ||
11:45 15mTalk | Refinement Types for Visualization Research Papers Jingtao Xia University of California, Santa Barbara, Junrui Liu University of California, Santa Barbara, Nicholas Brown University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Yu Feng University of California at Santa Barbara |
10:30 - 12:00 | Vulnerability and security1Research Papers / Tool Demonstrations at Gardenia Chair(s): Curtis Atkisson UW | ||
10:30 15mTalk | REACT: IR-Level Patch Presence Test for Binary Research Papers Qi Zhan Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University | ||
10:45 15mTalk | Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection Research Papers Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, David Lo Singapore Management University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Xiaolei Liu China Academy of Engineering Physics, Xingwei Lin Zhejiang University, Wei Liu Nanjing University Media Attached | ||
11:00 15mTalk | Unveiling the Characteristics and Impact of Security Patch Evolution Research Papers Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zichao Wei Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
11:15 15mTalk | Compositional Security Analysis of Dynamic Component-based Systems Research Papers | ||
11:30 15mTalk | Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities Research Papers Susheng Wu Fudan University, Ruisi Wang Fudan University, Kaifeng Huang Tongji University, Yiheng Cao Fudan University, Wenyan Song Fudan University, Zhuotong Zhou Fudan University, China, Yiheng Huang Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University Media Attached |
10:30 - 12:00 | SE for AI 1NIER Track / Journal-first Papers / Research Papers at Magnoila Chair(s): Chengcheng Wan East China Normal University | ||
10:30 15mTalk | Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing Research Papers Yihui Xu Soochow University, Yanhui Li Nanjing University, Jun Wang Nanjing University, Xiaofang Zhang Soochow University DOI | ||
10:45 15mTalk | Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training Research Papers Yangsen Wang Peking University, Yizhou Chen Peking University, Yifan Zhao Peking University, Zhihao Gong Peking University, Junjie Chen Tianjin University, Dan Hao Peking University DOI Pre-print |
13:30 - 15:00 | LLM for SE 1Research Papers / NIER Track / Tool Demonstrations / Journal-first Papers at Camellia Chair(s): Chengcheng Wan East China Normal University | ||
13:30 15mTalk | How Effective Do Code Language Models Understand Poor-Readability Code? Research Papers Chao Hu Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Fandong Meng WeChat AI, Tencent, Jie Zhou Tencent, Xiaodong Gu Shanghai Jiao Tong University | ||
13:45 15mTalk | An Empirical Study to Evaluate AIGC Detectors on Code Content Research Papers Jian Wang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University Pre-print | ||
14:15 15mTalk | Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency Research Papers Zhang Yichi , Zixi Liu Nanjing University, Yang Feng Nanjing University, Baowen Xu Nanjing University |
13:30 - 15:00 | Web and UIResearch Papers / Industry Showcase / Tool Demonstrations at Carr Chair(s): Mattia Fazzini University of Minnesota | ||
13:30 15mTalk | Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents Research Papers Shaoheng Cao Nanjing University, Renyi Chen Samsung Electronics(China)R&D Centre, Minxue Pan Nanjing University, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Xuandong Li Nanjing University | ||
14:00 15mTalk | Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics Research Papers Yuanhong Lan Nanjing University, Yifei Lu Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University | ||
14:15 15mTalk | Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study Research Papers Yujia Fan Southern University of Science and Technology, Sinan Wang Southern University of Science and Technology, Zebang Fei Southern University of Science and Technology, Yao Qin Southern University of Science and Technology, Huaxuan Li Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology |
13:30 - 15:00 | |||
13:30 15mTalk | Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We? Research Papers Pre-print | ||
13:45 15mTalk | The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier Research Papers Yongqi Han Tongji University, Qingfeng Du Tongji University, Ying Huang Tongji University, Jiaqi Wu Zhejiang University, Fulong Tian Di-Matrix(Shanghai) Information Technology Co., Ltd, Cheng He Di-Matrix(Shanghai) Information Technology Co., Ltd | ||
14:00 15mTalk | MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data Research Papers Wang yidan The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Zhouruixing Zhu Chinese University of Hong Kong, Shenzhen, Qiuai Fu Huawei Cloud Computing Technologies CO., LTD., Yuchi Ma Huawei Cloud Computing Technologies, Pinjia He Chinese University of Hong Kong, Shenzhen | ||
14:15 15mTalk | Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization Research Papers Lei Tao Nankai University, Shenglin Zhang Nankai University, ZedongJia Nankai University, Jinrui Sun Nankai University, Minghua Ma Microsoft Research, Zhengdan Li Nankai University, Yongqian Sun Nankai University, Canqun Yang National University of Defense Technology, Yuzhi Zhang Nankai University, Dan Pei Tsinghua University |
13:30 - 15:00 | Testing 1Research Papers / Industry Showcase at Gardenia Chair(s): Jialun Cao Hong Kong University of Science and Technology | ||
13:30 15mTalk | Spotting Code Mutation for Predictive Mutation Testing Research Papers Yifan Zhao Peking University, Yizhou Chen Peking University, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Qingyuan Liang Peking University, Guoqing Wang Peking University, Dan Hao Peking University | ||
13:45 15mTalk | Efficient Detection of Test Interference in C Projects Research Papers | ||
14:00 15mTalk | MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing Research Papers Congying Xu The Hong Kong University of Science and Technology, China, Songqiang Chen The Hong Kong University of Science and Technology, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Valerio Terragni University of Auckland, Hengcheng Zhu The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology | ||
