Dates
Wed 17 Jul 2024
Thu 18 Jul 2024
Fri 19 Jul 2024
Tracks
FSE Demonstrations
FSE Diversity and Inclusion
FSE Ideas, Visions and Reflections
FSE Industry Papers
FSE Journal First
FSE Posters
FSE Research Papers
FSE Social Events
Plenary
Hide plenary sessions
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 17 Jul

Displayed time zone: Brasilia, Distrito Federal, Brazil change

11:00 - 12:30
Software Maintenance and Comprehension 1Research Papers / Ideas, Visions and Reflections / Demonstrations at Acerola
Chair(s): Wesley Assunção North Carolina State University
11:00
18m
Talk
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning
Research Papers
Xiaoling Zhang Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Zhengzi Xu Nanyang Technological University, shouguo yang Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Zhi Li Institute of Information Engineering, Chinese Academy of Sciences, China, Zhiqiang Shi Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,
DOI Pre-print
11:18
18m
Talk
Only diff is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language ModelDistinguished Paper Award
Research Papers
Jiawei Li University of California, Irvine, David Faragó Innoopract GmbH & QPR Technologies, Christian Petrov Innoopract GmbH, Iftekhar Ahmed University of California, Irvine
11:36
18m
Talk
Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations
Research Papers
Jun Lyu Nanjing University, Shanshan Li Software Institute, Nanjing University, He Zhang Nanjing University, Lanxin Yang Nanjing University, Bohan Liu Nanjing University, Manuel Rigger National University of Singapore
11:54
18m
Talk
Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example
Research Papers
Malinda Dilhara University of Colorado Boulder, Abhiram Bellur University of Colorado Boulder, Timofey Bryksin JetBrains Research, Danny Dig University of Colorado Boulder, JetBrains Research
Pre-print
11:00 - 12:30
Human Aspects 1Research Papers / Industry Papers at Mandacaru
Chair(s): Christoph Treude Singapore Management University
11:00
18m
Talk
"The Law Doesn’t Work Like a Computer": Exploring Software Licensing Issues Faced by Legal PractitionersDistinguished Paper Award
Research Papers
Nathan Wintersgill William & Mary, Trevor Stalnaker William & Mary, Laura A. Heymann William & Mary, Oscar Chaparro William & Mary, Denys Poshyvanyk William & Mary
11:18
18m
Talk
AI-assisted Code Authoring at Scale: Fine-tuning, deploying, and mixed methods evaluation
Research Papers
Vijayaraghavan Murali Meta Platforms Inc., Chandra Sekhar Maddila Meta Platforms, Inc., Imad Ahmad Meta Platforms, Inc., Michael Bolin Meta Platforms, Inc., Daniel Cheng Meta Platforms Inc., Negar Ghorbani Meta Platforms Inc., Renuka Fernandez Meta Platforms, Inc., Nachiappan Nagappan Meta Platforms, Inc., Peter C Rigby Meta / Concordia University
11:36
18m
Talk
An Analysis of the Costs and Benefits of Autocomplete in IDEs
Research Papers
Shaokang Jiang University of California, San Diego, Michael Coblenz University of California, San Diego
Pre-print
11:54
18m
Talk
Shadows in the Interface: A Comprehensive Study on Dark Patterns
Research Papers
Liming Nie Nanyang Technological University, Yangyang Zhao Zhejiang Sci-Tech University, Chenglin Li Zhejiang Sci-Tech University, Xuqiong Luo Changsha University of Science and Technology, Yang Liu Nanyang Technological University
11:00 - 12:30
Formal VerificationDemonstrations / Journal First / Research Papers / Industry Papers at Pitanga
Chair(s): Yunja Choi Kyungpook National University
11:00
18m
Talk
A Transferability Study of Interpolation-Based Hardware Model Checking to Software VerificationDistinguished Paper Award
Research Papers
Dirk Beyer LMU Munich, Po-Chun Chien LMU Munich, Marek Jankola LMU Munich, Nian-Ze Lee LMU Munich
DOI Media Attached
11:00 - 12:30
Code Search and CompletionIndustry Papers / Research Papers at Pitomba
Chair(s): Akond Rahman Auburn University
11:18
18m
Talk
CodePlan: Repository-level Coding using LLMs and Planning
Research Papers
Ramakrishna Bairi Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Aditya Kanade Microsoft Research, India, Vageesh D C Microsoft Research, India, Arun Iyer Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua, B. Ashok Microsoft Research. India, Shashank Shet Microsoft Research. India
11:54
18m
Talk
DeciX: Explain Deep Learning Based Code Generation Applications
Research Papers
Simin Chen University of Texas at Dallas, Zexin Li University of California, Riverside, Wei Yang University of Texas at Dallas, Cong Liu University of California, Riverside
12:12
18m
Talk
IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion
Research Papers
Bolun Li Shandong Normal University, Zhihong Sun Shandong Normal University, Tao Huang Shandong Normal University, Hongyu Zhang Chongqing University, Yao Wan Huazhong University of Science and Technology, Chen Lyu Shandong Normal University, Ge Li Peking University, Zhi Jin Peking University
14:00 - 15:30
Processes, Requirements, and ArchitectureIndustry Papers / Journal First / Research Papers / Demonstrations at Acerola
Chair(s): Annibale Panichella Delft University of Technology
15:12
18m
Talk
Understanding Developers' Discussions and Perceptions on Non-Functional Requirements: The Case of the Spring EcosystemDistinguished Paper Award
Research Papers
Anderson Oliveira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), João Lucas Correia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Juliana Alves Pereira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello Federal University of Rio de Janeiro (UFRJ), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Caio Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Paulo Vítor C. F. Libório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio)
DOI Pre-print
14:00 - 15:30
Empirical Studies 1Industry Papers / Research Papers / Journal First at Mandacaru
Chair(s): Ronnie de Souza Santos University of Calgary
14:00
18m
Talk
An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation
Research Papers
Yibo He Peking University, Jiaming Huang Peking University, Hao Yu Peking University, Tao Xie Peking University
14:18
18m
Talk
Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Applications
Research Papers
Shuqing Li The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Jianping Zhang The Chinese University of Hong Kong, Yujia Zhang Harbin Institute of Technology, Yepang Liu Southern University of Science and Technology, Jiazhen Gu The Chinese University of Hong Kong, Yun Peng The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print
14:00 - 15:30
Testing 1Research Papers / Journal First at Pitanga
Chair(s): Xi Zheng Macquarie University
14:18
18m
Talk
Evaluating and Improving ChatGPT for Unit Test Generation
Research Papers
Zhiqiang Yuan Fudan University, Mingwei Liu Fudan University, Shiji Ding Fudan University, Kaixin Wang Fudan University, Yixuan Chen Yale University, Xin Peng Fudan University, Yiling Lou Fudan University
14:36
18m
Talk
Bounding Random Test Set Size with Computational Learning Theory
Research Papers
Neil Walkinshaw University of Sheffield, Michael Foster The University of Sheffield, José Miguel Rojas The University of Sheffield, Robert Hierons The University of Sheffield
Pre-print
14:54
18m
Talk
COSTELLO: Contrastive Testing for Embedding-based Large Language Model as a Service Embeddings
