Write a Blog >>
ICSE 2020
Wed 24 June - Thu 16 July 2020

ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering.

Dates
Tue 7 Jul 2020
Wed 8 Jul 2020
Thu 9 Jul 2020
Fri 10 Jul 2020
Sat 11 Jul 2020
Tracks
ICSE Demonstrations
ICSE Journal First
ICSE New Ideas and Emerging Results
ICSE Software Engineering in Practice
ICSE Technical Papers
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 7 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

07:00 - 08:00
I1-MetastudiesNew Ideas and Emerging Results / Technical Papers / Journal First / Demonstrations at Baekje
Chair(s): Michael Vierhauser Johannes Kepler University Linz
07:00
12m
Talk
An Evidence-Based Inquiry into the Use of Grey Literature in Software EngineeringTechnical
Technical Papers
He Zhang Nanjing University, Xin Zhou State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Xin Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Huang Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Muhammad Ali Babar The University of Adelaide
07:00 - 08:00
I2-SecurityNew Ideas and Emerging Results / Technical Papers at Goguryeo
Chair(s): Andrea Stocco Università della Svizzera italiana
07:00
12m
Talk
Targeted Greybox Fuzzing with Static Lookahead AnalysisTechnical
Technical Papers
Valentin Wüstholz ConsenSys Diligence, Maria Christakis MPI-SWS
Pre-print
07:12
12m
Talk
HyDiff: Hybrid Differential Software AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Yannic Noller Humboldt-Universität zu Berlin, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, Marcel Böhme Monash University, Youcheng Sun Queen's University Belfast, Hoang Lam Nguyen Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin
Pre-print
07:24
12m
Talk
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of UncertaintyTechnical
Technical Papers
Xiyue Zhang Peking University, Xiaofei Xie Nanyang Technological University, Lei Ma Kyushu University, Xiaoning Du Nanyang Technological University, Qiang Hu Kyushu University, Japan, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University, Meng Sun Peking University
Pre-print
07:36
12m
Talk
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning TypesTechnical
Technical Papers
Anastasia Danilova University of Bonn, Alena Naiakshina University of Bonn, Matthew Smith University of Bonn, Fraunhofer FKIE
08:05 - 09:05
I4-Clones and ChangesTechnical Papers / Journal First / New Ideas and Emerging Results / Demonstrations at Baekje
Chair(s): Chanchal K. Roy University of Saskatchewan
08:05
12m
Talk
HARP: Holistic Analysis for Refactoring Python-Based Analytics ProgramsTechnical
Technical Papers
Weijie Zhou North Carolina State University, Yue Zhao NCSU, Guoqiang Zhang North Carolina State University, Xipeng Shen North Carolina State University
08:17
12m
Talk
CC2Vec: Distributed Representations of Code ChangesTechnical
Technical Papers
Thong Hoang Singapore Management University, Singapore, Hong Jin Kang School of Information Systems, Singapore Management University, Julia Lawall Inria, David Lo Singapore Management University
Pre-print
08:05 - 09:05
I5-Deep Learning Testing and DebuggingTechnical Papers / Demonstrations at Goguryeo
Chair(s): Pooyan Jamshidi University of South Carolina
08:05
12m
Talk
DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer DissectionTechnical
Technical Papers
Huiyan Wang State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Jingwei Xu Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University
08:17
12m
Talk
White-box Fairness Testing through Adversarial SamplingACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Peixin Zhang Zhejiang University, Jingyi Wang National University of Singapore, Singapore, Jun Sun Singapore Management University, Guoliang Dong Computer College of Zhejiang University, Xinyu Wang Zhejiang University, Xingen Wang Zhejiang University, Jin Song Dong National University of Singapore, Dai Ting Huawei Corporation
08:35
12m
Talk
Taxonomy of Real Faults in Deep Learning SystemsACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Nargiz Humbatova Università della Svizzera italiana, Gunel Jahangirova Università della Svizzera italiana, Gabriele Bavota Università della Svizzera italiana, Vincenzo Riccio Università della Svizzera italiana, Andrea Stocco Università della Svizzera italiana, Paolo Tonella Università della Svizzera italiana
08:47
12m
Talk
An Empirical Study on Program Failures of Deep Learning JobsACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Ru Zhang Microsoft Research, Wencong Xiao Alibaba, Hongyu Zhang University of Newcastle, Australia, Yu Liu Microsoft Research, Haoxiang Lin Microsoft Research, Mao Yang Microsoft Research
DOI Pre-print
08:05 - 09:05
I6-Empirical Studies and RequirementsJournal First / Software Engineering in Practice / Technical Papers at Silla
Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick
08:13
12m
Talk
Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese NetworkTechnicalArtifact Available
Technical Papers
Lin Shi ISCAS, Mingzhe Xing ISCAS, Mingyang Li ISCAS, Yawen Wang ISCAS, Shoubin Li ISCAS, Qing Wang Institute of Software, Chinese Academy of Sciences
08:33
12m
Talk
Context-aware In-process Crowdworker RecommendationACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Junjie Wang Institute of Software, Chinese Academy of Sciences, Ye Yang Stevens institute of technology, Song Wang York University, Yuanzhe Hu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software, Chinese Academy of Sciences
15:00 - 16:00
A1-Autonomous Driving SystemsTechnical Papers at Baekje
Chair(s): Donghwan Shin University of Luxembourg (SnT)
15:00
12m
Talk
SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in SimulinkArtifact ReusableTechnicalArtifact Available
Technical Papers
Shafiul Azam Chowdhury University of Texas at Arlington, Sohil Lal Shrestha The University of Texas at Arlington, Taylor T Johnson Vanderbilt University, Christoph Csallner University of Texas at Arlington
Link to publication DOI Media Attached
15:12
12m
Talk
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving SystemsTechnical
Technical Papers
Husheng Zhou The University of Texas at Dallas, Wei Li Southern University of Science and Technology, Zelun Kong The University of Texas at Dallas, Junfeng Guo The University of Texas at Dallas, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang The University of Texas at Dallas, Bei Yu The Chinese University of Hong Kong, Cong Liu UT Dallas
15:24
12m
Talk
Misbehaviour Prediction for Autonomous Driving SystemsTechnical
Technical Papers
Andrea Stocco Università della Svizzera italiana, Michael Weiss Università della Svizzera Italiana (USI), Marco Calzana Università della Svizzera Italiana (USI), Paolo Tonella Università della Svizzera italiana
Pre-print
15:36
12m
Talk
Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System IdentificationArtifact ReusableTechnicalArtifact Available
Technical Papers
Claudio Menghi University of Luxembourg, Shiva Nejati University of Ottawa, Lionel Briand SnT Centre/University of Luxembourg, Yago Isasi Parache LuxSpace
15:48
12m
Talk
A Comprehensive Study of Autonomous Vehicle BugsTechnical
Technical Papers
Joshua Garcia University of California, Irvine, Yang Feng Nanjing University, Junjie Shen University of California, Irvine, Sumaya Almanee University of California, Irvine, Yuan Xia University of California, Irvine, Alfred Chen University of California, Irvine
15:00 - 16:00
15:00
12m
Talk
Studying the Use of Java Logging Utilities in the WildTechnical
Technical Papers
Boyuan Chen York University, Zhen Ming (Jack) Jiang York University
Authorizer link Pre-print
15:12
12m
Talk
Causal Testing: Understanding Defects' Root CausesACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Brittany Johnson University of Massachusetts Amherst, Yuriy Brun University of Massachusetts Amherst, Alexandra Meliou University of Massachusetts Amherst
Link to publication DOI Pre-print Media Attached
15:00 - 16:00
A3-Code SummarizationTechnical Papers / New Ideas and Emerging Results at Silla
Chair(s): Shaohua Wang New Jersey Institute of Technology, USA
15:00
12m
Talk
Posit: Simultaneously Tagging Natural and Programming LanguagesTechnicalArtifact Available
Technical Papers
Profir-Petru Pârțachi University College London, Santanu Dash University College London, UK, Christoph Treude The University of Adelaide, Earl T. Barr University College London, UK
Pre-print Media Attached File Attached
15:12
12m
Talk
CPC: Automatically Classifying and Propagating Natural Language Comments via Program AnalysisTechnicalArtifact Available
Technical Papers
Juan Zhai Rutgers University, Xiangzhe Xu Nanjing University, Yu Shi Purdue University, Guanhong Tao Purdue University, Minxue Pan Nanjing University, Shiqing Ma Rutgers University, Lei Xu National Key Laboratory for Novel Software Technology, Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications, Lin Tan Purdue University, Xiangyu Zhang Purdue University
15:24
12m
Talk
Suggesting Natural Method Names to Check Name ConsistenciesTechnical
Technical Papers
Son Nguyen The University of Texas at Dallas, Hung Phan , Trinh Le University of Engineering and Technology, Tien N. Nguyen University of Texas at Dallas
Pre-print
15:42
12m
Talk
Retrieval-based Neural Source Code SummarizationTechnical
Technical Papers
Jian Zhang Beihang University, Xu Wang Beihang University, Hongyu Zhang University of Newcastle, Australia, Hailong Sun Beihang University, Xudong Liu Beihang University
Pre-print
16:05 - 17:05
A4-Cyber-Physical SystemsSoftware Engineering in Practice / Technical Papers / Demonstrations at Baekje
Chair(s): Joanne M. Atlee University of Waterloo
16:05
12m
Talk
Adapting Requirements Models to Varying EnvironmentsTechnical
Technical Papers
Dalal Alrajeh Imperial College London, Antoine Cailliau ICTEAM, UCLouvain, Axel van Lamsweerde Université catholique de Louvain
16:17
12m
Talk
Comparing Formal Tools for System Design: a Judgment StudyTechnical
Technical Papers
Alessio Ferrari CNR-ISTI, Franco Mazzanti ISTI-CNR, Davide Basile University of Florence, Maurice H. ter Beek ISTI-CNR, Alessandro Fantechi University of Florence
DOI Pre-print
16:05 - 17:05
A5-Testing and Debugging 2Demonstrations / New Ideas and Emerging Results / Technical Papers at Goguryeo
Chair(s): Marcelo d'Amorim Federal University of Pernambuco
16:05
12m
Talk
Efficient Generation of Error-Inducing Floating-Point Inputs via Symbolic ExecutionArtifact ReusableTechnicalArtifact Available
Technical Papers
Hui Guo University of California, Davis, Cindy Rubio-González University of California, Davis
16:17
12m
Talk
A Study on the Lifecycle of Flaky TestsTechnical
Technical Papers
Wing Lam University of Illinois at Urbana-Champaign, Kıvanç Muşlu Microsoft, Hitesh Sajnani Microsoft , Suresh Thummalapenta Microsoft
16:38
12m
Talk
Ankou: Guiding Grey-box Fuzzing towards Combinatorial DifferenceArtifact ReusableTechnicalArtifact Available
Technical Papers
Valentin Manès CSRC, KAIST, Soomin Kim KAIST, Sang Kil Cha KAIST

