This program is tentative and subject to change.
Tue 29 OctDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 12:00 | |||
10:30 15mTalk | Towards Exploring the Limitations of Test Selection Techniques on Graph Neural Networks: An Empirical Study Journal-first Papers Xueqi Dang University of Luxembourg, SnT, Yinghua LI University of Luxembourg, Wei Ma Nanyang Technological University, Yuejun GUo Luxembourg Institute of Science and Technology, Qiang Hu The University of Tokyo, Mike Papadakis University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg | ||
10:45 15mTalk | Prioritizing Test Cases for Deep Learning-based Video Classifiers Journal-first Papers Yinghua LI University of Luxembourg, Xueqi Dang University of Luxembourg, SnT, Lei Ma The University of Tokyo & University of Alberta, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg | ||
11:00 15mTalk | Neuron Sensitivity Guided Test Case Selection Journal-first Papers Dong Huang The University of Hong Kong, Qingwen Bu Shanghai Jiao Tong University, Yichao FU The University of Hong Kong, Yuhao Qing University of Hong Kong, Xiaofei Xie Singapore Management University, Junjie Chen Tianjin University, Heming Cui University of Hong Kong | ||
11:15 15mTalk | FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection Research Papers Jialuo Chen Zhejiang University, Jingyi Wang Zhejiang University, Xiyue Zhang University of Oxford, Youcheng Sun University of Manchester, Marta Kwiatkowska University of Oxford, Jiming Chen Zhejiang University; Hangzhou Dianzi University, Peng Cheng Zhejiang University | ||
11:30 15mTalk | Hybrid Regression Test Selection by Integrating File and Method Dependences Research Papers Guofeng Zhang College of Computer, National University of Defense Technology, Luyao Liu College of Computer, National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Ji Wang National University of Defense Technology DOI Pre-print | ||
11:45 10mTalk | Prioritizing Tests for Improved Runtime NIER Track Abdelrahman Baz The University of Texas at Austin, Minchao Huang The University of Texas at Austin, August Shi The University of Texas at Austin |
10:30 - 12:00 | |||
10:30 15mTalk | Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach Research Papers Jialiang Wei EuroMov DHM, Univ Montpellier & IMT Mines Ales, Anne-Lise Courbis IMT Mines Alès, Thomas Lambolais IMT Mines Alès, Binbin Xu IMT Mines Alès, Pierre Louis Bernard University of Montpellier, Gerard Dray IMT Mines Alès, Walid Maalej University of Hamburg | ||
10:45 15mTalk | Efficient Slicing of Feature Models via Projected d-DNNF Compilation Research Papers | ||
11:00 15mTalk | Learning-based Relaxation of Completeness Requirements for Data Entry Forms Journal-first Papers Hichem Belgacem Luxembourg Institute of Science and Technology, Xiaochen Li Dalian University of Technology, Domenico Bianculli University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland | ||
11:15 15mTalk | Blackbox Observability of Features and Feature Interactions Research Papers Kallistos Weis Saarland University, Leopoldo Teixeira Federal University of Pernambuco, Clemens Dubslaff Eindhoven University of Technology, Sven Apel Saarland University Pre-print | ||
11:30 15mTalk | AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects Research Papers Kexin Sun Nanjing University, Yiding Ren Nanjing University, Hongyu Kuang Nanjing University, Hui Gao Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University, Guoping Rong Nanjing University, Dong Shao Nanjing University, He Zhang Nanjing University Pre-print | ||
11:45 10mTalk | Translation Titans, Reasoning Challenges: Satisfiability-Aided Language Models for Detecting Conflicting Requirements NIER Track Mohamad Fazelnia University of Hawaii at Manoa, Mehdi Mirakhorli University of Hawaii at Manoa, Hamid Bagheri University of Nebraska-Lincoln |
10:30 - 12:00 | |||
10:30 15mTalk | REACT: IR-Level Patch Presence Test for Binary Research Papers Qi Zhan Zhejiang University, Xing Hu Zhejiang University, Xin Xia Huawei, Shanping Li Zhejiang University | ||
10:45 15mTalk | Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection Research Papers Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, David Lo Singapore Management University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Xiaolei Liu China Academy of Engineering Physics, Xingwei Lin Zhejiang University, Wei Liu Nanjing University | ||
11:00 15mTalk | Unveiling the Characteristics and Impact of Security Patch Evolution Research Papers Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zichao Wei Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
11:15 15mTalk | Compositional Security Analysis of Dynamic Component-based Systems Research Papers | ||
11:30 15mTalk | Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities Research Papers Susheng Wu Fudan University, Ruisi Wang Fudan University, Kaifeng Huang Tongji University, Yiheng Cao Fudan University, Wenyan Song Fudan University, Zhuotong Zhou Fudan University, China, Yiheng Huang Fudan University, Bihuan Chen Fudan University, Xin Peng Fudan University | ||
11:45 10mTalk | VulZoo: A Comprehensive Vulnerability Intelligence Dataset Tool Demonstrations Bonan Ruan National University of Singapore, Jiahao Liu National University of Singapore, Weibo Zhao National University of Singapore, Zhenkai Liang National University of Singapore |
10:30 - 12:00 | |||
10:30 15mTalk | Shoot Yourself in the Foot — Efficient Code Causes Inefficiency in Compiler Optimizations Research Papers Fengjuan Gao Nanjing University of Science and Technology, Hongyu Chen Nanjing University, Yuewei Zhou Rice University, Ke Wang | ||
10:45 15mTalk | Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation Research Papers Wenzhang Yang University of Science and Technology of China, Cuifeng Gao University of Science and Technology of China, Xiaoyuan Liu University of Science and Technology of China, Yuekang Li UNSW, Yinxing Xue University of Science and Technology of China | ||
11:00 15mTalk | Compiler Bug Isolation via Enhanced Test Program Mutation Research Papers Yujie Liu Peking University, Mingxuan Zhu Peking University, Jinhao Dong Peking University, Junzhe Yu Peking University, Dan Hao Peking University | ||
11:15 15mTalk | Incremental Context-free Grammar Inference in Black Box Settings Research Papers Feifei Li Tsinghua Shenzhen International Graduate School, Xiao Chen University of Newcastle, Xi Xiao Tsinghua Shenzhen International Graduate School, Tsinghua University, Xiaoyu Sun Australian National University, Australia, Chuan Chen Key Laboratory of Computing Power Network and Information Security, Ministry of Education, Shandong Computer Science Center (National Supercomputer Center in Jinan), Qilu University of Technology (Shandong Academy of Sciences), Jinan, China, Shaohua Wang Central University of Finance and Economics, Jitao Han Central University of Finance and Economics | ||
11:30 15mTalk | Typed and Confused: Studying the Unexpected Dangers of Gradual Typing Research Papers Dominic Troppmann CISPA Helmholtz Center for Information Security, Aurore Fass CISPA Helmholtz Center for Information Security, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security | ||
11:45 15mTalk | Refinement Types for Visualization Research Papers Jingtao Xia University of California, Santa Barbara, Junrui Liu University of California, Santa Barbara, Nicholas Brown University of California, Santa Barbara, Yanju Chen University of California at Santa Barbara, Yu Feng University of California at Santa Barbara |
13:30 - 15:00 | |||
13:30 15mTalk | How Effective Do Code Language Models Understand Poor-Readability Code? Research Papers Chao Hu School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yitian Chai School of Software, Shanghai Jiao Tong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Fandong Meng WeChat AI, Tencent, Jie Zhou Tencent, Xiaodong Gu Shanghai Jiao Tong University | ||
13:45 15mTalk | An Empirical Study to Evaluate AIGC Detectors on Code Content Research Papers wang.jian , Shangqing Liu Nanyang Technological University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University Pre-print | ||
14:00 15mTalk | Distilled GPT for source code summarization Journal-first Papers | ||
14:15 15mTalk | Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency Research Papers Zhang Yichi , Zixi Liu Nanjing University, Yang Feng Nanjing University, Baowen Xu Nanjing University | ||
14:30 10mTalk | LLM-Based Java Concurrent Program to ArkTS Converter Tool Demonstrations Runlin Liu Beihang University, Yuhang Lin Zhejiang University, Yunge Hu Beihang University, Zhe Zhang Beihang University, Xiang Gao Beihang University | ||
14:40 10mTalk | Towards Leveraging LLMs for Reducing Open Source Onboarding Information Overload NIER Track | ||
14:50 10mTalk | CoDefeater: Using LLMs To Find Defeaters in Assurance Cases NIER Track Usman Gohar Dept. of Computer Science, Iowa State University, Michael Hunter Iowa State University, Robyn Lutz Iowa State University, Myra Cohen Iowa State University |
13:30 - 15:00 | |||
13:30 15mTalk | Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents Research Papers Shaoheng Cao Nanjing University, Renyi Chen Samsung Electronics(China)R&D Centre, Minxue Pan Nanjing University, Wenhua Yang Nanjing University of Aeronautics and Astronautics, Xuandong Li Nanjing University | ||