14:15 15mTalk | Approximation-guided Fairness Testing through Discriminatory Space Analysis Research Papers Zhenjiang Zhao Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan, Takahisa Toda The University of Electro-Communications, Takashi Kitamura | ||
14:45 15mTalk | Test Case Generation for Simulink Models using Model Fuzzing and State Solving Research Papers Zhuo Su KLISS, BNRist, School of Software, Tsinghua University, Zehong Yu KLISS, BNRist, School of Software, Tsinghua University, Dongyan Wang Information Technology Center, Renmin University of China, Wanli Chang College of Computer Science and Electronic Engineering, Hunan University, Bin Gu Beijing Institute of Control Engineering, Yu Jiang Tsinghua University |
13:30 - 15:00 | AndroidJournal-first Papers / Research Papers / Industry Showcase at Magnoila Chair(s): Ziyao He University of California, Irvine | ||
13:30 15mTalk | How Does Code Optimization Impact Third-party Library Detection for Android Applications? Research Papers Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Tinghan Li Huazhong University of Science and Technology, Yiding Zhu Huazhong University of Science and Technology, Qinsheng Hou Shandong University; Qi An Xin Group Corp., Hai Jin Huazhong University of Science and Technology Media Attached | ||
13:45 15mTalk | MaskDroid: Robust Android Malware Detection with Masked Graph Representations Research Papers Jingnan Zheng National University of Singapore, Jiahao Liu National University of Singapore, An Zhang , Jun ZENG Huawei, Ziqi Yang Zhejiang University, Zhenkai Liang National University of Singapore, Tat-Seng Chua National University of Singapore | ||
14:00 15mTalk | A Longitudinal Analysis Of Replicas in the Wild Wild Android Research Papers Syeda Mashal Abbas Zaidi University of Waterloo, Shahpar Khan University of Waterloo, Parjanya Vyas University of Waterloo, Yousra Aafer University of Waterloo |
15:30 - 16:30 | Code generation 1Journal-first Papers / Research Papers / Industry Showcase at Camellia Chair(s): Denys Poshyvanyk William & Mary | ||
15:30 15mTalk | AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models Research Papers Zhong Li , Chong Zhang Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Xuandong Li Nanjing University | ||
16:15 15mTalk | ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code Research Papers jiafeng University of Electronic Science and Technology of China, Jiachen Liu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Chun Yong Chong Huawei, Chaozheng Wang The Chinese University of Hong Kong, Shan Gao Huawei, Xin Xia Huawei Link to publication DOI Pre-print Media Attached |
15:30 - 17:00 | |||
15:30 15mTalk | AI-driven Java Performance Testing: Balancing Result Quality with Testing Time Research Papers Luca Traini University of L'Aquila, Federico Di Menna University of L'Aquila, Vittorio Cortellessa University of L'Aquila DOI Pre-print | ||
16:00 15mTalk | Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code Research Papers Muzi Qu University of Chinese Academy of Sciences, Jie Liu Institute of Software, Chinese Academy of Sciences, Liangyi Kang Institute of Software, Chinese Academy of Sciences, Shuai Wang Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences, Tao Huang Institute of Software at Chinese Academy of Sciences |
15:30 - 16:30 | Program and Code translationResearch Papers / Tool Demonstrations at Compagno Chair(s): Haiyan Zhao Peking University | ||
15:30 15mTalk | To Tag, or Not to Tag: Translating C’s Unions to Rust’s Tagged Unions Research Papers DOI | ||
15:45 15mTalk | Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data Research Papers Ming Zhu Virginia Tech, Mohimenul Karim Virginia Tech, Ismini Lourentzou Virginia Tech, Daphne Yao Virginia Tech | ||
16:00 15mTalk | A Joint Learning Model with Variational Interaction for Multilingual Program Translation Research Papers |
15:30 - 16:30 | GDPR and privacyTool Demonstrations / Research Papers / Journal-first Papers at Gardenia Chair(s): Lina Marsso University of Toronto | ||
15:30 15mTalk | Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps Research Papers Ming Fan Xi'an Jiaotong University, Jifei Shi Xi'an Jiaotong University, Yin Wang Xi'an Jiaotong University, Le Yu Nanjing University of Posts and Telecommunications, Xicheng Zhang Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
15:45 15mTalk | MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs Research Papers Yin Wang Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Jiajia Li Ant Group, Wenbo Chen Ant Group, Shijie Li Ant Group, Yu Zhang Ant Group, Deqiang Han Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University |
16:30 - 17:30 | Fuzzing 1Research Papers / Journal-first Papers / Industry Showcase / Tool Demonstrations at Camellia Chair(s): Parnian Kamran University of California, Davis | ||
16:30 12mTalk | Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing Research Papers Zhuotong Zhou Fudan University, China, Yongzhuo Yang Fudan University, Susheng Wu Fudan University, Yiheng Huang Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University |
16:30 - 17:30 | Program analysis 1Research Papers / Tool Demonstrations at Compagno Chair(s): Mugdha Khedkar Heinz Nixdorf Institute at Paderborn University | ||
16:30 15mTalk | Parf: Adaptive Parameter Tuning for Abstract Interpretation Research Papers Zhongyi Wang Zhejiang University, China, Linyu Yang Zhejiang University, Mingshuai Chen Zhejiang University, Yixuan Bu Zhejiang University, Zhiyang Li Zhejiang University, Qiuye Wang Fermat Labs, Huawei Inc., Shengchao Qin Fermat Labs, Huawei, Xiao Yi Fermat Labs, Huawei Inc., Jianwei Yin Zhejiang University | ||
16:45 15mTalk | Discovering Likely Program Invariants for Persistent Memory Research Papers Zunchen Huang , Srivatsan Ravi University of Southern California, Chao Wang University of Southern California |
16:30 - 17:30 | Smart contract and block chain 1Journal-first Papers / Research Papers / Tool Demonstrations at Gardenia Chair(s): Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis | ||