Wed 8 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

00:00 - 01:00
P7-Human AspectsNew Ideas and Emerging Results / Technical Papers / Journal First at Baekje
Chair(s): Mei Nagappan University of Waterloo
00:14
12m
Talk
A Study on the Prevalence of Human Values in Software Engineering Publications, 2015 – 2018TechnicalArtifact Available
Technical Papers
Jon Whittle Monash University, Gillian Oliver Faculty of Information Technology, Monash University, Waqar Hussain Monash University, Davoud Mougouei Faculty of Information Technology, Monash University, Harsha Perera Monash University, Arif Nurwidyantoro Faculty of Information Technology, Monash University, Rifat Ara Shams Monash University
00:26
12m
Talk
Pushback in Code Review: Characterizing and Detecting Negative Interpersonal InteractionsTechnical
Technical Papers
Pre-print
00:38
12m
Talk
Engineering Gender-Inclusivity into Software: Ten Teams' Tales from the TrenchesTechnical
Technical Papers
Claudia Hilderbrand Oregon State University, Christopher Perdriau Oregon State University, Lara Letaw Oregon State University, Jillian Emard Oregon State University, Zoe Steine-Hanson Oregon State University, Margaret Burnett Oregon State University, Anita Sarma Oregon State University
00:00 - 01:00
00:12
12m
Talk
On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Kui Liu Huawei Software Engineering Application Technology Lab, Shangwen Wang National University of Defense Technology, Anil Koyuncu University of Luxembourg, Luxembourg, Kisub Kim University of Luxembourg, SnT, Tegawendé F. Bissyandé SnT, University of Luxembourg, Dongsun Kim Furiosa.ai, Peng Wu National University of Defense Technology, Jacques Klein University of Luxembourg, SnT, Xiaoguang Mao National University of Defense Technology, Yves Le Traon University of Luxembourg
Pre-print
01:05 - 02:05
01:35
12m
Talk
Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack OverflowTechnical
Technical Papers
Alex Cummaudo Applied Artificial Intelligence Institute, Deakin University, Rajesh Vasa Deakin University, Scott Barnett Deakin University, John Grundy Monash University, Mohamed Abdelrazek Deakin University
01:05 - 02:05
P11-Natural Language ArtifactsJournal First / Technical Papers at Goguryeo
Chair(s): Jane Cleland-Huang University of Notre Dame
01:21
12m
Talk
Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge DistributionTechnicalArtifact Available
Technical Papers
Ehsan Mirsaeedi Concordia University, Peter Rigby Concordia University, Montreal, Canada
15:00 - 16:00
A7-Human Aspects 1Technical Papers / Journal First / New Ideas and Emerging Results at Baekje
Chair(s): Alexander Serebrenik Eindhoven University of Technology
15:14
12m
Talk
How Software Practitioners Use Informal Local Meetups to Share Software Engineering KnowledgeTechnical
Technical Papers
Claire Ingram University of York, Anders Drachen University of York
15:26
12m
Talk
Explaining Pair Programming Session Dynamics from Knowledge GapsTechnical
Technical Papers
Franz Zieris Freie Universität Berlin, Lutz Prechelt Freie Universität Berlin
DOI Pre-print Media Attached
15:00 - 16:00
A8-Machine Learning and ModelsJournal First / Technical Papers at Goguryeo
Chair(s): Liliana Pasquale University College Dublin & Lero
15:24
12m
Talk
Importance-Driven Deep Learning System TestingTechnical
Technical Papers
Simos Gerasimou University of York, UK, Hasan Ferit Eniser MPI-SWS, Alper Sen Bogazici University, Turkey, Alper Çakan Bogazici University, Turkey
15:36
12m
Talk
Quickly Generating Diverse Valid Test Inputs with Reinforcement LearningArtifact ReusableTechnicalArtifact Available
Technical Papers
Sameer Reddy University of California, Berkeley, Caroline Lemieux University of California, Berkeley, Rohan Padhye Carnegie Mellon University, Koushik Sen University of California, Berkeley
15:00 - 16:00
15:00
12m
Talk
A Novel Approach to Tracing Safety Requirements and State-Based Design ModelsTechnical
Technical Papers
Mounifah Alenazi University of Cincinnati, Nan Niu University of Cincinnati, Juha Savolainen Danfoss
15:12
12m
Talk
Establishing Multilevel Test-to-Code Traceability LinksArtifact ReusableTechnicalArtifact Available
Technical Papers
Robert White University College London, UK, Jens Krinke University College London, Raymond Tan University College London
15:45
12m
Talk
Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian NetworksTechnical
Technical Papers
Kevin Moran William & Mary/George Mason University, David Nader Palacio William & Mary, Carlos Bernal-Cárdenas William and Mary, Denys Poshyvanyk William and Mary, Daniel McCrystal William & Mary, Chris Shenefiel Cisco Systems, Jeff Johnson Cisco Systems
Pre-print Media Attached
16:05 - 17:05
A10-Human Aspects 2Journal First / Technical Papers at Baekje
Chair(s): Giuseppe Scanniello University of Basilicata
16:37
12m
Talk
Primers or Reminders? The Effects of Existing Review Comments on Code ReviewACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Davide Spadini Delft University of Technology, Netherlands, Gül Calikli Chalmers | University of Gothenburg, Alberto Bacchelli University of Zurich
DOI Pre-print Media Attached
16:05 - 17:05
A11-Performance and AnalysisNew Ideas and Emerging Results / Journal First / Technical Papers / Demonstrations at Goguryeo
Chair(s): Pooyan Jamshidi University of South Carolina
16:24
12m
Talk
Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are We There Yet?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Zishuo Ding University of Waterloo, Canada, Jinfu Chen Concordia University, Canada, Weiyi Shang Concordia University
Pre-print
16:05 - 17:05
A12-TestingJournal First / New Ideas and Emerging Results / Demonstrations / Technical Papers at Silla
Chair(s): Sasa Misailovic University of Illinois at Urbana-Champaign
16:05
12m
Talk
Practical Fault Detection in Puppet ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Thodoris Sotiropoulos Athens University of Economics and Business, Dimitris Mitropoulos Athens University of Economics and Business, Diomidis Spinellis Athens University of Economics and Business
16:34
12m
Talk
Learning from, Understanding, and Supporting DevOps Artifacts for DockerArtifact ReusableTechnicalArtifact Available
Technical Papers
Jordan Henkel University of Wisconsin–Madison, Christian Bird Microsoft Research, Shuvendu K. Lahiri Microsoft Research, Thomas Reps University of Wisconsin-Madison, USA