Research Papers
Weipeng Jiang Xi'an Jiaotong University, Juan Zhai University of Massachusetts, Amherst, Shiqing Ma University of Massachusetts, Amherst, Xiaoyu Zhang Xi'an Jiaotong University, Chao Shen Xi'an Jiaotong University
15:12
18m
Talk
FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution
Research Papers
Jaehan Yoon Sungkyunkwan University, Sooyoung Cha Sungkyunkwan University
14:00 - 15:30
AI4SE 1Research Papers at Pitomba
Chair(s): Mauro Pezze USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology
14:00
18m
Talk
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-context Learning
Research Papers
Yubo Mai Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Xing Hu Zhejiang University, Lingfeng Bao Zhejiang University, Yu Liu Zhejiang University, JianLing Sun Zhejiang University
14:18
18m
Talk
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
Research Papers
Zian Su Purdue University, Xiangzhe Xu Purdue University, Ziyang Huang Purdue University, Zhuo Zhang Purdue University, Yapeng Ye Purdue University, Jianjun Huang Renmin University of China, Xiangyu Zhang Purdue University
14:36
18m
Talk
Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs
Research Papers
Yanfu Yan William & Mary, Nathan Cooper William & Mary, Kevin Moran University of Central Florida, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Denys Poshyvanyk William & Mary, Steve Rich Cisco Systems
14:54
18m
Talk
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation
Research Papers
Zhen Yang Shandong University, Fang Liu Beihang University, Zhongxing Yu Shandong University, Jacky Keung City University of Hong Kong, Jia Li Peking University, Shuo Liu City University of Hong Kong, Hong Yifan City University of Hong Kong, Xiaoxue Ma City University of Hong Kong, Zhi Jin Peking University, Ge Li Peking University
Pre-print
15:12
18m
Talk
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
Research Papers
Yuxi Li Huazhong University of Science and Technology, Yi Liu Nanyang Technological University, Gelei Deng Nanyang Technological University, Ying Zhang Virginia Tech, Wenjia Song Virginia Tech, Ling Shi Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Yuekang Li The University of New South Wales, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology
16:00 - 18:00
Program Analysis and Performance 1Research Papers / Industry Papers / Demonstrations / Ideas, Visions and Reflections at Acerola
Chair(s): Alessandra Gorla IMDEA Software Institute
16:00
18m
Talk
DyPyBench: A Benchmark of Executable Python Software
Research Papers
Islem BOUZENIA University of Stuttgart, Bajaj Piyush Krishan University of Stuttgart, Michael Pradel University of Stuttgart
16:18
18m
Talk
Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point SlicingDistinguished Paper Award
Research Papers
DOI Pre-print
16:36
18m
Talk
PBE-based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software
Research Papers
Yoel Kim Kyungpook National University, Yunja Choi Kyungpook National University
DOI File Attached
16:54
18m
Talk
Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence LearningDistinguished Paper Award
Research Papers
Aashish Yadavally University of Texas at Dallas, Yi Li University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas
Pre-print
16:00 - 18:00
Program Repair and SynthesisDemonstrations / Research Papers / Ideas, Visions and Reflections at Mandacaru
Chair(s): Fernanda Madeiral Vrije Universiteit Amsterdam
16:00
18m
Talk
A Deep Dive into Large Language Models for Automated Bug Localization and Repair
Research Papers
Soneya Binta Hossain University of Virginia, Nan Jiang Purdue University, Qiang Zhou Amazon Web Services, Xiaopeng LI Amazon Web Services, Wen-Hao Chiang Amazon Web Services, Yingjun Lyu Amazon Web Services, Hoan Nguyen Amazon Web Services, Omer Tripp Amazon Web Services
DOI
16:18
18m
Talk
CORE: Resolving Code Quality Issues Using LLMs
Research Papers
Nalin Wadhwa Microsoft Research, India, Jui Pradhan Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Surya Prakash Sahu Microsoft Research, India, Nagarajan Natarajan Microsoft Research India, Aditya Kanade Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua
16:36
18m
Talk
Towards Effective Multi-Hunk Bug Repair: Detecting, Creating, Evaluating, and Understanding Indivisible Bugs
Research Papers
Qi Xin Wuhan University, Haojun Wu Wuhan University, Jinran Tang Wuhan University, Xinyu Liu Wuhan University, Steven P. Reiss Brown University, Jifeng Xuan Wuhan University
16:54
18m
Talk
ProveNFix: Temporal Property guided Program RepairDistinguished Paper Award
Research Papers
Yahui Song National University of Singapore, Xiang Gao Beihang University, Wenhua Li National University of Singapore, Wei-Ngan Chin National University of Singapore, Abhik Roychoudhury National University of Singapore
DOI Pre-print
17:12
18m
Talk
Towards AI-Assisted Synthesis of Verified Dafny Methods
Research Papers
Md Rakib Hossain Misu University of California Irvine, Crista Lopes University of California Irvine, Iris Ma University of California Irvine, James Noble Independent. Wellington, NZ
DOI Pre-print
16:00 - 18:00
16:00
18m
Talk
Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers
Research Papers
Dongwei Xiao Hong Kong University of Science and Technology, Zhibo Liu The Hong Kong University of Science and Technology, Qi Pang Carnegie Mellon University, Shuai Wang The Hong Kong University of Science and Technology, Yichen LI Hong Kong University of Science and Technology
16:18
18m
Talk
Mobile Bug Report Reproduction via Global Search on the App UI Model
Research Papers
Zhaoxu Zhang University of Southern California, Fazle Mohammed Tawsif University of Southern California, Komei Ryu University of Southern California, Tingting Yu University of Connecticut, William G.J. Halfond University of Southern California
16:00 - 18:00
AI4SE 2Industry Papers / Research Papers at Pitomba
Chair(s): Jingyue Li Norwegian University of Science and Technology (NTNU)
16:18
18m
Talk
Code-Aware Prompting: A study of Coverage guided Test Generation in Regression Setting using LLM
Research Papers
Gabriel Ryan Columbia University, Siddhartha Jain AWS AI Labs, Mingyue Shang AWS AI Labs, Shiqi Wang AWS AI Labs, Xiaofei Ma AWS AI Labs, Murali Krishna Ramanathan AWS AI Labs, Baishakhi Ray Columbia University, New York; AWS AI Lab
16:00 - 18:00
Fault Diagnosis and Root Cause Analysis 1Demonstrations / Research Papers / Industry Papers at Sapoti
Chair(s): Muhammad Ali Gulzar Virginia Tech
16:00
18m
Talk
A Quantitative and Qualitative Evaluation of LLM-based Explainable Fault Localization
Research Papers
Sungmin Kang Korea Advanced Institute of Science and Technology, Gabin An Korea Advanced Institute of Science and Technology, Shin Yoo Korea Advanced Institute of Science and Technology
Pre-print
16:18
18m
Talk
BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection
Research Papers
Luan Pham RMIT University, Huong Ha RMIT University, Hongyu Zhang Chongqing University
Pre-print
17:30
18m
Talk
ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems
Research Papers
Guangba  Yu Sun Yat-sen University, Pengfei Chen Sun Yat-sen University, Zilong He Sun Yat-sen University, Qiuyu Yan Tencent, Yu Luo Tencent, Fangyuan Li Tencent, Zibin Zheng Sun Yat-sen University
DOI Pre-print