13:45 15mTalk | Towards a Robust Waiting Strategy for Web GUI Testing for an Industrial Software System Industry Showcase Haonan Zhang University of Waterloo, Lizhi Liao Memorial University of Newfoundland, Zishuo Ding The Hong Kong University of Science and Technology (Guangzhou), Weiyi Shang University of Waterloo, Nidhi Narula ERA Environmental, Catalin Sporea ERA Environmental Management Solutions, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions | ||
14:00 15mTalk | Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics Research Papers Yuanhong Lan Nanjing University, Yifei Lu Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University | ||
14:15 15mTalk | Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study Research Papers Yujia Fan Southern University of Science and Technology, Sinan Wang Southern University of Science and Technology, Zebang Fei Southern University of Science and Technology, Yao Qin Southern University of Science and Technology, Huaxuan Li Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology | ||
14:30 10mTalk | Enabling Cost-Effective UI Automation Testing with Retrieval-Based LLMs: A Case Study in WeChat Industry Showcase Sidong Feng Monash University, Haochuan Lu Tencent, Jianqin Jiang Tencent Inc., Ting Xiong Tencent Inc., Likun Huang Tencent Inc., Yinglin Liang Tencent Inc., Xiaoqin Li Tencent Inc., Yuetang Deng Tencent, Aldeida Aleti Monash University | ||
14:40 10mTalk | Self-Elicitation of Requirements with Automated GUI Prototyping Tool Demonstrations Kristian Kolthoff Institute for Enterprise Systems (InES), University Of Mannheim, Christian Bartelt , Simone Paolo Ponzetto Data and Web Science Group, University of Mannheim, Kurt Schneider Leibniz Universität Hannover, Software Engineering Group |
13:30 - 15:00 | |||
13:30 15mTalk | Spotting Code Mutation for Predictive Mutation Testing Research Papers Yifan Zhao Peking University, Yizhou Chen Peking University, Zeyu Sun Institute of Software, Chinese Academy of Sciences, Qingyuan Liang Peking University, Guoqing Wang Peking University, Dan Hao Peking University | ||
13:45 15mTalk | Efficient Detection of Test Interference in C Projects Research Papers | ||
14:00 15mTalk | MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing Research Papers Congying Xu Fudan University, China, Songqiang Chen The Hong Kong University of Science and Technology, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Valerio Terragni University of Auckland, Hengcheng Zhu The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology | ||
14:15 15mTalk | Approximation-guided Fairness Testing through Discriminatory Space Analysis Research Papers Zhenjiang Zhao Graduate School of Informatics and Engineering, University of Electro-Communications, Tokyo, Japan, Takahisa Toda The University of Electro-Communications, Takashi Kitamura | ||
14:30 15mTalk | Integrating Mutation Testing into Developer Workflow: An Industrial Case Study Industry Showcase Stefan Alexander van Heijningen Chalmers and University of Gothenburg, Theo Wiik Chalmers and University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg, Gregory Gay Chalmers | University of Gothenburg, Kim Viggedal Zenseact, David Friberg Zenseact | ||
14:45 15mTalk | Test Case Generation for Simulink Models using Model Fuzzing and State Solving Research Papers Zhuo Su KLISS, BNRist, School of Software, Tsinghua University, Zehong Yu KLISS, BNRist, School of Software, Tsinghua University, Dongyan Wang Information Technology Center, Renmin University of China, Wanli Chang College of Computer Science and Electronic Engineering, Hunan University, Bin Gu Beijing Institute of Control Engineering, Yu Jiang Tsinghua University |
13:30 - 15:00 | |||
13:30 15mTalk | How Does Code Optimization Impact Third-party Library Detection for Android Applications? Research Papers Zifan Xie Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Tinghan Li Huazhong University of Science and Technology, Yiding Zhu Huazhong University of Science and Technology, Qinsheng Hou Shandong University; Qi An Xin Group Corp., Hai Jin Huazhong University of Science and Technology | ||
13:45 15mTalk | MaskDroid: Robust Android Malware Detection with Masked Graph Representations Research Papers Jingnan Zheng National University of Singapore, Jiahao Liu National University of Singapore, An Zhang , Jun ZENG Huawei, Ziqi Yang Zhejiang University, Zhenkai Liang National University of Singapore, Tat-Seng Chua National University of Singapore | ||
14:00 15mTalk | A Longitudinal Analysis Of Replicas in the Wild Wild Android Research Papers Syeda Mashal Abbas Zaidi University of Waterloo, Shahpar Khan University of Waterloo, Parjanya Vyas University of Waterloo, Yousra Aafer University of Waterloo | ||
14:15 15mTalk | Android Malware Family Labeling: Perspectives from the Industry Industry Showcase Liu Wang Beijing University of Posts and Telecommunications, Haoyu Wang Huazhong University of Science and Technology, Tao Zhang Macau University of Science and Technology, Haitao Xu Zhejiang University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Peiming Gao MYbank, Ant Group, Chen Wei MYbank, Ant Group, Yi Wang | ||
14:30 15mTalk | DexBERT: Effective, Task-Agnostic and Fine-grained Representation Learning of Android Bytecode Journal-first Papers Tiezhu Sun University of Luxembourg, Kevin Allix Independent Researcher, Kisub Kim Singapore Management University, Singapore, Xin Zhou Singapore Management University, Singapore, Dongsun Kim Korea University, David Lo Singapore Management University, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
14:45 15mTalk | Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps Industry Showcase Zikan Dong Beijing University of Posts and Telecommunications, Yanjie Zhao Huazhong University of Science and Technology, Tianming Liu Monash Univerisity, Chao Wang University of Southern California, Guosheng Xu Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology, Shenzhen, Lin Zhang The National Computer Emergency Response Team/Coordination Center of China (CNCERT/CC), Haoyu Wang Huazhong University of Science and Technology |
13:30 - 15:00 | |||
13:30 15mTalk | Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We? Research Papers Pre-print | ||
13:45 15mTalk | The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier Research Papers Yongqi Han Tongji University, Qingfeng Du Tongji University, Ying Huang Tongji University, Jiaqi Wu Zhejiang University, Fulong Tian Di-Matrix(Shanghai) Information Technology Co., Ltd, Cheng He Di-Matrix(Shanghai) Information Technology Co., Ltd | ||
14:00 15mTalk | MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data Research Papers Wang yidan The Chinese University of Hong Kong, Shenzhen (CUHK-Shenzhen), Zhouruixing Zhu Chinese University of Hong Kong, Shenzhen, Qiuai Fu Huawei Cloud Computing Technologies CO., LTD., Yuchi Ma Huawei Cloud Computing Technologies, Pinjia He Chinese University of Hong Kong, Shenzhen | ||
14:15 15mTalk | Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization Research Papers Lei Tao Nankai University, Shenglin Zhang Nankai University, ZedongJia Nankai University, Jinrui Sun Nankai University, Minghua Ma Microsoft Research, Zhengdan Li Nankai University, Yongqian Sun Nankai University, Canqun Yang National University of Defense Technology, Yuzhi Zhang Nankai University, Dan Pei Tsinghua University |
15:30 - 16:30 | |||
15:30 15mTalk | AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models Research Papers Zhong Li , Chong Zhang Nanjing University, Minxue Pan Nanjing University, Tian Zhang Nanjing University, Xuandong Li Nanjing University | ||
15:45 15mTalk | Self-collaboration Code Generation via ChatGPT Journal-first Papers | ||
16:00 15mTalk | Vehicle Domain-Specific Language: Unifying Modeling and Code Generation for Low-Code Automotive Development Industry Showcase Lei Liao GAC R&D Center, Junjie Wang Institute of Software at Chinese Academy of Sciences, Zhensheng Xu GAC R&D Center, Fangwen Mu Institute of Software, Chinese Academy of Sciences, Yukun Yang GAC R&D Center | ||
16:15 15mTalk | ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code Research Papers jiafeng University of Electronic Science and Technology of China, Jiachen Liu Harbin Institute of Technology, Shenzhen, Cuiyun Gao Harbin Institute of Technology, Chun Yong Chong Huawei, Chaozheng Wang The Chinese University of Hong Kong, Shan Gao Huawei, Xin Xia Huawei |
15:30 - 17:00 | |||
15:30 15mTalk | AI-driven Java Performance Testing: Balancing Result Quality with Testing Time Research Papers Luca Traini University of L'Aquila, Federico Di Menna University of L'Aquila, Vittorio Cortellessa University of L'Aquila Pre-print | ||
15:45 15mTalk | MLOLET - Machine Learning Optimized Load and Endurance Testing: An industrial experience report Industry Showcase | ||
16:00 15mTalk | Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code Research Papers Muzi Qu University of Chinese Academy of Sciences, Jie Liu Institute of Software, Chinese Academy of Sciences, Liangyi Kang Institute of Software, Chinese Academy of Sciences, Shuai Wang Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software, Chinese Academy of Sciences, Tao Huang Institute of Software at Chinese Academy of Sciences | ||
16:15 10mTalk | BenchCloud: A Platform for Scalable Performance Benchmarking Tool Demonstrations DOI Pre-print Media Attached | ||
16:25 10mTalk | A Formal Treatment of Performance BugsRecorded Talk NIER Track Omar Al Bataineh Gran Sasso Science Institute (GSSI) |
15:30 - 16:30 | |||
15:30 15mTalk | Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps Research Papers Ming Fan Xi'an Jiaotong University, Jifei Shi Xi'an Jiaotong University, Yin Wang Xi'an Jiaotong University, Le Yu Nanjing University of Posts and Telecommunications, Xicheng Zhang Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