Thu 9 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

00:00 - 01:00
P13-SecurityTechnical Papers / Software Engineering in Practice at Baekje
Chair(s): Joshua Garcia University of California, Irvine
00:00
12m
Talk
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return AddressesTechnicalArtifact Available
Technical Papers
Changwei Zou UNSW Sydney, Jingling Xue UNSW Sydney
00:24
12m
Talk
Unsuccessful Story about Few Shot Malware-Family Classification and Siamese Network to the RescueTechnical
Technical Papers
Yude Bai Tianjin University, Zhenchang Xing Australia National University, Xiaohong Li TianJin University, Zhiyong Feng Tianjin University, Duoyuan Ma Tianjin University
00:36
12m
Talk
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak DetectionTechnical
Technical Papers
Shengjian Guo Baidu X-Lab, Yueqi Chen The Pennsylvania State University, Peng Li Baidu X-Lab, Yueqiang Cheng Baidu Security, Huibo Wang Baidu X-Lab, Meng Wu Ant Financial, Zhiqiang Zuo Nanjing University, China
00:00 - 01:00
P14-TestingTechnical Papers / Software Engineering in Practice at Goguryeo
Chair(s): Shin Yoo Korea Advanced Institute of Science and Technology
00:00
12m
Talk
Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t GuidelinesTechnical
Technical Papers
Dehai Zhao Australian National University, Zhenchang Xing Australia National University, Chunyang Chen Monash University, Xiwei (Sherry) Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China
00:12
12m
Talk
Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksTechnical
Technical Papers
Xiang Gao National University of Singapore, Singapore, Ripon Saha Fujitsu Laboratories of America, Inc., Mukul Prasad Fujitsu Laboratories of America, Abhik Roychoudhury National University of Singapore, Singapore
00:36
12m
Talk
Testing File System Implementations on Layered ModelsTechnicalArtifact Available
Technical Papers
Dongjie Chen Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University
00:48
12m
Talk
A Cost-efficient Approach to Building in Continuous IntegrationTechnical
Technical Papers
Xianhao Jin Virginia Tech, USA, Francisco Servant Virginia Tech
Pre-print
01:05 - 02:05
P16-Security and LearningTechnical Papers / Journal First at Baekje
Chair(s): Lingming Zhang The University of Texas at Dallas
01:05
12m
Talk
Software Visualization and Deep Transfer Learning for Effective Software Defect PredictionTechnical
Technical Papers
Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Keke Hu College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Zhuangzhi Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Qi Xuan Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou 310023, China, Yi Liu Institute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Vladimir Filkov University of California at Davis, USA
01:25
12m
Talk
How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?TechnicalArtifact Available
Technical Papers
Xueling Zhang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio, USA, Rocky Slavin University of Texas at San Antonio, Travis Breaux Carnegie Mellon University, Jianwei Niu University of Texas at San Antonio
01:37
12m
Talk
Securing UnSafe Rust Programs with XRustArtifact ReusableTechnical
Technical Papers
Peiming Liu Texas A&M University, Gang Zhao Texas A&m University, Jeff Huang Texas A&M University
01:49
12m
Talk
Is Rust Used Safely by Software Developers?Technical
Technical Papers
Ana Nora Evans University of Virginia, USA, Bradford Campbell University of Virginia, Mary Lou Soffa University of Virginia
01:05 - 02:05
P17-Software DevelopmentJournal First / Technical Papers / Demonstrations at Goguryeo
Chair(s): Minghui Zhou Peking University
01:21
12m
Talk
Gap between Theory and Practice : An Empirical Study of Security Patches in SolidityArtifact ReusableTechnicalArtifact Available
Technical Papers
01:33
12m
Talk
A Tale from the Trenches: Cognitive Biases and Software DevelopmentACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Souti Chattopadhyay Graduate Student, Nicholas Nelson Oregon State University, Audrey Au Oregon State University, Natalia Morales Oregon State University, Christopher Sanchez Oregon State University, Rahul Pandita Phase Change Software, Anita Sarma Oregon State University
01:05 - 02:05
P18-Open Source SystemsJournal First / Technical Papers at Silla
Chair(s): John Grundy Monash University
01:21
12m
Talk
How do Companies Collaborate in Open Source Ecosystems? An Empirical Study of OpenStackTechnical
Technical Papers
Yuxia Zhang Peking University, Minghui Zhou Peking University, Klaas-Jan Stol University College Cork and Lero, Ireland, Jianyu Wu Peking University, Zhi Jin Peking University
Pre-print
01:33
12m
Talk
How to Not Get Rich: An Empirical Study of Donations in Open SourceArtifact ReusableTechnical
Technical Papers
Cassandra Overney Olin College of Engineering, Jens Meinicke Carnegie Mellon University, Christian Kästner Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
Pre-print
01:45
12m
Talk
Scaling Open Source Communities: an Empirical Study of the Linux kernelTechnical
Technical Papers
Xin Tan Peking University, Minghui Zhou Peking University, Brian Fitzgerald Lero - The Irish Software Research Centre and University of Limerick
Pre-print
07:00 - 08:00
I13-Testing and Debugging 1Demonstrations / Technical Papers / Software Engineering in Practice / Journal First at Baekje
Chair(s): Shin Hwei Tan Southern University of Science and Technology
07:00
12m
Talk
Learning-to-Rank vs Ranking-to-Learn: Strategies for Regression Testing in Continuous IntegrationTechnical
Technical Papers
Antonia Bertolino CNR-ISTI, Antonio Guerriero Università di Napoli Federico II, Breno Miranda Federal University of Pernambuco, Roberto Pietrantuono Università di Napoli Federico II, Stefano Russo Università di Napoli Federico II
07:12
12m
Talk
Debugging InputsArtifact ReusableTechnicalArtifact Available
Technical Papers
Lukas Kirschner Saarland University, Ezekiel Soremekun CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security
Link to publication DOI Pre-print
07:00 - 08:00
07:00
12m
Talk
Impact Analysis of Cross-Project Bugs on Software EcosystemsTechnical
Technical Papers
Wanwangying Ma Nanjing University, Lin Chen Nanjing University, Xiangyu Zhang Purdue University, Yang Feng Nanjing University, Zhaogui Xu Nanjing University, China, Zhifei Chen Huawei, Yuming Zhou Nanjing University, Baowen Xu Nanjing University
08:05 - 09:05
I16-Testing and Debugging 2Technical Papers / Journal First at Baekje
Chair(s): Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID
08:05
12m
Talk
Low-Overhead Deadlock PredictionTechnical
Technical Papers
Yan Cai Institute of Software, Chinese Academy of Sciences, Ruijie Meng University of Chinese Academy of Sciences, Jens Palsberg University of California, Los Angeles
08:49
12m
Talk
Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical StudyTechnicalArtifact Available
Technical Papers
Ke Li University of Exeter, Zilin Xiang University of Electronic Science and Technology of China, Tao Chen Loughborough University, Shuo Wang , Kay Chen Tan City University of Hong Kong
Pre-print
08:05 - 09:05
I17-Contracts and AnalysisDemonstrations / Technical Papers / Software Engineering in Practice / Journal First at Goguryeo
Chair(s): Jaechang Nam Handong Global University
08:45
10m
Talk
Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart ContractsArtifact ReusableTechnicalArtifact Available
Technical Papers
Thomas Durieux KTH Royal Institute of Technology, Sweden, João F. Ferreira INESC-ID and IST, University of Lisbon, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, Pedro Cruz IST, University of Lisbon, Portugal
Pre-print
08:05 - 09:05
I18-APIs and CommitsNew Ideas and Emerging Results / Journal First / Technical Papers at Silla
Chair(s): Massimiliano Di Penta University of Sannio
08:19
12m
Talk
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale StudyTechnical
Technical Papers
Hao Xia Fudan University, Yuan Zhang Fudan University, Yingtian Zhou Fudan University, Xiaoting Chen Fudan University, Yang Wang Fudan University, Xiangyu Zhang Purdue University, Shuaishuai Cui Fudan University, Geng Hong Fudan University, Xiaohan Zhang Fudan University, Min Yang Fudan University, Zhemin Yang Fudan University
08:31
12m
Talk
An Empirical Study on API Parameter RulesTechnical
Technical Papers
Hao Zhong Shanghai Jiao Tong University, Na Meng Virginia Tech, Zexuan Li Shanghai Jiao Tong University, Li Jia Shanghai Jiao Tong University
08:49
12m
Talk
Software Documentation: The Practitioners' PerspectiveTechnical
Technical Papers
Emad Aghajani Software Institute, USI - Lugano, Switzerland, Csaba Nagy Software Institute - USI, Lugano, Switzerland, Mario Linares-Vásquez Universidad de los Andes, Laura Moreno Colorado State University, Gabriele Bavota Università della Svizzera italiana, Michele Lanza Universita della Svizzera italiana (USI), David C. Shepherd Virginia Commonwealth University
Pre-print Media Attached

Fri 10 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

07:00 - 08:00
I19-Code Generation and VerificationTechnical Papers / Software Engineering in Practice / New Ideas and Emerging Results at Baekje
Chair(s): Raffi Khatchadourian City University of New York (CUNY) Hunter College
07:06
12m
Talk
Automatically Testing String SolversArtifact ReusableTechnicalArtifact Available
Technical Papers
Alexandra Bugariu ETH Zurich, Peter Müller ETH Zurich
Pre-print
07:24
12m
Talk
Co-Evolving Code with Evolving MetamodelsTechnical
Technical Papers
Djamel Eddine Khelladi CNRS, France, Benoit Combemale University of Toulouse and Inria, Mathieu Acher (Univ Rennes, Inria, IRISA), Olivier Barais (Univ Rennes, Inria, IRISA), Jean-Marc Jézéquel Univ Rennes - IRISA
07:00 - 08:00
I20-Android TestingTechnical Papers at Goguryeo
Chair(s): Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
07:00
12m
Talk
Multiple-Entry Testing of Android Applications by Constructing Activity Launching ContextsTechnicalArtifact Available
Technical Papers
Jiwei Yan Institute of Software, Chinese Academy of Sciences, Hao Liu Beijing University of Technology, Linjie Pan Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software, Chinese Academy of Sciences, Bin Liang Renmin University of China, China
07:12
12m
Talk
Time-travel Testing of Android AppsACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Zhen Dong National University of Singapore, Marcel Böhme Monash University, Lucia Cojocaru Politehnica University of Bucharest, Abhik Roychoudhury National University of Singapore, Singapore
07:24
12m
Talk
Collaborative Bug Finding for Android AppsTechnical
Technical Papers
Shin Hwei Tan Southern University of Science and Technology, Ziqiang Li Southern University of Science and Technology
Media Attached File Attached
07:36
12m
Talk
An Empirical Assessment of Security Risks of Global Android Banking AppsTechnical
Technical Papers
Sen Chen Nanyang Technological University, Singapore, Lingling Fan Nanyang Technological University, Singapore, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Ting Su ETH Zurich, Switzerland, Jason Minhui Xue The University of Adelaide, Yinxing Xue , Yang Liu Nanyang Technological University, Singapore, Lihua Xu New York University Shanghai
Pre-print
07:48
12m
Talk
RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen ApplicationsTechnical
Technical Papers
Ju Qian Nanjing University of Aeronautics and Astronautics, Zhengyu Shang Nanjing University of Aeronautics and Astronautics, Shuoyan Yan Nanjing University of Aeronautics and Astronautics, Yan Wang , Lin Chen Nanjing University
07:00 - 08:00
I21-Version Control and ProgrammingTechnical Papers / Journal First / Software Engineering in Practice at Silla
Chair(s): Sunghun Kim Hong Kong University of Science and Technology
07:44
12m
Talk
HeteroRefactor: Refactoring for Heterogeneous Computing with FPGATechnicalArtifact Available
Technical Papers
Aishwarya Sivaraman University of California, Los Angeles, Jason Lau University of California, Los Angeles, Qian Zhang University of California, Los Angeles, Muhammad Ali Gulzar University of California, Los Angeles, Jason Cong UCLA, Miryung Kim University of California, Los Angeles
DOI
08:05 - 09:05
I22-TestingTechnical Papers / Demonstrations at Baekje
Chair(s): Phil McMinn University of Sheffield
08:08
12m
Talk
MemLock: Memory Usage Guided FuzzingArtifact ReusableTechnicalArtifact Available
Technical Papers
Cheng Wen Xidian University, Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Yuekang Li Nanyang Technological University, Shengchao Qin University of Teesside, Yang Liu Nanyang Technological University, Singapore, Zhiwu Xu Shenzhen University, Hongxu Chen Research Associate, Xiaofei Xie Nanyang Technological University, Geguang Pu East China Normal University, Ting Liu Xi'an Jiaotong University
DOI Pre-print Media Attached
08:20
12m
Talk
Symbolic Verification of Message Passing Interface ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Hengbiao Yu National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China, Zhendong Su ETH Zurich, Switzerland, Jun Sun Singapore Management University, Chun Huang National University of Defense Technology, Wei Dong School of Computer, National University of Defense Technology, China
Pre-print
08:32
12m
Talk
SAVER: Scalable, Precise, and Safe Memory-Error RepairArtifact ReusableTechnicalArtifact Available
Technical Papers
Seongjoon Hong Korea University, Junhee Lee Korea University, South Korea, Jeongsoo Lee Korea University, Hakjoo Oh Korea University, South Korea
08:44
12m
Talk
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons LearnedTechnical
Technical Papers
Bingchang Liu Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Chao Zhang Institute for Network Sciences and Cyberspace of Tsinghua University, Feng Li Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Qi Gong Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Min Lin Institute for Network Sciences and Cyberspace of Tsinghua University, Dandan Sun Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Wei Huo Institute of Information Engineering, Chinese Academy of Sciences, Wei Zou Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China
08:05 - 09:05
I23-Code Artifact AnalysisJournal First / Technical Papers at Goguryeo
Chair(s): Benoit Baudry KTH Royal Institute of Technology
08:05
12m
Talk
Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical
Technical Papers
Qingkai Shi The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Gang Fan Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology
08:17
12m
Talk
Pipelining Bottom-up Data Flow AnalysisTechnical
Technical Papers
Qingkai Shi The Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology
15:00 - 16:00
15:00
12m
Talk
Recognizing Developers' Emotions while ProgrammingTechnicalArtifact Available
Technical Papers
Daniela Girardi University of Bari, Nicole Novielli University of Bari, Davide Fucci Blekinge Institute of Technology, Filippo Lanubile University of Bari
DOI Pre-print
15:12
12m
Talk
Neurological Divide: An fMRI Study of Prose and Code WritingArtifact ReusableTechnicalArtifact Available
Technical Papers
Ryan Krueger University of Michigan, Yu Huang University of Michigan, Xinyu Liu University of Michigan, Tyler Santander University of California at Santa Barbara, Westley Weimer University of Michigan, USA, Kevin Leach University of Michigan
Pre-print
15:36
12m
Talk
Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Nischal Shrestha North Carolina State University, Colton Botta North Carolina State University, Titus Barik Microsoft, Chris Parnin North Carolina State University
Pre-print
15:00 - 16:00
A21-Testing and Debugging 3Journal First / Technical Papers at Silla
Chair(s): Tingting Yu University of Kentucky
15:00
12m
Talk
Schrödinger's Security: Opening the Box on App Developers' Security RationaleTechnical
Technical Papers
Dirk van der Linden University of Bristol, Pauline Anthonysamy Google Inc., Bashar Nuseibeh The Open University (UK) & Lero (Ireland), Thein Tun , Marian Petre The Open University, Mark Levine Lancaster University, John Towse Lancaster University, Awais Rashid University of Bristol, UK
15:36
12m
Talk
An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect PredictionTechnical
Technical Papers
Sadia Tabassum University of Birmingham, UK, Leandro Minku University of Birmingham, UK, Danyi Feng XiLiu Tech, George Cabral Universidade Federal Rural de Pernambuco, Liyan Song University of Birmingham
16:05 - 17:05
A23-RequirementsJournal First / Technical Papers / New Ideas and Emerging Results at Goguryeo
Chair(s): Dalal Alrajeh Imperial College London
16:05
12m
Talk
Caspar: Extracting and Synthesizing User Stories of Problems from App ReviewsTechnical
Technical Papers
Hui Guo North Carolina State University, Munindar P. Singh North Carolina State University
16:05 - 17:05
A24-Testing and Debugging 4Technical Papers / New Ideas and Emerging Results / Journal First / Demonstrations at Silla
Chair(s): Yijun Yu The Open University, UK
16:11
12m
Talk
On Learning Meaningful Assert Statements for Unit Test CasesTechnical
Technical Papers
Cody Watson Washington and Lee University, Michele Tufano Microsoft, Kevin Moran William & Mary/George Mason University, Gabriele Bavota Università della Svizzera italiana, Denys Poshyvanyk William and Mary
Pre-print Media Attached
16:23
12m
Talk
TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural NetworksArtifact ReusableTechnicalArtifact Available
Technical Papers
Guanhong Tao Purdue University, Shiqing Ma Rutgers University, Yingqi Liu Purdue University, USA, Qiuling Xu Purdue University, Xiangyu Zhang Purdue University
Pre-print

Sat 11 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

00:00 - 01:00
P25-FuzzingTechnical Papers at Baekje
Chair(s): Marcel Böhme Monash University
00:00
12m
Talk
Typestate-Guided Fuzzer for Discovering Use-after-Free VulnerabilitiesTechnical
Technical Papers
Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Xiaofei Xie Nanyang Technological University, Yi Li Nanyang Technological University, Cheng Wen Xidian University, Yuekang Li Nanyang Technological University, Yang Liu Nanyang Technological University, Singapore, Shengchao Qin University of Teesside, Hongxu Chen Research Associate, Yulei Sui University of Technology Sydney, Australia
Link to publication DOI Pre-print
00:12
12m
Talk
sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart ContractsTechnical
Technical Papers
Tai D. Nguyen Singapore Management University, Long H. Pham Singapore University of Technology and Design, Jun Sun Singapore Management University, Yun Lin National University of Singapore, Minh Quang Tran Ho Chi Minh City University of Technology
00:24
12m
Talk
Planning for Untangling: Predicting the Difficulty of Merge ConflictsTechnical
Technical Papers
Caius Brindescu Oregon State University, Iftekhar Ahmed University of California at Irvine, USA, Rafael Leano Oregon State University, Anita Sarma Oregon State University
00:36
12m
Talk
Gang of Eight: A Defect Taxonomy for Infrastructure as Code ScriptsTechnicalArtifact Available
Technical Papers
Akond Rahman Tennessee Tech University, Effat Farhana North Carolina State University, Chris Parnin North Carolina State University, Laurie Williams North Carolina State University
Pre-print
00:48
12m
Talk
JVM Fuzzing for JIT-Induced Side-Channel DetectionTechnical
Technical Papers
Tegan Brennan University of California, Santa Barbara, Seemanta Saha University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara
00:00 - 01:00
P26-Deep Learning Testing and DebuggingTechnical Papers at Goguryeo
Chair(s): Tim Menzies North Carolina State University
00:00
12m
Talk
ReluDiff: Differential Verification of Deep Neural NetworksArtifact ReusableTechnical
Technical Papers
Brandon Paulsen University of Southern California, Jingbo Wang University of Southern California, Chao Wang USC
Pre-print
00:12
12m
Talk
Structure-Invariant Testing for Machine TranslationTechnical
Technical Papers
Pinjia He ETH Zurich, Clara Meister ETH Zurich, Zhendong Su ETH Zurich, Switzerland
00:24
12m
Talk
Automatic Testing and Improvement of Machine TranslationTechnical
Technical Papers
Zeyu Sun Peking University, Jie M. Zhang University College London, UK, Mark Harman Facebook and University College London, Mike Papadakis University of Luxembourg, Lu Zhang Peking University, China
00:36
12m
Talk
Testing DNN Image Classifier for Confusion & Bias ErrorsArtifact ReusableTechnicalArtifact Available
Technical Papers
Yuchi Tian Columbia University, Ziyuan Zhong Columbia University, Vicente Ordonez University of Virginia, Gail Kaiser Columbia University, Baishakhi Ray Columbia University, New York
00:48
12m
Talk
Repairing Deep Neural Networks: Fix Patterns and ChallengesArtifact ReusableTechnicalArtifact Available
Technical Papers
Md Johirul Islam Iowa State University, Rangeet Pan Iowa State University, USA, Giang Nguyen Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University, USA
00:00 - 01:00
00:00
12m
Talk
Big Code != Big Vocabulary: Open-Vocabulary Models for Source codeACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Rafael-Michael Karampatsis The University of Edinburgh, Hlib Babii Free University of Bozen-Bolzano, Romain Robbes Free University of Bozen-Bolzano, Charles Sutton Google Research, Andrea Janes Free University of Bozen-Bolzano
DOI Pre-print
00:24
12m
Talk
Managing data constraints in database-backed web applicationsArtifact ReusableTechnicalArtifact Available
Technical Papers
Junwen Yang University of Chicago, Utsav Sethi University of Chicago, Cong Yan University of Washington, Alvin Cheung University of California, Berkeley, Shan Lu University of Chicago
00:36
12m
Talk
Improving Data Scientist Efficiency with ProvenanceArtifact ReusableTechnicalArtifact Available
Technical Papers
Jingmei Hu Harvard University, Jiwon Joung Harvard University, Maia Jacobs Harvard University, Margo Seltzer University of British Columbia, Krzysztof Gajos Harvard University
01:05 - 02:05
P28-Analysis and VerificationSoftware Engineering in Practice / Technical Papers / Demonstrations at Baekje
Chair(s): Rahul Purandare IIIT-Delhi
01:05
12m
Talk
Tailoring Programs for Static Analysis via Program TransformationTechnicalArtifact Available
Technical Papers
Rijnard van Tonder Sourcegraph, Claire Le Goues Carnegie Mellon University
01:20
12m
Talk
BCFA: Bespoke Control Flow Analysis for CFA at ScaleTechnical
Technical Papers
Ramanathan Ramu Iowa State University, Ganesha Upadhyaya Harmony.one, Hoan Anh Nguyen Amazon, Hridesh Rajan Iowa State University, USA
01:32
12m
Talk
On the Recall of Static Call Graph Construction in PracticeArtifact ReusableTechnicalArtifact Available
Technical Papers
Li Sui Massey University, New Zealand, Jens Dietrich Victoria University of Wellington, Amjed Tahir Massey University, George Fourtounis University of Athens
Pre-print
01:05 - 02:05
P29-Android and Web TestingDemonstrations / Technical Papers / Software Engineering in Practice at Goguryeo
Chair(s): Hironori Washizaki Waseda University
01:05
12m
Talk
SLACC: Simion-based Language Agnostic Code ClonesArtifact ReusableTechnical
Technical Papers
George Mathew North Carolina State University, Chris Parnin North Carolina State University, Kathryn Stolee North Carolina State University
Pre-print
01:17
8m
Talk
Near-Duplicate Detection in Web App Model InferenceTechnicalArtifact Available
Technical Papers
Rahulkrishna Yandrapally University of British Columbia, Canada, Andrea Stocco Università della Svizzera italiana, Ali Mesbah University of British Columbia
Pre-print
01:37
12m
Talk
Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep LearningACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Jieshan Chen Australian National University, Chunyang Chen Monash University, Zhenchang Xing Australia National University, Xiwei (Sherry) Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China