Thu 18 Jul

Displayed time zone: Brasilia, Distrito Federal, Brazil change

11:00 - 12:30
Empirical Studies 2Ideas, Visions and Reflections / Research Papers / Industry Papers / Journal First at Acerola
Chair(s): Iftekhar Ahmed University of California, Irvine
11:00
18m
Talk
State Reconciliation Defects in Infrastructure as Code
Research Papers
Md Mahadi Hassan Auburn University, John Salvador Auburn University, Shubhra Kanti Karmaker Santu Auburn University, Akond Rahman Auburn University
Pre-print
11:18
18m
Talk
Understanding and Detecting Annotation-induced Faults of Static Analyzers
Research Papers
Huaien Zhang The Hong Kong Polytechnic University, Southern University of Science and Technology, Yu Pei The Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Shin Hwei Tan Concordia University
11:00 - 12:30
Human Aspects 2Research Papers at Mandacaru
Chair(s): Bianca Trinkenreich Colorado State University
11:00
18m
Talk
Can GPT-4 Replicate Empirical Software Engineering Research?
Research Papers
Jenny T. Liang Carnegie Mellon University, Carmen Badea Microsoft Research, Christian Bird Microsoft Research, Robert DeLine Microsoft Research, Denae Ford Microsoft Research, Nicole Forsgren Microsoft Research, Thomas Zimmermann Microsoft Research
Pre-print
11:18
18m
Talk
Do Code Generation Models Think Like Us? - A Study of Attention Alignment between Large Language Models and Human Programmers
Research Papers
Bonan Kou Purdue University, Shengmai Chen Purdue University, Zhijie Wang University of Alberta, Lei Ma The University of Tokyo & University of Alberta, Tianyi Zhang Purdue University
Pre-print
11:36
18m
Talk
Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion
Research Papers
Md Shamimur Rahman University of Saskatchewan, Canada, Zadia Codabux University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Canada
11:54
18m
Talk
Effective Teaching through Code Reviews: Patterns and Anti-Patterns
Research Papers
Anita Sarma Oregon State University, Nina Chen Google
DOI
12:12
18m
Talk
An empirical study on code review activity prediction in practice
Research Papers
Doriane Olewicki Queen's University, Sarra Habchi Ubisoft Montréal, Bram Adams Queen's University
Pre-print
11:00 - 12:30
Program Analysis and Performance 2Research Papers at Pitanga
Chair(s): Rahul Purandare University of Nebraska-Lincoln
11:00
18m
Talk
Adapting Multi-objectivized Software Configuration Tuning
Research Papers
Tao Chen University of Birmingham, Miqing Li University of Birmingham
Pre-print
11:18
18m
Talk
Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions?
Research Papers
Madeline Endres University of Massachusetts Amherst, Sarah Fakhoury Microsoft Research, Saikat Chakraborty Microsoft Research, Shuvendu K. Lahiri Microsoft Research
11:36
18m
Talk
Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit
Research Papers
Matteo Paltenghi University of Stuttgart, Michael Pradel University of Stuttgart
Pre-print
11:54
18m
Talk
Abstraction-Aware Inference of Metamorphic Relations
Research Papers
Agustin Nolasco University of Rio Cuarto, Facundo Molina IMDEA Software Institute, Renzo Degiovanni Luxembourg Institute of Science and Technology, Alessandra Gorla IMDEA Software Institute, Diego Garbervetsky Departamento de Computación, FCEyN, UBA, Mike Papadakis University of Luxembourg, Sebastian Uchitel Imperial College and University of Buenos Aires, Nazareno Aguirre University of Rio Cuarto and CONICET, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
12:12
18m
Talk
Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning
Research Papers
Jingzhi Gong Loughborough University, Tao Chen University of Birmingham
Pre-print
11:00 - 12:30
Software Maintenance and Comprehension 2Research Papers at Pitomba
Chair(s): Denys Poshyvanyk William & Mary
11:00
18m
Talk
Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis
Research Papers
Georgios-Petros Drosos ETH Zurich, Thodoris Sotiropoulos ETH Zurich, Diomidis Spinellis Athens University of Economics and Business & Delft University of Technology, Dimitris Mitropoulos University of Athens
DOI Pre-print
11:18
18m
Research paper
Characterizing Python Library Migrations
Research Papers
Mohayeminul Islam University of Alberta, Ajay Jha North Dakota State University, Ildar Akhmetov Northeastern University, Sarah Nadi New York University Abu Dhabi, University of Alberta
DOI Pre-print
11:36
18m
Talk
PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages
Research Papers
Kai Gao University of Science and Technology Beijing, Weiwei Xu Peking University, Wenhao Yang Peking University, Minghui Zhou Peking University
DOI Pre-print
11:54
18m
Talk
Refactoring to Pythonic Idioms: A Hybrid Knowledge-Driven Approach Leveraging Large Language Models
Research Papers
zejun zhang Australian National University, Zhenchang Xing CSIRO's Data61, Xiaoxue Ren Zhejiang University, Qinghua Lu Data61, CSIRO, Xiwei (Sherry) Xu Data61, CSIRO
12:12
18m
Talk
Dependency-Induced Waste in Continuous Integration: An Empirical Study of Unused Dependencies in the NPM Ecosystem
Research Papers
Nimmi Weeraddana University of Waterloo, Mahmoud Alfadel University of Waterloo, Shane McIntosh University of Waterloo
DOI Pre-print
14:00 - 15:30
Empirical Studies 3Research Papers / Journal First at Acerola
Chair(s): Shane McIntosh University of Waterloo
14:00
18m
Talk
Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications
Research Papers
Dhanushka Jayasuriya University of Auckland, Valerio Terragni University of Auckland, Jens Dietrich Victoria University of Wellington, Kelly Blincoe University of Auckland
14:54
18m
Talk
AROMA: Automatic Reproduction of Maven Artifacts
Research Papers
Mehdi Keshani Delft University of Technology, Tudor-Gabriel Velican Delft University of Technology, Gideon Bot Delft University of Technology, Sebastian Proksch Delft University of Technology
14:00 - 15:30
14:00
18m
Talk
Harnessing Neuron Stability to Improve DNN Verification
Research Papers
Hai Duong George Mason University, Dong Xu University of Virginia, ThanhVu Nguyen George Mason University, Matthew B Dwyer University of Virginia
14:18
18m
Talk
MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions
Research Papers
Ying Xiao King's College London / Southern University of Science and Technology, Jie M. Zhang King's College London, Yepang Liu Southern University of Science and Technology, Mohammad Reza Mousavi King's College London, Sicen Liu Southern University of Science and Technology, Dingyuan Xue Southern University of Science and Technology
14:00 - 15:30
Security and Privacy 1Ideas, Visions and Reflections / Industry Papers / Research Papers at Pitanga
Chair(s): Gias Uddin York University, Canada
14:00
18m
Talk
Investigating Documented Privacy Changes in Android OS
Research Papers
Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Fuman Xie University of Queensland, Guangdong Bai University of Queensland
14:36
18m
Talk
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-coded Credentials
Research Papers
Yizhan Huang The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
14:00 - 15:30
Software Maintenance and Comprehension 3Research Papers / Journal First at Pitomba
Chair(s): Xin Xia Huawei Technologies
14:00
18m
Talk
Revealing Software Development Work Patterns with PR-Issue Graph Topologies
Research Papers
Cleidson de Souza Federal University of Pará, Brazil, Emilie Ma University of British Columbia, Jesse Wong University of British Columbia, Dongwook Yoon University of British Columbia, Ivan Beschastnikh University of British Columbia
14:36
18m
Talk
Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions
Research Papers
Tao Xiao Nara Institute of Science and Technology, Hideaki Hata Shinshu University, Christoph Treude Singapore Management University, Kenichi Matsumoto Nara Institute of Science and Technology
Pre-print Media Attached
14:54
18m
Talk
SimLLM: Measuring Semantic Similarity in Code Summaries Using a Large Language Model-Based Approach
Research Papers
Xin Jin Meta, Zhiqiang Lin The Ohio State University
15:12
18m
Talk
Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations
Research Papers
David Broneske DZHW Hannover, Germany, Sebastian Kittan Otto-von-Guericke Unviersity Magdeburg, Germany, Jacob Krüger Eindhoven University of Technology
16:00 - 18:00
Log Analysis and DebuggingResearch Papers / Industry Papers at Acerola
Chair(s): Domenico Bianculli University of Luxembourg
16:00
18m
Talk
Go Static: Contextualized Logging Statement Generation
Research Papers
Yichen LI The Chinese University of Hong Kong, Yintong Huo The Chinese University of Hong Kong, Renyi Zhong The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu The Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Jiazhen Gu The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Michael Lyu The Chinese University of Hong Kong
16:18
18m
Talk
DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing
Research Papers
Sabaat Haroon Virginia tech, Chris Brown Virginia Tech, Muhammad Ali Gulzar Virginia Tech
16:36
18m
Talk
DTD: Comprehensive and Scalable Testing for Debuggers
Research Papers
Hongyi Lu Southern University of Science and Technology/Hong Kong University of Science and Technology, Zhibo Liu The Hong Kong University of Science and Technology, Shuai Wang The Hong Kong University of Science and Technology, Fengwei Zhang Southern University of Science and Technology
17:03
18m
Talk
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques
Research Papers
Max Landauer AIT Austrian Institute of Technology, Florian Skopik AIT Austrian Institute of Technology, Markus Wurzenberger AIT Austrian Institute of Technology
17:21
18m
Research paper
LILAC: Log Parsing using LLMs with Adaptive Parsing Cache
Research Papers
Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Yichen LI The Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Yintong Huo The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Jiazhen Gu The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print
17:39
18m
Talk
TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime StateDistinguished Paper Award
Research Papers
Haiyu Huang Sun Yat-sen University, Xiaoyu Zhang HUAWEI CLOUD COMPUTING TECHNOLOGIES CO. LTD., Pengfei Chen Sun Yat-sen University, Zilong He Sun Yat-sen University, Zhiming Chen Sun Yat-sen University, Guangba  Yu Sun Yat-sen University, Hongyang Chen Sun Yat-sen University, Chen Sun Huawei
Pre-print
16:00 - 18:00
SE4AI 2Research Papers / Industry Papers / Demonstrations / Journal First at Mandacaru
Chair(s): Wei Yang University of Texas at Dallas
16:00
18m
Talk
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models
Research Papers
Yan Wang Central University of Finance and Economics, Xiaoning Li Central University of Finance and Economics, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang Central University of Finance and Economics, Chao Ni School of Software Technology, Zhejiang University, Ling Ding Central University of Finance and Economics
Pre-print Media Attached File Attached
16:18
18m
Talk
On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software
Research Papers
Ophir Carmel The Hebrew University of Jerusalem, Guy Katz The Hebrew University of Jerusalem
16:00 - 18:00
16:36
18m
Talk
Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles
Research Papers
weigang he East China Normal University / University of Technology Sydney, Peng Di Ant Group, Mengli Ming East China Normal University, Chengyu Zhang ETH Zurich, Ting Su East China Normal University, Shijie Li Ant Group, Yulei Sui UNSW
16:54
18m
Talk
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators
Research Papers
Jinyin Chen Zhejiang University of Technology, Chengyu Jia Zhejiang University of Technology, Yunjie Yan Zhejiang University of Technology, Jie Ge Zhejiang University of Technology, haibin zheng Zhejiang University of Technology, Yao Cheng TÜV SÜD Asia Pacific Pte. Ltd.
17:39
18m
Talk
Java JIT Testing with Template Extraction
Research Papers
Zhiqiang Zang The University of Texas at Austin, Fu-Yao Yu The University of Texas at Austin, Aditya Thimmaiah The University of Texas at Austin, August Shi The University of Texas at Austin, Milos Gligoric The University of Texas at Austin
DOI Pre-print
16:00 - 18:00
FuzzingDemonstrations / Journal First / Ideas, Visions and Reflections / Research Papers / Industry Papers at Sapoti
Chair(s): Maxime Lamothe Polytechnique Montreal, Montreal, Canada
16:36
18m
Talk
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
Research Papers
Tae Eun Kim KAIST, Jaeseung Choi Sogang University, Seongjae Im KAIST, Kihong Heo KAIST, Sang Kil Cha KAIST
Pre-print Media Attached