15:45 15mTalk | MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs Research Papers Yin Wang Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Hao Zhou Pattern, Recognition Center, WeChat, Tencent, Haijun Wang Xi’an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Jiajia Li Ant Group, Wenbo Chen Ant Group, Shijie Li Ant Group, Yu Zhang Ant Group, Deqiang Han Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
16:00 15mTalk | A Multi-solution Study on GDPR AI-enabled Completeness Checking of DPAs Journal-first Papers Muhammad Ilyas Azeem Institute of Software Chinese Academy of Sciences, Sallam Abualhaija University of Luxembourg | ||
16:15 10mTalk | CompAi: A Tool for GDPR Completeness Checking of Privacy Policies using Artificial Intelligence Tool Demonstrations Orlando Amaral University of Luxembourg, Sallam Abualhaija University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland |
15:30 - 16:30 | Mobile app development and app reivewJournal-first Papers / NIER Track / Tool Demonstrations at Magnoila | ||
15:30 15mTalk | Can GitHub Issues Help in App Review Classifications? Journal-first Papers | ||
15:45 15mTalk | App Review Driven Collaborative Bug Finding Journal-first Papers Xunzhu Tang University of Luxembourg, Haoye Tian University of Melbourne, Pingfan Kong Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, Saad Ezzini Lancaster University, Kui Liu Huawei, Xin Xia Huawei, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg | ||
16:00 10mTalk | Assessing the feasibility of Micro frontend architecture in native mobile app development NIER Track Quentin Capdepon LIRMM - University of Montpellier, Nicolas Hlad Berger-Levrault, Benoit Verhaeghe Berger-Levrault, Abdelhak Seriai LIRMM, CNRS and University of Montpellier | ||
16:10 10mTalk | Model-based GUI Testing For HarmonyOS Apps Tool Demonstrations Yige Chen Southern University of Science and Technology, Sinan Wang Southern University of Science and Technology, Yida Tao Southern University of Science and Technology, Yepang Liu Southern University of Science and Technology | ||
16:20 10mTalk | Towards Extracting Ethical Concerns-related Software Requirements from App ReviewsRecorded Talk NIER Track |
15:30 - 16:30 | |||
15:30 15mTalk | To Tag, or Not to Tag: Translating C’s Unions to Rust’s Tagged Unions Research Papers | ||
15:45 15mTalk | Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data Research Papers Ming Zhu Virginia Tech, Mohimenul Karim Virginia Tech, Ismini Lourentzou Virginia Tech, Daphne Yao Virginia Tech | ||
16:00 15mTalk | A Joint Learning Model with Variational Interaction for Multilingual Program Translation Research Papers | ||
16:15 10mTalk | Automated Validation of COBOL to Java Transformation Tool Demonstrations Atul Kumar IBM India Research Labs, Diptikalyan Saha IBM Research India, Toshiaki Yasue IBM Research - Tokyo, Kohichi Ono IBM Research - Tokyo, Saravanan Krishnan IBM India Research Lab, Sandeep Hans IBM India Research Lab, Fumiko Satoh IBM Research - Tokyo, Gerald Mitchell IBM Software, Sachin Kumar IBM Software |
16:30 - 17:30 | Smart contract and block chain 1Journal-first Papers / Research Papers / Tool Demonstrations at Gardenia | ||
16:30 15mTalk | Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts Research Papers Haijun Wang Xi’an Jiaotong University, Yurui Hu Xi'an Jiaotong University, Hao Wu Xi'an JiaoTong University, Dijun Liu Ant Group, Chenyang Peng Xi'an Jiaotong University, Yin Wu Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University | ||
16:45 15mTalk | DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts Journal-first Papers | ||
17:00 10mTalk | OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond Tool Demonstrations Zhiyang Chen University of Toronto, Ye Liu Singapore Management University, Sidi Mohamed Beillahi University of Toronto, Yi Li Nanyang Technological University, Fan Long University of Toronto |
16:30 - 17:30 | |||
16:30 15mTalk | Enhancing the Efficiency of Automated Program Repair via Greybox Analysis Research Papers YoungJae Kim Ulsan National Institute of Science and Technology, Yechan Park UNIST, Seungheon Han UNIST, Jooyong Yi UNIST | ||
16:45 15mTalk | VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair Research Papers Jian Zhang Nanyang Technological University, Chong Wang Nanyang Technological University, Anran Li Nanyang Technological University, Wenhan Wang University of Alberta, Li Tianlin Nanyang Technological University, Yang Liu Nanyang Technological University | ||
17:00 10mTalk | Automated Repair of Multi-fault Programs: Obstacles, Approaches, and ProspectsRecorded Talk NIER Track Omar Al Bataineh Gran Sasso Science Institute (GSSI) | ||
17:10 10mTalk | FixKit: A Program Repair Collection for Python Tool Demonstrations Marius Smytzek CISPA Helmholtz Center for Information Security, Martin Eberlein Humboldt University of Berlin, Kai Werk Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security Media Attached |
16:30 - 17:30 | |||
16:30 15mTalk | Parf: Adaptive Parameter Tuning for Abstract Interpretation Research Papers Zhongyi Wang Zhejiang University, China, Linyu Yang Zhejiang University, Mingshuai Chen Zhejiang University, Yixuan Bu Zhejiang University, Zhiyang Li Zhejiang University, Qiuye Wang Fermat Labs, Huawei Inc., Shengchao Qin Fermat Labs, Huawei, Xiao Yi Fermat Labs, Huawei Inc., Jianwei Yin Zhejiang University | ||
16:45 15mTalk | Discovering Likely Program Invariants for Persistent Memory Research Papers Zunchen Huang , Srivatsan Ravi University of Southern California, Chao Wang University of Southern California | ||
17:00 10mTalk | flowR: A Static Program Slicer for R Tool Demonstrations | ||
17:10 10mTalk | Slicer4D: A Slicing-based Debugger for Java Tool Demonstrations Sahar Badihi University of British Columbia, Canada, Sami Nourji The University of British Columbia, Julia Rubin The University of British Columbia Pre-print |
Wed 30 OctDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 12:00 | |||
10:30 15mTalk | Imperceptible Content Poisoning in LLM-Powered Applications Research Papers Quan Zhang Tsinghua University, Chijin Zhou Tsinghua University, Gwihwan Go Tsinghua University, Binqi Zeng Central South University, Heyuan Shi Central South University, Zichen Xu The Nanchang University, Yu Jiang Tsinghua University | ||
10:45 15mTalk | What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners’ Perspective Research Papers Xiao Yu Huawei, Zexian Zhang Wuhan University of Technology, Feifei Niu University of Ottawa, Xing Hu Zhejiang University, Xin Xia Huawei, John Grundy Monash University | ||
11:00 15mTalk | Prompt Sapper: A LLM-Empowered Production Tool for Building AI Chains Journal-first Papers Yu Cheng Jiangxi Normal University, Jieshan Chen CSIRO's Data61, Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing CSIRO's Data61, Xiwei (Sherry) Xu Data61, CSIRO, Qinghua Lu Data61, CSIRO | ||
11:15 15mTalk | Efficient Detection of Toxic Prompts in Large Language Models Research Papers Yi Liu Nanyang Technological University, Huijia Sun ShanghaiTech University, Ling Shi Nanyang Technological University, Gelei Deng Nanyang Technological University, Yuqi Chen ShanghaiTech University, Junzhe Yu ShanghaiTech University, Yang Liu Nanyang Technological University | ||
11:30 15mTalk | Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security Research Papers Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Liuhuo Wan University of Queensland, Tian Yang Ooi University of Queensland, Ruomai Ren University of Queensland, Guangdong Bai University of Queensland | ||
11:45 15mTalk | DataRecipe — How to Cook the Data for CodeLLM? Research Papers Kisub Kim Singapore Management University, Singapore, Jounghoon Kim Chinese University of Hong Kong, Hong Kong, Byeongjo Park Chungbuk National University, Korea, Dongsun Kim Korea University, Chun Yong Chong Monash University Malaysia, Yuan Wang Independent Researcher, Hong Kong, Tiezhu Sun University of Luxembourg, Xunzhu Tang University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg |
10:30 - 12:00 | |||
10:30 15mTalk | Demonstration-Free: Towards More Practical Log Parsing with Large Language Models Research Papers | ||
10:45 15mTalk | Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing Research Papers | ||
11:00 15mTalk | Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach Research Papers Vittoriano Muttillo University of Teramo, Claudio Di Sipio University of l'Aquila, Riccardo Rubei University of L'Aquila, Luca Berardinelli Johannes Kepler University Linz, MohammadHadi Dehghani Johannes Kepler University Linz | ||
11:15 15mTalk | DeployFix: Dynamic Repair of Software Deployment Failures via Constraint Solving Industry Showcase Haoyu Liao East China Normal University, Jianmei Guo East China Normal University, Bo Huang East China Normal University, Yujie Han East China Normal University, Dingyu Yang Zhejiang University, Kai Shi Alibaba Group, Jonathan Ding Intel, Guoyao Xu Alibaba Group, Guodong Yang Alibaba Group, Liping Zhang Alibaba Group | ||
11:30 15mTalk | FAIL: Analyzing Software Failures from the News Using LLMs Research Papers Dharun Anandayuvaraj Purdue University, Matthew Campbell Purdue University, Arav Tewari Purdue University, James C. Davis Purdue University DOI Pre-print | ||
11:45 15mTalk | Do not neglect what's on your hands: localizing software faults with exception trigger stream Research Papers Xihao Zhang School of Computer Science, Wuhan University, Yi Song School of Computer Science, Wuhan University, Xiaoyuan Xie Wuhan University, Qi Xin Wuhan University, Chenliang Xing School of Computer Science, Wuhan University |
10:30 - 12:00 | |||
10:30 15mTalk | Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation Research Papers Xinyu Gao , Yun Xiong Fudan University, Deze Wang National University of Defense Technology, Zhenhan Guan Fudan University, Zejian Shi Fudan University, Haofen Wang Tongji University, Shanshan Li National University of Defense Technology Pre-print | ||
10:45 15mTalk | Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates Research Papers Zhihong Sun Shandong Normal University, Yao Wan Huazhong University of Science and Technology, Jia Li , Hongyu Zhang Chongqing University, Zhi Jin Peking University, Ge Li Peking University, Chen Lyu Shandong Normal University | ||
11:00 15mTalk | Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization Research Papers | ||
11:15 15mTalk | JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models Research Papers Jialun Cao Hong Kong University of Science and Technology, Zhiyong Chen Nanjing University, Jiarong Wu The Hong Kong University of Science and Technology, Shing-Chi Cheung Hong Kong University of Science and Technology, Chang Xu Nanjing University | ||
11:30 15mTalk | PACGBI: A Pipeline for Automated Code Generation from Backlog Items Tool Demonstrations Mahja Sarschar Hochschule für Technik und Wirtschaft Berlin, Gefei Zhang HTW Berlin, Annika Nowak Capgemini | ||
11:45 15mTalk | Contextualized Data-Wrangling Code Generation in Computational Notebooks Research Papers Junjie Huang The Chinese University of Hong Kong, Daya Guo Sun-yat Sen University, Chenglong Wang Microsoft Research, Jiazhen Gu Chinese University of Hong Kong, Shuai Lu Microsoft Research, Jeevana Priya Inala Microsoft Research, Cong Yan Microsoft Research, Jianfeng Gao Microsoft Research, Nan Duan Microsoft Research, Michael Lyu The Chinese University of Hong Kong |
10:30 - 12:00 | |||
10:30 15mTalk | B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests Research Papers Mouxiang Chen Zhejiang University, Zhongxin Liu Zhejiang University, He Tao Zhejiang University, Yusu Hong Zhejiang University, David Lo Singapore Management University, Xin Xia Huawei, JianLing Sun Zhejiang University | ||
10:45 15mTalk | Reducing Test Runtime by Transforming Test Fixtures Research Papers Chengpeng Li University of Texas at Austin, Abdelrahman Baz The University of Texas at Austin, August Shi The University of Texas at Austin | ||
11:00 15mTalk | Efficient Incremental Code Coverage Analysis for Regression Test Suites Research Papers | ||
11:15 15mTalk | Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection Research Papers Huan Xie Chongqing University, Yan Lei Chongqing University, Maojin Li Chongqing University, Meng Yan Chongqing University, Sheng Zhang Chongqing University | ||
11:30 15mTalk | A Combinatorial Testing Approach to Surrogate Model Construction Research Papers Sunny Shree The University of Texas at Arlington, Krishna Khadka The University of Texas at Arlington, Jeff Yu Lei University of Texas at Arlington, Raghu Kacker National Institute of Standards and Technology, D. Richard Kuhn National Institute of Standards and Technology | ||
11:45 15mTalk | The Importance of Accounting for Execution Failures when Predicting Test Flakiness Industry Showcase Guillaume Haben University of Luxembourg, Sarra Habchi Ubisoft Montréal, John Micco VMware, Mark Harman Meta Platforms, Inc. and UCL, Mike Papadakis University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg |
10:30 - 12:00 | |||
10:30 15mTalk | Semantic-Enhanced Indirect Call Analysis with Large Language Models Research Papers Baijun Cheng Peking University, Cen Zhang Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology, Yao Guo Peking University, Xiangqun Chen Peking University | ||
10:45 15mTalk | Scaler: Efficient and Effective Cross Flow Analysis Research Papers Steven (Jiaxun) Tang University of Massachusetts Amherst, Mingcan Xiang University of Massachusetts Amherst, Yang Wang The Ohio State University, Bo Wu Colorado School of Mines, Jianjun Chen Bytedance, Tongping Liu ByteDance | ||
11:00 15mTalk | AXA: Cross-Language Analysis through Integration of Single-Language Analyses Research Papers Tobias Roth TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Julius Näumann TU Darmstadt | ATHENE - National Research Center for Applied Cybersecurity, Darmstadt, Dominik Helm University of Duisburg-Essen; TU Darmstadt; National Research Center for Applied Cybersecurity ATHENE, Sven Keidel TU Darmstadt, Mira Mezini TU Darmstadt; hessian.AI; National Research Center for Applied Cybersecurity ATHENE Pre-print | ||
11:15 15mTalk | TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning Research Papers Zirui Song The Chinese University of Hong Kong, YuTong Zhou The Chinese University of Hong Kong, Shuaike Dong Ant Group, Ke Zhang , Kehuan Zhang The Chinese University of Hong Kong | ||
11:30 15mTalk | Experience Report on Applying Program Analysis Techniques for Mainframe Application Understanding Industry Showcase | ||
11:45 15mTalk | Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects Research Papers Nick Feng University of Toronto, Lina Marsso University of Toronto, Marsha Chechik University of Toronto |
13:30 - 15:00 | |||
13:30 15mTalk | A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How Research Papers Chaozheng Wang The Chinese University of Hong Kong, Shuzheng Gao Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Wenxuan Wang Chinese University of Hong Kong, Chun Yong Chong Huawei, Shan Gao Huawei, Michael Lyu The Chinese University of Hong Kong | ||
13:45 15mTalk | AutoDW: Automatic Data Wrangling Leveraging Large Language Models Industry Showcase Lei Liu Fujitsu Laboratories of America, Inc., So Hasegawa Fujitsu Research of America Inc., Shailaja Keyur Sampat Fujitsu Research of America Inc., Maria Xenochristou Fujitsu Research of America Inc., Wei-Peng Chen Fujitsu Research of America, Inc., Takashi Kato Fujitsu Research, Taisei Kakibuchi Fujitsu Research, Tatsuya Asai Fujitsu Research | ||
14:00 15mTalk | Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks Research Papers jiawei lu Zhejiang University, Haoye Wang Hangzhou City University, Zhongxin Liu Zhejiang University, Keyu Liang Zhejiang University, Lingfeng Bao Zhejiang University, Xiaohu Yang Zhejiang University | ||
14:15 15mTalk | WaDec: Decompile WebAssembly Using Large Language Model Research Papers Xinyu She Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
14:30 10mTalk | LLM4Workflow: An LLM-based Automated Workflow Model Generation Tool Tool Demonstrations | ||
14:40 10mTalk | GPTZoo: A Large-scale Dataset of GPTs for the Research Community NIER Track Xinyi Hou Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
14:50 10mTalk | Emergence of A Novel Domain Expert: A Generative AI-based Framework for Software Function Point Analysis NIER Track |
13:30 - 15:00 | |||
13:30 15mTalk | LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference Research Papers Guangyuan Wu Nanjing University, Weining Cao Nanjing University, Yuan Yao Nanjing University, Hengfeng Wei State Key Laboratory for Novel Software Technology, Nanjing University, Taolue Chen Birkbeck, University of London, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University | ||
13:45 15mTalk | LLM-Generated Invariants for Bounded Model Checking Without Loop Unrolling Research Papers Muhammad A. A. Pirzada The University of Manchester, Giles Reger University of Manchester, Ahmed Bhayat Independent Scholar, Lucas C. Cordeiro University of Manchester, UK and Federal University of Amazonas, Brazil | ||
14:00 15mTalk | Proof Automation with Large Language Models Research Papers Pre-print | ||
14:15 15mTalk | Verifying the Option Type With Rely-Guarantee Reasoning Research Papers James Yoo University of Washington, Michael D. Ernst University of Washington, René Just University of Washington Pre-print | ||
14:30 10mTalk | CoVeriTeam GUI: A No-Code Approach to Cooperative Software Verification Tool Demonstrations | ||
14:40 10mTalk | CoqPilot, a plugin for LLM-based generation of proofs Tool Demonstrations Andrei Kozyrev JetBrains Research, Constructor University Bremen, Gleb Solovev JetBrains Research, Constructor University Bremen, Nikita Khramov JetBrains Research, Constructor University Bremen, Anton Podkopaev JetBrains Research, Constructor University |
13:30 - 15:00 | |||
13:30 15mTalk | SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing Research Papers An Guo Nanjing University, Yuan Zhou Nanyang Technological University, Haoxiang Tian Nanyang Technological University, Chunrong Fang Nanjing University, Yunjian Sun Nanjing University, Weisong Sun Nanyang Technological University, Xinyu Gao , Luu Anh Tuan Nanyang Technological University, Yang Liu Nanyang Technological University, Zhenyu Chen Nanjing University Pre-print | ||
13:45 15mTalk | Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems Research Papers | ||
14:00 15mTalk | In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators Industry Showcase Dmytro Humeniuk Polytechnique Montréal, Houssem Ben Braiek Sycodal, Thomas Reid Sycodal, Foutse Khomh Polytechnique Montréal | ||
14:15 15mTalk | LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language Models Research Papers Shuncheng Tang University of Science and Technology of China, Zhenya Zhang Kyushu University, Japan, Jixiang Zhou University of Science and Technology of China, Lei Wang National University of Defense Technology, Yuan Zhou Zhejiang Sci-Tech University, Yinxing Xue University of Science and Technology of China | ||
14:30 15mTalk | ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation Research Papers Shiwei Feng Purdue University, Yapeng Ye Purdue University, Qingkai Shi Nanjing University, Zhiyuan Cheng Purdue University, Xiangzhe Xu Purdue University, Siyuan Cheng Purdue University, Hongjun Choi DGIST, Xiangyu Zhang Purdue University | ||
14:45 15mTalk | The IDEA of Us: An Identity-Aware Architecture for Autonomous Systems Journal-first Papers Carlos Gavidia-Calderon The Alan Turing Institute, Anastasia Kordoni Lancaster University (UK), Amel Bennaceur The Open University, UK, Mark Levine Lancaster University, Bashar Nuseibeh The Open University, UK; Lero, University of Limerick, Ireland |
13:30 - 15:00 | |||
13:30 15mTalk | How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera Research Papers Yifan Xie , Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Ying Wang Northeastern University, Jun Ma National University of Defense Technology, Xiaoling Li National University of Defense Technology, Haoran Liu National University of Defense Technology, Ying Fu National University of Defense Technology, Liao Xiangke National University of Defense Technology | ||
13:45 15mTalk | Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments Industry Showcase Xinyi Zheng Huazhong University of Science and Technology, Chen Wei MYbank, Ant Group, Shenao Wang Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Peiming Gao MYbank, Ant Group, Yuanchao Zhang Mybank, Ant Group, Kailong Wang Huazhong University of Science and Technology, Haoyu Wang Huazhong University of Science and Technology | ||
14:00 15mTalk | Detect Hidden Dependency to Untangle Commits Research Papers Mengdan Fan , Wei Zhang Peking University, Haiyan Zhao Peking University, Guangtai Liang Huawei Cloud Computing Technologies, Zhi Jin Peking University | ||
14:15 15mTalk | LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries Research Papers Igor Wodiany University of Manchester, Antoniu Pop University of Manchester, Mikel Luján University of Manchester DOI Pre-print | ||
14:30 15mTalk | Balancing the Quality and Cost of Updating Dependencies Research Papers Damien Jaime Université Paris Nanterre & LIP6, Pascal Poizat Université Paris Nanterre & LIP6, Joyce El Haddad Université Paris Dauphine - PSL , Thomas Degueule CNRS | ||
14:45 10mTalk | Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor Tool Demonstrations Qiong Feng Nanjing University of Science and Technology, Xiaotian Ma Nanjing University of Science and Technology, Huan Ji Huawei Nanjing Research Center, Wei Song Nanjing University of Science and Technology, Peng Liang Wuhan University, China |
13:30 - 15:00 | |||
13:30 15mTalk | SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice Research Papers Rui Ren DAMO Academy, Alibaba Group Hangzhou, China, Jingbang Yang DAMO Academy, Alibaba Group Hangzhou, China, Linxiao Yang DAMO Academy, Alibaba Group Hangzhou, China, Xinyue Gu DAMO Academy, Alibaba Group Hangzhou, China, Liang Sun DAMO Academy, Alibaba Group Hangzhou, China | ||
13:45 15mTalk | ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems Research Papers Yongqian Sun Nankai University, Binpeng Shi Nankai University, Mingyu Mao Nankai University, Minghua Ma Microsoft Research, Sibo Xia Nankai University, Shenglin Zhang Nankai University, Dan Pei Tsinghua University | ||
14:00 15mTalk | Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality Research Papers Yifan Liao Shanghai Jiao Tong University / National University of Singapore, Ming Xu Shanghai Jiao Tong University / National University of Singapore, Yun Lin Shanghai Jiao Tong University, Xiwen Teoh National University of Singapore, Xiaofei Xie Singapore Management University, Ruitao Feng Singapore Management University, Frank Liauw Government Technology Agency Singapore, Hongyu Zhang Chongqing University, Jin Song Dong National University of Singapore DOI Pre-print | ||
14:15 15mTalk | End-to-End AutoML for Unsupervised Log Anomaly Detection Research Papers Shenglin Zhang Nankai University, Yuhe Ji Nankai University, Jiaqi Luan Nankai University, Xiaohui Nie Computer Network Information Center at Chinese Academy of Sciences, Zi`ang Cheng Nankai University, Minghua Ma Microsoft Research, Yongqian Sun Nankai University, Dan Pei Tsinghua University | ||
14:30 10mTalk | Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network NIER Track Yuanlin Li Tsinghua University, Zhiwei Xu Tsinghua University, Min Zhou Tsinghua University, Hai Wan Tsinghua University, Xibin Zhao Tsinghua University | ||
14:40 10mTalk | A vision on a methodology for the application of an Intrusion Detection System for satellites NIER Track Sébastien Gios UCLouvain, Charles-Henry Bertrand Van Ouytsel UCLouvain, Mark Diamantino Caribé Telespazio - ESA, Axel Legay Université Catholique de Louvain, Belgium |
15:30 - 16:30 | |||
15:30 15mTalk | UFront: Toward A Unified MLIR Frontend for Deep Learning Research Papers Guoqing Bao Shanghai Enflame Technology Co., Ltd., Heng Shi Shanghai Jiao Tong University, Shanghai Enflame Technology Co., Ltd., Chengyi Cui Shanghai Enflame Technology Co., Ltd., Yalin Zhang Shanghai Enflame Technology Co., Ltd., Jianguo Yao Shanghai Jiao Tong University; Shanghai Enflame Technology | ||
15:45 15mTalk | FIPSER: Improving Fairness Testing of DNN by Seed Prioritization Research Papers Junwei Chen East China Normal University, Yueling Zhang East China Normal University, Lingfeng Zhang East China Normal University, Min Zhang East China Normal University, Chengcheng Wan East China Normal University, Ting Su East China Normal University, Geguang Pu East China Normal University, China | ||
16:00 15mTalk | Prioritizing Test Inputs for DNNs Using Training Dynamics Research Papers Jian Shen Nanjing University, Zhong Li , Minxue Pan Nanjing University, Xuandong Li Nanjing University | ||
16:15 15mTalk | Learning DNN Abstractions using Gradient DescentRecorded Talk NIER Track Diganta Mukhopadhyay TCS Research, Pune, India, Sanaa Siddiqui Indian Institute of Technology Delhi, New Delhi, India, Hrishikesh Karmarkar TCS Research, Kumar Madhukar Indian Institute of Technologiy Delhi, New Delhi, India, Guy Katz The Hebrew University of Jerusalem |
15:30 - 16:30 | |||
15:30 15mTalk | An Explainable Automated Model for Measuring Software Engineer Contribution Research Papers Yue Li Nanjing University, He Zhang Nanjing University, Yuzhe Jin Nanjing University, Zhong Ren State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University Nanjing, Jiangsu, China, Liming Dong Nanjing University, Jun Lyu Nanjing University, Lanxin Yang Nanjing University, David Lo Singapore Management University, Dong Shao Nanjing University | ||
15:45 15mTalk | Context-Aware Automated Sprint Plan Generation for Agile Software Development Research Papers Elvan Kula Delft University of Technology, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology | ||
16:00 15mTalk | Agile meets quantum: a novel genetic algorithm model for predicting the success of quantum software development project Journal-first Papers Arif Ali Khan University of Oulu, Muhammad Azeem Akbar LUT University, Valtteri Lahtinen QUANSCIENT, Marko Paavola VTT Technical Research Ctr of Finland Ltd, Oulu, Finland, Mahmood Niazi King Fahd University of Petroleum and Minerals, Mohammed Naif Alatawi Information Technology Department, Faculty of Computers and Information Technology, University of Tabuk, Tabuk, Saudi Arabia, Shoayee Dlaim Alotaibi Department of Artificial Intelligence and Data Science, College of Computer Science and Engineering, University of Hail, Hail, Saudi Arabia | ||
16:15 15mTalk | How many pomodoros do professional engineers need to complete a microtask of programming? Industry Showcase Shinobu Saito NTT, IIMURA Yukako NTT Corporation, Emad Aghayi George Mason University, Thomas LaToza George Mason University |
15:30 - 16:30 | |||
15:30 15mTalk | Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration Research Papers Dohyun Ryu The Pennsylvania State University, Giyeol Kim The Pennsylvania State University, Daeun Lee Pusan National University, Seongjin Kim The Pennsylvania State University, Seungjin Bae The Pennsylvania State University, Junghwan Rhee University of Central Oklahoma, Taegyu Kim The Pennsylvania State University | ||
15:45 15mTalk | Seeding and Mocking in White-Box Fuzzing Enterprise RPC APIs: An Industrial Case Study Industry Showcase Man Zhang Beihang University, China, Andrea Arcuri Kristiania University College and Oslo Metropolitan University, Piyun Teng Meituan, kaiming.xue Meituan, Wenhao Wang Meituan | ||
16:00 15mTalk | Industry Practice of Directed Kernel Fuzzing for Open-source Linux Distribution Industry Showcase Heyuan Shi Central South University, Shijun chen Central South University, Runzhe Wang Alibaba Group, Yuhan Chen Central South Sniversity, Weibo Zhang Central South University, Qiang Zhang Hunan University, Yuheng Shen Tsinghua University, Xiaohai Shi Alibaba Group, Chao Hu Central South University, Yu Jiang Tsinghua University | ||
16:15 10mTalk | Visualizing and Understanding the Internals of Fuzzing NIER Track Sriteja Kummita Fraunhofer Institute for Mechatronic Systems Design (Fraunhofer IEM), Zenong Zhang The University of Texas - Dallas, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Shiyi Wei University of Texas at Dallas |
15:30 - 16:30 | |||
15:30 15mTalk | Repairing Regex-Dependent String Functions Research Papers | ||
15:45 15mTalk | FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments Research Papers Fang Liu Beihang University, Zhenwei Liu Beihang University, Qianhui Zhao Beihang University, Jing Jiang Beihang University, Li Zhang Beihang University, Zian Sun Beihang University, Ge Li Peking University, Zhongqi Li Huawei Cloud Computing Technologies Co., Ltd., Yuchi Ma Huawei Cloud Computing Technologies | ||
16:00 15mTalk | Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair Research Papers Guochang Li Zhejiang University, Chen Zhi Zhejiang University, Jialiang Chen Zhejiang University, Junxiao Han , Shuiguang Deng Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies | ||
16:15 15mTalk | Enhancing Automated Program Repair with Solution Design Research Papers Jiuang Zhao Beihang University, Donghao Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Zitian Yang Beihang University, Fang Liu Beihang University |
Thu 31 OctDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 12:00 | |||
10:30 15mTalk | GPP: A Graph-Powered Prioritizer for Code Review Requests Research Papers Lanxin Yang Nanjing University, Jinwei Xu Nanjing University, He Zhang Nanjing University, Fanghao Wu Nanjing University, Jun Lyu Nanjing University, Yue Li Nanjing University, Alberto Bacchelli University of Zurich | ||
10:45 15mTalk | Understanding Developer-Analyzer Interactions in Code Reviews Industry Showcase Martin Schäf Amazon Web Services, Berk Cirisci Amazon Web Services, Linghui Luo Amazon Web Services, Muhammad Numair Mansur Amazon Web Services, Omer Tripp Amazon Web Services, Daniel J Sanchez Amazon Alexa, Qiang Zhou Amazon Web Services, Muhammad Bilal Zafar Amazon Web Services | ||
11:00 15mTalk | Understanding the Implications of Changes to Build Systems Research Papers Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Calgary, Shane McIntosh University of Waterloo DOI Pre-print | ||
11:15 15mTalk | Developer-Defined Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns Research Papers Mingyang Yin University of Waterloo, Yutaro Kashiwa Nara Institute of Science and Technology, Keheliya Gallaba Centre for Software Excellence, Huawei Canada, Mahmoud Alfadel University of Calgary, Yasutaka Kamei Kyushu University, Shane McIntosh University of Waterloo DOI Pre-print | ||
11:30 10mTalk | Towards Automated Configuration Documentation NIER Track Jobayer Ahmmed Iowa State University, Myra Cohen Iowa State University, Paul Gazzillo University of Central Florida | ||
11:40 10mTalk | Unity Is Strength: Collaborative LLM-Based Agents for Code Reviewer Recommendation NIER Track Luqiao Wang Xidian University, Yangtao Zhou Xidian University, Huiying Zhuang Xidian University, Qingshan Li Xidian University, Di Cui Xidian University, Yutong Zhao University of Central Missouri, Lu Wang Xidian University | ||
11:50 10mTalk | Build Issue Resolution from the Perspective of Non-Contributors NIER Track Sunzhou Huang The University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio |
10:30 - 12:00 | |||
10:30 15mTalk | FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows Research Papers Yilun Wang Anhui University, Pengfei Chen Sun Yat-sen University, Hui Dou Anhui University, Yiwen Zhang Anhui University, Guangba Yu Sun Yat-sen University, Zilong He Sun Yat-sen University, Haiyu Huang Sun Yat-sen University | ||
10:45 15mTalk | Challenges & Opportunities in Automating DBMS: A Qualitative Study Industry Showcase Yifan WANG Orange/ INRIA, Pierre Bourhis University of Lille, Inria, CRIStAL UMR CNRS 9189, Romain Rouvoy University Lille 1 and INRIA, Patrick Royer Orange | ||
11:00 15mTalk | Test-suite-guided discovery of least privilege for cloud infrastructure as code Journal-first Papers Ryo Shimizu Hitachi Ltd., Yuna Nunomura Research and Development Group, Hitachi Ltd., Hideyuki Kanuka Hitachi, Ltd. | ||
11:15 15mTalk | Microservice Decomposition Techniques: An Independent Tool Comparison Research Papers Yingying Wang University of British Columbia, Sarah Bornais The University of British Columbia, Julia Rubin The University of British Columbia Pre-print | ||
11:30 10mTalk | Towards Long-Term Scientific Model Sustainment at Sandia National Laboratories Industry Showcase Christian Gilbertson Sandia National Labs, Reed Milewicz Sandia National Laboratories, Eric Berquist Sandia National Labs, Aaron Brundage Sandia National Labs, John Engelmann Sandia National Labs, Brian Evans Sandia National Labs, Nicholas Francis Sandia National Labs, Ernest Friedman-Hill Sandia National Labs, Samuel Grayson Sandia National Labs, Evan Harvey Sandia National Labs, Eric Ho Sandia National Labs, Edward Hoffman Sandia National Labs, Kevin Irick Sandia National Labs, Anagha Krishna Sandia National Labs, Aaron Moreno Sandia National Labs, Joshua Teves Sandia National Labs | ||
11:40 10mTalk | Cloud Resource Protection via Automated Security Property Reasoning Industry Showcase Zhixing Xu Amazon Web Services, Shengjian Guo Amazon Web Services, Oksana Tkachuk Amazon Web Services, Saeed Nejati Amazon Web Services, Niloofar Razavi Amazon Web Services, George Argyros Amazon Web Services |
10:30 - 12:00 | |||
10:30 15mTalk | Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation Research Papers Zongze Jiang Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Xuanhua Shi Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
10:45 15mTalk | Distribution-aware Fairness Test Generation Journal-first Papers Sai Sathiesh Rajan Singapore University of Technology and Design, Singapore, Ezekiel Soremekun Royal Holloway, University of London, Yves Le Traon University of Luxembourg, Luxembourg, Sudipta Chattopadhyay Singapore University of Technology and Design | ||
11:00 15mTalk | Effective Unit Test Generation for Java Null Pointer Exceptions Research Papers Myungho Lee Korea University, Jiseong Bak Korea University, Seokhyeon Moon , Yoon-Chan Jhi Technology Research, Samsung SDS, Seoul, South Korea, Hakjoo Oh Korea University | ||
11:15 15mTalk | SlicePromptTest4J: High-coverage Test Generation using LLM via Method Slicing Research Papers Zejun Wang Peking University, Kaibo Liu Peking University, Ge Li Peking University, Zhi Jin Peking University | ||
11:30 15mTalk | DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning Research Papers Davide Corradini University of Verona, Zeno Montolli University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona | ||
11:45 15mTalk | On the Evaluation of Large Language Models in Unit Test Generation Research Papers Lin Yang Tianjin University, Chen Yang Tianjin University, Shutao Gao Tianjin University, Weijing Wang College of Intelligence and Computing, Tianjin University, Bo Wang Beijing Jiaotong University, Qihao Zhu DeepSeek-AI, Xiao Chu Huawei Cloud Computing Co. Ltd., Jianyi Zhou Huawei Cloud Computing Technologies Co., Ltd., Guangtai Liang Huawei Cloud Computing Technologies, Qianxiang Wang Huawei Technologies Co., Ltd, Junjie Chen Tianjin University Pre-print |
10:30 - 12:00 | |||
10:30 15mTalk | Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection? Research Papers Yu Zhao , Lina Gong Nanjing University of Aeronautics and Astronautic, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics, Yongwei Wang Shanghai Institute for Advanced Study and College of Computer Science, Zhejiang University, Mingqiang Wei School of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Fei Wu College of Computer Science and Technology in Zhejiang University | ||
10:45 15mTalk | STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation Research Papers Md Shafiuzzaman University of California at Santa Barbara, Achintya Desai University of California Santa Barbara, Laboni Sarker University of California at Santa Barbara, Tevfik Bultan University of California at Santa Barbara | ||
11:00 15mTalk | Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models Research Papers Yulun Wu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
11:15 15mTalk | COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts Research Papers Wenkai Li Hainan University, Xiaoqi Li Hainan University, Zongwei Li Hainan University, Yuqing Zhang University of Chinese Academy of Sciences; Zhongguancun Laboratory | ||
11:30 10mTalk | MADE-WIC: Multiple Annotated Datasets for Exploring Weaknesses In Code Tool Demonstrations Moritz Mock Free University of Bozen-Bolzano, Jorge Melegati Free University of Bozen-Bolzano, Max Kretschmann Hamburg University of Technology, Nicolás E. Díaz Ferreyra Hamburg University of Technology, Barbara Russo Free University of Bozen/Bolzano, Italy | ||
11:40 10mTalk | The Software Genome Project: Unraveling Software Through Genetic Principles NIER Track Yueming Wu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Zhengzi Xu Nanyang Technological University; Imperial Global Singapore, Lyuye Zhang Nanyang Technological University, Yiran Zhang , Zhu Zhiling Zhejiang University of Technology, Yang Liu Nanyang Technological University | ||
11:50 10mTalk | Mining for Mutation Operators for Reduction of Information Flow Control Violations NIER Track Ilya Kosorukov University College London, Daniel Blackwell University College London, David Clark University College London, Myra Cohen Iowa State University, Justyna Petke University College London |
13:30 - 15:00 | Testing 3Tool Demonstrations / Journal-first Papers / Research Papers / Industry Showcase / NIER Track at Camellia | ||
13:30 15mTalk | General and Practical Property-based Testing for Android Apps Research Papers Yiheng Xiong East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Jingling Sun University of Electronic Science and Technology of China, Geguang Pu East China Normal University, China, Zhendong Su ETH Zurich | ||
14:00 15mTalk | ACCESS: Assurance Case Centric Engineering of Safety-critical Systems Journal-first Papers Ran Wei Lancaster University, Simon Foster University of York, Haitao Mei University of York, Fang Yan University of York, Ruizhe Yang Dalian University of Technology, Ibrahim Habli University of York, Colin O'Halloran D-RisQ Software Systems, Nick Tudor D-RisQ Software Systems, Tim Kelly University of York, Yakoub Nemouchi University of York | ||
14:15 15mTalk | Quantum Program Testing Through Commuting Pauli Strings on IBM's Quantum Computers Industry Showcase Asmar Muqeet Simula Research Laboratory and University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Paolo Arcaini National Institute of Informatics
Pre-print | ||
14:30 10mTalk | Toward Individual Fairness Testing with Data Validity NIER Track Takashi Kitamura , Sousuke Amasaki Okayama Prefectural University, Jun Inoue National Institute of Advanced Industrial Science and Technology, Japan, Yoshinao Isobe AIST, Takahisa Toda The University of Electro-Communications | ||
14:40 10mTalk | DroneWiS: Automated Simulation Testing of small Unmanned Aerial System in Realistic Windy Conditions Tool Demonstrations | ||
14:50 10mTalk | ARUS: A Tool for Automatically Removing Unnecessary Stubbings from Test Suites Tool Demonstrations |
13:30 - 15:00 | |||
13:30 15mTalk | Test-Driven Development and LLM-based Code Generation Research Papers | ||
13:45 15mTalk | A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven Refinement Research Papers | ||
14:00 15mTalk | Ansible Lightspeed: A Code Generation Service for IT Automation Industry Showcase Priyam Sahoo , Saurabh Pujar IBM Research AI, Ganesh Nalawade RED HAT, Richard Gebhardt , Louis Mandel IBM Research, USA, Luca Buratti | ||
14:15 15mTalk | Self-planning Code Generation with Large Language Models Journal-first Papers Xue Jiang , Yihong Dong Peking University, Lecheng Wang Peking University, Fang Zheng Peking University, Qiwei Shang Peking University, Ge Li Peking University, Zhi Jin Peking University, Wenpin Jiao Peking University |
13:30 - 15:00 | |||
13:30 15mTalk | Evaluation of Version Control Merge Tools Research Papers Benedikt Schesch ETH Zurich, Ryan Featherman UW CSE, Ben Roberts UW CSE, Kenneth J Yang UW CSE, Michael D. Ernst University of Washington | ||
13:45 15mTalk | Semistructured Merge with Language-Specific Syntactic Separators Research Papers Guilherme Cavalcanti Federal Institute of Pernambuco, Brazil, Paulo Borba Federal University of Pernambuco, Leonardo dos Anjos Federal University of Pernambuco, Jonatas Clementino Federal University of Pernambuco | ||
14:00 15mTalk | Automatic Prediction of Developers' Resolutions for Software Merge Conflicts Journal-first Papers Waad riadh aldndni Virginia Tech, Blacksburg,VA,U.S.A., Na Meng Virginia Tech, Francisco Servant ITIS Software, University of Malaga | ||
14:15 15mTalk | ConflictBench: A Benchmark to Evaluate Software Merge Tools Journal-first Papers | ||
14:30 15mTalk | Revisiting the Conflict-Resolving Problem from a Semantic Perspective Research Papers Jinhao Dong Peking University, Jun Sun Singapore Management University, Yun Lin Shanghai Jiao Tong University, Yedi Zhang National University of Singapore, Murong Ma National University of Singapore, Jin Song Dong National University of Singapore, Dan Hao Peking University |
13:30 - 15:00 | |||
13:30 15mTalk | PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code Research Papers Ziyou Jiang Institute of Software at Chinese Academy of Sciences, Lin Shi Beihang University, Guowei Yang University of Queensland, Qing Wang Institute of Software at Chinese Academy of Sciences Pre-print | ||
13:45 15mTalk | Understanding Code Changes Practically with Small-Scale Language Models Research Papers Cong Li Zhejiang University; Ant Group, Zhaogui Xu Ant Group, Peng Di Ant Group, Dongxia Wang Zhejiang University, Zheng Li Ant Group, Qian Zheng Ant Group | ||
14:00 15mTalk | DRMiner: Extracting Latent Design Rationale from Jira Issue Logs Research Papers Jiuang Zhao Beihang University, Zitian Yang Beihang University, Li Zhang Beihang University, Xiaoli Lian Beihang University, China, Donghao Yang Beihang University, Xin Tan Beihang University | ||
14:15 15mTalk | An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation Research Papers Zhiquan Huang Sun Yat-sen University, Yuan Huang Sun Yat-sen University, Xiangping Chen Sun Yat-sen University, Xiaocong Zhou School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China, Changlin Yang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University | ||
14:30 15mTalk | RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection Research Papers Weilong Li School of Computer Science and Engineering,Sun Yat-sen University, Jintian Lu College of Computer Science and Engineering, Jishou University, Ruizhi Xiao School of Computer Science and Engineering,Sun Yat-sen University, Pengfei Shao China Southern Power Grid Digital Grid Group Information and Telecommunication Technology Co., Ltd., Shuyuan Jin School of Computer Science and Engineering,Sun Yat-sen University | ||
14:45 15mTalk | ChatBR: Automated assessment and improvement of bug report quality using ChatGPT Research Papers Lili Bo Yangzhou University, wangjie ji Yangzhou University, Xiaobing Sun Yangzhou University, Ting Zhang Singapore Management University, Xiaoxue Wu Yangzhou University, Ying Wei Yangzhou University |
13:30 - 15:00 | |||
13:30 15mTalk | Towards Effective Static Type-Error Detection for Python Research Papers | ||
13:45 15mTalk | Detecting Element Accessing Bugs in C++ Sequence Containers Research Papers | ||
14:00 15mTalk | Concretely Mapped Symbolic Memory Locations for Memory Error Detection Journal-first Papers Haoxin Tu Singapore Management University, Singapore, Lingxiao Jiang Singapore Management University, Jiaqi Hong Independent Researcher, Xuhua Ding Singapore Management University, He Jiang Dalian University of Technology | ||
14:15 15mTalk | NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers Research Papers |
15:30 - 16:30 | |||
15:30 15mTalk | Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models Research Papers Cong Wu The University of Hong Kong, Jing Chen Wuhan University, Ziwei Wang Wuhan University, Ruichao Liang Wuhan University, Ruiying Du Wuhan University | ||
15:45 15mTalk | AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis Research Papers Yin Wu Xi'an Jiaotong University, Xiaofei Xie Singapore Management University, Chenyang Peng Xi'an Jiaotong University, Dijun Liu Ant Group, Hao Wu Xi'an JiaoTong University, Ming Fan Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University, Haijun Wang Xi’an Jiaotong University | ||
16:00 10mTalk | ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts Tool Demonstrations Che Wang Peking University, China, Jiashuo Zhang Peking University, China, Jianbo Gao Beijing Jiaotong University, Libin Xia Peking University, Zhi Guan Peking University, Zhong Chen | ||
16:10 10mTalk | HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts Tool Demonstrations Mojtaba Eshghie KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden, Hans Stammler KTH Royal Institute of Technology, Wolfgang Ahrendt Chalmers University of Technology, Thomas T. Hildebrandt University of Copenhagen, Gerardo Schneider University of Gothenburg | ||
16:20 10mTalk | Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs NIER Track Mojtaba Eshghie KTH Royal Institute of Technology, Cyrille Artho KTH Royal Institute of Technology, Sweden |
15:30 - 16:30 | |||
15:30 15mTalk | iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring Research Papers Di Wu , Fangwen Mu Institute of Software, Chinese Academy of Sciences, Lin Shi Beihang University, Zhaoqiang Guo Software Engineering Application Technology Lab, Huawei, China, Kui Liu Huawei, Weiguang Zhuang Beihang University, Yuqi Zhong Beihang University, Li Zhang Beihang University | ||
15:45 15mTalk | A Position-Aware Approach to Decomposing God Classes Research Papers Tianyi Chen Beijing Institute of Technology, Yanjie Jiang Peking University, Fu Fan Beijing Institute of Technology, Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology | ||
16:00 15mTalk | Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network Research Papers Di Cui Xidian University, Jiaqi Wang Xidian University, Qiangqiang Wang Xidian University, Peng Ji Xidian University, Minglang Qiao Xidian University, Yutong Zhao University of Central Missouri, Jingzhao Hu Xidian University, Luqiao Wang Xidian University, Qingshan Li Xidian University | ||
16:15 10mTalk | Copilot-in-the-Loop: Fixing Code Smells in Copilot-Generated Python Code using Copilot NIER Track Beiqi Zhang Wuhan University, Peng Liang Wuhan University, China, Qiong Feng Nanjing University of Science and Technology, Yujia Fu Wuhan University, Zengyang Li Central China Normal University |
15:30 - 16:30 | |||
15:30 15mTalk | RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code Research Papers Jiachi Chen Sun Yat-sen University, Qingyuan Zhong Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Kaiwen Ning Sun Yat-sen University, Yongkun Liu Sun Yat-sen University, Zenan Xu Tencent AI Lab, Zhe Zhao Tencent AI Lab, Ting Chen University of Electronic Science and Technology of China, Zibin Zheng Sun Yat-sen University | ||
15:45 15mTalk | SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching Research Papers Yiheng Huang Fudan University, Ruisi Wang Fudan University, Wen Zheng Fudan University, Zhuotong Zhou Fudan University, China, Susheng Wu Fudan University, Shulin Ke Fudan University, Bihuan Chen Fudan University, Shan Gao Huawei, Xin Peng Fudan University | ||
16:00 15mTalk | 1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection Research Papers Xiaobing Sun Yangzhou University, Xingan Gao Yangzhou University, Sicong Cao Yangzhou University, Lili Bo Yangzhou University, Xiaoxue Wu Yangzhou University, Kaifeng Huang Tongji University | ||
16:15 15mTalk | Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs Industry Showcase Jian Zhao Huazhong University of Science and Technology, Shenao Wang Huazhong University of Science and Technology, Yanjie Zhao Huazhong University of Science and Technology, Xinyi Hou Huazhong University of Science and Technology, Kailong Wang Huazhong University of Science and Technology, Peiming Gao MYbank, Ant Group, Yuanchao Zhang Mybank, Ant Group, Chen Wei MYbank, Ant Group, Haoyu Wang Huazhong University of Science and Technology |
15:30 - 16:30 | |||
15:30 15mTalk | DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation Research Papers Yanzhou Mu , Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Xiang Chen Nantong University, Zhixiang Cao , Peiran Yang State Key Laboratory for Novel Software Technology, Nanjing University, China, Yinglong Zou Nanjing University, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University | ||
15:45 15mTalk | Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment Research Papers Yinglong Zou Nanjing University, Juan Zhai University of Massachusetts at Amherst, Chunrong Fang Nanjing University, Jiawei Liu University of Illinois at Urbana-Champaign, Tao Zheng Nanjing University, Zhenyu Chen Nanjing University | ||
16:00 15mTalk | DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators Research Papers Mingyi Zhou Monash University, Xiang Gao Beihang University, Xiao Chen University of Newcastle, Chunyang Chen TU Munich, John Grundy Monash University, Li Li Beihang University | ||
16:15 15mTalk | GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models Research Papers Zhibo Zhang Huazhong University of Science and Technology, Wuxia Bai Huazhong University of Science and Technology, Yuxi Li Huazhong University of Science and Technology, Mark Huasong Meng National University of Singapore, Kailong Wang Huazhong University of Science and Technology, Ling Shi Nanyang Technological University, Li Li Beihang University, Jun Wang Post Luxembourg, Haoyu Wang Huazhong University of Science and Technology |
15:30 - 16:30 | |||
15:30 15mTalk | Attribution-guided Adversarial Code Prompt Generation for Code Completion Models Research Papers Xueyang Li Institute of Information Engineering, Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Shangqing Liu Nanyang Technological University, Lu Xiang SKLOIS, Institute of Information Engineering, Chinese Academy of Sciences, China, Kun Sun Institute of Information Engineering, Chinese Academy of Sciences, Kai Chen Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xiapu Luo Hong Kong Polytechnic University, Yang Liu Nanyang Technological University | ||
15:45 15mTalk | DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation Research Papers Xinran Yu Nanjing University, Chun Li Nanjing University, Minxue Pan Nanjing University, Xuandong Li Nanjing University | ||
16:00 15mTalk | GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph Research Papers Wei Liu Nanjing University, Ailun Yu Peking University, Daoguang Zan Institute of Software, Chinese Academy of Sciences, Bo Shen Huawei Cloud Computing Technologies Co., Ltd., Wei Zhang Peking University, Haiyan Zhao Peking University, Zhi Jin Peking University, Qianxiang Wang Huawei Technologies Co., Ltd | ||
16:15 10mTalk | RepoSim: Evaluating Prompt Strategies for Code Completion via User Behavior Simulation NIER Track Chao Peng ByteDance, Qinyun Wu Bytedance Ltd., Jiangchao Liu ByteDance, Jierui Liu ByteDance, Bo Jiang Bytedance Network Technology, Mengqian Xu East China Normal University, Yinghao Wang ByteDance, Xia Liu ByteDance, Ping Yang Bytedance Network Technology |
Accepted Papers
Call for Papers
The ASE 2024 Demonstrations Track invites researchers and practitioners to present and discuss the most recent advances, experiences, and challenges in the field of software engineering supported by live presentations of new research tools, data, and other artifacts. We encourage innovative research demonstrations, which show early implementations of novel software engineering concepts, as well as mature prototypes. The research demonstrations are intended to highlight underlying scientific contributions.
Whereas a regular research paper points out the scientific contribution of a new software engineering approach, a demonstration paper provides the opportunity to show how a scientific contribution has been transferred into a working tool or data set. Authors of regular research papers are thus encouraged to submit an accompanying demonstration paper. Submissions of independent tools that are not associated with any research papers are welcome.
Papers submitted to the tool demonstration track should describe (a) novel early tool prototypes or (b) novel aspects of mature tools. The submissions must clearly communicate the following information to the audience:
- the envisioned users;
- the software engineering challenge the tool addresses;
- the methodology it implies for its users;
- the results of validation studies already conducted (for mature tools) or the design of planned studies (for early prototypes).
Submission
Papers must be submitted electronically through the HotCRP submission site by Fri 26 June 2024, and must:
- All submissions must be in PDF format and conform, at time of submission, to the to the ACM Proceedings Template: https://www.acm.org/publications/proceedings-template. LaTeX users must use the
\documentclass[sigconf,review]{acmart}
option. - All submissions must be in English.
- A demonstration submission must not exceed four pages (including all text, references, and figures);
- Authors are required to submit a screencast of the tool, with the video link attached to the end of the abstract;
- Authors are encouraged to make their code and datasets open source, with the link for the code and datasets attached to the end of the abstract;
- A submission must not have been previously published in a demonstration form and must not simultaneously be submitted to another symposium other than ASE;
- Submissions for the tool track DO NOT follow a double-blind review process. If a tool track submission accompanies a submission to the research track (which is double-blind), please make sure to click “Yes” in the “Connection with research track” section on HotCRP during submission.
By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects. Alleged violations of this policy or any ACM Publications Policy will be investigated by ACM and may result in a full retraction of your paper, in addition to other potential penalties, as per ACM Publications Policy.
Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process for your accepted paper. ACM has been involved in ORCID from the start and we have recently made a commitment to collect ORCID IDs from all of our published authors. The collection process has started and will roll out as a requirement throughout 2022. We are committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.
Tools and Data Availability
To promote replicability and to disseminate the advances achieved with the research tools and data sets, we require that data sets are publicly available for download and use. We strongly encourage the same for tools, ideally through their distribution with an open-source software license. Whenever the tool is not made publicly available, the paper must include a clear explanation for why this was not possible.
Authors are also encouraged to distribute their demonstration in a form that can be easily used, such as a virtual machine image, a software container (e.g., Docker), or a system configuration (e.g., Puppet, Ansible, Salt, CFEngine).
Screencast
Authors are required to prepare an up to 5 minutes video demonstrating the tool. For consistency, we require ALL videos to be uploaded to YouTube and made available by the time of submission. The URL of the YouTube video should be added at the end of the abstract.
The video should:
- provide an overview of the tool’s capabilities and show the major tool features in detail;
- provide clarifying voice-over and/or annotation highlights;
- be engaging and exciting for the audience!
Please note that authors of successful submissions will have the opportunity to revise the paper, the video (and its hosting location), the code, and the datasets by the camera-ready deadline.
Submissions that do not comply with the instructions will be rejected without review.
Evaluation
Each submission will be reviewed by at least three members of the tool demonstrations program committee. The evaluation criteria include:
- Presentation, i.e., the extent to which the presentation meets the high standards of ASE.
- Relevance, i.e., the pertinence of the proposed tool for the ASE audience;
- Positioning, i.e., the degree to which the submission considers differences to related tools (pros and cons);
- Demo quality, i.e., the quality and usefulness of the accompanied artifacts: video, tool, code, and evaluation datasets.
For further information, please feel free to contact the track chairs.
Accepted Papers
After acceptance, the list of paper authors cannot be changed under any circumstances; the list of authors on camera-ready papers must be identical to those on submitted papers. Paper titles cannot be changed except by permission of the Track Chairs and only when referees recommend a change for clarity or accuracy with respect to the paper content.