16:30 15mTalk | Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts Research Papers Haijun Wang Xi’an Jiaotong University, Yurui Hu Xi'an Jiaotong University, Hao Wu Xi'an JiaoTong University, Dijun Liu Ant Group, Chenyang Peng Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University |
16:30 - 17:30 | Program repair 1Research Papers / Tool Demonstrations / NIER Track at Magnoila Chair(s): Vikram Nitin Columbia University | ||
16:30 15mTalk | Enhancing the Efficiency of Automated Program Repair via Greybox Analysis Research Papers YoungJae Kim Ulsan National Institute of Science and Technology, Yechan Park UNIST, Seungheon Han UNIST, Jooyong Yi UNIST | ||
16:45 15mTalk | VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair Research Papers Jian Zhang Nanyang Technological University, Chong Wang Nanyang Technological University, Anran Li Nanyang Technological University, Wenhan Wang University of Alberta, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University |
Wed 30 OctDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 12:00 | AIWareResearch Papers / Journal-first Papers at Camellia Chair(s): Vladimir Filkov University of California at Davis, USA | ||
10:30 15mTalk | Imperceptible Content Poisoning in LLM-Powered Applications Research Papers Quan Zhang Tsinghua University, Chijin Zhou Tsinghua University, Gwihwan Go Tsinghua University, Binqi Zeng Central South University, Heyuan Shi Central South University, Zichen Xu The Nanchang University, Yu Jiang Tsinghua University | ||
10:45 15mTalk | What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners’ Perspective Research Papers Xiao Yu Huawei, Zexian Zhang Wuhan University of Technology, Feifei Niu University of Ottawa, Xing Hu Zhejiang University, Xin Xia Huawei, John Grundy Monash University Media Attached | ||
11:15 15mTalk | Efficient Detection of Toxic Prompts in Large Language Models Research Papers Yi Liu Nanyang Technological University, Huijia Sun ShanghaiTech University, Ling Shi Nanyang Technological University, Gelei Deng Nanyang Technological University, Yuqi Chen ShanghaiTech University, Junzhe Yu ShanghaiTech University, Yang Liu Nanyang Technological University | ||
11:30 15mTalk | Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security Research Papers Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Liuhuo Wan University of Queensland, Tian Yang Ooi University of Queensland, Ruomai Ren University of Queensland, Guangdong Bai University of Queensland | ||
11:45 15mTalk | DataRecipe — How to Cook the Data for CodeLLM? Research Papers Kisub Kim Singapore Management University, Singapore, Jounghoon Kim Chinese University of Hong Kong, Hong Kong, Byeongjo Park Chungbuk National University, Korea, Dongsun Kim Korea University, Chun Yong Chong Monash University Malaysia, Yuan Wang Independent Researcher, Hong Kong, Tiezhu Sun University of Luxembourg, Xunzhu Tang University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg |
10:30 - 12:00 | Program analysis 2Research Papers / Industry Showcase at Compagno Chair(s): Qingkai Shi Nanjing University | ||
10:30 15mTalk | Semantic-Enhanced Indirect Call Analysis with Large Language Models Research Papers Baijun Cheng Peking University, Cen Zhang Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology, Yao Guo Peking University, Xiangqun Chen Peking University | ||
10:45 15mTalk | Scaler: Efficient and Effective Cross Flow Analysis Research Papers Steven (Jiaxun) Tang University of Massachusetts Amherst, Mingcan Xiang University of Massachusetts Amherst, Yang Wang The Ohio State University, Bo Wu Colorado School of Mines, Jianjun Chen Bytedance, Tongping Liu ByteDance | ||
11:00 15mTalk | AXA: Cross-Language Analysis through Integration of Single-Language Analyses Research Papers Tobias Roth TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Julius Näumann TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE Link to publication DOI Pre-print | ||
11:15 15mTalk | TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning Research Papers Zirui Song The Chinese University of Hong Kong, YuTong Zhou The Chinese University of Hong Kong, Shuaike Dong Ant Group, Ke Zhang , Kehuan Zhang The Chinese University of Hong Kong | ||
11:45 15mTalk | Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects Research Papers Nick Feng University of Toronto, Lina Marsso University of Toronto, Marsha Chechik University of Toronto |
10:30 - 12:00 | Code generation 2Research Papers / Tool Demonstrations at Gardenia Chair(s): Yangruibo Ding Columbia University | ||
10:30 15mTalk | Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation Research Papers Xinyu Gao , Yun Xiong Fudan University, Deze Wang National University of Defense Technology, Zhenhan Guan Fudan University, Zejian Shi Fudan University, Haofen Wang Tongji University, Shanshan Li National University of Defense Technology Pre-print | ||
10:45 15mTalk | Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates Research Papers Zhihong Sun Shandong Normal University, Yao Wan Huazhong University of Science and Technology, Jia Li , Hongyu Zhang Chongqing University, Zhi Jin Peking University, Ge Li Peking University, Chen Lyu Shandong Normal University | ||
11:00 15mTalk | Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization Research Papers Pre-print | ||
11:15 15mTalk | JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models Research Papers Jialun Cao Hong Kong University of Science and Technology, Zhiyong Chen Nanjing University, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Chang Xu Nanjing University | ||
11:45 15mTalk | Contextualized Data-Wrangling Code Generation in Computational Notebooks Research Papers Junjie Huang The Chinese University of Hong Kong, Daya Guo Sun-yat Sen University, Chenglong Wang Microsoft Research, Jiazhen Gu Chinese University of Hong Kong, Shuai Lu Microsoft Research, Jeevana Priya Inala Microsoft Research, Cong Yan Microsoft Research, Jianfeng Gao Microsoft Research, Nan Duan Microsoft Research, Michael Lyu The Chinese University of Hong Kong |
10:30 - 12:00 | |||
10:30 15mTalk | B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests Research Papers Mouxiang Chen Zhejiang University, Zhongxin Liu Zhejiang University, He Tao Zhejiang University, Yusu Hong Zhejiang University, David Lo Singapore Management University, Xin Xia Huawei, JianLing Sun Zhejiang University | ||