Fri 19 Jul

Displayed time zone: Brasilia, Distrito Federal, Brazil change

11:00 - 12:30
Human Aspects 3Research Papers / Industry Papers at Mandacaru
Chair(s): Eduardo Santana de Almeida Federal University of Bahia
11:18
18m
Talk
Rocks Coding, Not Development–A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks
Research Papers
Wei Wang Beijing University of Posts and Telecommunications, Huilong Ning Beijing University of Posts and Telecommunications, Gaowei Zhang Beijing University of Posts and Telecommunications, Libo Liu School of Computing and Information Systems, University of Melbourne, Yi Wang Beijing University of Posts and Telecommunications
DOI Pre-print
11:36
18m
Talk
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice
Research Papers
Ranim Khojah Chalmers | University of Gothenburg, Mazen Mohamad Chalmers | RISE - Research Institutes of Sweden, Philipp Leitner Chalmers | University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg
Pre-print
11:54
18m
Talk
How to Gain Commit Rights in Modern Top Open Source Communities?
Research Papers
Xin Tan Beihang University, Yan Gong Beihang University, Geyu Huang Beihang University, Haohua Wu Beihang University, Li Zhang Beihang University
DOI Pre-print
12:12
18m
Talk
How does Simulation-based Testing for Self-driving Cars match Human Perception?
Research Papers
Christian Birchler Zurich University of Applied Sciences & University of Bern, Tanzil Kombarabettu Mohammed University of Zurich, Pooja Rani University of Zurich, Teodora Nechita Zurich University of Applied Sciences, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences
11:00 - 12:30
Testing 4Research Papers / Industry Papers at Pitanga
Chair(s): Antonia Bertolino National Research Council, Italy
11:00
18m
Talk
Partial Solution Based Constraint Solving Cache in Symbolic Execution
Research Papers
Ziqi Shuai School of Computer, National University of Defense Technology, China, Zhenbang Chen College of Computer, National University of Defense Technology, Kelin Ma School of Computer, National University of Defense Technology, China, Kunlin Liu School of Computer, National University of Defense Technology, China, Yufeng Zhang Hunan University, Jun Sun School of Information Systems, Singapore Management University, Singapore, Ji Wang School of Computer, National University of Defense Technology, China
Pre-print
11:18
18m
Talk
Natural Symbolic Execution-based Testing for Big Data Analytics
Research Papers
Yaoxuan Wu UCLA, Ahmad Humayun Virginia Tech, Muhammad Ali Gulzar Virginia Tech, Miryung Kim UCLA and Amazon Web Services
Pre-print
11:36
18m
Talk
MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems
Research Papers
Xiaoyan Zhu Zhejiang Sci-Tech University, Mingyue Jiang Zhejiang Sci-Tech University, Xiao-Yi Zhang University of Science and Technology Beijing, Liming Nie Nanyang Technological University, Zuohua Ding Zhejiang Sci-Tech University
11:00 - 12:30
AI4SE 4 Research Papers at Pitomba
Chair(s): Wesley Assunção North Carolina State University
11:00
18m
Talk
Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge DistillationDistinguished Paper Award
Research Papers
Oussama Ben Sghaier DIRO, Université de Montréal, Houari Sahraoui DIRO, Université de Montréal
11:18
18m
Talk
Learning to Detect and Localize Multilingual Bugs
Research Papers
Haoran Yang Washington State University, Yu Nong Washington State University, Tao Zhang Macau University of Science and Technology, Xiapu Luo The Hong Kong Polytechnic University, Haipeng Cai Washington State University
DOI Pre-print
11:36
18m
Talk
Mining Action Rules for Defect Reduction Planning
Research Papers
Khouloud Oueslati Polytechnique Montréal, Canada, Gabriel Laberge Polytechnique Montréal, Canada, Maxime Lamothe Polytechnique Montreal, Foutse Khomh Polytechnique Montréal
11:54
18m
Talk
Predicting Failures of Autoscaling Distributed Applications
Research Papers
Giovanni Denaro University of Milano - Bicocca, Noura El Moussa USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Rahim Heydarov USI Università della Svizzera Italiana, Francesco Lomio SIT Schaffhausen Institute of Technology, Mauro Pezze USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Ketai Qiu USI Università della Svizzera Italiana
DOI Pre-print
12:12
18m
Talk
RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction
Research Papers
Gengyi Sun University of Waterloo, Sarra Habchi Ubisoft Montréal, Shane McIntosh University of Waterloo
14:00 - 15:30
Security and Privacy 2Industry Papers / Research Papers at Acerola
Chair(s): Kihong Heo KAIST
14:00
18m
Talk
PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models
Research Papers
Simin Chen University of Texas at Dallas, XiaoNing Feng Taiyuan University of Technology, Xiaohong Han Taiyuan University of Technology, Cong Liu University of California, Riverside, Wei Yang University of Texas at Dallas
14:18
18m
Talk
Demystifying Invariant Effectiveness for Securing Smart Contracts
Research Papers
Zhiyang Chen University of Toronto, Ye Liu Nanyang Technological University, Sidi Mohamed Beillahi University of Toronto, Yi Li Nanyang Technological University, Fan Long University of Toronto
Link to publication Pre-print Media Attached
14:36
18m
Talk
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?Distinguished Paper Award
Research Papers
Kaixuan Li East China Normal University, Yue Xue Metatrust Labs, Sen Chen Tianjin University, Han Liu East China Normal University, Kairan Sun Nanyang Technological University, Ming Hu Singapore Management University, Haijun Wang Xi'an Jiaotong University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University
Pre-print
14:54
18m
Talk
On the Contents and Utility of IoT Cybersecurity Guidelines
Research Papers
Jesse Chen University of Arizona, Dharun Anandayuvaraj Purdue University, James C. Davis Purdue University, Sazzadur Rahaman University of Arizona
DOI Pre-print
14:00 - 15:30
Program Analysis and Performance 3Research Papers at Mandacaru
Chair(s): Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University
14:00
18m
Talk
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings
Research Papers
Zirui Song The Chinese University of Hong Kong, Jiongyi Chen National University of Defense Technology, Kehuan Zhang The Chinese University of Hong Kong
14:18
18m
Talk
Active Monitoring Mechanism for Control-based Self-Adaptive Systems
Research Papers
Yi Qin State Key Laboratory for Novel Software Technology, Nanjing University, Yanxiang Tong State Key Laboratory for Novel Software Technology, Nanjing University, Yifei Xu State Key Laboratory for Novel Software Technology, Nanjing University, Chun Cao State Key Laboratory for Novel Software Technology, Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University
14:36
18m
Talk
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs
Research Papers
Haoran Liu National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yan Lei Chongqing University, Yue Yu National University of Defense Technology, Yu Jiang Tsinghua university, Xiaoguang Mao National University of Defense Technology, Liao Xiangke National University of Defense Technology
14:54
18m
Talk
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization
Research Papers
Chengpeng Wang The Hong Kong University of Science and Technology, Jipeng Zhang The Hong Kong University of Science and Technology, Rongxin Wu School of Informatics, Xiamen University, Charles Zhang The Hong Kong University of Science and Technology
15:12
18m
Talk
Decomposing Software Verification Using Distributed Summary Synthesis
Research Papers
Dirk Beyer LMU Munich, Matthias Kettl LMU Munich, Thomas Lemberger LMU Munich
DOI Media Attached File Attached
14:00 - 15:30
Fault Diagnosis and Root Cause Analysis 2Research Papers / Industry Papers at Pitanga
Chair(s): Xi Zheng Macquarie University
14:18
18m
Talk
Towards Better Graph Neural Network-based Fault Localization Through Enhanced Code Representation
Research Papers
Md Nakhla Rafi Concordia University, Dong Jae Kim Concordia University, An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaowei Wang Department of Computer Science, University of Manitoba, Canada
14:00 - 15:30
Software Maintenance and Comprehension 4Research Papers / Demonstrations / Ideas, Visions and Reflections / Industry Papers at Pitomba
Chair(s): Timo Kehrer University of Bern
14:00
18m
Talk
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization
Research Papers
Yifan Zhang Vanderbilt University, Jiliang Li Vanderbilt University, Zachary Karas Vanderbilt University, Aakash Bansal University of Notre Dame, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University
14:18
18m
Talk
Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code Using Deep Neural Networks
Research Papers
Tarek Alakmeh University of Zurich, David Reich University of Potsdam, Lena Jäger University of Zurich, Thomas Fritz University of Zurich
DOI Pre-print
14:36
18m
Talk
R2I: A Relative Readability Metric for Decompiled Code
Research Papers
Haeun Eom Sungkyunkwan University, Dohee Kim Sungkyunkwan University, Sori Lim Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, Sungjae Hwang Sungkyunkwan University

Unscheduled Events

Not scheduled
Talk
Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times
Research Papers
Necip Fazıl Yıldıran University of Central Florida, Jeho Oh The University of Texas at Austin, Julia Lawall Inria, Paul Gazzillo University of Central Florida
Not scheduled
Talk
Syntax Is All You Need: A Universal-Language Approach to Mutant Generation
Research Papers
Sourav Deb Northern Arizona University, Kush Jain Carnegie Mellon University, Rijnard van Tonder Mysten Labs, Inc., Claire Le Goues Carnegie Mellon University, Alex Groce Northern Arizona University
Not scheduled
Talk
JIT-Smart: A Multi-Task Learning Framework for Just-In-Time Defect Prediction and Localization
Research Papers
Xiangping Chen Sun Yat-sen University, Furen Xu Sun Yat-sen University, Yuan Huang Sun Yat-sen University, Neng Zhang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
Not scheduled
Talk
ClarifyGPT: A Framework for Enhancing LLM-based Code Generation via Requirements Clarification
Research Papers
Fangwen Mu Institute of Software, Chinese Academy of Sciences, Lin Shi Beihang University, Song Wang York University, Zhuohao Yu Institute of Software, Chinese Academy of Sciences, Binquan Zhang Beihang University, ChenXue Wang Institute of Software, Chinese Academy of Sciences, Shichao LIu Software IDE innovation Lab, Huawei Central Software Institute, Qing Wang Institute of Software, Chinese Academy of Sciences
Not scheduled
Talk
CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models
Research Papers
Qilin Zhou City University of Hong Kong, Zhengyuan Wei City University of Hong Kong, Haipeng Wang City University of Hong Kong, Bo Jiang Beihang University, Wing-Kwong Chan City University of Hong Kong
Not scheduled
Talk
DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises
Research Papers
Daoguang Zan Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Ailun Yu Peking University, Bo Shen Huawei Technologies Co., Ltd, Bei Chen Independent Researcher, Wei Li Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yongshun Gong Shandong University, Xiaolin Chen Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yafen Yao Huawei Technologies Co., Ltd, Weihua Luo Funcun-wuyou Technologies Co., Ltd, Bei Guan Institute of Software Chinese Academy of Sciences, Yan Liu Independent Researcher, Yongji Wang Institute of Software Chinese Academy of Sciences, Qianxiang Wang Huawei Technologies Co., Ltd, Lizhen Cui Shandong University
Not scheduled
Talk
Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems
Research Papers
Yuntianyi Chen University of California, Irvine, Yuqi Huai University of California, Irvine, Shilong Li University of California, Irvine, Changnam Hong University of California, Irvine, Joshua Garcia University of California, Irvine
DOI
Not scheduled
Talk
Semi-Supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules
Research Papers
Shengcheng Yu Nanjing University, Chunrong Fang Nanjing University, Quanjun Zhang Nanjing University, Mingzhe Du Nanjing University, Jia Liu Nanjing University, Zhenyu Chen Nanjing University
Not scheduled
Talk
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis
Research Papers
Zeqin Liao Sun Yat-sen University, Henglong Liang Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Sicheng Hao Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Juan Zhai University of Massachusetts, Amherst, Jiajing Wu Sun Yat-sen University
Not scheduled
Talk
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers
Research Papers
Changwei Zou UNSW Sydney, Dongjie He UNSW Sydney, Yulei Sui UNSW, Jingling Xue UNSW Sydney
Not scheduled
Talk
BRF: Fuzzing the eBPF runtime
Research Papers
Hsin-Wei Hung UC Irvine, Ardalan Amiri Sani UC Irvine
Not scheduled
Talk
A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories
Research Papers
Farbod Farhour Concordia University, Ahmad Abdellatif University of Calgary, Essam Mansour Concordia University, Emad Shihab Concordia University
Not scheduled
Talk
LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking
Research Papers
Yongzheng Xie University of Adelaide, Hongyu Zhang Chongqing University, Muhammad Ali Babar School of Computer Science, The University of Adelaide
Not scheduled
Talk
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Research Papers
Luwei Cai ShanghaiTech University, Fu Song State Key Laboratory of Computer Science and Institute of Software, Chinese Academy of Sciences., Taolue Chen Birkbeck, University of London
Not scheduled
Talk
Evolutionary Multi-Objective Optimization for Contextual Adversarial Example Generation
Research Papers
Shasha Zhou University of Exeter, Mingyu Huang University of Electronic Science and Technology of China, Ke Li University of Exeter, Yanan Sun Sichuan University
Not scheduled
Talk
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile ApplicationsDistinguished Paper Award
Research Papers
Keke Lian Fudan University, Lei Zhang Fudan University, Guangliang Yang Fudan University, Shuo Mao Fudan University, Xinjie Wang Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
Not scheduled
Talk
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection
Research Papers
Shihan Dou Fudan University, Yueming Wu Nanyang Technological University, Haoxiang Jia Huazhong University of Science and Technology, Yuhao Zhou Fudan University, Yang Liu Nanyang Technological University
Not scheduled
Talk
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts
Research Papers
Zexu Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Yu Zhang Harbin Institute of Technology, Weizhe Zhang Harbin Institute of Technology

Accepted Papers

Title
Abstraction-Aware Inference of Metamorphic Relations
Research Papers
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques
Research Papers
Active Monitoring Mechanism for Control-based Self-Adaptive Systems
Research Papers
Adapting Multi-objectivized Software Configuration Tuning
Research Papers
Pre-print
A Deep Dive into Large Language Models for Automated Bug Localization and Repair
Research Papers
DOI
AI-assisted Code Authoring at Scale: Fine-tuning, deploying, and mixed methods evaluation
Research Papers
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators
Research Papers
Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit
Research Papers
Pre-print
An Analysis of the Costs and Benefits of Autocomplete in IDEs
Research Papers
Pre-print
An empirical study on code review activity prediction in practice
Research Papers
Pre-print
An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation
Research Papers
A Quantitative and Qualitative Evaluation of LLM-based Explainable Fault Localization
Research Papers
Pre-print
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-context Learning
Research Papers
AROMA: Automatic Reproduction of Maven Artifacts
Research Papers
A Transferability Study of Interpolation-Based Hardware Model Checking to Software VerificationDistinguished Paper Award
Research Papers
DOI Media Attached
A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories
Research Papers
BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection
Research Papers
Pre-print
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice
Research Papers
Pre-print
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings
Research Papers
Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis
Research Papers
DOI Pre-print
Bounding Random Test Set Size with Computational Learning Theory
Research Papers
Pre-print
BRF: Fuzzing the eBPF runtime
Research Papers
Can GPT-4 Replicate Empirical Software Engineering Research?
Research Papers
Pre-print
Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions?
Research Papers
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection
Research Papers
ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems
Research Papers
DOI Pre-print
Characterizing Python Library Migrations
Research Papers
DOI Pre-print
ClarifyGPT: A Framework for Enhancing LLM-based Code Generation via Requirements Clarification
Research Papers
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
Research Papers
Code-Aware Prompting: A study of Coverage guided Test Generation in Regression Setting using LLM
Research Papers
CodePlan: Repository-level Coding using LLMs and Planning
Research Papers
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile ApplicationsDistinguished Paper Award
Research Papers
CORE: Resolving Code Quality Issues Using LLMs
Research Papers
COSTELLO: Contrastive Testing for Embedding-based Large Language Model as a Service Embeddings
Research Papers
CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models
Research Papers
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs
Research Papers
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization
Research Papers
DeciX: Explain Deep Learning Based Code Generation Applications
Research Papers
Decomposing Software Verification Using Distributed Summary Synthesis
Research Papers
DOI Media Attached File Attached
Demystifying Invariant Effectiveness for Securing Smart Contracts
Research Papers
Link to publication Pre-print Media Attached
Dependency-Induced Waste in Continuous Integration: An Empirical Study of Unused Dependencies in the NPM Ecosystem
Research Papers
DOI Pre-print
DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing
Research Papers
DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises
Research Papers
Do Code Generation Models Think Like Us? - A Study of Attention Alignment between Large Language Models and Human Programmers
Research Papers
Pre-print
Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion
Research Papers
DTD: Comprehensive and Scalable Testing for Debuggers
Research Papers
DyPyBench: A Benchmark of Executable Python Software
Research Papers
Effective Teaching through Code Reviews: Patterns and Anti-Patterns
Research Papers
DOI
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts
Research Papers
Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs
Research Papers
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning
Research Papers
DOI Pre-print
Evaluating and Improving ChatGPT for Unit Test Generation
Research Papers
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
Research Papers
Pre-print Media Attached
Evolutionary Multi-Objective Optimization for Contextual Adversarial Example Generation
Research Papers
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation
Research Papers
Pre-print
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization
Research Papers
Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point SlicingDistinguished Paper Award
Research Papers
DOI Pre-print
FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution
Research Papers
Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles
Research Papers
Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions
Research Papers
Pre-print Media Attached
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
Research Papers
Go Static: Contextualized Logging Statement Generation
Research Papers
Harnessing Neuron Stability to Improve DNN Verification
Research Papers
How does Simulation-based Testing for Self-driving Cars match Human Perception?
Research Papers
How to Gain Commit Rights in Modern Top Open Source Communities?
Research Papers
DOI Pre-print
Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge DistillationDistinguished Paper Award
Research Papers
Investigating Documented Privacy Changes in Android OS
Research Papers
IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion
Research Papers
Java JIT Testing with Template Extraction
Research Papers
DOI Pre-print
JIT-Smart: A Multi-Task Learning Framework for Just-In-Time Defect Prediction and Localization
Research Papers
Learning to Detect and Localize Multilingual Bugs
Research Papers
DOI Pre-print
Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Applications
Research Papers
DOI Pre-print
LILAC: Log Parsing using LLMs with Adaptive Parsing Cache
Research Papers
DOI Pre-print
LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking
Research Papers
Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times
Research Papers
Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers
Research Papers
Mining Action Rules for Defect Reduction Planning
Research Papers
MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions
Research Papers
Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems
Research Papers
DOI
Mobile Bug Report Reproduction via Global Search on the App UI Model
Research Papers
MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems
Research Papers
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models
Research Papers
Pre-print Media Attached File Attached
Natural Symbolic Execution-based Testing for Big Data Analytics
Research Papers
Pre-print
Only diff is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language ModelDistinguished Paper Award
Research Papers
On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software
Research Papers
On the Contents and Utility of IoT Cybersecurity Guidelines
Research Papers
DOI Pre-print
Partial Solution Based Constraint Solving Cache in Symbolic Execution
Research Papers
Pre-print
PBE-based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software
Research Papers
DOI File Attached
PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models
Research Papers
Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code Using Deep Neural Networks
Research Papers
DOI Pre-print
Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning
Research Papers
Pre-print
Predicting Failures of Autoscaling Distributed Applications
Research Papers
DOI Pre-print
Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence LearningDistinguished Paper Award
Research Papers
Pre-print
ProveNFix: Temporal Property guided Program RepairDistinguished Paper Award
Research Papers
DOI Pre-print
PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages
Research Papers
DOI Pre-print
R2I: A Relative Readability Metric for Decompiled Code
Research Papers
RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction
Research Papers
Refactoring to Pythonic Idioms: A Hybrid Knowledge-Driven Approach Leveraging Large Language Models
Research Papers
Revealing Software Development Work Patterns with PR-Issue Graph Topologies
Research Papers
Rocks Coding, Not Development–A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks
Research Papers
DOI Pre-print
Semi-Supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules
Research Papers
Shadows in the Interface: A Comprehensive Study on Dark Patterns
Research Papers
Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations
Research Papers
SimLLM: Measuring Semantic Similarity in Code Summaries Using a Large Language Model-Based Approach
Research Papers
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis
Research Papers
State Reconciliation Defects in Infrastructure as Code
Research Papers
Pre-print
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?Distinguished Paper Award
Research Papers
Pre-print
Syntax Is All You Need: A Universal-Language Approach to Mutant Generation
Research Papers
"The Law Doesn’t Work Like a Computer": Exploring Software Licensing Issues Faced by Legal PractitionersDistinguished Paper Award
Research Papers
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers
Research Papers
Towards AI-Assisted Synthesis of Verified Dafny Methods
Research Papers
DOI Pre-print
Towards Better Graph Neural Network-based Fault Localization Through Enhanced Code Representation
Research Papers
Towards Effective Multi-Hunk Bug Repair: Detecting, Creating, Evaluating, and Understanding Indivisible Bugs
Research Papers
Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations
Research Papers
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Research Papers
TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime StateDistinguished Paper Award
Research Papers
Pre-print
Understanding and Detecting Annotation-induced Faults of Static Analyzers
Research Papers
Understanding Developers' Discussions and Perceptions on Non-Functional Requirements: The Case of the Spring EcosystemDistinguished Paper Award
Research Papers
DOI Pre-print
Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications
Research Papers
Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example
Research Papers
Pre-print
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-coded Credentials
Research Papers

Call for Papers

We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research.

Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems are also welcome, as well as replication papers. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call.

NEW THIS YEAR #1: The inaugural Proceedings of the ACM on Software Engineering (PACMSE) Issue FSE 2024 seeks contributions through submissions in this track. Accepted papers will be invited for presentation at FSE 2024. Approval has been granted by ACM in late July. PACMSE will be the only proceedings where accepted research track papers will be published. Please check the FAQ for details.

NEW THIS YEAR #2: The steering committee has decided that the conference name will be changed to ACM International Conference on the Foundations of Software Engineering (FSE). In this transition year, we may still use the old and new names interchangeably on the conference webpage.

NEW THIS YEAR #3: Based on the coordination among FSE, ICSE, and ASE steering committees, the FSE conference and submission dates have been moved a few months early. The intention is for this schedule to remain stable in the years ahead and the conference and submission deadlines of the three large general software engineering conferences to be spread out throughout the year. This change however means that the submission deadline of FSE 2024 (late September 2023) will be before the days ESEC/FSE 2023 will be held (December 2023).

NEW THIS YEAR #4: Submissions must follow the "ACM Policy on Authorship" released April 20, 2023, which contains policy regarding the use of Generative AI tools and technologies, such as ChatGPT. Please also check the ACM FAQ which describes in what situations generative AI tools can be used (with or without acknowledgement).

Tracks

This CFP refers to the Research Track of FSE. For the remaining tracks, please check the specific calls on the website:

HOW TO SUBMIT

At the time of submission, each paper should have no more than 18 pages for all text and figures, plus 4 pages for references, using the following templates: Latex or Word (Mac) or Word (Windows). Authors using LaTeX should use the sample-acmsmall-conf.tex file (found in the samples folder of the acmart package) with the acmsmall option. We also strongly encourage the use of the review, screen, and anonymous options as well. In sum, you want to use: \documentclass[acmsmall,screen,review,anonymous]{acmart}. Papers may be submitted using numeric citations, but final versions of accepted papers must use the author-year format for citations. It is a single-column page layout. Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the FSE 2024 submission site:

https://fse2024.hotcrp.com

Each submission will be reviewed by at least three members of the program committee. The review process is that the initial output can be accept, reject or major revision. When the initial output of the three reviews is major revision, authors will have an opportunity to address the reviewers’ requests during a 6 week major revision period. Such requests may include additional experiments or new analyses of existing results; major rewriting of algorithms and explanations; clarifications, better scoping, and improved motivations. The revised submission must be accompanied by a response letter, where the authors explain how they addressed each concern expressed by the reviewers. The same reviewers who requested major revisions will then assess whether the revised submission satisfies their requests adequately.

Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation (if relevant), quality of presentation, and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The program committee as a whole will make final decisions about which submissions to accept for publication.

In addition to declaring the topics which are relevant for their submissions, authors will be asked to declare the research methods employed in their submissions. This will enable us to ensure reviewer expertise both for research methods and topics. For full definitions of the research methods, see the SIGSOFT Empirical Standards.

Double-Anonymous Review Process

In order to ensure the fairness of the reviewing process, the FSE 2024 Research Papers Track will employ a double-anonymous review process, where external reviewers do not know the identity of authors, and authors do not know the identity of external reviewers. The papers submitted must not reveal the authors’ identities in any way:

  • Authors should leave out author names and affiliations from the body of their submission.
  • Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
  • Authors should not include URLs to author-revealing sites (tools, datasets). Authors are still encouraged to follow open science principles and submit replication packages, see more details on the open science policy below.
  • Authors should anonymize author-revealing company names but instead provide general characteristics of the organizations involved needed to understand the context of the paper.
  • Authors should ensure that paper acknowledgements do not reveal the origin of their work.
  • While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to FSE 2024.
  • During review, authors should not publicly use the submission title.

The double-anonymous process used this year is “heavy”, i.e., the paper anonymity will be maintained during all reviewing and discussion periods. In case of major revision, authors must therefore maintain anonymity in their response letter and must provide no additional information that could be author-revealing.

To facilitate double-anonymous reviewing, we recommend the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification. If the authors have uploaded to arXiv or similar, they should avoid specifying that the manuscript was submitted to FSE 2024.

Authors with further questions on double-anonymous reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-anonymous review process will be desk-rejected.

Submission Policies

The authors must follow the “ACM Policy on Authorship” released April 20, 2023 and its accompanying FAQ including the following points:

  • “Generative AI tools and technologies, such as ChatGPT, may not be listed as authors of an ACM published Work. The use of generative AI tools and technologies to create content is permitted but must be fully disclosed in the Work. For example, the authors could include the following statement in the Acknowledgements section of the Work: ChatGPT was utilized to generate sections of this Work, including text, tables, graphs, code, data, citations, etc.). If you are uncertain about the need to disclose the use of a particular tool, err on the side of caution, and include a disclosure in the acknowledgements section of the Work.”

  • “If you are using generative AI software tools to edit and improve the quality of your existing text in much the same way you would use a typing assistant like Grammarly to improve spelling, grammar, punctuation, clarity, engagement or to use a basic word processing system to correct spelling or grammar, it is not necessary to disclose such usage of these tools in your Work.”

Please read the full policy and FAQ.

Papers submitted for consideration to FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.

To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.

All publications are subject to the ACM Author Representations policy.

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.

Alleged violations to any of the above policies will be reported to ACM for further investigation and may result in a full retraction of your paper, in addition to other potential penalties, as per the ACM Publications Policies.

Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process if your paper is accepted. ACM has been involved in ORCID from the start and they have recently made a commitment to collect ORCID IDs from all published authors. ACM is committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.

The authors of accepted papers are invited and strongly encouraged to attend the conference to present their work. Attendance at the event is not mandatory for publication. Authors also have the option of not presenting their work at the conference, in which case they do not need to register.

Important Dates

All dates are 23:59:59 AoE (UTC-12h)

  • Paper registration: Thursday, September 21, 2023 (to register a paper, paper title, abstract, author list, and some additional metadata are required; title and abstract must contain sufficient information for effective bidding; registrations containing empty or generic title and abstract may be dropped)
  • Full paper submission: Thursday, September 28, 2023
  • Author response: December 11-13, 2023 (3-day period)
  • Initial notification: Tuesday, January 23, 2024 (long discussion period due to year-end holidays)
  • Camera ready (directly accepted papers): Tuesday, February 20, 2024
  • Revised manuscript submissions (major revisions only): Tuesday, March 5, 2024
  • Final notification for major revisions: Tuesday, April 16, 2024
  • Camera ready (accepted major revision papers): Tuesday, May 14, 2024

The official publication date is the date the journal issue is made available in the ACM Digital Library. This date may be as early as July 1, 2024. The official publication date affects the deadline for any patent filings related to published work.

Open Science Policy

The research track of FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.

Upon submission to the research track, authors are asked to make a replication package available to the program committee (via upload of supplemental material or a link to a private or public repository) or to comment on why this is not possible or desirable. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. We ask authors to provide a supporting statement on the availability of a replication package (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section. Be careful that such statements continue to maintain author anonymity. For more details, see the FSE open science policy.

Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate FSE’24 artifact evaluation committee.

Topics of Interest

Topics of interest include, but are not limited to:

  • Artificial intelligence and machine learning for software engineering
  • Autonomic computing
  • Debugging and fault localization
  • Dependability, safety, and reliability
  • Distributed and collaborative software engineering
  • Embedded software, safety-critical systems, and cyber-physical systems
  • Empirical software engineering
  • Human and social aspects of software engineering
  • Human-computer interaction
  • Mining software repositories
  • Mobile development
  • Model checking
  • Model-driven engineering
  • Parallel, distributed, and concurrent systems
  • Performance engineering
  • Program analysis
  • Program comprehension
  • Program repair
  • Program synthesis
  • Programming languages
  • Recommendation systems
  • Requirements engineering
  • Search-based software engineering
  • Services, components, and cloud
  • Software architectures
  • Software engineering education
  • Software engineering for machine learning and artificial intelligence
  • Software evolution
  • Software processes
  • Software security
  • Software testing
  • Software traceability
  • Symbolic execution
  • Tools and environments

FAQ on Review Process: Major Revisions, Open Science Policy, Double-Anonymous Reviewing

PACMSE Proceedings

Q: What paper format shall we follow for FSE 2024?

A: Papers accepted by the technical track of FSE 2024 will be published in the inaugural journal issue of the Proceedings of the ACM on Software Engineering (PACMSE). Approval has been granted by ACM in late July. Please check the Research Paper How to Submit section for details.

Q: How would the inaugural PACMSE journal affect FSE 2024?

A: FSE will be published in the inaugural PACMSE journal following the recent practices of other communities such as PACMPL (PLDI, POPL, OOPSLA, etc.), PACMHCI, PACMMOD, PACMNET, etc.

Identity: FSE papers will be published in a dedicated issue of PACMSE, with FSE as the issue name. This means that FSE papers will keep their identity!

Paper format: The paper format will follow the ACM’s requirement. This is a switch from the traditional FSE two-column format to this new PACMSE single-column format. However, the amount of content should remain more or less the same: the FSE 2024’s 18 page limit in the singe-column format maps roughly to the old single-column of 10 pages.

Review process: FSE already has a major-revision cycle in 2023 and 2024, which maps neatly onto PACMSE’s requirements for two rounds of reviews, so there are no PACMSE-related changes here.

Conference presentations: FSE 2024’s move to PACMSE changes how the proceedings are published. All accepted papers will still be guaranteed presentation delivery at the conference in the usual way.

Policy on Authorship (e.g., regarding ChatGPT)

Q: What is the policy on Authorship, especially considering the the use of Generative AI tools and technologies, such as ChatGPT?

A: Submissions must follow the “ACM Policy on Authorship” released April 20, 2023, which contains policy regarding the use of Generative AI tools and technologies, such as ChatGPT. Please also check the ACM FAQ which describes in what situations generative AI tools can be used (with or without acknowledgement).

Major Revision Process

Q: Why is FSE allowing major revisions?

A: SE conferences are currently forced to reject papers that include valuable material, but would need major changes to become acceptable for conference presentation, because major revisions cannot be accommodated in the current review process. By supporting only a binary outcome, conferences force reviewers to decide between rejection and acceptance even in borderline cases that would be better judged after a round of major revision. This can cause additional reviewing burden for the community (the paper is resubmitted to another venue with new reviewers) and inconsistency for the authors (the new reviewers have different opinions). We hope by allowing major revisions to both increase the acceptance rate of FSE and to help reduce these current problems with the reviewing process.

For Authors

Q: If my paper receives major revisions, what happens next?

A: The meta-review will clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. Authors of these papers are granted 6 weeks to implement the requested changes. In addition to the revised paper, authors are asked to submit a response letter that explains how each required change was implemented. If any change was not implemented, authors can explain why. The same reviewers will then review the revised paper and make their final (binary) decision. Authors can also choose to withdraw their submission if they wish.

Q: Will major revision become the default decision causing initial acceptance rates to drop?

A: This is not the intention: reviewers are instructed to accept all papers that would have been accepted when major revision was not an available outcome.

For Reviewers

Q: When shall I recommend major revision for a paper?

A: Major revision should not become the default choice for borderline papers and should be used only if without major revisions the paper would be rejected, while a properly done major revision, which addresses the reviewers’ concerns, could make the paper acceptable for publication; if the requested changes are doable in 6 weeks and are implementable within the page limit; if the requested changes are strictly necessary for paper acceptance (i.e., not just nice-to-have features); if the requested changes require recheck (i.e., reviewers cannot trust the authors to implement them directly in the camera ready).

Q: When shall I recommend rejection instead of major revision?

A: Rejection is a more appropriate outcome than major revision if the requested additions/changes are not implementable in 6 weeks; if the contribution is very narrow or not relevant to the SE audience, and it cannot be retargeted in 6 weeks; if the methodology is flawed and cannot be fixed in 6 weeks; if results are unconvincing, the paper does not seem to improve the state of the art much, and new convincing results are unlikely to be available after 6 weeks of further experiments; if the customary benchmark used in the community was ignored and cannot be adopted and compared to in 6 weeks.

Q: When shall I recommend acceptance instead of major revision?

A: We do not want major revision to become the primary pathway for acceptance. We should continue to trust the authors to make minor changes to the submissions in the camera ready version. Acceptance is preferable if the requested additions/changes are nice to have features, not mandatory for the acceptability of the work; if minor improvements of the text are needed; if minor clarifications requested by the reviewers should be incorporated; if important but not critical references should be added and discussed; if discussion of results could be improved, but the current one is already sufficient.

Q: What is the difference between major revision and shepherding?

A: Major revision is not shepherding. While shepherding typically focuses on important but minor changes, which can be specified in an operational way and can be checked quite easily and quickly by reviewers, major revisions require major changes (although doable in 6 weeks), which means the instructions for the authors cannot be completely operational and the check will need to go deeply into the new content delivered by the paper. Hence, while the expectation for shepherded papers is that most of them will be accepted once the requested changes are implemented, this is not necessarily the case with major revisions.

Q: Is there a quota of papers that can have major revision as outcome? A: As there is no quota for the accepted papers, there is also no quota for major revisions. However, we expect that thanks to major revisions we will be able to eventually accept 10-15% more papers, while keeping the quality bar absolutely unchanged.

Q: What shall I write in the meta-review of a paper with major revision outcome?

A: With the possibility of a major revision outcome, meta-reviews become extremely important. The meta-review should clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. The meta-review should act as a contract between reviewers and authors, such that when all required changes are properly made, the paper is accepted. In this respect, the listed changes should be extremely clear, precise, and implementable.

Review Process

For Authors

Q: Can I withdraw my paper?

A: Yes, papers can be withdrawn at any time using HotCRP.

Q: Is appendix or other supplemental materials allowed?

A: The main submission file must follow the page limit. Any supplemental materials including appendix and replication packages must be submitted separately under “Supplemental Material”. Program Committee members can review supplemental materials but are not obligated to review them.

For Reviewers

Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?

A: Contact the Program Co-Chairs, who will download the material on your behalf and make it available to you.

Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?

A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Co-Chairs, especially since additional reviewers might have a different set of conflicts of interest.

Open Science Policy

Q: What is the FSE 2024 open science policy and how can I follow it?

A: Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:

  • make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
  • include in the paper an explanation as to why this is not possible or desirable; and
  • indicate if they intend to make their data publicly available upon acceptance. This information should be provided in the submitted papers in a section named Data Availability after the Conclusion section. For more details, see the FSE open science policy.

Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?

A: To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site. Instructions are provided in the FSE open science policy.

Double-Anonymous Reviewing (DAR)

Q: Why are you using double-anonymous reviewing?

A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.

Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.

A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.

For Authors

Q: What exactly do I have to do to anonymize my paper?

A: Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors.

Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?

A: On the submission site, there will be an option to submit supplementary material along with your main paper. You can also share supplementary material in a private or publicly shared repository (preferred). This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-anonymous guidelines. See instructions on the FSE open science policy.

Q: My submission is based on code available in a public repository. How do I deal with this?

A: Making your code publicly available is not incompatible with double-anonymous reviewing. You can create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy. Authors wanting to share GitHub repositories may want to look into using https://anonymous.4open.science/ which is an open source tool that helps you to quickly double-anonymize your repository.

Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission? A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Co-Chairs.

Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?

A: No. But we recommend you do not use the same title for your FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.

Q: Am I allowed to post my (non-anonymized) paper on my web page or arXiv?

A: You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. Whenever possible, please avoid posting your manuscript on public archives (e.g, ArXiV) before or during the submission period. Would you still prefer to do so, carefully avoid adding to the manuscript any reference to FSE 2024 (e.g., using footnotes saying “Submitted to FSE 2024”).

Q: Can I give a talk about my work while it is under review? How do I handle social media?

A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are grey areas and trade-offs; we cannot describe every possible scenario.

Things you may do:

  • Put your submission on your home page.
  • Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
  • Present your work at professional meetings, job interviews, etc.
  • Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.

Things you should not do:

  • Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
  • Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
  • Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.

Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.

Q: Will the fact that FSE is double-anonymous have an impact on handling conflicts of interest?

A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Call for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.

For Reviewers

Q: What should I do if I learn the authors’ identity? What should I do if a prospective FSE author contacts me and asks to visit my institution? A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Co-Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgement.

Q: How do we handle potential conflicts of interest since I cannot see the author names?

A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.

Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?

A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.


The above guidelines are partly based on the PLDI FAQ on double-anonymous reviewing and the ICSE 2023 guidelines on double-anonymous submissions.

:
: