ASE 2024
Sun 27 October - Fri 1 November 2024 Sacramento, California, United States
Dates
Tracks
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 29 Oct

Displayed time zone: Pacific Time (US & Canada) change

10:00 - 10:30
10:00
30m
Coffee break
Break
Catering

10:30 - 12:00
Test selection and prioritizationResearch Papers / Journal-first Papers / NIER Track at Camellia
Chair(s): Wing Lam George Mason University
10:30
15m
Talk
Towards Exploring the Limitations of Test Selection Techniques on Graph Neural Networks: An Empirical Study
Journal-first Papers
Xueqi Dang University of Luxembourg, SnT, Yinghua LI University of Luxembourg, Wei Ma Nanyang Technological University, Yuejun GUo Luxembourg Institute of Science and Technology, Qiang Hu The University of Tokyo, Mike Papadakis University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Media Attached
10:45
15m
Talk
Prioritizing Test Cases for Deep Learning-based Video Classifiers
Journal-first Papers
Yinghua LI University of Luxembourg, Xueqi Dang University of Luxembourg, SnT, Lei Ma The University of Tokyo & University of Alberta, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg
Media Attached
11:00
15m
Talk
Neuron Sensitivity Guided Test Case Selection
Journal-first Papers
Dong Huang The University of Hong Kong, Qingwen Bu Shanghai Jiao Tong University, Yichao FU The University of Hong Kong, Yuhao Qing University of Hong Kong, Xiaofei Xie Singapore Management University, Junjie Chen Tianjin University, Heming Cui University of Hong Kong
11:15
15m
Talk
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection
Research Papers
Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Xiyue Zhang University of Oxford, Youcheng Sun University of Manchester, Marta Kwiatkowska University of Oxford, Jiming Chen Zhejiang University; Hangzhou Dianzi University, Peng Cheng Zhejiang University
11:30
15m
Talk
Hybrid Regression Test Selection by Integrating File and Method Dependences
Research Papers
Guofeng Zhang College of Computer, National University of Defense Technology, Luyao Liu College of Computer, National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Ji Wang National University of Defense Technology
DOI Pre-print
11:45
10m
Talk
Prioritizing Tests for Improved Runtime
NIER Track
Abdelrahman Baz The University of Texas at Austin, Minchao Huang The University of Texas at Austin, August Shi The University of Texas at Austin
10:30 - 12:00
Requirement engineeringResearch Papers / NIER Track / Journal-first Papers at Carr
Chair(s): Lina Marsso University of Toronto
10:30
15m
Talk
Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach
Research Papers
Jialiang Wei EuroMov DHM, Univ Montpellier & IMT Mines Ales, Anne-Lise Courbis IMT Mines Alès, Thomas Lambolais IMT Mines Alès, Binbin Xu IMT Mines Alès, Pierre Louis Bernard University of Montpellier, Gerard Dray IMT Mines Alès, Walid Maalej University of Hamburg
Pre-print
10:45
15m
Talk
Efficient Slicing of Feature Models via Projected d-DNNF Compilation
Research Papers
Chico Sundermann University of Ulm, Jacob Loth University of Ulm, Thomas Thüm Paderborn University
11:00
15m
Talk
Learning-based Relaxation of Completeness Requirements for Data Entry Forms
Journal-first Papers
Hichem Belgacem Luxembourg Institute of Science and Technology, Xiaochen Li Dalian University of Technology, Domenico Bianculli University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
11:15
15m
Talk
Blackbox Observability of Features and Feature Interactions
Research Papers
Kallistos Weis Saarland University, Leopoldo Teixeira Federal University of Pernambuco, Clemens Dubslaff Eindhoven University of Technology, Sven Apel Saarland University
Pre-print
11:30
15m
Talk
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects
Research Papers
Kexin Sun Nanjing University, Yiding Ren Nanjing University, Hongyu Kuang Nanjing University, Hui Gao Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University
Pre-print
11:45
10m
Talk
Translation Titans, Reasoning Challenges: Satisfiability-Aided Language Models for Detecting Conflicting Requirements
NIER Track
Mohamad Fazelnia University of Hawaii at Manoa, Mehdi Mirakhorli University of Hawaii at Manoa, Hamid Bagheri University of Nebraska-Lincoln
10:30 - 12:00
Compiler and PLResearch Papers at Compagno
Chair(s): Bernd Fischer Stellenbosch University
10:30
15m
Talk
Shoot Yourself in the Foot — Efficient Code Causes Inefficiency in Compiler Optimizations
Research Papers
Fengjuan Gao Nanjing University of Science and Technology, Hongyu Chen Nanjing University, Yuewei Zhou Rice University, Ke Wang Visa Research
10:45
15m
Talk
Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation
Research Papers
Wenzhang Yang University of Science and Technology of China, Cuifeng Gao University of Science and Technology of China, Xiaoyuan Liu University of Science and Technology of China, Yuekang Li UNSW, Yinxing Xue University of Science and Technology of China
11:00
15m
Talk
Compiler Bug Isolation via Enhanced Test Program Mutation
Research Papers
Yujie Liu Peking University, Mingxuan Zhu Peking University, Jinhao Dong Peking University, Junzhe Yu Peking University, Dan Hao Peking University
11:15
15m
Talk
Incremental Context-free Grammar Inference in Black Box Settings
Research Papers
Feifei Li Tsinghua Shenzhen International Graduate School, Xiao Chen University of Newcastle, Xi Xiao Tsinghua Shenzhen International Graduate School, Tsinghua University, Xiaoyu Sun Australian National University, Australia, Chuan Chen Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China, Shaohua Wang Central University of Finance and Economics, Jitao Han Central University of Finance and Economics
11:30
15m
Talk
Typed and Confused: Studying the Unexpected Dangers of Gradual Typing
Research Papers
Dominic Troppmann CISPA Helmholtz Center for Information Security, Aurore Fass CISPA Helmholtz Center for Information Security, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security
11:45
15m
Talk
Refinement Types for Visualization
Research Papers
Jingtao Xia University of California, Santa Barbara, Junrui Liu University of California, Santa Barbara, Nicholas Brown University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Yu Feng University of California at Santa Barbara
10:30 - 12:00
Vulnerability and security1Research Papers / Tool Demonstrations at Gardenia
Chair(s): Curtis Atkisson UW
10:30
15m
Talk
REACT: IR-Level Patch Presence Test for Binary
Research Papers
Qi Zhan Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University
10:45
15m
Talk
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection
Research Papers
Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, David Lo Singapore Management University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Xiaolei Liu China Academy of Engineering Physics, Xingwei Lin Zhejiang University, Wei Liu Nanjing University
Media Attached
11:00
15m
Talk
Unveiling the Characteristics and Impact of Security Patch Evolution
Research Papers
Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zichao Wei Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Media Attached
11:15
15m
Talk
Compositional Security Analysis of Dynamic Component-based Systems
Research Papers
Narges Khakpour Newcastle University, UK, Charilaos Skandylas Linnaeus University
11:30
15m
Talk
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities
Research Papers
Susheng Wu Fudan University, Ruisi Wang Fudan University, Kaifeng Huang Tongji University, Yiheng Cao Fudan University, Wenyan Song Fudan University, Zhuotong Zhou Fudan University, China, Yiheng Huang Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University
Media Attached
11:45
10m
Talk
VulZoo: A Comprehensive Vulnerability Intelligence Dataset
Tool Demonstrations
Bonan Ruan National University of Singapore, Jiahao Liu National University of Singapore, Weibo Zhao National University of Singapore, Zhenkai Liang National University of Singapore
10:30 - 12:00
SE for AI 1NIER Track / Journal-first Papers / Research Papers at Magnoila
Chair(s): Chengcheng Wan East China Normal University
10:30
15m
Talk
Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing
Research Papers
Yihui Xu Soochow University, Yanhui Li Nanjing University, Jun Wang Nanjing University, Xiaofang Zhang Soochow University
DOI
10:45
15m
Talk
Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training
Research Papers
Yangsen Wang Peking University, Yizhou Chen Peking University, Yifan Zhao Peking University, Zhihao Gong Peking University, Junjie Chen Tianjin University, Dan Hao Peking University
DOI Pre-print
11:00
15m
Talk
Supporting Safety Analysis of Image-processing DNNs through Clustering-based Approaches
Journal-first Papers
Mohammed Attaoui University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
11:15
15m
Talk
Challenges and Practices of Deep Learning Model Reengineering: A Case Study on Computer Vision
Journal-first Papers
Wenxin Jiang Purdue University, Vishnu Banna Purdue University, Naveen Vivek Purdue University, Abhinav Goel Purdue University, Nicholas Synovic Loyola University Chicago, George K. Thiruvathukal Loyola University Chicago, James C. Davis Purdue University
Link to publication DOI Media Attached File Attached
11:30
10m
Talk
A Conceptual Framework for Quality Assurance of LLM-based Socio-critical Systems
NIER Track
Luciano Baresi Politecnico di Milano, Matteo Camilli Politecnico di Milano, Tommaso Dolci Politecnico di Milano, Giovanni Quattrocchi Politecnico di Milano
11:40
10m
Talk
Towards Robust ML-enabled Software Systems: Detecting Out-of-Distribution data using Gini Coefficients
NIER Track
Hala Abdelkader Applied Artificial Intelligence Institute, Deakin University, Jean-Guy Schneider Monash University, Mohamed Abdelrazek Deakin University, Australia, Priya Rani RMIT University, Rajesh Vasa Deakin University, Australia
11:50
10m
Talk
Attacks and Defenses for Large Language Models on Coding Tasks
NIER Track
Chi Zhang , Zifan Wang Center for AI Safety, Ruoshi Zhao Independent Researcher, Ravi Mangal Colorado State University, Matt Fredrikson Carnegie Mellon University, Limin Jia , Corina S. Păsăreanu Carnegie Mellon University; NASA Ames
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:30 - 15:00
LLM for SE 1Research Papers / NIER Track / Tool Demonstrations / Journal-first Papers at Camellia
Chair(s): Chengcheng Wan East China Normal University
13:30
15m
Talk
How Effective Do Code Language Models Understand Poor-Readability Code?
Research Papers
Chao Hu Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Fandong Meng WeChat AI, Tencent, Jie Zhou Tencent, Xiaodong Gu Shanghai Jiao Tong University
13:45
15m
Talk
An Empirical Study to Evaluate AIGC Detectors on Code Content
Research Papers
Jian Wang Nanyang Technological University, Shangqing Liu Nanyang Technological University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University
Pre-print
14:00
15m
Talk
Distilled GPT for source code summarization
Journal-first Papers
Chia-Yi Su University of Notre Dame, Collin McMillan University of Notre Dame
14:15
15m
Talk
Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency
Research Papers
Zhang Yichi , Zixi Liu Nanjing University, Yang Feng Nanjing University, Baowen Xu Nanjing University
14:30
10m
Talk
LLM-Based Java Concurrent Program to ArkTS Converter
Tool Demonstrations
Runlin Liu Beihang University, Yuhang Lin Zhejiang University, Yunge Hu Beihang University, Zhe Zhang Beihang University, Xiang Gao Beihang University
14:40
10m
Talk
Towards Leveraging LLMs for Reducing Open Source Onboarding Information Overload
NIER Track
Elijah Kayode Adejumo George Mason University, Brittany Johnson George Mason University
14:50
10m
Talk
CoDefeater: Using LLMs To Find Defeaters in Assurance Cases
NIER Track
Usman Gohar Dept. of Computer Science, Iowa State University, Michael Hunter Iowa State University, Robyn Lutz Iowa State University, Myra Cohen Iowa State University
13:30 - 15:00
Web and UIResearch Papers / Industry Showcase / Tool Demonstrations at Carr
Chair(s): Mattia Fazzini University of Minnesota
13:30
15m
Talk
Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents
Research Papers
Shaoheng Cao Nanjing University, Renyi Chen Samsung Electronics(China)R&D Centre, Minxue Pan Nanjing University, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Xuandong Li Nanjing University
13:45
15m
Talk
Towards a Robust Waiting Strategy for Web GUI Testing for an Industrial Software System
Industry Showcase
Haonan Zhang University of Waterloo, Lizhi Liao Memorial University of Newfoundland, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou), Weiyi Shang University of Waterloo, Nidhi Narula ERA Environmental, Catalin Sporea ERA Environmental Management Solutions, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions
14:00
15m
Talk
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics
Research Papers
Yuanhong Lan Nanjing University, Yifei Lu Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University
14:15
15m
Talk
Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study
Research Papers
Yujia Fan Southern University of Science and Technology, Sinan Wang Southern University of Science and Technology, Zebang Fei Southern University of Science and Technology, Yao Qin Southern University of Science and Technology, Huaxuan Li Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology
14:30
10m
Talk
Enabling Cost-Effective UI Automation Testing with Retrieval-Based LLMs: A Case Study in WeChat
Industry Showcase
Sidong Feng Monash University, Haochuan Lu Tencent, Jianqin Jiang Tencent Inc., Ting Xiong Tencent Inc., Likun Huang Tencent Inc., Yinglin Liang Tencent Inc., Xiaoqin Li Tencent Inc., Yuetang Deng Tencent, Aldeida Aleti Monash University
14:40
10m
Talk
Self-Elicitation of Requirements with Automated GUI Prototyping
Tool Demonstrations
Kristian Kolthoff Institute for Enterprise Systems (InES), University Of Mannheim, Christian Bartelt , Simone Paolo Ponzetto Data and Web Science Group, University of Mannheim, Kurt Schneider Leibniz Universität Hannover, Software Engineering Group
DOI Pre-print Media Attached
13:30 - 15:00
Root-cause analysisResearch Papers at Compagno
Chair(s): Curtis Atkisson UW
13:30
15m
Talk
Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We?
Research Papers
Luan Pham RMIT University, Huong Ha RMIT University, Hongyu Zhang Chongqing University
Pre-print
13:45
15m
Talk
The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier
Research Papers
Yongqi Han Tongji University, Qingfeng Du Tongji University, Ying Huang Tongji University, Jiaqi Wu Zhejiang University, Fulong Tian Di-Matrix(Shanghai) Information Technology Co., Ltd, Cheng He Di-Matrix(Shanghai) Information Technology Co., Ltd
14:00
15m
Talk
MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data
Research Papers
Wang yidan The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Zhouruixing Zhu Chinese University of Hong Kong, Shenzhen, Qiuai Fu Huawei Cloud Computing Technologies CO., LTD., Yuchi Ma Huawei Cloud Computing Technologies, Pinjia He Chinese University of Hong Kong, Shenzhen
14:15
15m
Talk
Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization
Research Papers
Lei Tao Nankai University, Shenglin Zhang Nankai University, ZedongJia Nankai University, Jinrui Sun Nankai University, Minghua Ma Microsoft Research, Zhengdan Li Nankai University, Yongqian Sun Nankai University, Canqun Yang National University of Defense Technology, Yuzhi Zhang Nankai University, Dan Pei Tsinghua University
13:30 - 15:00
Testing 1Research Papers / Industry Showcase at Gardenia
Chair(s): Jialun Cao Hong Kong University of Science and Technology
13:30
15m
Talk
Spotting Code Mutation for Predictive Mutation Testing
Research Papers
Yifan Zhao Peking University, Yizhou Chen Peking University, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Qingyuan Liang Peking University, Guoqing Wang Peking University, Dan Hao Peking University
13:45
15m
Talk
Efficient Detection of Test Interference in C Projects
Research Papers
Florian Eder LMU Munich, Stefan Winter Ulm University and LMU Munich
14:00
15m
Talk
MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing
Research Papers
Congying Xu The Hong Kong University of Science and Technology, China, Songqiang Chen The Hong Kong University of Science and Technology, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Valerio Terragni University of Auckland, Hengcheng Zhu The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology
14:15
15m
Talk
Approximation-guided Fairness Testing through Discriminatory Space Analysis
Research Papers
Zhenjiang Zhao Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan, Takahisa Toda The University of Electro-Communications, Takashi Kitamura
14:30
15m
Talk
Integrating Mutation Testing into Developer Workflow: An Industrial Case Study
Industry Showcase
Stefan Alexander van Heijningen Chalmers and University of Gothenburg, Theo Wiik Chalmers and University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg, Gregory Gay Chalmers | University of Gothenburg, Kim Viggedal Zenseact, David Friberg Zenseact
14:45
15m
Talk
Test Case Generation for Simulink Models using Model Fuzzing and State Solving
Research Papers
Zhuo Su KLISS, BNRist, School of Software, Tsinghua University, Zehong Yu KLISS, BNRist, School of Software, Tsinghua University, Dongyan Wang Information Technology Center, Renmin University of China, Wanli Chang College of Computer Science and Electronic Engineering, Hunan University, Bin Gu Beijing Institute of Control Engineering, Yu Jiang Tsinghua University
13:30 - 15:00
AndroidJournal-first Papers / Research Papers / Industry Showcase at Magnoila
Chair(s): Ziyao He University of California, Irvine
13:30
15m
Talk
How Does Code Optimization Impact Third-party Library Detection for Android Applications?ACM SigSoft Distinguished Paper Award
Research Papers
Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Tinghan Li Huazhong University of Science and Technology, Yiding Zhu Huazhong University of Science and Technology, Qinsheng Hou Shandong University; Qi An Xin Group Corp., Hai Jin Huazhong University of Science and Technology
Media Attached
13:45
15m
Talk
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
Research Papers
Jingnan Zheng National University of Singapore, Jiahao Liu National University of Singapore, An Zhang , Jun ZENG Huawei, Ziqi Yang Zhejiang University, Zhenkai Liang National University of Singapore, Tat-Seng Chua National University of Singapore
14:00
15m
Talk
A Longitudinal Analysis Of Replicas in the Wild Wild Android
Research Papers
Syeda Mashal Abbas Zaidi University of Waterloo, Shahpar Khan University of Waterloo, Parjanya Vyas University of Waterloo, Yousra Aafer University of Waterloo
14:15
15m
Talk
Android Malware Family Labeling: Perspectives from the Industry
Industry Showcase
Liu Wang Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, Tao Zhang Macau University of Science and Technology, Haitao Xu Zhejiang University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Peiming Gao MYbank, Ant Group, Chen Wei MYbank, Ant Group, Yi Wang
14:30
15m
Talk
DexBERT: Effective, Task-Agnostic and Fine-grained Representation Learning of Android Bytecode
Journal-first Papers
Tiezhu Sun University of Luxembourg, Kevin Allix Independent Researcher, Kisub Kim Singapore Management University, Singapore, Xin Zhou Singapore Management University, Singapore, Dongsun Kim Korea University, David Lo Singapore Management University, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
14:45
15m
Talk
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps
Industry Showcase
Zikan Dong Beijing University of Posts and Telecommunications, Yanjie Zhao Huazhong University of Science and Technology, Tianming Liu Monash Univerisity, Chao Wang University of Southern California, Guosheng Xu Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Lin Zhang The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC), Haoyu Wang Huazhong University of Science and Technology
15:00 - 15:30
15:00
30m
Coffee break
Break
Catering

15:30 - 16:30
Code generation 1Journal-first Papers / Research Papers / Industry Showcase at Camellia
Chair(s): Denys Poshyvanyk William & Mary
15:30
15m
Talk
AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models
Research Papers
Zhong Li , Chong Zhang Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Xuandong Li Nanjing University
15:45
15m
Talk
Self-collaboration Code Generation via ChatGPT
Journal-first Papers
Yihong Dong Peking University, Xue Jiang , Zhi Jin Peking University, Ge Li Peking University
16:00
15m
Talk
Vehicle Domain-Specific Language: Unifying Modeling and Code Generation for Low-Code Automotive Development
Industry Showcase
Lei Liao GAC R&D Center, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zhensheng Xu GAC R&D Center, Fangwen Mu Institute of Software, Chinese Academy of Sciences, Yukun Yang GAC R&D Center
16:15
15m
Talk
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code
Research Papers
jiafeng University of Electronic Science and Technology of China, Jiachen Liu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Chun Yong Chong Huawei, Chaozheng Wang The Chinese University of Hong Kong, Shan Gao Huawei, Xin Xia Huawei
Link to publication DOI Pre-print Media Attached
15:30 - 17:00
15:30
15m
Talk
AI-driven Java Performance Testing: Balancing Result Quality with Testing Time
Research Papers
Luca Traini University of L'Aquila, Federico Di Menna University of L'Aquila, Vittorio Cortellessa University of L'Aquila
DOI Pre-print
15:45
15m
Talk
MLOLET - Machine Learning Optimized Load and Endurance Testing: An industrial experience report
Industry Showcase
Arthur Vitui Concordia University, Tse-Hsun (Peter) Chen Concordia University
16:00
15m
Talk
Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code
Research Papers
Muzi Qu University of Chinese Academy of Sciences, Jie Liu Institute of Software, Chinese Academy of Sciences, Liangyi Kang Institute of Software, Chinese Academy of Sciences, Shuai Wang Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences, Tao Huang Institute of Software at Chinese Academy of Sciences
16:15
10m
Talk
BenchCloud: A Platform for Scalable Performance Benchmarking
Tool Demonstrations
Dirk Beyer LMU Munich, Po-Chun Chien LMU Munich, Marek Jankola LMU Munich
DOI Pre-print Media Attached
16:25
10m
Talk
A Formal Treatment of Performance BugsRecorded Talk
NIER Track
Omar I. Al Bataineh Gran Sasso Science Institute (GSSI)
15:30 - 16:30
Program and Code translationResearch Papers / Tool Demonstrations at Compagno
Chair(s): Haiyan Zhao Peking University
15:30
15m
Talk
To Tag, or Not to Tag: Translating C’s Unions to Rust’s Tagged Unions
Research Papers
DOI
15:45
15m
Talk
Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data
Research Papers
Ming Zhu Virginia Tech, Mohimenul Karim Virginia Tech, Ismini Lourentzou Virginia Tech, Daphne Yao Virginia Tech
16:00
15m
Talk
A Joint Learning Model with Variational Interaction for Multilingual Program Translation
Research Papers
Yali Du Nanjing University, Hui Sun Nanjing University, National Key Laboratory for Novel Software Technology, China; Nanjing University, School of Artificial Intelligence, China, Ming Li Nanjing University
16:15
10m
Talk
Automated Validation of COBOL to Java Transformation
Tool Demonstrations
Atul Kumar IBM Research India, Diptikalyan Saha IBM Research India, Toshiaki Yasue IBM Research - Tokyo, Kohichi Ono IBM Research - Tokyo, Saravanan Krishnan IBM India Research Lab, Sandeep Hans IBM India Research Lab, Fumiko Satoh IBM Research - Tokyo, Gerald Mitchell IBM Software, Sachin Kumar IBM Software
15:30 - 16:30
GDPR and privacyTool Demonstrations / Research Papers / Journal-first Papers at Gardenia
Chair(s): Lina Marsso University of Toronto
15:30
15m
Talk
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps
Research Papers
Ming Fan Xi'an Jiaotong University, Jifei Shi Xi'an Jiaotong University, Yin Wang Xi'an Jiaotong University, Le Yu Nanjing University of Posts and Telecommunications, Xicheng Zhang Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
15:45
15m
Talk
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-ProgramsACM SigSoft Distinguished Paper Award
Research Papers
Yin Wang Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Jiajia Li Ant Group, Wenbo Chen Ant Group, Shijie Li Ant Group, Yu Zhang Ant Group, Deqiang Han Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
16:00
15m
Talk
A Multi-solution Study on GDPR AI-enabled Completeness Checking of DPAs
Journal-first Papers
Muhammad Ilyas Azeem Institute of Software Chinese Academy of Sciences, Sallam Abualhaija University of Luxembourg
16:15
10m
Talk
CompAi: A Tool for GDPR Completeness Checking of Privacy Policies using Artificial Intelligence
Tool Demonstrations
Orlando Amaral University of Luxembourg, Sallam Abualhaija University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
15:30 - 16:30
Mobile app development and app reivewJournal-first Papers / NIER Track / Tool Demonstrations at Magnoila
15:30
15m
Talk
Can GitHub Issues Help in App Review Classifications?
Journal-first Papers
Yasaman Abedini Sharif University of Technology, Abbas Heydarnoori Bowling Green State University
15:45
15m
Talk
App Review Driven Collaborative Bug Finding
Journal-first Papers
Xunzhu Tang University of Luxembourg, Haoye Tian University of Melbourne, Pingfan Kong Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Saad Ezzini Lancaster University, Kui Liu Huawei, Xin Xia Huawei, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg
16:00
10m
Talk
Assessing the feasibility of Micro frontend architecture in native mobile app development
NIER Track
Quentin Capdepon LIRMM - University of Montpellier, Nicolas Hlad Berger-Levrault, Benoit Verhaeghe Berger-Levrault, Abdelhak Seriai LIRMM, CNRS and University of Montpellier
16:10
10m
Talk
Model-based GUI Testing For HarmonyOS Apps
Tool Demonstrations
Yige Chen Southern University of Science and Technology, Sinan Wang Southern University of Science and Technology, Yida Tao Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology
16:20
10m
Talk
Towards Extracting Ethical Concerns-related Software Requirements from App ReviewsRecorded Talk
NIER Track
Aakash Sorathiya University of Calgary, Gouri Ginde (Deshpande) University of Calgary
16:30 - 17:30
Fuzzing 1Research Papers / Journal-first Papers / Industry Showcase / Tool Demonstrations at Camellia
Chair(s): Parnian Kamran University of California, Davis
16:30
12m
Talk
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing
Research Papers
Zhuotong Zhou Fudan University, China, Yongzhuo Yang Fudan University, Susheng Wu Fudan University, Yiheng Huang Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University
16:42
12m
Talk
Applying Fuzz Driver Generation to Native C/C++ Libraries of OEM Android Framework: Obstacles and Solutions
Industry Showcase
Shiyan Peng Fudan University, Yuan Zhang Fudan University, Jiarun Dai Fudan University, Yue Gu Fudan University, Zhuoxiang Shen Fudan University, Jingcheng Liu Fudan University, Lin Wang Fudan University, Yong Chen OPPO, Yu Qin OPPO, Lei Ai OPPO, Xianfeng Lu OPPO, Min Yang Fudan University
16:54
12m
Talk
Olympia: Fuzzer Benchmarking for Solidity
Tool Demonstrations
Jana Chadt TU Wien, Austria, Christoph Hochrainer TU Wien, Valentin Wüstholz ConsenSys, Maria Christakis TU Wien
17:06
15m
Talk
BUGOSS: A Benchmark of Real-world Regression Bugs for Empirical Investigation of Regression Fuzzing Techniques
Journal-first Papers
Jeewoong Kim Chungbuk National University, Shin Hong Chungbuk National University
DOI Authorizer link Pre-print
17:21
15m
Talk
Learning Failure-Inducing Models for Testing Software-Defined Networks
Journal-first Papers
Raphaël Ollando University of Luxembourg, Seung Yeob Shin University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
16:30 - 17:30
Program analysis 1Research Papers / Tool Demonstrations at Compagno
Chair(s): Mugdha Khedkar Heinz Nixdorf Institute at Paderborn University
16:30
15m
Talk
Parf: Adaptive Parameter Tuning for Abstract Interpretation
Research Papers
Zhongyi Wang Zhejiang University, China, Linyu Yang Zhejiang University, Mingshuai Chen Zhejiang University, Yixuan Bu Zhejiang University, Zhiyang Li Zhejiang University, Qiuye Wang Fermat Labs, Huawei Inc., Shengchao Qin Fermat Labs, Huawei, Xiao Yi Fermat Labs, Huawei Inc., Jianwei Yin Zhejiang University
16:45
15m
Talk
Discovering Likely Program Invariants for Persistent Memory
Research Papers
Zunchen Huang , Srivatsan Ravi University of Southern California, Chao Wang University of Southern California
17:00
10m
Talk
flowR: A Static Program Slicer for R
Tool Demonstrations
Florian Sihler Ulm University, Matthias Tichy Ulm University, Germany
17:10
10m
Talk
Slicer4D: A Slicing-based Debugger for Java
Tool Demonstrations
Sahar Badihi University of British Columbia, Canada, Sami Nourji The University of British Columbia, Julia Rubin The University of British Columbia
Pre-print
16:30 - 17:30
Smart contract and block chain 1Journal-first Papers / Research Papers / Tool Demonstrations at Gardenia
Chair(s): Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis
16:30
15m
Talk
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts
Research Papers
Haijun Wang Xi’an Jiaotong University, Yurui Hu Xi'an Jiaotong University, Hao Wu Xi'an JiaoTong University, Dijun Liu Ant Group, Chenyang Peng Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
16:45
15m
Talk
DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts
Journal-first Papers
Yang Liu Shanghai Maritime University/National University of Singapore, Chao Wang University of Southern California, Yan Ma Nanjing University of Finance and Economics / National University of Singapore
17:00
10m
Talk
OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond
Tool Demonstrations
Zhiyang Chen University of Toronto, Ye Liu Singapore Management University, Sidi Mohamed Beillahi University of Toronto, Yi Li Nanyang Technological University, Fan Long University of Toronto
DOI Pre-print Media Attached
16:30 - 17:30
Program repair 1Research Papers / Tool Demonstrations / NIER Track at Magnoila
Chair(s): Vikram Nitin Columbia University
16:30
15m
Talk
Enhancing the Efficiency of Automated Program Repair via Greybox Analysis
Research Papers
YoungJae Kim Ulsan National Institute of Science and Technology, Yechan Park UNIST, Seungheon Han UNIST, Jooyong Yi UNIST
16:45
15m
Talk
VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair
Research Papers
Jian Zhang Nanyang Technological University, Chong Wang Nanyang Technological University, Anran Li Nanyang Technological University, Wenhan Wang University of Alberta, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University
17:00
10m
Talk
Automated Repair of Multi-fault Programs: Obstacles, Approaches, and ProspectsRecorded Talk
NIER Track
Omar I. Al Bataineh Gran Sasso Science Institute (GSSI)
17:10
10m
Talk
FixKit: A Program Repair Collection for Python
Tool Demonstrations
Marius Smytzek CISPA Helmholtz Center for Information Security, Martin Eberlein Humboldt University of Berlin, Kai Werk Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security
Link to publication DOI Pre-print Media Attached

Wed 30 Oct

Displayed time zone: Pacific Time (US & Canada) change

10:00 - 10:30
Coffee Break + Poster PresentationsCatering at Morgan's
10:00
30m
Coffee break
Break
Catering

10:30 - 12:00
AIWareResearch Papers / Journal-first Papers at Camellia
Chair(s): Vladimir Filkov University of California at Davis, USA
10:30
15m
Talk
Imperceptible Content Poisoning in LLM-Powered Applications
Research Papers
Quan Zhang Tsinghua University, Chijin Zhou Tsinghua University, Gwihwan Go Tsinghua University, Binqi Zeng Central South University, Heyuan Shi Central South University, Zichen Xu The Nanchang University, Yu Jiang Tsinghua University
10:45
15m
Talk
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners’ Perspective
Research Papers
Xiao Yu Huawei, Zexian Zhang Wuhan University of Technology, Feifei Niu University of Ottawa, Xing Hu Zhejiang University, Xin Xia Huawei, John Grundy Monash University
Media Attached
11:00
15m
Talk
Prompt Sapper: A LLM-Empowered Production Tool for Building AI Chains
Journal-first Papers
Yu Cheng Jiangxi Normal University, Jieshan Chen CSIRO's Data61, Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing CSIRO's Data61, Xiwei (Sherry) Xu Data61, CSIRO, Qinghua Lu Data61, CSIRO
11:15
15m
Talk
Efficient Detection of Toxic Prompts in Large Language Models
Research Papers
Yi Liu Nanyang Technological University, Huijia Sun ShanghaiTech University, Ling Shi Nanyang Technological University, Gelei Deng Nanyang Technological University, Yuqi Chen ShanghaiTech University, Junzhe Yu ShanghaiTech University, Yang Liu Nanyang Technological University
11:30
15m
Talk
Exploring ChatGPT App Ecosystem: Distribution, Deployment and SecurityACM SigSoft Distinguished Paper Award
Research Papers
Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Liuhuo Wan University of Queensland, Tian Yang Ooi University of Queensland, Ruomai Ren University of Queensland, Guangdong Bai University of Queensland
11:45
15m
Talk
DataRecipe — How to Cook the Data for CodeLLM?
Research Papers
Kisub Kim Singapore Management University, Singapore, Jounghoon Kim Chinese University of Hong Kong, Hong Kong, Byeongjo Park Chungbuk National University, Korea, Dongsun Kim Korea University, Chun Yong Chong Monash University Malaysia, Yuan Wang Independent Researcher, Hong Kong, Tiezhu Sun University of Luxembourg, Xunzhu Tang University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg
10:30 - 12:00
Log and trace; failure and faultResearch Papers / Industry Showcase at Carr
Chair(s): Yiming Tang Rochester Institute of Technology
10:30
15m
Talk
Demonstration-Free: Towards More Practical Log Parsing with Large Language Models
Research Papers
Yi Xiao , Van-Hoang Le The University of Newcastle, Hongyu Zhang Chongqing University
10:45
15m
Talk
Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing
Research Papers
Siyu Yu The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Yifan Wu Peking University, Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Pinjia He Chinese University of Hong Kong, Shenzhen
11:00
15m
Talk
Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach
Research Papers
Vittoriano Muttillo University of Teramo, Claudio Di Sipio University of l'Aquila, Riccardo Rubei University of L'Aquila, Luca Berardinelli Johannes Kepler University Linz, MohammadHadi Dehghani Johannes Kepler University Linz
11:15
15m
Talk
DeployFix: Dynamic Repair of Software Deployment Failures via Constraint Solving
Industry Showcase
Haoyu Liao East China Normal University, Jianmei Guo East China Normal University, Bo Huang East China Normal University, Yujie Han East China Normal University, Dingyu Yang Zhejiang University, Kai Shi Alibaba Group, Jonathan Ding Intel, Guoyao Xu Alibaba Group, Guodong Yang Alibaba Group, Liping Zhang Alibaba Group
11:30
15m
Talk
FAIL: Analyzing Software Failures from the News Using LLMs
Research Papers
Dharun Anandayuvaraj Purdue University, Matthew Campbell Purdue University, Arav Tewari Purdue University, James C. Davis Purdue University
DOI Pre-print
11:45
15m
Talk
Do not neglect what's on your hands: localizing software faults with exception trigger streamACM SigSoft Distinguished Paper Award
Research Papers
Xihao Zhang School of Computer Science, Wuhan University, Yi Song School of Computer Science, Wuhan University, Xiaoyuan Xie Wuhan University, Qi Xin Wuhan University, Chenliang Xing School of Computer Science, Wuhan University
10:30 - 12:00
Program analysis 2Research Papers / Industry Showcase at Compagno
Chair(s): Qingkai Shi Nanjing University
10:30
15m
Talk
Semantic-Enhanced Indirect Call Analysis with Large Language Models
Research Papers
Baijun Cheng Peking University, Cen Zhang Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology, Yao Guo Peking University, Xiangqun Chen Peking University
10:45
15m
Talk
Scaler: Efficient and Effective Cross Flow Analysis
Research Papers
Steven (Jiaxun) Tang University of Massachusetts Amherst, Mingcan Xiang University of Massachusetts Amherst, Yang Wang The Ohio State University, Bo Wu Colorado School of Mines, Jianjun Chen Bytedance, Tongping Liu ByteDance
11:00
15m
Talk
AXA: Cross-Language Analysis through Integration of Single-Language Analyses
Research Papers
Tobias Roth TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Julius Näumann TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE
Link to publication DOI Pre-print
11:15
15m
Talk
TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning
Research Papers
Zirui Song The Chinese University of Hong Kong, YuTong Zhou The Chinese University of Hong Kong, Shuaike Dong Ant Group, Ke Zhang , Kehuan Zhang The Chinese University of Hong Kong
11:30
15m
Talk
Experience Report on Applying Program Analysis Techniques for Mainframe Application Understanding
Industry Showcase
Shivali Agarwal IBM, Hiroaki Nakamura IBM Research Tokyo, Rami Katan IBM Research Haifa
11:45
15m
Talk
Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects
Research Papers
Nick Feng University of Toronto, Lina Marsso University of Toronto, Marsha Chechik University of Toronto
10:30 - 12:00
Code generation 2Research Papers / Tool Demonstrations at Gardenia
Chair(s): Yangruibo Ding Columbia University
10:30
15m
Talk
Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation
Research Papers
Xinyu Gao , Yun Xiong Fudan University, Deze Wang National University of Defense Technology, Zhenhan Guan Fudan University, Zejian Shi Fudan University, Haofen Wang Tongji University, Shanshan Li National University of Defense Technology
Pre-print
10:45
15m
Talk
Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates
Research Papers
Zhihong Sun Shandong Normal University, Yao Wan Huazhong University of Science and Technology, Jia Li , Hongyu Zhang Chongqing University, Zhi Jin Peking University, Ge Li Peking University, Chen Lyu Shandong Normal University
11:00
15m
Talk
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization
Research Papers
Zhi Chen Singapore Management University, Lingxiao Jiang Singapore Management University
Pre-print
11:15
15m
Talk
JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models
Research Papers
Jialun Cao Hong Kong University of Science and Technology, Zhiyong Chen Nanjing University, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Chang Xu Nanjing University
11:30
15m
Talk
PACGBI: A Pipeline for Automated Code Generation from Backlog Items
Tool Demonstrations
Mahja Sarschar Hochschule für Technik und Wirtschaft Berlin, Gefei Zhang HTW Berlin, Annika Nowak Capgemini
11:45
15m
Talk
Contextualized Data-Wrangling Code Generation in Computational Notebooks
Research Papers
Junjie Huang The Chinese University of Hong Kong, Daya Guo Sun-yat Sen University, Chenglong Wang Microsoft Research, Jiazhen Gu Chinese University of Hong Kong, Shuai Lu Microsoft Research, Jeevana Priya Inala Microsoft Research, Cong Yan Microsoft Research, Jianfeng Gao Microsoft Research, Nan Duan Microsoft Research, Michael Lyu The Chinese University of Hong Kong
10:30 - 12:00
Testing 2Research Papers / Industry Showcase at Magnoila
Chair(s): Wing Lam George Mason University
10:30
15m
Talk
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests
Research Papers
Mouxiang Chen Zhejiang University, Zhongxin Liu Zhejiang University, He Tao Zhejiang University, Yusu Hong Zhejiang University, David Lo Singapore Management University, Xin Xia Huawei, JianLing Sun Zhejiang University
10:45
15m
Talk
Reducing Test Runtime by Transforming Test FixturesACM SigSoft Distinguished Paper Award
Research Papers
Chengpeng Li University of Texas at Austin, Abdelrahman Baz The University of Texas at Austin, August Shi The University of Texas at Austin
11:00
15m
Talk
Efficient Incremental Code Coverage Analysis for Regression Test Suites
Research Papers
Jiale Amber Wang University of Waterloo, Kaiyuan Wang Google, Pengyu Nie University of Waterloo
11:15
15m
Talk
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness DetectionACM SigSoft Distinguished Paper Award
Research Papers
Huan Xie Chongqing University, Yan Lei Chongqing University, Maojin Li Chongqing University, Meng Yan Chongqing University, Sheng Zhang Chongqing University
11:30
15m
Talk
A Combinatorial Testing Approach to Surrogate Model Construction
Research Papers
Sunny Shree The University of Texas at Arlington, Krishna Khadka The University of Texas at Arlington, Jeff Yu Lei University of Texas at Arlington, Raghu Kacker National Institute of Standards and Technology, D. Richard Kuhn National Institute of Standards and Technology
11:45
15m
Talk
The Importance of Accounting for Execution Failures when Predicting Test Flakiness
Industry Showcase
Guillaume Haben University of Luxembourg, Sarra Habchi Ubisoft Montréal, John Micco VMware, Mark Harman Meta Platforms, Inc. and UCL, Mike Papadakis University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Pre-print
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:30 - 15:00
LLM for SE 2NIER Track / Research Papers / Industry Showcase / Tool Demonstrations at Camellia
Chair(s): Wenxi Wang University of Virgina
13:30
15m
Talk
A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How
Research Papers
Chaozheng Wang The Chinese University of Hong Kong, Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Chun Yong Chong Huawei, Shan Gao Huawei, Michael Lyu The Chinese University of Hong Kong
13:45
15m
Talk
AutoDW: Automatic Data Wrangling Leveraging Large Language Models
Industry Showcase
Lei Liu Fujitsu Laboratories of America, Inc., So Hasegawa Fujitsu Research of America Inc., Shailaja Keyur Sampat Fujitsu Research of America Inc., Maria Xenochristou Fujitsu Research of America Inc., Wei-Peng Chen Fujitsu Research of America, Inc., Takashi Kato Fujitsu Research, Taisei Kakibuchi Fujitsu Research, Tatsuya Asai Fujitsu Research
14:00
15m
Talk
Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks
Research Papers
jiawei lu Zhejiang University, Haoye Wang Hangzhou City University, Zhongxin Liu Zhejiang University, Keyu Liang Zhejiang University, Lingfeng Bao Zhejiang University, Xiaohu Yang Zhejiang University
14:15
15m
Talk
WaDec: Decompile WebAssembly Using Large Language Model
Research Papers
Xinyu She Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
14:30
10m
Talk
LLM4Workflow: An LLM-based Automated Workflow Model Generation Tool
Tool Demonstrations
Jia Xu Anhui University, Weilin Du Anhui University, Xiao Liu School of Information Technology, Deakin University, Xuejun Li School of Computer Science and Technology, Anhui University
14:40
10m
Talk
GPTZoo: A Large-scale Dataset of GPTs for the Research Community
NIER Track
Xinyi Hou Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
14:50
10m
Talk
Emergence of A Novel Domain Expert: A Generative AI-based Framework for Software Function Point Analysis
NIER Track
13:30 - 15:00
VerificationResearch Papers / Tool Demonstrations at Carr
Chair(s): Tevfik Bultan University of California at Santa Barbara
13:30
15m
Talk
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant InferenceACM SigSoft Distinguished Paper Award
Research Papers
Guangyuan Wu Nanjing University, Weining Cao Nanjing University, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University
13:45
15m
Talk
LLM-Generated Invariants for Bounded Model Checking Without Loop UnrollingACM SigSoft Distinguished Paper Award
Research Papers
Muhammad A. A. Pirzada The University of Manchester, Giles Reger University of Manchester, Ahmed Bhayat Independent Scholar, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil
Link to publication DOI
14:00
15m
Talk
Proof Automation with Large Language Models
Research Papers
Minghai Lu Purdue University, Benjamin Delaware Purdue University, Tianyi Zhang Purdue University
Pre-print
14:15
15m
Talk
Verifying the Option Type With Rely-Guarantee Reasoning
Research Papers
James Yoo University of Washington, Michael D. Ernst University of Washington, René Just University of Washington
Link to publication DOI
14:30
10m
Talk
CoVeriTeam GUI: A No-Code Approach to Cooperative Software Verification
Tool Demonstrations
Thomas Lemberger LMU Munich, Henrik Wachowitz LMU Munich
14:40
10m
Talk
CoqPilot, a plugin for LLM-based generation of proofs
Tool Demonstrations
Andrei Kozyrev JetBrains Research, Constructor University Bremen, Gleb Solovev JetBrains Research, Constructor University Bremen, Nikita Khramov JetBrains Research, Constructor University Bremen, Anton Podkopaev JetBrains Research, Constructor University
13:30 - 15:00
Anomaly and fault detectionResearch Papers / NIER Track at Compagno
Chair(s): Xing Hu Zhejiang University
13:30
15m
Talk
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice
Research Papers
Rui Ren DAMO Academy, Alibaba Group Hangzhou, China, Jingbang Yang DAMO Academy, Alibaba Group Hangzhou, China, Linxiao Yang DAMO Academy, Alibaba Group Hangzhou, China, Xinyue Gu DAMO Academy, Alibaba Group Hangzhou, China, Liang Sun DAMO Academy, Alibaba Group Hangzhou, China
13:45
15m
Talk
ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems
Research Papers
Yongqian Sun Nankai University, Binpeng Shi Nankai University, Mingyu Mao Nankai University, Minghua Ma Microsoft Research, Sibo Xia Nankai University, Shenglin Zhang Nankai University, Dan Pei Tsinghua University
14:00
15m
Talk
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality
Research Papers
Yifan Liao Shanghai Jiao Tong University / National University of Singapore, Ming Xu Shanghai Jiao Tong University / National University of Singapore, Yun Lin Shanghai Jiao Tong University, Xiwen Teoh National University of Singapore, Xiaofei Xie Singapore Management University, Ruitao Feng Singapore Management University, Frank Liauw Government Technology Agency Singapore, Hongyu Zhang Chongqing University, Jin Song Dong National University of Singapore
DOI Pre-print
14:15
15m
Talk
End-to-End AutoML for Unsupervised Log Anomaly Detection
Research Papers
Shenglin Zhang Nankai University, Yuhe Ji Nankai University, Jiaqi Luan Nankai University, Xiaohui Nie Computer Network Information Center at Chinese Academy of Sciences, Zi`ang Cheng Nankai University, Minghua Ma Microsoft Research, Yongqian Sun Nankai University, Dan Pei Tsinghua University
14:30
10m
Talk
Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network
NIER Track
Yuanlin Li Tsinghua University, Zhiwei Xu Tsinghua University, Min Zhou Tsinghua University, Hai Wan Tsinghua University, Xibin Zhao Tsinghua University
14:40
10m
Talk
A vision on a methodology for the application of an Intrusion Detection System for satellites
NIER Track
Sébastien Gios UCLouvain, Charles-Henry Bertrand Van Ouytsel UCLouvain, Mark Diamantino Caribé Telespazio - ESA, Axel Legay Université Catholique de Louvain, Belgium
DOI
13:30 - 15:00
Autonomous SystemsResearch Papers / Journal-first Papers / Industry Showcase at Gardenia
Chair(s): Qingkai Shi Nanjing University
13:30
15m
Talk
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing
Research Papers
An Guo Nanjing University, Yuan Zhou Nanyang Technological University, Haoxiang Tian Nanyang Technological University, Chunrong Fang Nanjing University, Yunjian Sun Nanjing University, Weisong Sun Nanyang Technological University, Xinyu Gao , Luu Anh Tuan Nanyang Technological University, Yang Liu Nanyang Technological University, Zhenyu Chen Nanjing University
Pre-print
13:45
15m
Talk
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems
Research Papers
Mohammad Hossein Amini University of Ottawa, Shiva Nejati University of Ottawa
14:00
15m
Talk
In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators
Industry Showcase
Dmytro Humeniuk Polytechnique Montréal, Houssem Ben Braiek Sycodal, Thomas Reid Sycodal, Foutse Khomh Polytechnique Montréal
14:15
15m
Talk
LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language ModelsACM SigSoft Distinguished Paper Award
Research Papers
Shuncheng Tang University of Science and Technology of China, Zhenya Zhang Kyushu University, Japan, Jixiang Zhou University of Science and Technology of China, Lei Wang National University of Defense Technology, Yuan Zhou Zhejiang Sci-Tech University, Yinxing Xue University of Science and Technology of China
14:30
15m
Talk
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutationACM SigSoft Distinguished Paper Award
Research Papers
Shiwei Feng Purdue University, Yapeng Ye Purdue University, Qingkai Shi Nanjing University, Zhiyuan Cheng Purdue University, Xiangzhe Xu Purdue University, Siyuan Cheng Purdue University, Hongjun Choi DGIST, Xiangyu Zhang Purdue University
14:45
15m
Talk
The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems
Journal-first Papers
Carlos Gavidia-Calderon The Alan Turing Institute, Anastasia Kordoni Lancaster University (UK), Amel Bennaceur The Open University, UK, Mark Levine Lancaster University, Bashar Nuseibeh The Open University, UK; Lero, University of Limerick, Ireland
13:30 - 15:00
13:30
15m
Talk
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera
Research Papers
Yifan Xie , Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Ying Wang Northeastern University, Jun Ma National University of Defense Technology, Xiaoling Li National University of Defense Technology, Haoran Liu National University of Defense Technology, Ying Fu National University of Defense Technology, Liao Xiangke National University of Defense Technology
13:45
15m
Talk
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments
Industry Showcase
Xinyi Zheng Huazhong University of Science and Technology, Chen Wei MYbank, Ant Group, Shenao Wang Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Peiming Gao MYbank, Ant Group, Yuanchao Zhang Mybank, Ant Group, Kailong Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology
14:00
15m
Talk
Detect Hidden Dependency to Untangle Commits
Research Papers
Mengdan Fan , Wei Zhang Peking University, Haiyan Zhao Peking University, Guangtai Liang Huawei Cloud Computing Technologies, Zhi Jin Peking University
14:15
15m
Talk
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries
Research Papers
Igor Wodiany University of Manchester, Antoniu Pop University of Manchester, Mikel Luján University of Manchester
DOI Pre-print
14:30
15m
Talk
Balancing the Quality and Cost of Updating Dependencies
Research Papers
Damien Jaime Université Paris Nanterre & LIP6, Pascal Poizat Université Paris Nanterre & LIP6, Joyce El Haddad Université Paris Dauphine - PSL , Thomas Degueule CNRS
14:45
10m
Talk
Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor
Tool Demonstrations
Qiong Feng Nanjing University of Science and Technology, Xiaotian Ma Nanjing University of Science and Technology, Huan Ji Huawei Nanjing Research Center, Wei Song Nanjing University of Science and Technology, Peng Liang Wuhan University, China
DOI Pre-print Media Attached
15:00 - 15:30
Coffee Break + Poster PresentationsCatering at Morgan's
15:00
30m
Coffee break
Break
Catering

15:30 - 16:30
SE for AI 2NIER Track / Research Papers at Camellia
Chair(s): Wenxi Wang University of Virgina
15:30
15m
Talk
UFront: Toward A Unified MLIR Frontend for Deep Learning
Research Papers
Guoqing Bao Shanghai Enflame Technology Co., Ltd., Heng Shi Shanghai Jiao Tong University, Shanghai Enflame Technology Co., Ltd., Chengyi Cui Shanghai Enflame Technology Co., Ltd., Yalin Zhang Shanghai Enflame Technology Co., Ltd., Jianguo Yao Shanghai Jiao Tong University; Shanghai Enflame Technology
15:45
15m
Talk
FIPSER: Improving Fairness Testing of DNN by Seed Prioritization
Research Papers
Junwei Chen East China Normal University, Yueling Zhang East China Normal University, Lingfeng Zhang East China Normal University, Min Zhang East China Normal University, Chengcheng Wan East China Normal University, Ting Su East China Normal University, Geguang Pu East China Normal University, China
16:00
15m
Talk
Prioritizing Test Inputs for DNNs Using Training Dynamics
Research Papers
Jian Shen Nanjing University, Zhong Li , Minxue Pan Nanjing University, Xuandong Li Nanjing University
16:15
15m
Talk
Learning DNN Abstractions using Gradient DescentRecorded Talk
NIER Track
Diganta Mukhopadhyay TCS Research, Pune, India, Sanaa Siddiqui Indian Institute of Technology Delhi, New Delhi, India, Hrishikesh Karmarkar TCS Research, Kumar Madhukar Indian Institute of Technologiy Delhi, New Delhi, India, Guy Katz The Hebrew University of Jerusalem
15:30 - 16:30
Program repair 2Research Papers at Compagno
Chair(s): Xing Hu Zhejiang University
15:30
15m
Talk
Repairing Regex-Dependent String Functions
Research Papers
Nariyoshi Chida NTT Social Informatics Laboratories, Tachio Terauchi Waseda University
15:45
15m
Talk
FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments
Research Papers
Fang Liu Beihang University, Zhenwei Liu Beihang University, Qianhui Zhao Beihang University, Jing Jiang Beihang University, Li Zhang Beihang University, Zian Sun Beihang University, Ge Li Peking University, Zhongqi Li Huawei Cloud Computing Technologies Co., Ltd., Yuchi Ma Huawei Cloud Computing Technologies
16:00
15m
Talk
Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair
Research Papers
Guochang Li Zhejiang University, Chen Zhi Zhejiang University, Jialiang Chen Zhejiang University, Junxiao Han , Shuiguang Deng Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies
16:15
15m
Talk
Enhancing Automated Program Repair with Solution Design
Research Papers
Jiuang Zhao Beihang University, Donghao Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Zitian Yang Beihang University, Fang Liu Beihang University
15:30 - 16:30
Software processResearch Papers / Industry Showcase / Journal-first Papers at Gardenia
Chair(s): Tim Menzies North Carolina State University
15:30
15m
Talk
An Explainable Automated Model for Measuring Software Engineer Contribution
Research Papers
Yue Li Nanjing University, He Zhang Nanjing University, Yuzhe Jin Nanjing University, Zhong Ren State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University Nanjing, Jiangsu, China, Liming Dong Nanjing University, Jun Lyu Nanjing University, Lanxin Yang Nanjing University, David Lo Singapore Management University, Dong Shao Nanjing University
15:45
15m
Talk
Context-Aware Automated Sprint Plan Generation for Agile Software DevelopmentACM SigSoft Distinguished Paper Award
Research Papers
Elvan Kula Delft University of Technology, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology
16:00
15m
Talk
Agile meets quantum: a novel genetic algorithm model for predicting the success of quantum software development project
Journal-first Papers
Arif Ali Khan University of Oulu, Muhammad Azeem Akbar LUT University, Valtteri Lahtinen QUANSCIENT, Marko Paavola VTT Technical Research Ctr of Finland Ltd, Oulu, Finland, Mahmood Niazi King Fahd University of Petroleum and Minerals, Mohammed Naif Alatawi Information Technology Department, Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia, Shoayee Dlaim Alotaibi Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia
16:15
15m
Talk
How many pomodoros do professional engineers need to complete a microtask of programming?
Industry Showcase
Shinobu Saito NTT, IIMURA Yukako NTT Corporation, Emad Aghayi George Mason University, Thomas LaToza George Mason University
15:30 - 16:30
Fuzzing 2Industry Showcase / NIER Track / Research Papers at Magnoila
Chair(s): Marcel Böhme MPI-SP, Bochum
15:30
15m
Talk
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration
Research Papers
Dohyun Ryu The Pennsylvania State University, Giyeol Kim The Pennsylvania State University, Daeun Lee Pusan National University, Seongjin Kim The Pennsylvania State University, Seungjin Bae The Pennsylvania State University, Junghwan Rhee University of Central Oklahoma, Taegyu Kim The Pennsylvania State University
15:45
15m
Talk
Seeding and Mocking in White-Box Fuzzing Enterprise RPC APIs: An Industrial Case Study
Industry Showcase
Man Zhang Beihang University, China, Andrea Arcuri Kristiania University College and Oslo Metropolitan University, Piyun Teng Meituan, kaiming.xue Meituan, Wenhao Wang Meituan
16:00
15m
Talk
Industry Practice of Directed Kernel Fuzzing for Open-source Linux Distribution
Industry Showcase
Heyuan Shi Central South University, Shijun chen Central South University, Runzhe Wang Alibaba Group, Yuhan Chen Central South Sniversity, Weibo Zhang Central South University, Qiang Zhang Hunan University, Yuheng Shen Tsinghua University, Xiaohai Shi Alibaba Group, Chao Hu Central South University, Yu Jiang Tsinghua University
16:15
10m
Talk
Visualizing and Understanding the Internals of Fuzzing
NIER Track
Sriteja Kummita Fraunhofer Institute for Mechatronic Systems Design (Fraunhofer IEM), Zenong Zhang The University of Texas - Dallas, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Shiyi Wei University of Texas at Dallas

Thu 31 Oct

Displayed time zone: Pacific Time (US & Canada) change

10:00 - 10:30
10:00
30m
Coffee break
Break
Catering

10:30 - 12:00
Release engineeringResearch Papers / NIER Track / Industry Showcase at Camellia
Chair(s): Parnian Kamran University of California, Davis
10:30
15m
Talk
GPP: A Graph-Powered Prioritizer for Code Review Requests
Research Papers
Lanxin Yang Nanjing University, Jinwei Xu Nanjing University, He Zhang Nanjing University, Fanghao Wu Nanjing University, Jun Lyu Nanjing University, Yue Li Nanjing University, Alberto Bacchelli University of Zurich
10:45
15m
Talk
Understanding Developer-Analyzer Interactions in Code Reviews
Industry Showcase
Martin Schäf Amazon Web Services, Berk Cirisci Amazon Web Services, Linghui Luo Amazon Web Services, Muhammad Numair Mansur Amazon Web Services, Omer Tripp Amazon Web Services, Daniel J Sanchez Amazon Alexa, Qiang Zhou Amazon Web Services, Muhammad Bilal Zafar Amazon Web Services
11:00
15m
Talk
Understanding the Implications of Changes to Build Systems
Research Papers
Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Calgary, Shane McIntosh University of Waterloo
DOI Pre-print
11:15
15m
Talk
Developer-Defined Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns
Research Papers
Mingyang Yin University of Waterloo, Yutaro Kashiwa Nara Institute of Science and Technology, Keheliya Gallaba Centre for Software Excellence, Huawei Canada, Mahmoud Alfadel University of Calgary, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo
DOI Pre-print
11:30
10m
Talk
Towards Automated Configuration Documentation
NIER Track
Jobayer Ahmmed Iowa State University, Myra Cohen Iowa State University, Paul Gazzillo University of Central Florida
DOI Pre-print
11:40
10m
Talk
Unity Is Strength: Collaborative LLM-Based Agents for Code Reviewer Recommendation
NIER Track
Luqiao Wang Xidian University, Yangtao Zhou Xidian University, Huiying Zhuang Xidian University, Qingshan Li Xidian University, Di Cui Xidian University, Yutong Zhao University of Central Missouri, Lu Wang Xidian University
11:50
10m
Talk
Build Issue Resolution from the Perspective of Non-Contributors
NIER Track
Sunzhou Huang The University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio
DOI Pre-print
10:30 - 12:00
Cloud and Systems Research Papers / Journal-first Papers / Industry Showcase at Carr
Chair(s): Amel Bennaceur The Open University, UK
10:30
15m
Talk
FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows
Research Papers
Yilun Wang Anhui University, Pengfei Chen Sun Yat-sen University, Hui Dou Anhui University, Yiwen Zhang Anhui University, Guangba  Yu Sun Yat-sen University, Zilong He Sun Yat-sen University, Haiyu Huang Sun Yat-sen University
Pre-print
10:45
15m
Talk
Challenges & Opportunities in Automating DBMS: A Qualitative Study
Industry Showcase
Yifan WANG Orange/ INRIA, Pierre Bourhis University of Lille, Inria, CRIStAL UMR CNRS 9189, Romain Rouvoy University Lille 1 and INRIA, Patrick Royer Orange
11:00
15m
Talk
Test-suite-guided discovery of least privilege for cloud infrastructure as code
Journal-first Papers
Ryo Shimizu Hitachi Ltd., Yuna Nunomura Hitachi, Ltd., Hideyuki Kanuka Hitachi, Ltd.
DOI
11:15
15m
Talk
Microservice Decomposition Techniques: An Independent Tool Comparison
Research Papers
Yingying Wang University of British Columbia, Sarah Bornais The University of British Columbia, Julia Rubin The University of British Columbia
Pre-print
11:30
10m
Talk
Towards Long-Term Scientific Model Sustainment at Sandia National Laboratories
Industry Showcase
Christian Gilbertson Sandia National Labs, Reed Milewicz Sandia National Laboratories, Eric Berquist Sandia National Labs, Aaron Brundage Sandia National Labs, John Engelmann Sandia National Labs, Brian Evans Sandia National Labs, Nicholas Francis Sandia National Labs, Ernest Friedman-Hill Sandia National Labs, Samuel Grayson Sandia National Labs, Evan Harvey Sandia National Labs, Eric Ho Sandia National Labs, Edward Hoffman Sandia National Labs, Kevin Irick Sandia National Labs, Anagha Krishna Sandia National Labs, Aaron Moreno Sandia National Labs, Joshua Teves Sandia National Labs
11:40
10m
Talk
Cloud Resource Protection via Automated Security Property Reasoning
Industry Showcase
Zhixing Xu Amazon Web Services, Shengjian Guo Amazon Web Services, Oksana Tkachuk Amazon Web Services, Saeed Nejati Amazon Web Services, Niloofar Razavi Amazon Web Services, George Argyros Amazon Web Services
10:30 - 12:00
Program analysis 3Industry Showcase / Research Papers at Compagno
Chair(s): Xusheng Xiao Arizona State University
10:30
15m
Talk
Language-Agnostic Static Analysis of Probabilistic Programs
Research Papers
Markus Böck TU Wien, Michael Schröder TU Wien, Jürgen Cito TU Wien
10:45
15m
Talk
What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing
Research Papers
Chenyang Yang , Yining Hong Carnegie Mellon University, Grace Lewis Carnegie Mellon Software Engineering Institute, Tongshuang Wu Carnegie Mellon University, Christian Kästner Carnegie Mellon University
11:00
15m
Talk
Interrogation Testing of Program Analyzers for Soundness and Precision Issues
Research Papers
David Kaindlstorfer TU Wien, Austria, Anastasia Isychev TU Wien, Valentin Wüstholz ConsenSys, Maria Christakis TU Wien
11:15
15m
Talk
Constraint-Based Test Oracles for Program Analyzers
Research Papers
Markus Fleischmann TU Wien, Austria, David Kaindlstorfer TU Wien, Austria, Anastasia Isychev TU Wien, Valentin Wüstholz ConsenSys, Maria Christakis TU Wien
11:30
15m
Talk
Program Synthesis Meets Visual What-Comes-Next Puzzles
Research Papers
Sumit Lahiri Indian Institute of Technology Kanpur, Pankaj Kumar Kalita IIT Kanpur, Akshay Kumar Chittora Indian Institute of Technology Kanpur, Varun Vankudre Indian Institute of Technology Kanpur, Subhajit Roy IIT Kanpur
11:45
15m
Talk
Enhancing Compositional Static Analysis with Dynamic Analysis
Industry Showcase
10:30 - 12:00
Test generationResearch Papers / Journal-first Papers at Gardenia
Chair(s): Lingming Zhang University of Illinois at Urbana-Champaign
10:30
15m
Talk
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input GenerationACM SigSoft Distinguished Paper Award
Research Papers
Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Xuanhua Shi Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
10:45
15m
Talk
Distribution-aware Fairness Test Generation
Journal-first Papers
Sai Sathiesh Rajan Singapore University of Technology and Design, Singapore, Ezekiel Soremekun Royal Holloway, University of London, Yves Le Traon University of Luxembourg, Luxembourg, Sudipta Chattopadhyay Singapore University of Technology and Design
11:00
15m
Talk
Effective Unit Test Generation for Java Null Pointer Exceptions
Research Papers
Myungho Lee Korea University, Jiseong Bak Korea University, Seokhyeon Moon , Yoon-Chan Jhi Technology Research, Samsung SDS, Seoul, South Korea, Hakjoo Oh Korea University
11:15
15m
Talk
SlicePromptTest4J: High-coverage Test Generation using LLM via Method Slicing
Research Papers
Zejun Wang Peking University, Kaibo Liu Peking University, Ge Li Peking University, Zhi Jin Peking University
11:30
15m
Talk
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning
Research Papers
Davide Corradini University of Verona, Zeno Montolli University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona
11:45
15m
Talk
On the Evaluation of Large Language Models in Unit Test Generation
Research Papers
Lin Yang Tianjin University, Chen Yang Tianjin University, Shutao Gao Tianjin University, Weijing Wang College of Intelligence and Computing, Tianjin University, Bo Wang Beijing Jiaotong University, Qihao Zhu DeepSeek-AI, Xiao Chu Huawei Cloud Computing Co. Ltd., Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Guangtai Liang Huawei Cloud Computing Technologies, Qianxiang Wang Huawei Technologies Co., Ltd, Junjie Chen Tianjin University
Pre-print
10:30 - 12:00
Vulnerability and security2NIER Track / Research Papers / Tool Demonstrations at Magnoila
Chair(s): Yiming Tang Rochester Institute of Technology
10:30
15m
Talk
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
Research Papers
Yu Zhao , Lina Gong Nanjing University of Aeronautics and Astronautic, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Yongwei Wang Shanghai Institute for Advanced Study and College of Computer Science, Zhejiang University, Mingqiang Wei School of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Fei Wu College of Computer Science and Technology in Zhejiang University
10:45
15m
Talk
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation
Research Papers
Md Shafiuzzaman University of California at Santa Barbara, Achintya Desai University of California Santa Barbara, Laboni Sarker University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara
11:00
15m
Talk
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
Research Papers
Yulun Wu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
11:15
15m
Talk
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
Research Papers
Wenkai Li Hainan University, Xiaoqi Li Hainan University, Zongwei Li Hainan University, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory
Link to publication DOI Pre-print Media Attached
11:30
10m
Talk
MADE-WIC: Multiple Annotated Datasets for Exploring Weaknesses In Code
Tool Demonstrations
Moritz Mock Free University of Bozen-Bolzano, Jorge Melegati Free University of Bozen-Bolzano, Max Kretschmann Hamburg University of Technology, Nicolás E. Díaz Ferreyra Hamburg University of Technology, Barbara Russo Free University of Bozen/Bolzano, Italy
DOI Pre-print
11:40
10m
Talk
The Software Genome Project: Unraveling Software Through Genetic Principles
NIER Track
Yueming Wu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Lyuye Zhang Nanyang Technological University, Yiran Zhang , Zhu Zhiling Zhejiang University of Technology, Yang Liu Nanyang Technological University
11:50
10m
Talk
Mining for Mutation Operators for Reduction of Information Flow Control Violations
NIER Track
Ilya Kosorukov University College London, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London
12:00 - 13:30
12:00
90m
Lunch
Lunch
Catering

13:30 - 15:00
Testing 3Tool Demonstrations / Journal-first Papers / Research Papers / Industry Showcase / NIER Track at Camellia
Chair(s): Yi Song School of Computer Science, Wuhan University
13:30
12m
Talk
General and Practical Property-based Testing for Android AppsACM SigSoft Distinguished Paper Award
Research Papers
Yiheng Xiong East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Jingling Sun University of Electronic Science and Technology of China, Geguang Pu East China Normal University, China, Zhendong Su ETH Zurich
Pre-print
13:42
12m
Talk
ACCESS: Assurance Case Centric Engineering of Safety-critical Systems
Journal-first Papers
Ran Wei Lancaster University, Simon Foster University of York, Haitao Mei University of York, Fang Yan University of York, Ruizhe Yang Dalian University of Technology, Ibrahim Habli University of York, Colin O'Halloran D-RisQ Software Systems, Nick Tudor D-RisQ Software Systems, Tim Kelly University of York, Yakoub Nemouchi University of York
13:55
12m
Talk
Quantum Program Testing Through Commuting Pauli Strings on IBM's Quantum Computers
Industry Showcase
Asmar Muqeet Simula Research Laboratory and University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Paolo Arcaini National Institute of Informatics
Link to publication Pre-print
14:08
12m
Talk
Toward Individual Fairness Testing with Data Validity
NIER Track
Takashi Kitamura , Sousuke Amasaki Okayama Prefectural University, Jun Inoue National Institute of Advanced Industrial Science and Technology, Japan, Yoshinao Isobe AIST, Takahisa Toda The University of Electro-Communications
14:21
12m
Talk
DroneWiS: Automated Simulation Testing of small Unmanned Aerial System in Realistic Windy Conditions
Tool Demonstrations
Bohan Zhang Saint Louis University, Missouri, Ankit Agrawal Saint Louis University, Missouri
14:34
12m
Talk
ARUS: A Tool for Automatically Removing Unnecessary Stubbings from Test Suites
Tool Demonstrations
Mengzhen Li University of Minnesota, Mattia Fazzini University of Minnesota
14:47
12m
Talk
Learning Failure-Inducing Models for Testing Software-Defined Networks
Journal-first Papers
Raphaël Ollando University of Luxembourg, Seung Yeob Shin University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
13:30 - 15:00
Code generation 3Industry Showcase / Journal-first Papers / Research Papers at Carr
Chair(s): Jialun Cao Hong Kong University of Science and Technology
13:30
15m
Talk
Test-Driven Development and LLM-based Code Generation
Research Papers
Noble Saji Mathews University of Waterloo, Canada, Mei Nagappan University of Waterloo
13:45
15m
Talk
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven RefinementACM SigSoft Distinguished Paper Award
Research Papers
Huan Zhang Nanjing University, Wei Cheng Nanjing University, Yuhan Wu Nanjing University, Wei Hu Nanjing University
14:00
15m
Talk
Ansible Lightspeed: A Code Generation Service for IT Automation
Industry Showcase
Priyam Sahoo , Saurabh Pujar IBM Research AI, Ganesh Nalawade RED HAT, Richard Gebhardt , Louis Mandel IBM Research, USA, Luca Buratti IBM Research
Link to publication DOI Pre-print File Attached
14:15
15m
Talk
Self-planning Code Generation with Large Language Models
Journal-first Papers
Xue Jiang , Yihong Dong Peking University, Lecheng Wang Peking University, Fang Zheng Peking University, Qiwei Shang Peking University, Ge Li Peking University, Zhi Jin Peking University, Wenpin Jiao Peking University
13:30 - 15:00
Bug detection and predictionResearch Papers / Journal-first Papers at Compagno
Chair(s): Tim Menzies North Carolina State University
13:30
15m
Talk
Towards Effective Static Type-Error Detection for Python
Research Papers
Wonseok Oh Korea University, Hakjoo Oh Korea University
13:45
15m
Talk
Detecting Element Accessing Bugs in C++ Sequence Containers
Research Papers
zhilin li , Xutong Ma Institute of Software, Chinese Academy of Sciences, Beijing, China, Mengze Hu Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences
14:00
15m
Talk
Concretely Mapped Symbolic Memory Locations for Memory Error Detection
Journal-first Papers
Haoxin Tu Singapore Management University, Singapore, Lingxiao Jiang Singapore Management University, Jiaqi Hong Independent Researcher, Xuhua Ding Singapore Management University, He Jiang Dalian University of Technology
14:15
15m
Talk
NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers
Research Papers
Gichan Lee Hanyang University, Hansae Ju Hanyang University, Scott Uk-Jin Lee Hanyang University
13:30 - 15:00
Software MergeResearch Papers / Journal-first Papers at Gardenia
Chair(s): Haiyan Zhao Peking University
13:30
15m
Talk
Evaluation of Version Control Merge Tools
Research Papers
Benedikt Schesch ETH Zurich, Ryan Featherman UW CSE, Ben Roberts UW CSE, Kenneth J Yang UW CSE, Michael D. Ernst University of Washington
13:45
15m
Talk
Semistructured Merge with Language-Specific Syntactic Separators
Research Papers
Guilherme Cavalcanti Federal Institute of Pernambuco, Brazil, Paulo Borba Federal University of Pernambuco, Leonardo dos Anjos Federal University of Pernambuco, Jonatas Clementino Federal University of Pernambuco
14:00
15m
Talk
Automatic Prediction of Developers' Resolutions for Software Merge Conflicts
Journal-first Papers
Waad riadh aldndni Virginia Tech, Blacksburg,VA,U.S.A., Na Meng Virginia Tech, Francisco Servant ITIS Software, University of Malaga
14:15
15m
Talk
ConflictBench: A Benchmark to Evaluate Software Merge Tools
Journal-first Papers
Bowen Shen Virginia Tech, Na Meng Virginia Tech
14:30
15m
Talk
Revisiting the Conflict-Resolving Problem from a Semantic Perspective
Research Papers
Jinhao Dong Peking University, Jun Sun Singapore Management University, Yun Lin Shanghai Jiao Tong University, Yedi Zhang National University of Singapore, Murong Ma National University of Singapore, Jin Song Dong National University of Singapore, Dan Hao Peking University
13:30 - 15:00
Code and issue reportResearch Papers at Magnoila
Chair(s): Baishakhi Ray Columbia University, New York; AWS AI Lab
13:30
15m
Talk
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code
Research Papers
Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences
DOI Pre-print
13:45
15m
Talk
Understanding Code Changes Practically with Small-Scale Language Models
Research Papers
Cong Li Zhejiang University; Ant Group, Zhaogui Xu Ant Group, Peng Di Ant Group, Dongxia Wang Zhejiang University, Zheng Li Ant Group, Qian Zheng Ant Group
14:00
15m
Talk
DRMiner: Extracting Latent Design Rationale from Jira Issue LogsACM SigSoft Distinguished Paper Award
Research Papers
Jiuang Zhao Beihang University, Zitian Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Donghao Yang Beihang University, Xin Tan Beihang University
14:15
15m
Talk
An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation
Research Papers
Zhiquan Huang Sun Yat-sen University, Yuan Huang Sun Yat-sen University, Xiangping Chen Sun Yat-sen University, Xiaocong Zhou School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China, Changlin Yang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
14:30
15m
Talk
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection
Research Papers
Weilong Li School of Computer Science and Engineering,Sun Yat-sen University, Jintian Lu College of Computer Science and Engineering, Jishou University, Ruizhi Xiao School of Computer Science and Engineering,Sun Yat-sen University, Pengfei Shao China Southern Power Grid Digital Grid Group Information and Telecommunication Technology Co., Ltd., Shuyuan Jin School of Computer Science and Engineering,Sun Yat-sen University
14:45
15m
Talk
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT
Research Papers
Lili Bo Yangzhou University, wangjie ji Yangzhou University, Xiaobing Sun Yangzhou University, Ting Zhang Singapore Management University, Xiaoxue Wu Yangzhou University, Ying Wei Yangzhou University
15:00 - 15:30
15:00
30m
Coffee break
Break
Catering

15:30 - 16:30
Smart contract and block chain 2NIER Track / Research Papers / Tool Demonstrations at Camellia
Chair(s): Vladimir Filkov University of California at Davis, USA
15:30
15m
Talk
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models
Research Papers
Cong Wu The University of Hong Kong, Jing Chen Wuhan University, Ziwei Wang Wuhan University, Ruichao Liang Wuhan University, Ruiying Du Wuhan University
15:45
15m
Talk
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis
Research Papers
Yin Wu Xi'an Jiaotong University, Xiaofei Xie Singapore Management University, Chenyang Peng Xi'an Jiaotong University, Dijun Liu Ant Group, Hao Wu Xi'an JiaoTong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University
16:00
10m
Talk
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts
Tool Demonstrations
Che Wang Peking University, China, Jiashuo Zhang Peking University, China, Jianbo Gao Beijing Jiaotong University, Libin Xia Peking University, Zhi Guan Peking University, Zhong Chen
16:10
10m
Talk
HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts
Tool Demonstrations
Mojtaba Eshghie KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden, Hans Stammler KTH Royal Institute of Technology, Wolfgang Ahrendt Chalmers University of Technology, Thomas T. Hildebrandt University of Copenhagen, Gerardo Schneider University of Gothenburg
16:20
10m
Talk
Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs
NIER Track
Mojtaba Eshghie KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden
15:30 - 16:30
15:30
15m
Talk
iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring
Research Papers
Di Wu , Fangwen Mu Institute of Software, Chinese Academy of Sciences, Lin Shi Beihang University, Zhaoqiang Guo Software Engineering Application Technology Lab, Huawei, China, Kui Liu Huawei, Weiguang Zhuang Beihang University, Yuqi Zhong Beihang University, Li Zhang Beihang University
15:45
15m
Talk
A Position-Aware Approach to Decomposing God Classes
Research Papers
Tianyi Chen Beijing Institute of Technology, Yanjie Jiang Peking University, Fu Fan Beijing Institute of Technology, Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology
16:00
15m
Talk
Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network
Research Papers
Di Cui Xidian University, Jiaqi Wang Xidian University, Qiangqiang Wang Xidian University, Peng Ji Xidian University, Minglang Qiao Xidian University, Yutong Zhao University of Central Missouri, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University
16:15
10m
Talk
Copilot-in-the-Loop: Fixing Code Smells in Copilot-Generated Python Code using Copilot
NIER Track
Beiqi Zhang Wuhan University, Peng Liang Wuhan University, China, Qiong Feng Nanjing University of Science and Technology, Yujia Fu Wuhan University, Zengyang Li Central China Normal University
DOI Pre-print
15:30 - 16:30
Code completionResearch Papers / NIER Track at Compagno
Chair(s): Baishakhi Ray Columbia University, New York; AWS AI Lab
15:30
15m
Talk
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models
Research Papers
Xueyang Li Institute of Information Engineering, Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Shangqing Liu Nanyang Technological University, Lu Xiang SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Kun Sun Institute of Information Engineering, Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiapu Luo Hong Kong Polytechnic University, Yang Liu Nanyang Technological University
15:45
15m
Talk
DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation
Research Papers
Xinran Yu Nanjing University, Chun Li Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University
16:00
15m
Talk
GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph
Research Papers
Wei Liu Nanjing University, Ailun Yu Peking University, Daoguang Zan Institute of Software, Chinese Academy of Sciences, Bo Shen Huawei Cloud Computing Technologies Co., Ltd., Wei Zhang Peking University, Haiyan Zhao Peking University, Zhi Jin Peking University, Qianxiang Wang Huawei Technologies Co., Ltd
16:15
10m
Talk
RepoSim: Evaluating Prompt Strategies for Code Completion via User Behavior Simulation
NIER Track
Chao Peng ByteDance, Qinyun Wu Bytedance Ltd., Jiangchao Liu ByteDance, Jierui Liu ByteDance, Bo Jiang Bytedance Network Technology, Mengqian Xu East China Normal University, Yinghao Wang ByteDance, Xia Liu ByteDance, Ping Yang Bytedance Network Technology
15:30 - 16:30
Malicious code and packageResearch Papers / Industry Showcase at Gardenia
Chair(s): Curtis Atkisson UW
15:30
15m
Talk
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code
Research Papers
Jiachi Chen Sun Yat-sen University, Qingyuan Zhong Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Kaiwen Ning Sun Yat-sen University, Yongkun Liu Sun Yat-sen University, Zenan Xu Tencent AI Lab, Zhe Zhao Tencent AI Lab, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University
15:45
15m
Talk
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching
Research Papers
Yiheng Huang Fudan University, Ruisi Wang Fudan University, Wen Zheng Fudan University, Zhuotong Zhou Fudan University, China, Susheng Wu Fudan University, Shulin Ke Fudan University, Bihuan Chen Fudan University, Shan Gao Huawei, Xin Peng Fudan University
16:00
15m
Talk
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection
Research Papers
Xiaobing Sun Yangzhou University, Xingan Gao Yangzhou University, Sicong Cao Yangzhou University, Lili Bo Yangzhou University, Xiaoxue Wu Yangzhou University, Kaifeng Huang Tongji University
Media Attached
16:15
15m
Talk
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs
Industry Showcase
Jian Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Xinyi Hou Huazhong University of Science and Technology, Kailong Wang Huazhong University of Science and Technology, Peiming Gao MYbank, Ant Group, Yuanchao Zhang Mybank, Ant Group, Chen Wei MYbank, Ant Group, Haoyu Wang Huazhong University of Science and Technology
15:30 - 16:30
SE for AI 3Research Papers at Magnoila
Chair(s): Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis
15:30
15m
Talk
DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation
Research Papers
Yanzhou Mu , Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Xiang Chen Nantong University, Zhixiang Cao Xi'an Jiaotong University, Peiran Yang State Key Laboratory for Novel Software Technology, Nanjing University, China, Yinglong Zou Nanjing University, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University
15:45
15m
Talk
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment
Research Papers
Yinglong Zou Nanjing University, Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Jiawei Liu University of Illinois at Urbana-Champaign, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University
16:00
15m
Talk
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators
Research Papers
Mingyi Zhou Monash University, Xiang Gao Beihang University, Xiao Chen University of Newcastle, Chunyang Chen TU Munich, John Grundy Monash University, Li Li Beihang University
16:15
15m
Talk
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models
Research Papers
Zhibo Zhang Huazhong University of Science and Technology, Wuxia Bai Huazhong University of Science and Technology, Yuxi Li Huazhong University of Science and Technology, Mark Huasong Meng National University of Singapore, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Li Li Beihang University, Jun Wang Post Luxembourg, Haoyu Wang Huazhong University of Science and Technology

Accepted Papers

Title
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection
Research Papers
Media Attached
AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models
Research Papers
A Combinatorial Testing Approach to Surrogate Model Construction
Research Papers
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis
Research Papers
AI-driven Java Performance Testing: Balancing Result Quality with Testing Time
Research Papers
DOI Pre-print
A Joint Learning Model with Variational Interaction for Multilingual Program Translation
Research Papers
A Longitudinal Analysis Of Replicas in the Wild Wild Android
Research Papers
An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation
Research Papers
An Empirical Study to Evaluate AIGC Detectors on Code Content
Research Papers
Pre-print
An Explainable Automated Model for Measuring Software Engineer Contribution
Research Papers
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven RefinementACM SigSoft Distinguished Paper Award
Research Papers
A Position-Aware Approach to Decomposing God Classes
Research Papers
Approximation-guided Fairness Testing through Discriminatory Space Analysis
Research Papers
ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems
Research Papers
A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How
Research Papers
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models
Research Papers
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects
Research Papers
Pre-print
AXA: Cross-Language Analysis through Integration of Single-Language Analyses
Research Papers
Link to publication DOI Pre-print
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests
Research Papers
Balancing the Quality and Cost of Updating Dependencies
Research Papers
Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents
Research Papers
Blackbox Observability of Features and Feature Interactions
Research Papers
Pre-print
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems
Research Papers
Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study
Research Papers
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT
Research Papers
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
Research Papers
Link to publication DOI Pre-print Media Attached
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?
Research Papers
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness DetectionACM SigSoft Distinguished Paper Award
Research Papers
Compiler Bug Isolation via Enhanced Test Program Mutation
Research Papers
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code
Research Papers
Link to publication DOI Pre-print Media Attached
Compositional Security Analysis of Dynamic Component-based Systems
Research Papers
Constraint-Based Test Oracles for Program Analyzers
Research Papers
Context-Aware Automated Sprint Plan Generation for Agile Software DevelopmentACM SigSoft Distinguished Paper Award
Research Papers
Contextualized Data-Wrangling Code Generation in Computational Notebooks
Research Papers
DataRecipe — How to Cook the Data for CodeLLM?
Research Papers
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning
Research Papers
Demonstration-Free: Towards More Practical Log Parsing with Large Language Models
Research Papers
Detect Hidden Dependency to Untangle Commits
Research Papers
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality
Research Papers
DOI Pre-print
Detecting Element Accessing Bugs in C++ Sequence Containers
Research Papers
Developer-Defined Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns
Research Papers
DOI Pre-print
DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation
Research Papers
Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects
Research Papers
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration
Research Papers
Discovering Likely Program Invariants for Persistent Memory
Research Papers
Do not neglect what's on your hands: localizing software faults with exception trigger streamACM SigSoft Distinguished Paper Award
Research Papers
DRMiner: Extracting Latent Design Rationale from Jira Issue LogsACM SigSoft Distinguished Paper Award
Research Papers
DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation
Research Papers
Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code
Research Papers
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators
Research Papers
Effective Unit Test Generation for Java Null Pointer Exceptions
Research Papers
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
Research Papers
Efficient Detection of Test Interference in C Projects
Research Papers
Efficient Detection of Toxic Prompts in Large Language Models
Research Papers
Efficient Incremental Code Coverage Analysis for Regression Test Suites
Research Papers
Efficient Slicing of Feature Models via Projected d-DNNF Compilation
Research Papers
End-to-End AutoML for Unsupervised Log Anomaly Detection
Research Papers
Enhancing Automated Program Repair with Solution Design
Research Papers
Enhancing the Efficiency of Automated Program Repair via Greybox Analysis
Research Papers
Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing
Research Papers
DOI
Evaluation of Version Control Merge Tools
Research Papers
Exploring ChatGPT App Ecosystem: Distribution, Deployment and SecurityACM SigSoft Distinguished Paper Award
Research Papers
Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair
Research Papers
FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows
Research Papers
Pre-print
FAIL: Analyzing Software Failures from the News Using LLMs
Research Papers
DOI Pre-print
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection
Research Papers
FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments
Research Papers
FIPSER: Improving Fairness Testing of DNN by Seed Prioritization
Research Papers
General and Practical Property-based Testing for Android AppsACM SigSoft Distinguished Paper Award
Research Papers
Pre-print
Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach
Research Papers
Pre-print
Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization
Research Papers
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps
Research Papers
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models
Research Papers
GPP: A Graph-Powered Prioritizer for Code Review Requests
Research Papers
GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph
Research Papers
How Does Code Optimization Impact Third-party Library Detection for Android Applications?ACM SigSoft Distinguished Paper Award
Research Papers
Media Attached
How Effective Do Code Language Models Understand Poor-Readability Code?
Research Papers
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera
Research Papers
Hybrid Regression Test Selection by Integrating File and Method Dependences
Research Papers
DOI Pre-print
Imperceptible Content Poisoning in LLM-Powered Applications
Research Papers
Incremental Context-free Grammar Inference in Black Box Settings
Research Papers
Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks
Research Papers
Interrogation Testing of Program Analyzers for Soundness and Precision Issues
Research Papers
iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring
Research Papers
JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models
Research Papers
Language-Agnostic Static Analysis of Probabilistic Programs
Research Papers
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries
Research Papers
DOI Pre-print
LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language ModelsACM SigSoft Distinguished Paper Award
Research Papers
Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency
Research Papers
LLM-Generated Invariants for Bounded Model Checking Without Loop UnrollingACM SigSoft Distinguished Paper Award
Research Papers
Link to publication DOI
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant InferenceACM SigSoft Distinguished Paper Award
Research Papers
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing
Research Papers
MaskDroid: Robust Android Malware Detection with Masked Graph Representations
Research Papers
Microservice Decomposition Techniques: An Independent Tool Comparison
Research Papers
Pre-print
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-ProgramsACM SigSoft Distinguished Paper Award
Research Papers
MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing
Research Papers
MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data
Research Papers
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment
Research Papers
Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training
Research Papers
DOI Pre-print
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics
Research Papers
NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers
Research Papers
On the Evaluation of Large Language Models in Unit Test Generation
Research Papers
Pre-print
Parf: Adaptive Parameter Tuning for Abstract Interpretation
Research Papers
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code
Research Papers
DOI Pre-print
Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation
Research Papers
Pre-print
Prioritizing Test Inputs for DNNs Using Training Dynamics
Research Papers
Program Synthesis Meets Visual What-Comes-Next Puzzles
Research Papers
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization
Research Papers
Pre-print
Proof Automation with Large Language Models
Research Papers
Pre-print
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection
Research Papers
REACT: IR-Level Patch Presence Test for Binary
Research Papers
Reducing Test Runtime by Transforming Test FixturesACM SigSoft Distinguished Paper Award
Research Papers
Refinement Types for Visualization
Research Papers
Repairing Regex-Dependent String Functions
Research Papers
Revisiting the Conflict-Resolving Problem from a Semantic Perspective
Research Papers
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code
Research Papers
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutationACM SigSoft Distinguished Paper Award
Research Papers
Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We?
Research Papers
Pre-print
Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation
Research Papers
Scaler: Efficient and Effective Cross Flow Analysis
Research Papers
Semantic-Enhanced Indirect Call Analysis with Large Language Models
Research Papers
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models
Research Papers
Semistructured Merge with Language-Specific Syntactic Separators
Research Papers
Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data
Research Papers
Shoot Yourself in the Foot — Efficient Code Causes Inefficiency in Compiler Optimizations
Research Papers
Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates
Research Papers
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts
Research Papers
SlicePromptTest4J: High-coverage Test Generation using LLM via Method Slicing
Research Papers
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice
Research Papers
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection
Research Papers
Media Attached
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing
Research Papers
Pre-print
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching
Research Papers
Spotting Code Mutation for Predictive Mutation Testing
Research Papers
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation
Research Papers
Test Case Generation for Simulink Models using Model Fuzzing and State Solving
Research Papers
Test-Driven Development and LLM-based Code Generation
Research Papers
The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier
Research Papers
Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network
Research Papers
To Tag, or Not to Tag: Translating C’s Unions to Rust’s Tagged Unions
Research Papers
DOI
Towards Effective Static Type-Error Detection for Python
Research Papers
Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach
Research Papers
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input GenerationACM SigSoft Distinguished Paper Award
Research Papers
Typed and Confused: Studying the Unexpected Dangers of Gradual Typing
Research Papers
TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning
Research Papers
UFront: Toward A Unified MLIR Frontend for Deep Learning
Research Papers
Understanding Code Changes Practically with Small-Scale Language Models
Research Papers
Understanding the Implications of Changes to Build Systems
Research Papers
DOI Pre-print
Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing
Research Papers
Unveiling the Characteristics and Impact of Security Patch Evolution
Research Papers
Media Attached
Verifying the Option Type With Rely-Guarantee Reasoning
Research Papers
Link to publication DOI
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities
Research Papers
Media Attached
VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair
Research Papers
WaDec: Decompile WebAssembly Using Large Language Model
Research Papers
What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing
Research Papers
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners’ Perspective
Research Papers
Media Attached

Call for Papers

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2024 invites high-quality contributions describing significant, original, and unpublished results. Solicited topics include, but are not limited to:

  • Requirements and Design
    • requirements elicitation and management, traceability analysis;
    • architecture and design;
    • modeling and model-driven engineering;
    • software product lines;
    • component-based, service-oriented systems;
    • OO/Aspect-oriented.
  • Testing and Analysis
    • regression, mutation, model-based testing;
    • program analysis;
    • program synthesis;
    • program repairs.
  • Tools and Processes
    • release engineering and DevOps;
    • configuration and release management;
    • Agile processes.
  • Maintenance and Evolution
    • debugging and fault-localization;
    • refactoring and reengineering;
    • reverse engineering;
    • software reuse;
    • API design and management.
  • Formal Aspects of Software Engineering
    • formal methods, validation and verification;
    • programming languages;
    • specification languages, DSLs.
  • AI and Software Engineering
    • search-based software engineering;
    • recommender systems;
    • autonomous and self-adapting systems;
    • AI for SE;
    • SE for AI.
  • Software Analytics
    • mining software repositories;
    • apps and app store analysis.
  • Human Aspects of Software Engineering
    • program comprehension;
    • systematic reviews, code inspection;
    • human-computer interface;
    • software visualization;
    • crowd-based software engineering;
    • distributed and collaborative software engineering.
  • Social Aspects of Software Engineering
    • green and sustainable technologies;
    • software economics;
    • ethics in software engineering.
  • Dependability, Safety, and Reliability
    • privacy and security;
    • reliability;
    • safety;
    • performance.

ASE welcomes submissions addressing topics across the full spectrum of software engineering and a variety of application domains, including mobile, cloud, blockchains, embedded and cyber-physical systems, parallel/distributed/concurrent systems, probabilistic systems, and ubiquitous/pervasive software systems.


Submission Categories and Evaluation Criteria

We solicit submissions in two categories:

Technical Research Papers, which describe innovative research in automating software development or automating support to users engaged in software development activities. Papers in this category should:

  • clearly describe the extent to which the paper’s contributions can impact the field of software engineering and under which assumptions (if any);
  • articulate the novel contribution to the field and carefully support the claims of novelty with citations and discussions of the relevant literature;
  • show that the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.

Experience Papers, which describe a significant experience in applying automated software engineering technology. Papers in this category should:

  • clearly describe a problem of practical importance, explain how the problem was investigated, and in what context;
  • present evidence for the paper’s conclusions, explaining the insights or best practices that emerged, tools developed, and/or software processes involved;
  • carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience.

Papers in both categories should:

  • discuss the extent to which an independent verification or replication of the paper’s claimed contributions is supported;
  • provide sufficient and clear information to understand how the proposed approach works and how data was obtained, analyzed, and interpreted;
  • include an adequate use of the English language, absence of major ambiguity, and clearly readable figures and tables;
  • adhere to the formatting instructions provided below.

New Ideas (short) papers are managed and evaluated by a separate track, with its own program committee and deadlines.


Originality

Papers submitted to ASE 2024 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2024. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.

To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies. Contravention of the submission policy will be deemed a serious breach of scientific ethics and appropriate action will be taken in all such cases.


Double Anonymous Review Process

The ASE 2024 Research Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:

  • Authors’ names and affiliated institution names must be omitted from the submission.
  • All references to the author’s prior work should be in the third person.
  • Authors are encouraged to title their submissions differently than preprints of the authors on arXiV or similar sites. During review, authors should not publicly use the submission title.

Further advice, guidance, and explanation about the double-anonymous review process can be found on the Q&A page.


Artifact Availability and Supplementary Material

We actively support and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Upon submission, authors are asked to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) or explain why this is not possible or desirable.

Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Please carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:

https://ineed.coffee/5205/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance/

Upon acceptance, authors will have the possibility to separately submit their supplementary material to the ASE 2024 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated, or reproduced.


ACM Policy on Research Involving Humans

If work reported in the paper involves human subjects, authors will be required to affirm compliance with the ACM Policy on Research Involving Humans as part of the submission process: https://www.acm.org/publications/policies/research-involving-human-participants-and-subjects

It is the authors’ responsibility (each author individually and the authors collectively) to comply with and provide evidence of compliance with this Policy. Where local ethical review boards are required, authors are responsible for having their research reviewed and approved by such boards. Authors are also responsible for the overall ethical conduct of their research. All ACM Authors must be prepared to provide documentary evidence to ACM that they have adhered to local ethical and legal standards, as ACM may require documentary evidence of such approval at any time following submission of the Work and prior to or after publication of the Work.


Formatting and Submission Guidelines

Abstracts and papers must be submitted electronically through the ASE 2024 HotCRP submission site: https://ase2024.hotcrp.com/. All submissions must be in English.

For the abstract submissions, authors are required to specify the title and the abstract of their papers, relevant research areas, and their conflict of interest. This information will be used to select qualified reviewers for each submission. Authors are allowed to augment the paper title/abstract in the full paper submission stage. However, submissions with dummy placeholders for titles/abstracts will be rejected and authors of such submissions will be unable to proceed to the full paper submission stage.

All submissions must be in PDF format and conform, at time of submission, to the to the ACM Proceedings Template: https://www.acm.org/publications/proceedings-template. LaTeX users must use the \documentclass[sigconf,review,anonymous]{acmart} option.

Submissions must not exceed 10 pages for the main text, including all figures, tables, appendices, etc. Up to two additional pages containing ONLY references are permitted. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.

Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.

The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs.

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.

Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors. The collection process has started and will roll out as a requirement throughout 2022. We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.


Accepted Papers

Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including all figures, tables, appendices) plus 2 pages containing only references. Note that all submitted papers must conform to the 10+2 requirement, described above.

After acceptance, the list of paper authors cannot be changed under any circumstances. That is, the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommend a change for clarity or accuracy with the paper content.

We strongly encourage authors of accepted papers to archive the research artifacts associated with their ASE papers, including code and data, in a repository with a DOI. Popular open-access repositories include but are not limited to, Figshare and Zenodo.

If a submission is accepted, at least one author of the paper is required to register for ASE 2024 and present the paper.


Questions and Comments

If you have any further questions, please contact the PC chairs at rayb@cs.columbia.edu and zhmh@pku.edu.cn.