10:45 15mTalk | Reducing Test Runtime by Transforming Test Fixtures Research Papers Chengpeng Li University of Texas at Austin, Abdelrahman Baz The University of Texas at Austin, August Shi The University of Texas at Austin | ||
11:00 15mTalk | Efficient Incremental Code Coverage Analysis for Regression Test Suites Research Papers | ||
11:15 15mTalk | Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection Research Papers Huan Xie Chongqing University, Yan Lei Chongqing University, Maojin Li Chongqing University, Meng Yan Chongqing University, Sheng Zhang Chongqing University | ||
11:30 15mTalk | A Combinatorial Testing Approach to Surrogate Model Construction Research Papers Sunny Shree The University of Texas at Arlington, Krishna Khadka The University of Texas at Arlington, Jeff Yu Lei University of Texas at Arlington, Raghu Kacker National Institute of Standards and Technology, D. Richard Kuhn National Institute of Standards and Technology |
13:30 - 15:00 | LLM for SE 2NIER Track / Research Papers / Industry Showcase / Tool Demonstrations at Camellia Chair(s): Wenxi Wang University of Virgina | ||
13:30 15mTalk | A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How Research Papers Chaozheng Wang The Chinese University of Hong Kong, Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Chun Yong Chong Huawei, Shan Gao Huawei, Michael Lyu The Chinese University of Hong Kong | ||
14:00 15mTalk | Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks Research Papers jiawei lu Zhejiang University, Haoye Wang Hangzhou City University, Zhongxin Liu Zhejiang University, Keyu Liang Zhejiang University, Lingfeng Bao Zhejiang University, Xiaohu Yang Zhejiang University | ||
14:15 15mTalk | WaDec: Decompile WebAssembly Using Large Language Model Research Papers Xinyu She Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology |
13:30 - 15:00 | VerificationResearch Papers / Tool Demonstrations at Carr Chair(s): Tevfik Bultan University of California at Santa Barbara | ||
13:30 15mTalk | LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference Research Papers Guangyuan Wu Nanjing University, Weining Cao Nanjing University, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University | ||
13:45 15mTalk | LLM-Generated Invariants for Bounded Model Checking Without Loop Unrolling Research Papers Muhammad A. A. Pirzada The University of Manchester, Giles Reger University of Manchester, Ahmed Bhayat Independent Scholar, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil Link to publication DOI | ||
14:00 15mTalk | Proof Automation with Large Language Models Research Papers Pre-print | ||
14:15 15mTalk | Verifying the Option Type With Rely-Guarantee Reasoning Research Papers James Yoo University of Washington, Michael D. Ernst University of Washington, René Just University of Washington Link to publication DOI |
13:30 - 15:00 | Anomaly and fault detectionResearch Papers / NIER Track at Compagno Chair(s): Xing Hu Zhejiang University | ||
13:30 15mTalk | SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice Research Papers Rui Ren DAMO Academy, Alibaba Group Hangzhou, China, Jingbang Yang DAMO Academy, Alibaba Group Hangzhou, China, Linxiao Yang DAMO Academy, Alibaba Group Hangzhou, China, Xinyue Gu DAMO Academy, Alibaba Group Hangzhou, China, Liang Sun DAMO Academy, Alibaba Group Hangzhou, China | ||
13:45 15mTalk | ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems Research Papers Yongqian Sun Nankai University, Binpeng Shi Nankai University, Mingyu Mao Nankai University, Minghua Ma Microsoft Research, Sibo Xia Nankai University, Shenglin Zhang Nankai University, Dan Pei Tsinghua University | ||
14:00 15mTalk | Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality Research Papers Yifan Liao Shanghai Jiao Tong University / National University of Singapore, Ming Xu Shanghai Jiao Tong University / National University of Singapore, Yun Lin Shanghai Jiao Tong University, Xiwen Teoh National University of Singapore, Xiaofei Xie Singapore Management University, Ruitao Feng Singapore Management University, Frank Liauw Government Technology Agency Singapore, Hongyu Zhang Chongqing University, Jin Song Dong National University of Singapore DOI Pre-print | ||
14:15 15mTalk | End-to-End AutoML for Unsupervised Log Anomaly Detection Research Papers Shenglin Zhang Nankai University, Yuhe Ji Nankai University, Jiaqi Luan Nankai University, Xiaohui Nie Computer Network Information Center at Chinese Academy of Sciences, Zi`ang Cheng Nankai University, Minghua Ma Microsoft Research, Yongqian Sun Nankai University, Dan Pei Tsinghua University |
13:30 - 15:00 | Autonomous SystemsResearch Papers / Journal-first Papers / Industry Showcase at Gardenia Chair(s): Qingkai Shi Nanjing University | ||
13:30 15mTalk | SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing Research Papers An Guo Nanjing University, Yuan Zhou Nanyang Technological University, Haoxiang Tian Nanyang Technological University, Chunrong Fang Nanjing University, Yunjian Sun Nanjing University, Weisong Sun Nanyang Technological University, Xinyu Gao , Luu Anh Tuan Nanyang Technological University, Yang Liu Nanyang Technological University, Zhenyu Chen Nanjing University Pre-print | ||
13:45 15mTalk | Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems Research Papers | ||
14:15 15mTalk | LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language Models Research Papers Shuncheng Tang University of Science and Technology of China, Zhenya Zhang Kyushu University, Japan, Jixiang Zhou University of Science and Technology of China, Lei Wang National University of Defense Technology, Yuan Zhou Zhejiang Sci-Tech University, Yinxing Xue University of Science and Technology of China | ||
14:30 15mTalk | ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation Research Papers Shiwei Feng Purdue University, Yapeng Ye Purdue University, Qingkai Shi Nanjing University, Zhiyuan Cheng Purdue University, Xiangzhe Xu Purdue University, Siyuan Cheng Purdue University, Hongjun Choi DGIST, Xiangyu Zhang Purdue University |
13:30 - 15:00 | Library and dependancyResearch Papers / Industry Showcase / Tool Demonstrations at Magnoila Chair(s): Curtis Atkisson UW | ||
13:30 15mTalk | How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera Research Papers Yifan Xie , Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Ying Wang Northeastern University, Jun Ma National University of Defense Technology, Xiaoling Li National University of Defense Technology, Haoran Liu National University of Defense Technology, Ying Fu National University of Defense Technology, Liao Xiangke National University of Defense Technology | ||
14:00 15mTalk | Detect Hidden Dependency to Untangle Commits Research Papers Mengdan Fan , Wei Zhang Peking University, Haiyan Zhao Peking University, Guangtai Liang Huawei Cloud Computing Technologies, Zhi Jin Peking University | ||
14:15 15mTalk | LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries Research Papers Igor Wodiany University of Manchester, Antoniu Pop University of Manchester, Mikel Luján University of Manchester DOI Pre-print | ||
14:30 15mTalk | Balancing the Quality and Cost of Updating Dependencies Research Papers Damien Jaime Université Paris Nanterre & LIP6, Pascal Poizat Université Paris Nanterre & LIP6, Joyce El Haddad Université Paris Dauphine - PSL , Thomas Degueule CNRS |
15:30 - 16:30 | |||
15:30 15mTalk | UFront: Toward A Unified MLIR Frontend for Deep Learning Research Papers Guoqing Bao Shanghai Enflame Technology Co., Ltd., Heng Shi Shanghai Jiao Tong University, Shanghai Enflame Technology Co., Ltd., Chengyi Cui Shanghai Enflame Technology Co., Ltd., Yalin Zhang Shanghai Enflame Technology Co., Ltd., Jianguo Yao Shanghai Jiao Tong University; Shanghai Enflame Technology | ||
15:45 15mTalk | FIPSER: Improving Fairness Testing of DNN by Seed Prioritization Research Papers Junwei Chen East China Normal University, Yueling Zhang East China Normal University, Lingfeng Zhang East China Normal University, Min Zhang East China Normal University, Chengcheng Wan East China Normal University, Ting Su East China Normal University, Geguang Pu East China Normal University, China | ||
16:00 15mTalk | Prioritizing Test Inputs for DNNs Using Training Dynamics Research Papers Jian Shen Nanjing University, Zhong Li , Minxue Pan Nanjing University, Xuandong Li Nanjing University |
15:30 - 16:30 | |||
15:30 15mTalk | Repairing Regex-Dependent String Functions Research Papers | ||
15:45 15mTalk | FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments Research Papers Fang Liu Beihang University, Zhenwei Liu Beihang University, Qianhui Zhao Beihang University, Jing Jiang Beihang University, Li Zhang Beihang University, Zian Sun Beihang University, Ge Li Peking University, Zhongqi Li Huawei Cloud Computing Technologies Co., Ltd., Yuchi Ma Huawei Cloud Computing Technologies | ||
16:00 15mTalk | Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair Research Papers Guochang Li Zhejiang University, Chen Zhi Zhejiang University, Jialiang Chen Zhejiang University, Junxiao Han , Shuiguang Deng Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies | ||
16:15 15mTalk | Enhancing Automated Program Repair with Solution Design Research Papers Jiuang Zhao Beihang University, Donghao Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Zitian Yang Beihang University, Fang Liu Beihang University |
15:30 - 16:30 | Software processResearch Papers / Industry Showcase / Journal-first Papers at Gardenia Chair(s): Tim Menzies North Carolina State University | ||
15:30 15mTalk | An Explainable Automated Model for Measuring Software Engineer Contribution Research Papers Yue Li Nanjing University, He Zhang Nanjing University, Yuzhe Jin Nanjing University, Zhong Ren State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University Nanjing, Jiangsu, China, Liming Dong Nanjing University, Jun Lyu Nanjing University, Lanxin Yang Nanjing University, David Lo Singapore Management University, Dong Shao Nanjing University | ||
15:45 15mTalk | Context-Aware Automated Sprint Plan Generation for Agile Software Development Research Papers Elvan Kula Delft University of Technology, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology |
15:30 - 16:30 | Fuzzing 2Industry Showcase / NIER Track / Research Papers at Magnoila Chair(s): Marcel Böhme MPI-SP, Bochum | ||
15:30 15mTalk | Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration Research Papers Dohyun Ryu The Pennsylvania State University, Giyeol Kim The Pennsylvania State University, Daeun Lee Pusan National University, Seongjin Kim The Pennsylvania State University, Seungjin Bae The Pennsylvania State University, Junghwan Rhee University of Central Oklahoma, Taegyu Kim The Pennsylvania State University |
Thu 31 OctDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 12:00 | Release engineeringResearch Papers / NIER Track / Industry Showcase at Camellia Chair(s): Parnian Kamran University of California, Davis | ||
10:30 15mTalk | GPP: A Graph-Powered Prioritizer for Code Review Requests Research Papers Lanxin Yang Nanjing University, Jinwei Xu Nanjing University, He Zhang Nanjing University, Fanghao Wu Nanjing University, Jun Lyu Nanjing University, Yue Li Nanjing University, Alberto Bacchelli University of Zurich | ||
11:00 15mTalk | Understanding the Implications of Changes to Build Systems Research Papers Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Calgary, Shane McIntosh University of Waterloo DOI Pre-print | ||
11:15 15mTalk | Developer-Defined Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns Research Papers Mingyang Yin University of Waterloo, Yutaro Kashiwa Nara Institute of Science and Technology, Keheliya Gallaba Centre for Software Excellence, Huawei Canada, Mahmoud Alfadel University of Calgary, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo DOI Pre-print |
10:30 - 12:00 | Cloud and Systems Research Papers / Journal-first Papers / Industry Showcase at Carr Chair(s): Amel Bennaceur The Open University, UK | ||
10:30 15mTalk | FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows Research Papers Yilun Wang Anhui University, Pengfei Chen Sun Yat-sen University, Hui Dou Anhui University, Yiwen Zhang Anhui University, Guangba Yu Sun Yat-sen University, Zilong He Sun Yat-sen University, Haiyu Huang Sun Yat-sen University Pre-print | ||
11:15 15mTalk | Microservice Decomposition Techniques: An Independent Tool Comparison Research Papers Yingying Wang University of British Columbia, Sarah Bornais The University of British Columbia, Julia Rubin The University of British Columbia Pre-print |
10:30 - 12:00 | Test generationResearch Papers / Journal-first Papers at Gardenia Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign | ||
10:30 15mTalk | Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation Research Papers Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Xuanhua Shi Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
11:00 15mTalk | Effective Unit Test Generation for Java Null Pointer Exceptions Research Papers Myungho Lee Korea University, Jiseong Bak Korea University, Seokhyeon Moon , Yoon-Chan Jhi Technology Research, Samsung SDS, Seoul, South Korea, Hakjoo Oh Korea University | ||
11:15 15mTalk | SlicePromptTest4J: High-coverage Test Generation using LLM via Method Slicing Research Papers Zejun Wang Peking University, Kaibo Liu Peking University, Ge Li Peking University, Zhi Jin Peking University | ||
11:30 15mTalk | DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning Research Papers Davide Corradini University of Verona, Zeno Montolli University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona | ||
11:45 15mTalk | On the Evaluation of Large Language Models in Unit Test Generation Research Papers Lin Yang Tianjin University, Chen Yang Tianjin University, Shutao Gao Tianjin University, Weijing Wang College of Intelligence and Computing, Tianjin University, Bo Wang Beijing Jiaotong University, Qihao Zhu DeepSeek-AI, Xiao Chu Huawei Cloud Computing Co. Ltd., Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Guangtai Liang Huawei Cloud Computing Technologies, Qianxiang Wang Huawei Technologies Co., Ltd, Junjie Chen Tianjin University Pre-print |
10:30 - 12:00 | Vulnerability and security2NIER Track / Research Papers / Tool Demonstrations at Magnoila Chair(s): Yiming Tang Rochester Institute of Technology | ||
10:30 15mTalk | Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection? Research Papers Yu Zhao , Lina Gong Nanjing University of Aeronautics and Astronautic, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Yongwei Wang Shanghai Institute for Advanced Study and College of Computer Science, Zhejiang University, Mingqiang Wei School of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Fei Wu College of Computer Science and Technology in Zhejiang University | ||
10:45 15mTalk | STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation Research Papers Md Shafiuzzaman University of California at Santa Barbara, Achintya Desai University of California Santa Barbara, Laboni Sarker University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara | ||
11:00 15mTalk | Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models Research Papers Yulun Wu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
11:15 15mTalk | COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts Research Papers Wenkai Li Hainan University, Xiaoqi Li Hainan University, Zongwei Li Hainan University, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory Link to publication DOI Pre-print Media Attached |
13:30 - 15:00 | Testing 3Tool Demonstrations / Journal-first Papers / Research Papers / Industry Showcase / NIER Track at Camellia Chair(s): Yi Song School of Computer Science, Wuhan University | ||
13:30 12mTalk | General and Practical Property-based Testing for Android Apps Research Papers Yiheng Xiong East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Jingling Sun University of Electronic Science and Technology of China, Geguang Pu East China Normal University, China, Zhendong Su ETH Zurich Pre-print |
13:30 - 15:00 | Code generation 3Industry Showcase / Journal-first Papers / Research Papers at Carr Chair(s): Jialun Cao Hong Kong University of Science and Technology | ||
13:30 15mTalk | Test-Driven Development and LLM-based Code Generation Research Papers | ||
13:45 15mTalk | A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven Refinement Research Papers Huan Zhang Nanjing University, Wei Cheng Nanjing University, Yuhan Wu Nanjing University, Wei Hu Nanjing University |
13:30 - 15:00 | Bug detection and predictionResearch Papers / Journal-first Papers at Compagno Chair(s): Tim Menzies North Carolina State University | ||
13:30 15mTalk | Towards Effective Static Type-Error Detection for Python Research Papers | ||
13:45 15mTalk | Detecting Element Accessing Bugs in C++ Sequence Containers Research Papers | ||
14:15 15mTalk | NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers Research Papers |
13:30 - 15:00 | Software MergeResearch Papers / Journal-first Papers at Gardenia Chair(s): Haiyan Zhao Peking University | ||
13:30 15mTalk | Evaluation of Version Control Merge Tools Research Papers Benedikt Schesch ETH Zurich, Ryan Featherman UW CSE, Ben Roberts UW CSE, Kenneth J Yang UW CSE, Michael D. Ernst University of Washington | ||
13:45 15mTalk | Semistructured Merge with Language-Specific Syntactic Separators Research Papers Guilherme Cavalcanti Federal Institute of Pernambuco, Brazil, Paulo Borba Federal University of Pernambuco, Leonardo dos Anjos Federal University of Pernambuco, Jonatas Clementino Federal University of Pernambuco | ||
14:30 15mTalk | Revisiting the Conflict-Resolving Problem from a Semantic Perspective Research Papers Jinhao Dong Peking University, Jun Sun Singapore Management University, Yun Lin Shanghai Jiao Tong University, Yedi Zhang National University of Singapore, Murong Ma National University of Singapore, Jin Song Dong National University of Singapore, Dan Hao Peking University |
13:30 - 15:00 | Code and issue reportResearch Papers at Magnoila Chair(s): Baishakhi Ray Columbia University, New York; AWS AI Lab | ||
13:30 15mTalk | PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code Research Papers Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences DOI Pre-print | ||
13:45 15mTalk | Understanding Code Changes Practically with Small-Scale Language Models Research Papers Cong Li Zhejiang University; Ant Group, Zhaogui Xu Ant Group, Peng Di Ant Group, Dongxia Wang Zhejiang University, Zheng Li Ant Group, Qian Zheng Ant Group | ||
14:00 15mTalk | DRMiner: Extracting Latent Design Rationale from Jira Issue Logs Research Papers Jiuang Zhao Beihang University, Zitian Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Donghao Yang Beihang University, Xin Tan Beihang University | ||
14:15 15mTalk | An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation Research Papers Zhiquan Huang Sun Yat-sen University, Yuan Huang Sun Yat-sen University, Xiangping Chen Sun Yat-sen University, Xiaocong Zhou School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China, Changlin Yang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University | ||
14:30 15mTalk | RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection Research Papers Weilong Li School of Computer Science and Engineering,Sun Yat-sen University, Jintian Lu College of Computer Science and Engineering, Jishou University, Ruizhi Xiao School of Computer Science and Engineering,Sun Yat-sen University, Pengfei Shao China Southern Power Grid Digital Grid Group Information and Telecommunication Technology Co., Ltd., Shuyuan Jin School of Computer Science and Engineering,Sun Yat-sen University | ||
14:45 15mTalk | ChatBR: Automated assessment and improvement of bug report quality using ChatGPT Research Papers Lili Bo Yangzhou University, wangjie ji Yangzhou University, Xiaobing Sun Yangzhou University, Ting Zhang Singapore Management University, Xiaoxue Wu Yangzhou University, Ying Wei Yangzhou University |
15:30 - 16:30 | Smart contract and block chain 2NIER Track / Research Papers / Tool Demonstrations at Camellia Chair(s): Vladimir Filkov University of California at Davis, USA | ||
15:30 15mTalk | Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models Research Papers Cong Wu The University of Hong Kong, Jing Chen Wuhan University, Ziwei Wang Wuhan University, Ruichao Liang Wuhan University, Ruiying Du Wuhan University | ||
15:45 15mTalk | AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis Research Papers Yin Wu Xi'an Jiaotong University, Xiaofei Xie Singapore Management University, Chenyang Peng Xi'an Jiaotong University, Dijun Liu Ant Group, Hao Wu Xi'an JiaoTong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University |
15:30 - 16:30 | |||
15:30 15mTalk | iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring Research Papers Di Wu , Fangwen Mu Institute of Software, Chinese Academy of Sciences, Lin Shi Beihang University, Zhaoqiang Guo Software Engineering Application Technology Lab, Huawei, China, Kui Liu Huawei, Weiguang Zhuang Beihang University, Yuqi Zhong Beihang University, Li Zhang Beihang University | ||
15:45 15mTalk | A Position-Aware Approach to Decomposing God Classes Research Papers Tianyi Chen Beijing Institute of Technology, Yanjie Jiang Peking University, Fu Fan Beijing Institute of Technology, Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology | ||
16:00 15mTalk | Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network Research Papers Di Cui Xidian University, Jiaqi Wang Xidian University, Qiangqiang Wang Xidian University, Peng Ji Xidian University, Minglang Qiao Xidian University, Yutong Zhao University of Central Missouri, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University |
15:30 - 16:30 | Code completionResearch Papers / NIER Track at Compagno Chair(s): Baishakhi Ray Columbia University, New York; AWS AI Lab | ||
15:30 15mTalk | Attribution-guided Adversarial Code Prompt Generation for Code Completion Models Research Papers Xueyang Li Institute of Information Engineering, Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Shangqing Liu Nanyang Technological University, Lu Xiang SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Kun Sun Institute of Information Engineering, Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiapu Luo Hong Kong Polytechnic University, Yang Liu Nanyang Technological University | ||
15:45 15mTalk | DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation Research Papers Xinran Yu Nanjing University, Chun Li Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University | ||
16:00 15mTalk | GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph Research Papers Wei Liu Nanjing University, Ailun Yu Peking University, Daoguang Zan Institute of Software, Chinese Academy of Sciences, Bo Shen Huawei Cloud Computing Technologies Co., Ltd., Wei Zhang Peking University, Haiyan Zhao Peking University, Zhi Jin Peking University, Qianxiang Wang Huawei Technologies Co., Ltd |
15:30 - 16:30 | Malicious code and packageResearch Papers / Industry Showcase at Gardenia Chair(s): Curtis Atkisson UW | ||
15:30 15mTalk | RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code Research Papers Jiachi Chen Sun Yat-sen University, Qingyuan Zhong Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Kaiwen Ning Sun Yat-sen University, Yongkun Liu Sun Yat-sen University, Zenan Xu Tencent AI Lab, Zhe Zhao Tencent AI Lab, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University | ||
15:45 15mTalk | SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching Research Papers Yiheng Huang Fudan University, Ruisi Wang Fudan University, Wen Zheng Fudan University, Zhuotong Zhou Fudan University, China, Susheng Wu Fudan University, Shulin Ke Fudan University, Bihuan Chen Fudan University, Shan Gao Huawei, Xin Peng Fudan University | ||
16:00 15mTalk | 1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection Research Papers Xiaobing Sun Yangzhou University, Xingan Gao Yangzhou University, Sicong Cao Yangzhou University, Lili Bo Yangzhou University, Xiaoxue Wu Yangzhou University, Kaifeng Huang Tongji University Media Attached |
15:30 - 16:30 | SE for AI 3Research Papers at Magnoila Chair(s): Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis | ||
15:30 15mTalk | DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation Research Papers Yanzhou Mu , Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Xiang Chen Nantong University, Zhixiang Cao Xi'an Jiaotong University, Peiran Yang State Key Laboratory for Novel Software Technology, Nanjing University, China, Yinglong Zou Nanjing University, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University | ||
15:45 15mTalk | Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment Research Papers Yinglong Zou Nanjing University, Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Jiawei Liu University of Illinois at Urbana-Champaign, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University | ||
16:00 15mTalk | DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators Research Papers Mingyi Zhou Monash University, Xiang Gao Beihang University, Xiao Chen University of Newcastle, Chunyang Chen TU Munich, John Grundy Monash University, Li Li Beihang University | ||
16:15 15mTalk | GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models Research Papers Zhibo Zhang Huazhong University of Science and Technology, Wuxia Bai Huazhong University of Science and Technology, Yuxi Li Huazhong University of Science and Technology, Mark Huasong Meng National University of Singapore, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Li Li Beihang University, Jun Wang Post Luxembourg, Haoyu Wang Huazhong University of Science and Technology |
Accepted Papers
Call for Papers
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2024 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:
- Requirements and Design
- requirements elicitation and management, traceability analysis;
- architecture and design;
- modeling and model-driven engineering;
- software product lines;
- component-based, service-oriented systems;
- OO/Aspect-oriented.
- Testing and Analysis
- regression, mutation, model-based testing;
- program analysis;
- program synthesis;
- program repairs.
- Tools and Processes
- release engineering and DevOps;
- configuration and release management;
- Agile processes.
- Maintenance and Evolution
- debugging and fault-localization;
- refactoring and reengineering;
- reverse engineering;
- software reuse;
- API design and management.
- Formal Aspects of Software Engineering
- formal methods, validation and verification;
- programming languages;
- specification languages, DSLs.
- AI and Software Engineering
- search-based software engineering;
- recommender systems;
- autonomous and self-adapting systems;
- AI for SE;
- SE for AI.
- Software Analytics
- mining software repositories;
- apps and app store analysis.
- Human Aspects of Software Engineering
- program comprehension;
- systematic reviews, code inspection;
- human-computer interface;
- software visualization;
- crowd-based software engineering;
- distributed and collaborative software engineering.
- Social Aspects of Software Engineering
- green and sustainable technologies;
- software economics;
- ethics in software engineering.
- Dependability, Safety, and Reliability
- privacy and security;
- reliability;
- safety;
- performance.
ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.
Submission Categories and Evaluation Criteria
We solicit submissions in two categories:
Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:
- clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
- articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
- show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.
Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:
- clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
- present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
- carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.
Papers in both categories should:
- discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
- provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
- include an adequate use of the English language, absence of major ambiguity, and clearly readable figures and tables;
- adhere to the formatting instructions provided below.
New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.
Originality
Papers submitted to ASE 2024 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2024. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.
To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.
Double Anonymous Review Process
The ASE 2024 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
- Authors’ names and affiliated institution names must be omitted from the submission.
- All references to the author’s prior work should be in the third person.
- Authors are encouraged to title their submissions differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.
Further advice, guidance, and explanation about the double-anonymous review process can be found on the Q&A page.
Artifact Availability and Supplementary Material
We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.
Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:
Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2024 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.
ACM Policy on Research Involving Humans
If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects
It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.
Formatting and Submission Guidelines
Abstracts and papers must be submitted electronically through the ASE 2024 HotCRP submission site: https://ase2024.hotcrp.com/. All submissions must be in English.
For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interest. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.
All submissions must be in PDF format and conform, at time of submission, to the to the ACM Proceedings Template: https://www.acm.org/publications/proceedings-template. LaTeX users must use the \documentclass[sigconf,review,anonymous]{acmart}
option.
Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.
The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs.
By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.
Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors. The collection process has started and will roll out as a requirement throughout 2022. We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.
Accepted Papers
Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.
After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommend a change for clarity or accuracy with the paper content.
We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include but are not limited to, Figshare and Zenodo.
If a submission is accepted, at least one author of the paper is required to register for ASE 2024 and present the paper.
Questions and Comments
If you have any further questions, please contact the PC chairs at rayb@cs.columbia.edu and zhmh@pku.edu.cn.