01:05 - 02:05
P30-Ecosystems 2Technical Papers / Journal First at Silla
Chair(s): Chang Xu Nanjing University
01:13
12m
Talk
Taming Behavioral Backward Incompatibilities via Cross-Project Testing and AnalysisTechnical
Technical Papers
Lingchao Chen The University of Texas at Dallas, Foyzul Hassan University of Texas at San Antonio, USA, Xiaoyin Wang University of Texas at San Antonio, USA, Lingming Zhang The University of Texas at Dallas
01:25
12m
Talk
Watchman: Monitoring Dependency Conflicts for Python Library EcosystemArtifact ReusableTechnicalArtifact Available
Technical Papers
Ying Wang Northeastern University, China, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Yibo Wang Northeastern University, Zhenming Li Northeastern University, Chao Wang University of Southern California, Hai Yu Northeastern University, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Chang Xu Nanjing University, Zhiliang Zhu Northeastern University, China
01:37
12m
Talk
How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHubTechnical
Technical Papers
Shurui Zhou Carnegie Mellon University, USA / University of Toronto, CA, Bogdan Vasilescu Carnegie Mellon University, Christian Kästner Carnegie Mellon University
Pre-print
15:00 - 16:00
A25-Android TestingTechnical Papers / Journal First at Baekje
Chair(s): Ting Su
15:08
12m
Talk
ComboDroid: Generating High-Quality Test Inputs for Android Apps via Use Case CombinationsTechnicalArtifact Available
Technical Papers
Jue Wang Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Chun Cao Nanjing University, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University
15:20
12m
Talk
Translating Video Recordings of Mobile App Usages into Replayable ScenariosACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Carlos Bernal-Cárdenas William and Mary, Nathan Cooper College of William & Mary, Kevin Moran William & Mary/George Mason University, Oscar Chaparro College of William & Mary, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk William and Mary
Pre-print Media Attached
15:00 - 16:00
A26-Bugs and RepairJournal First / Technical Papers at Goguryeo
Chair(s): Davide Falessi California Polytechnic State University
15:00
12m
Talk
Simulee: Detecting CUDA Synchronization Bugs via Memory-Access ModelingTechnical
Technical Papers
Mingyuan Wu Southern University of Science and Technology, Yicheng Ouyang Southern University of Science and Technology, Husheng Zhou The University of Texas at Dallas, Lingming Zhang The University of Texas at Dallas, Cong Liu UT Dallas, Yuqun Zhang Southern University of Science and Technology
15:44
12m
Talk
DLFix: Context-based Code Transformation Learning for Automated Program RepairTechnical
Technical Papers
Yi Li New Jersey Institute of Technology, USA, Shaohua Wang New Jersey Institute of Technology, USA, Tien N. Nguyen University of Texas at Dallas
16:05 - 17:05
A28-Android and Web TestingTechnical Papers / Demonstrations at Baekje
Chair(s): Reyhaneh Jabbarvand University of Illinois Urbana-Champaign
16:08
12m
Talk
Revealing Injection Vulnerabilities by Leveraging Existing TestsArtifact ReusableTechnicalArtifact Available
Technical Papers
Katherine Hough George Mason University, Gebrehiwet Biyane Welearegai University of Potsdam, Germany, Christian Hammer University of Potsdam, A: Jonathan Bell Northeastern University
16:20
12m
Talk
Accessibility Issues in Android Apps: State of Affairs, Sentiments, and Ways ForwardTechnical
Technical Papers
Abdulaziz Alshayban University of California, Irvine, Iftekhar Ahmed University of California at Irvine, USA, Sam Malek University of California, Irvine
16:35
12m
Talk
Extracting Taint Specifications for JavaScript LibrariesTechnical
Technical Papers
Cristian-Alexandru Staicu TU Darmstadt, Martin Toldam Torp Aarhus University, Max Schaefer GitHub, Inc., Anders Møller Aarhus University, Michael Pradel University of Stuttgart
Pre-print Media Attached
16:47
12m
Talk
Finding Client-side Business Flow Tampering VulnerabilitiesTechnical
Technical Papers
I Luk Kim Purdue University, Yunhui Zheng IBM Research, Hogun Park Purdue University, Weihang Wang University at Buffalo, SUNY, Wei You Renmin University of China, Yousra Aafer Purdue University, Xiangyu Zhang Purdue University
16:05 - 17:05
A29-Code Analysis and VerificationTechnical Papers / New Ideas and Emerging Results at Goguryeo
Chair(s): Elena Sherman Boise State University
16:05
12m
Talk
Heaps'n Leaks: How Heap Snapshots Improve Android Taint AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Manuel Benz University of Paderborn, Erik Krogh Kristensen GitHub, Linghui Luo Paderborn University, Germany, Nataniel Borges Jr. CISPA Helmholtz Center for Information Security, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Andreas Zeller CISPA Helmholtz Center for Information Security
Media Attached File Attached
16:17
12m
Talk
Verifying Object ConstructionTechnicalArtifact Available
Technical Papers
Martin Kellogg University of Washington, Seattle, Manli Ran University of California, Riverside, Manu Sridharan University of California Riverside, Martin Schäf Amazon Web Services, USA, Michael D. Ernst University of Washington, USA
16:35
12m
Talk
When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical
Technical Papers
Maxime Lamothe Concordia University, Weiyi Shang Concordia University
Pre-print
16:47
12m
Talk
Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical
Technical Papers
Xiaoxue Ren Zhejiang University, Zhenchang Xing Australia National University, Jiamou Sun Australian National University, Xin Xia Monash University, JianLing Sun Zhejiang University
16:05 - 17:05
A30-Dependencies and ConfigurationTechnical Papers / Software Engineering in Practice at Silla
Chair(s): Diomidis Spinellis Athens University of Economics and Business
16:05
12m
Talk
Lazy Product Discovery in Huge Configuration SpacesArtifact ReusableTechnicalArtifact Available
Technical Papers
Michael Lienhardt ONERA, Ferruccio Damiani University of Turin, Einar Broch Johnsen University of Oslo, Jacopo Mauro University of Southern Denmark
16:17
12m
Talk
Reducing Run-Time Adaptation Space via Analysis of Possible Utility BoundsTechnical
Technical Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln, USA
Pre-print

Accepted Papers

Title
Accessibility Issues in Android Apps: State of Affairs, Sentiments, and Ways ForwardTechnical
Technical Papers
A Comprehensive Study of Autonomous Vehicle BugsTechnical
Technical Papers
A Cost-efficient Approach to Building in Continuous IntegrationTechnical
Technical Papers
Pre-print
Adapting Requirements Models to Varying EnvironmentsTechnical
Technical Papers
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons LearnedTechnical
Technical Papers
An Empirical Assessment of Security Risks of Global Android Banking AppsTechnical
Technical Papers
Pre-print
An Empirical Study on API Parameter RulesTechnical
Technical Papers
An Empirical Study on Program Failures of Deep Learning JobsACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
DOI Pre-print
An Evidence-Based Inquiry into the Use of Grey Literature in Software EngineeringTechnical
Technical Papers
An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect PredictionTechnical
Technical Papers
Ankou: Guiding Grey-box Fuzzing towards Combinatorial DifferenceArtifact ReusableTechnicalArtifact Available
Technical Papers
A Novel Approach to Tracing Safety Requirements and State-Based Design ModelsTechnical
Technical Papers
Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System IdentificationArtifact ReusableTechnicalArtifact Available
Technical Papers
A Study on the Lifecycle of Flaky TestsTechnical
Technical Papers
A Study on the Prevalence of Human Values in Software Engineering Publications, 2015 – 2018TechnicalArtifact Available
Technical Papers
A Tale from the Trenches: Cognitive Biases and Software DevelopmentACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Automatically Testing String SolversArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Automatic Testing and Improvement of Machine TranslationTechnical
Technical Papers
BCFA: Bespoke Control Flow Analysis for CFA at ScaleTechnical
Technical Papers
Big Code != Big Vocabulary: Open-Vocabulary Models for Source codeACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
DOI Pre-print
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return AddressesTechnicalArtifact Available
Technical Papers
Caspar: Extracting and Synthesizing User Stories of Problems from App ReviewsTechnical
Technical Papers
Causal Testing: Understanding Defects' Root CausesACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Link to publication DOI Pre-print Media Attached
CC2Vec: Distributed Representations of Code ChangesTechnical
Technical Papers
Pre-print
Co-Evolving Code with Evolving MetamodelsTechnical
Technical Papers
Collaborative Bug Finding for Android AppsTechnical
Technical Papers
Media Attached File Attached
ComboDroid: Generating High-Quality Test Inputs for Android Apps via Use Case CombinationsTechnicalArtifact Available
Technical Papers
Comparing Formal Tools for System Design: a Judgment StudyTechnical
Technical Papers
DOI Pre-print
Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical
Technical Papers
Context-aware In-process Crowdworker RecommendationACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
CPC: Automatically Classifying and Propagating Natural Language Comments via Program AnalysisTechnicalArtifact Available
Technical Papers
Debugging InputsArtifact ReusableTechnicalArtifact Available
Technical Papers
Link to publication DOI Pre-print
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving SystemsTechnical
Technical Papers
Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical
Technical Papers
Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese NetworkTechnicalArtifact Available
Technical Papers
DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer DissectionTechnical
Technical Papers
DLFix: Context-based Code Transformation Learning for Automated Program RepairTechnical
Technical Papers
Efficient Generation of Error-Inducing Floating-Point Inputs via Symbolic ExecutionArtifact ReusableTechnicalArtifact Available
Technical Papers
Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart ContractsArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Engineering Gender-Inclusivity into Software: Ten Teams' Tales from the TrenchesTechnical
Technical Papers
Establishing Multilevel Test-to-Code Traceability LinksArtifact ReusableTechnicalArtifact Available
Technical Papers
Explaining Pair Programming Session Dynamics from Knowledge GapsTechnical
Technical Papers
DOI Pre-print Media Attached
Extracting Taint Specifications for JavaScript LibrariesTechnical
Technical Papers
Pre-print Media Attached
Finding Client-side Business Flow Tampering VulnerabilitiesTechnical
Technical Papers
Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksTechnical
Technical Papers
Gang of Eight: A Defect Taxonomy for Infrastructure as Code ScriptsTechnicalArtifact Available
Technical Papers
Pre-print
Gap between Theory and Practice : An Empirical Study of Security Patches in SolidityArtifact ReusableTechnicalArtifact Available
Technical Papers
HARP: Holistic Analysis for Refactoring Python-Based Analytics ProgramsTechnical
Technical Papers
Heaps'n Leaks: How Heap Snapshots Improve Android Taint AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Media Attached File Attached
Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Pre-print
HeteroRefactor: Refactoring for Heterogeneous Computing with FPGATechnicalArtifact Available
Technical Papers
DOI
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale StudyTechnical
Technical Papers
How do Companies Collaborate in Open Source Ecosystems? An Empirical Study of OpenStackTechnical
Technical Papers
Pre-print
How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?TechnicalArtifact Available
Technical Papers
How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHubTechnical
Technical Papers
Pre-print
How Software Practitioners Use Informal Local Meetups to Share Software Engineering KnowledgeTechnical
Technical Papers
How to Not Get Rich: An Empirical Study of Donations in Open SourceArtifact ReusableTechnical
Technical Papers
Pre-print
HyDiff: Hybrid Differential Software AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Impact Analysis of Cross-Project Bugs on Software EcosystemsTechnical
Technical Papers
Importance-Driven Deep Learning System TestingTechnical
Technical Papers
Improving Data Scientist Efficiency with ProvenanceArtifact ReusableTechnicalArtifact Available
Technical Papers
Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian NetworksTechnical
Technical Papers
Pre-print Media Attached
Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack OverflowTechnical
Technical Papers
Is Rust Used Safely by Software Developers?Technical
Technical Papers
JVM Fuzzing for JIT-Induced Side-Channel DetectionTechnical
Technical Papers
Lazy Product Discovery in Huge Configuration SpacesArtifact ReusableTechnicalArtifact Available
Technical Papers
Learning from, Understanding, and Supporting DevOps Artifacts for DockerArtifact ReusableTechnicalArtifact Available
Technical Papers
Learning-to-Rank vs Ranking-to-Learn: Strategies for Regression Testing in Continuous IntegrationTechnical
Technical Papers
Low-Overhead Deadlock PredictionTechnical
Technical Papers
Managing data constraints in database-backed web applicationsArtifact ReusableTechnicalArtifact Available
Technical Papers
MemLock: Memory Usage Guided FuzzingArtifact ReusableTechnicalArtifact Available
Technical Papers
DOI Pre-print Media Attached
Misbehaviour Prediction for Autonomous Driving SystemsTechnical
Technical Papers
Pre-print
Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge DistributionTechnicalArtifact Available
Technical Papers
Multiple-Entry Testing of Android Applications by Constructing Activity Launching ContextsTechnicalArtifact Available
Technical Papers
Near-Duplicate Detection in Web App Model InferenceTechnicalArtifact Available
Technical Papers
Pre-print
Neurological Divide: An fMRI Study of Prose and Code WritingArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning TypesTechnical
Technical Papers
On Learning Meaningful Assert Statements for Unit Test CasesTechnical
Technical Papers
Pre-print Media Attached
On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
On the Recall of Static Call Graph Construction in PracticeArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Pipelining Bottom-up Data Flow AnalysisTechnical
Technical Papers
Planning for Untangling: Predicting the Difficulty of Merge ConflictsTechnical
Technical Papers
Posit: Simultaneously Tagging Natural and Programming LanguagesTechnicalArtifact Available
Technical Papers
Pre-print Media Attached File Attached
Practical Fault Detection in Puppet ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Primers or Reminders? The Effects of Existing Review Comments on Code ReviewACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
DOI Pre-print Media Attached
Pushback in Code Review: Characterizing and Detecting Negative Interpersonal InteractionsTechnical
Technical Papers
Pre-print
Quickly Generating Diverse Valid Test Inputs with Reinforcement LearningArtifact ReusableTechnicalArtifact Available
Technical Papers
Recognizing Developers' Emotions while ProgrammingTechnicalArtifact Available
Technical Papers
DOI Pre-print
Reducing Run-Time Adaptation Space via Analysis of Possible Utility BoundsTechnical
Technical Papers
Pre-print
ReluDiff: Differential Verification of Deep Neural NetworksArtifact ReusableTechnical
Technical Papers
Pre-print
Repairing Deep Neural Networks: Fix Patterns and ChallengesArtifact ReusableTechnicalArtifact Available
Technical Papers
Retrieval-based Neural Source Code SummarizationTechnical
Technical Papers
Pre-print
Revealing Injection Vulnerabilities by Leveraging Existing TestsArtifact ReusableTechnicalArtifact Available
Technical Papers
RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen ApplicationsTechnical
Technical Papers
SAVER: Scalable, Precise, and Safe Memory-Error RepairArtifact ReusableTechnicalArtifact Available
Technical Papers
Scaling Open Source Communities: an Empirical Study of the Linux kernelTechnical
Technical Papers
Pre-print
Schrödinger's Security: Opening the Box on App Developers' Security RationaleTechnical
Technical Papers
Securing UnSafe Rust Programs with XRustArtifact ReusableTechnical
Technical Papers
Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t GuidelinesTechnical
Technical Papers
sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart ContractsTechnical
Technical Papers
Simulee: Detecting CUDA Synchronization Bugs via Memory-Access ModelingTechnical
Technical Papers
SLACC: Simion-based Language Agnostic Code ClonesArtifact ReusableTechnical
Technical Papers
Pre-print
SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in SimulinkArtifact ReusableTechnicalArtifact Available
Technical Papers
Link to publication DOI Media Attached
Software Documentation: The Practitioners' PerspectiveTechnical
Technical Papers
Pre-print Media Attached
Software Visualization and Deep Transfer Learning for Effective Software Defect PredictionTechnical
Technical Papers
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak DetectionTechnical
Technical Papers
Structure-Invariant Testing for Machine TranslationTechnical
Technical Papers
Studying the Use of Java Logging Utilities in the WildTechnical
Technical Papers
Authorizer link Pre-print
Suggesting Natural Method Names to Check Name ConsistenciesTechnical
Technical Papers
Pre-print
Symbolic Verification of Message Passing Interface ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Tailoring Programs for Static Analysis via Program TransformationTechnicalArtifact Available
Technical Papers
Taming Behavioral Backward Incompatibilities via Cross-Project Testing and AnalysisTechnical
Technical Papers
Targeted Greybox Fuzzing with Static Lookahead AnalysisTechnical
Technical Papers
Pre-print
Taxonomy of Real Faults in Deep Learning SystemsACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Testing DNN Image Classifier for Confusion & Bias ErrorsArtifact ReusableTechnicalArtifact Available
Technical Papers
Testing File System Implementations on Layered ModelsTechnicalArtifact Available
Technical Papers
Time-travel Testing of Android AppsACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of UncertaintyTechnical
Technical Papers
Pre-print
Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are We There Yet?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Pre-print
TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural NetworksArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Translating Video Recordings of Mobile App Usages into Replayable ScenariosACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Pre-print Media Attached
Typestate-Guided Fuzzer for Discovering Use-after-Free VulnerabilitiesTechnical
Technical Papers
Link to publication DOI Pre-print
Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep LearningACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical StudyTechnicalArtifact Available
Technical Papers
Pre-print
Unsuccessful Story about Few Shot Malware-Family Classification and Siamese Network to the RescueTechnical
Technical Papers
Verifying Object ConstructionTechnicalArtifact Available
Technical Papers
Watchman: Monitoring Dependency Conflicts for Python Library EcosystemArtifact ReusableTechnicalArtifact Available
Technical Papers
When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical
Technical Papers
Pre-print
White-box Fairness Testing through Adversarial SamplingACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers

Call for Papers

ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering including but not limited to:

            Agile software development                                                   Program analysis
            AI and software engineering                                                   Program comprehension
            Apps and app store analysis                                                  Program repair
            Autonomic and (self-)adaptive systems                                  Program synthesis
            Cloud computing                                                                    Programming languages
            Component-based software engineering                                Recommendation systems
            Configuration management and deployment                          Refactoring
            Crowd sourced software engineering                                      Requirements engineering
            Cyber physical systems                                                          Reverse engineering
            Debugging                                                                              Search-based software engineering
            Dependability, safety, and reliability                                        Security, privacy, and trust
            Distributed and collaborative software engineering                Software architecture
            Embedded software                                                                Software economics and metrics
            Empirical software engineering                                               Software evolution and maintenance
            End-user software engineering                                               Software modeling and design
            Fault localization                                                                     Software process
            Formal methods                                                                      Software product lines
            Green and sustainable technologies                                       Software reuse
            Human and social aspects of software engineering                Software services
            Human-computer interaction                                                   Software testing
            Middleware, frameworks, and APIs                                         Software visualization
            Mining software engineering repositories                                Specification and modeling languages
            Mobile applications                                                                  Tools and environments
            Model-driven engineering                                                        Traceability
            Parallel, distributed, and concurrent systems                          Validation and verification
            Performance

Review Criteria

Each paper submitted to the Technical Track will be evaluated based on the following criteria:

  • Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods

  • Significance: The extent to which the paper’s contributions are important with respect to open software engineering challenges

  • Novelty: The extent to which the contribution is sufficiently original and is clearly explained with respect to the state-of-the-art

  • Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions

  • Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions and explanations, adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below

Reviewers will carefully consider all of these criteria during the review process, and as a result, high-quality papers may vary considerably in their type of contribution. For example, one paper could provide an extensive replication of prior work while another could describe a highly novel approach supported by non-trivial experimentation or empirical analysis.

How to Submit

  • All submissions must conform to the ICSE 2020 formatting and submission instructions and must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. The page limit is strict, and it will not be possible to purchase additional pages at any point in the process (including after the paper is accepted).

  • Formatting instructions are available at https://www.acm.org/publications/proceedings-template for both LaTeX and Word users. LaTeX users must use the provided acmart.cls and ACM-Reference-Format.bst without modification, enable the conference format in the preamble of the document (i.e., \documentclass[sigconf,review]{acmart}), and use the ACM reference format for the bibliography (i.e., \bibliographystyle{ACM-Reference-Format}). The review option adds line numbers, thereby allowing referees to refer to specific lines in their comments.

  • By submitting to the ICSE Research Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism (https://www.acm.org/publications/policies/plagiarism) and the IEEE Plagiarism FAQ (https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html). In particular, papers submitted to ICSE 2020 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2020. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.

  • Lastly, the ICSE 2020 Technical Track will employ a double-blind review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-blind review process. In particular, the authors’ names must be omitted from the submission and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-blind review process can be found in the Q&A page (https://conf.researchr.org/track/icse-2020/icse-2020-papers#Submitting-to-ICSE-Q-A).

Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site (https://icse2020.hotcrp.com) by the submission deadline. We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-blind reviewing.

Any submission that does not comply with these requirements may be desk rejected by the Technical Track PC Chairs without further review.

Conference Attendance Expectation

If a submission is accepted, at least one author of the paper is required to register for and attend the full 3-day technical conference and present the paper in person.

Please note that the Double Blind Review (DBR) process is not used by all tracks. Check in the call for papers whether DBR is used or not.

Q: Why Double Blind?

There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-blind reviewing, see Claire Le Goues’s very well argued, referenced and evidenced blog posting in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller​​ and Alberto Bacchelli​​ (see https://pure.tudelft.nl/portal/files/17721365/1589a385.pdf).

Q: How to prepare your paper for double-blind reviewing?

You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up as an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:

  1. Omit all authors’ names from the title page. Please note that it is not sufficient to simply change the font color to white, as names may appear when highlighted or on some printers; nor is it sufficient to cover the names with a rectangle. Also, please make sure that no identifying information is stored in the properties metadata of your submitted pdf. There are many ways to check this, for example from linux: $ pdfinfo paper.pdf or from Adobe Acrobat select File/Properties tab.

  2. Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper. If for any reason it is completely impossible to reference your prior work in the third person, then you will need to provide a blinded reference and send a copy of the original paper to the chairs. However, in most cases we expect you to reference your own work in the third person.

  3. Do not rely on supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. We allow supplementary material to be uploaded in the submission system, but it is your responsibility to make sure it does not include identifying information. If you choose to upload supplementary material (either through the submission site or as a link), and your material includes identifying information, then your submission could be desk rejected. Furthermore, please keep in mind that reviewers are not obligated to read supplementary material.

Q: I previously published an earlier version of this work in a venue that doesn’t have double-blind. What should I do about acknowledging that previous work?

A: If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.

If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.

Q: Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?

A: It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final post-review, camera ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-blind review process, please refrain from citing the dissertation, to increase anonymity.

You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identifies. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.

Q: What if we want to cite some unpublished work of our own (as motivation for example)

A: If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works.

Q: Can I disseminate non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?

A: You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you are allowed to put your submission on your home page and present your work at small professional meetings. However, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post your work on ArXiV or a similar site just before or after submitting to the conference.

More info will be posted on this page as it becomes available

:
: