Call for Papers
ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. In the technical track, we invite high quality submissions of technical research papers describing original and unpublished results of software engineering research.
Please note the following important changes for 2023:
- As previous ICSE editions, we apply an open science policy. This year, we will ask a reviewer to perform a lightweight check on the shared artifacts (see below).
- There will be a second response period for a subset of the submitted papers. Please check our calendar of important dates.
Also, we will continue the initiative started in 2022, giving emphasis to the significance of the research contributions (see review criteria).
Research of Interest
ICSE welcomes submissions addressing topics across the full spectrum of Software Engineering, being inclusive of quantitative, qualitative, and mixed-methods research.
Topics of interest include:
● API design and evolution
● Apps and app store analysis
● Autonomic systems and self adaptation
● Configuration management
● Crowd-based software engineering
● Debugging and fault localization
● Design for quality, incl. privacy and security by design
● Distributed and collaborative software engineering
● Diversity, inclusion, fairness of software
● Embedded and cyber-physical systems
● Ethics in software engineering
● Evolution and maintenance
● Feedback, user, and requirements management
● Formal methods
● Green and sustainable technologies
● Human aspects of software engineering
● Human-computer interaction
● Legal aspects of software engineering
● Machine learning with and for SE
● Mining software repositories
● Model checking
● Modeling and model-driven engineering
● Parallel and distributed systems
● Performance analysis and testing
● Privacy and security
● Program analysis
● Program comprehension
● Program repair
● Program synthesis
● Programming languages
● Recommender systems
● Refactoring
● Release engineering and DevOps
● Reliability and safety
● Requirements engineering
● Reverse engineering
● SE for machine learning
● Search-based software engineering
● Software architecture and product design
● Software economics
● Software ecosystems
● Software metrics and prediction models
● Software processes
● Software reuse
● Software services and cloud-based systems
● Software testing
● Software traceability
● Software visualization
● Variability and product lines
Review Criteria
Each paper submitted to the Technical Track will be evaluated based on the following criteria:
● Soundness: The extent to which the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.
● Significance: The extent to which the paper’s contributions can impact the field of software engineering, and under which assumptions (if any).
● Novelty: The extent to which the contributions are sufficiently original with respect to the state-of-the-art.
● Verifiability and Transparency: The extent to which the paper includes sufficient information to understand how an innovation works; to understand how data was obtained, analyzed, and interpreted; and how the paper supports independent verification or replication of the paper’s claimed contributions. New this year: the artifacts attached to the paper (or hyperlinked to it) will be checked by at least one reviewer.
● Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions, as well as adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below.
Reviewers will carefully consider all of these criteria during the review process, and authors should take great care in clearly addressing them all. The paper should clearly explain the claimed contributions, and how they are sound, significant, novel, and verifiable, as described above.
Each paper will be handled by an area chair. The role of the area chairs is to ensure a reviewing consistency among papers submitted within the same area of research. For this reason, we will ask the authors, upon submission, to identify up to two main areas to which the paper belongs, among the following ones:
● Artificial Intelligence and Software Engineering
● Analysis and Testing
● Dependability
● Requirements, modeling, and design
● Social Aspects
● Software Evolution
● Software Analytics
Program chairs will ultimately assign a paper to an area chair, considering the authors’ selection, the paper’s content, and (if applicable) keeping into account possible conflicts of interest.
For more information on how the ICSE PC will interpret and use these criteria in the paper evaluation process, see the ICSE 2023 Review Process and Guidelines.
How to Submit
Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).
● All submissions must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. Accepted papers will be allowed one extra page for the main text of the camera-ready version.
● Submissions must strictly conform to the IEEE conference proceedings formatting instructions specified above . Alterations of spacing, font size, and other changes that deviate from the instructions may result in desk rejection without further review.
● By submitting to the ICSE Technical Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ. In particular, papers submitted to ICSE 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2023. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
● If the research involves human participants/subjects, the authors must adhere to the ACM Publications Policy on Research Involving Human Participants and Subjects. Upon submitting, authors will declare their compliance to such a policy.
● The ICSE 2023 Technical Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:
○ Authors’ names must be omitted from the submission.
○ All references to the author’s prior work should be in the third person.
○ While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to ICSE 2023.
○ During review, authors should not publicly use the submission title.
● Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.
● By submitting to the ICSE Technical Track, authors acknowledge that they conform to the authorship policy of the ACM, and the authorship policy of the IEEE.
Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site ( https://icse2023.hotcrp.com) by the submission deadline. Any submission that does not comply with these requirements may be desk rejected without further review.
We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-anonymous reviewing. Authors are encouraged to try out the experimental SIGSOFT Submission Checker to detect violations to the formatting and double anonymous guidelines. (Mind that the tool is based on heuristics. Therefore it may miss violations, and it can raise false alarms. The requirements listed in this call for papers take precedence over the results of the tool when deciding whether a paper meets the submission guidelines.)
Open Science Policy
The research track of ICSE 2023 is governed by the ICSE 2023 Open Science policies. In summary, the steering principle is that all research results should be accessible to the public and, if possible, empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Note that sharing research data is not mandatory for submission or acceptance. However, sharing is expected to be the default, and non-sharing needs to be justified. We recognize that reproducibility or replicability is not a goal in qualitative research and that, similar to industrial studies, qualitative studies often face challenges in sharing research data. For guidelines on how to report qualitative research to ensure the assessment of the reliability and credibility of research results, see the Q&A page.
Upon submission to the research track, authors are asked
● to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) – and provide instructions on how to access this data in the paper, possibly in a section named "Data Availability" after the Conclusions; or
● to include in the paper an explanation as to why this is not possible or desirable; and
● to indicate if they intend to make their data publicly available upon acceptance.
NEW! This year, at least one reviewer will check whether the enclosed package contains what is declared in the paper. This quality check process will be very lightweight, and the main aim is to ensure that authors do not submit (partially) empty packages.
Supplementary material can be uploaded via the HotCrp site or anonymously linked from the paper submission. Also, the authors must briefly describe, in the submission form, the content of the supplementary material with a short paragraph/bullet list. We strongly encourage authors to use supplementary material to provide access to anonymized data, whenever possible. Authors are asked to carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post.
Upon acceptance, authors have the possibility to separately submit their supplementary material to the ICSE 2023 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated or reproduced.
Mentoring for Prospective Authors
We are organizing an “Ask me Anything” (AMA) Session on Best practices for a successful ICSE paper in June 2022 for prospective authors to learn from the 2022 ICSE PC co-chairs, Andreas Zeller and Daniela Damian.
Details about this event will be announced a couple of months before the event will happen.
Author Response Periods
ICSE 2023 will offer response periods for authors. In such periods, the authors will have the opportunity to inspect the reviews, and to answer specific questions raised by the program committee.
ICSE 2023 will foresee two response periods. The first one is scheduled after all reviews have been completed, and serves to inform the subsequent decision making process. Authors will be able to see the full reviews, including the reviewer scores as part of the author response process. The second one follows a period of review discussion, and will involve only some papers, for which additional reviews were needed, or where, during the discussion, further questions for the authors emerged.
Note that:
● Participating in the response period is optional for the authors, i.e., omitting a rebuttal does not necessarily prejudice the paper’s outcome.
● Not being invited to participate in the second response period does not mean the paper has been rejected (nor accepted), but just that reviewers felt that a second response period was unnecessary.
Withdrawing a Paper
Authors can withdraw their paper at any moment until the final decision has been made, through the paper submission system. Resubmitting the paper to another venue before the final decision has been made without withdrawing from ICSE 2023 first is considered a violation of the concurrent submission policy, and will lead to automatic rejection from ICSE 2023 as well as any other venue adhering to this policy.
Important Dates
● Technical Track Submissions Deadline: September 1, 2022
● Technical Track Author First Response Period (all papers): November 14–19, 2022
● Technical Track Author Second Response Period (some papers): November 29–30, 2022
● Technical Track Acceptance Notification: December 9, 2022
● Technical Track Camera Ready: TBA
Conference Attendance Expectation
If a submission is accepted, at least one author of the paper is required to register for ICSE 2023 and present the paper. [We will add more info on this as soon as the ICSE 2023 format is finalized.]
Wed 17 MayDisplayed time zone: Hobart change
11:00 - 12:30 | AI models for SEJournal-First Papers / Technical Track / DEMO - Demonstrations / NIER - New Ideas and Emerging Results at Level G - Plenary Room 1 Chair(s): Denys Poshyvanyk College of William and Mary | ||
11:00 15mTalk | One Adapter for All Programming Languages? Adapter Tuning for Multilingual Tasks in Software Engineering Technical Track Deze Wang National University of Defense Technology, Boxing Chen , Shanshan Li National University of Defense Technology, Wei Luo , Shaoliang Peng Hunan University, Wei Dong School of Computer, National University of Defense Technology, China, Liao Xiangke National University of Defense Technology | ||
11:15 15mTalk | CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back Technical Track Zhongxin Liu Zhejiang University, Zhijie Tang Zhejiang University, Xin Xia Huawei, Xiaohu Yang Zhejiang University Pre-print | ||
11:30 15mTalk | Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models Technical Track Shuzheng Gao Harbin institute of technology, Hongyu Zhang The University of Newcastle, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology |
11:00 - 12:30 | Fuzzing: applicationsTechnical Track / DEMO - Demonstrations at Meeting Room 101 Chair(s): Corina S. Păsăreanu Carnegie Mellon University | ||
11:00 15mTalk | Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces Technical Track Haoxiang Jia Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zifan Xie Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Rongxin Wu Xiamen University, Maolin Sun Huazhong University of Science and Technology, Kang Chen Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Pre-print | ||
11:15 15mTalk | JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers Technical Track Mingyuan Wu Southern University of Science and Technology, Minghai Lu Southern University of Science and Technology, Heming Cui University of Hong Kong, Junjie Chen Tianjin University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign | ||
11:30 15mTalk | Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs Technical Track Maolin Sun Huazhong University of Science and Technology, Yibiao Yang Nanjing University, Ming Wen Huazhong University of Science and Technology, Yongcong Wang Huazhong University of Science and Technology, Yuming Zhou Nanjing University, Hai Jin Huazhong University of Science and Technology Pre-print | ||
11:45 15mTalk | Regression Fuzzing for Deep Learning Systems Technical Track Hanmo You College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Junjie Chen Tianjin University, Shuang Liu Tianjin University, Shuochuan Li College of Intelligence and Computing, Tianjin University | ||
12:00 15mTalk | Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers Technical Track Suyue Guo Renmin University of China, Xinyu Wan Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, China, Wenchang Shi Renmin University of China, China, Yiwei Zhang Renmin University of China, Jianjun Huang Renmin University of China, China, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China Pre-print |
11:00 - 12:30 | Mining software repositoriesTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102 Chair(s): Brittany Johnson George Mason University | ||
11:00 15mTalk | The untold story of code refactoring customizations in practice Technical Track Daniel Oliveira PUC-Rio, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Alessandro Garcia PUC-Rio, Ana Carla Bibiano PUC-Rio, Márcio Ribeiro Federal University of Alagoas, Brazil, Rohit Gheyi Federal University of Campina Grande, Baldoino Fonseca Federal University of Alagoas (UFAL) Pre-print | ||
11:15 15mTalk | Data Quality for Software Vulnerability Datasets Technical Track Roland Croft The University of Adelaide, Muhammad Ali Babar University of Adelaide, M. Mehdi Kholoosi University of Adelaide Pre-print | ||
11:30 15mTalk | Do code refactorings influence the merge effort? Technical Track André Oliveira Federal Fluminense University, Vania Neves Universidade Federal Fluminense (UFF), Alexandre Plastino Federal Fluminense University, Ana Carla Bibiano PUC-Rio, Alessandro Garcia PUC-Rio, Leonardo Murta Universidade Federal Fluminense (UFF) | ||
12:15 15mTalk | A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization Technical Track Hao Guan The University of Queensland, Ying Xiao Southern University of Science and Technology, Jiaying LI Microsoft, Yepang Liu Southern University of Science and Technology, Guangdong Bai University of Queensland |
11:00 - 12:30 | Fault localizationJournal-First Papers / Technical Track / Showcase at Meeting Room 103 Chair(s): Rui Abreu University of Porto | ||
11:00 15mTalk | Evaluating the Impact of Experimental Assumptions in Automated Fault Localization Technical Track Ezekiel Soremekun Royal Holloway, University of London, Lukas Kirschner Saarland University, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Mike Papadakis University of Luxembourg, Luxembourg Pre-print Media Attached | ||
11:15 15mTalk | Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set Technical Track Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Yepang Liu Southern University of Science and Technology, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences Pre-print | ||
11:30 15mTalk | PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports Technical Track Pre-print Media Attached | ||
12:15 15mTalk | RAT: A Refactoring-Aware Traceability Model for Bug Localization Technical Track Feifei Niu University of Ottawa, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Liguo Huang Southern Methodist University, Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Jidong Ge Nanjing University, Bin Luo Nanjing University, Alexander Egyed Johannes Kepler University Linz File Attached |
11:00 - 12:30 | Formal verificationSEIP - Software Engineering in Practice / DEMO - Demonstrations / Technical Track / NIER - New Ideas and Emerging Results / Showcase at Meeting Room 104 Chair(s): Bonita Sharif University of Nebraska-Lincoln, USA | ||
11:00 15mTalk | How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms Technical Track Hammad Ahmad University of Michigan, Zachary Karas University of Michigan, Kimberly Diaz University of Michigan, Amir Kamil University of Michigan, Jean-Baptiste Jeannin University of Michigan at Ann Arbor, Westley Weimer University of Michigan | ||
11:15 15mTalk | Which of My Assumptions are Unnecessary for Realizability and Why Should I Care? Technical Track Pre-print |
11:00 - 12:30 | APIs and librariesTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 105 Chair(s): Sarah Nadi University of Alberta | ||
11:00 15mTalk | UpCy: Safely Updating Outdated Dependencies Technical Track Andreas Dann Paderborn University, Ben Hermann TU Dortmund, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM Pre-print | ||
11:15 15mTalk | APICAD: Augmenting API Misuse Detection Through Specifications From Code And Documents Technical Track DOI Pre-print | ||
11:30 15mTalk | Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis Technical Track Sen Yang Army Engineering University of PLA, Sen Chen Tianjin University, Lingling Fan Nankai University, Sihan Xu Nankai University, China, Zhanwei Hui Academy of Military Science, Song Huang Army Engineering University of PLA | ||
11:45 15mTalk | OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions Technical Track Wu Jiahui Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Wei Tang Tsinghua University, Lyuye Zhang Nanyang Technological University, Yueming Wu Nanyang Technological University, Chengyue Liu Scantist, Kairan Sun Singapore University of Technology and Design, Lida Zhao Nanyang Technological University, Yang Liu Nanyang Technological University |
11:00 - 12:30 | Blockchain/smart contractsTechnical Track / DEMO - Demonstrations / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 106 Chair(s): Yi Li Nanyang Technological University | ||
11:00 15mTalk | SmartMark: Software Watermarking Scheme for Smart Contracts Technical Track Taeyoung Kim Sungkyunkwan University, Yunhee Jang Sungkyunkwan University, Chanjong Lee Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, hyoungshick kim Sungkyunkwan University | ||
11:15 15mTalk | Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum Technical Track Zibin Zheng School of Software Engineering, Sun Yat-sen University, Neng Zhang School of Software Engineering, Sun Yat-sen University, Jianzhong Su Sun Yat-sen University, Zhijie Zhong School of Software Engineering, Sun Yat-sen University, Mingxi Ye Sun Yat-sen University, Jiachi Chen School of Software Engineering, Sun Yat-sen University Pre-print | ||
11:30 15mTalk | BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts Technical Track Peilin Zheng Sun Yat-sen University, Xiapu Luo The Hong Kong Polytechnic University, Zibin Zheng School of Software Engineering, Sun Yat-sen University Pre-print File Attached |
11:00 - 12:30 | Cognitive aspects of software developmentNIER - New Ideas and Emerging Results / Journal-First Papers / SEIS - Software Engineering in Society / SEIP - Software Engineering in Practice / SEET - Software Engineering Education and Training / Technical Track at Meeting Room 109 Chair(s): Nicole Novielli University of Bari | ||
11:00 15mTalk | Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel Contributors Technical Track Bianca Trinkenreich Northern Arizona University, USA, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital , Anita Sarma Oregon State University, Daniel M. German University of Victoria, Marco Gerosa Northern Arizona University, Igor Steinmacher Northern Arizona University Pre-print |
13:45 - 15:15 | Code smells and clonesTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Level G - Plenary Room 1 Chair(s): Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity | ||
13:45 15mTalk | Comparison and Evaluation of Clone Detection Techniques with Different Code Representations Technical Track Yuekun Wang University of Science and Technology of China, Yuhang Ye University of Science and Technology of China, Yueming Wu Nanyang Technological University, Weiwei Zhang University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Yang Liu Nanyang Technological University | ||
14:00 15mTalk | Learning Graph-based Code Representations for Source-level Functional Similarity Detection Technical Track Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Zhenkai Liang National University of Singapore | ||
14:15 15mTalk | The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing Technical Track Qihong Chen University of California, Irvine, Rúben Câmara LASIGE and Department of Informatics are Faculdade Ciências Universidade de Lisboa,, José Campos University of Porto, Portugal, André Souto LaSiGE & FCUL, University of Lisbon, Iftekhar Ahmed University of California at Irvine Pre-print |
13:45 - 15:15 | Fuzzing: techniques and toolsTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 101 Chair(s): Mike Papadakis University of Luxembourg, Luxembourg | ||
13:52 15mTalk | Reachable Code Coverage Technical Track Danushka Liyanage Monash University, Australia, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Kla Tantithamthavorn Monash University, Stephan Lipp Technical University of Munich | ||
14:07 15mTalk | Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing Technical Track | ||
14:22 15mTalk | Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation Technical Track Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Rongxin Wu Xiamen University, Wei Liu Nanjing University, Biao He Ant Group, Yu Ouyang Ant Group, Jiajia Li Ant Group | ||
14:37 15mTalk | Evaluating and Improving Hybrid Fuzzing Technical Track Ling Jiang Southern University of Science and Technology, Hengchen Yuan Southern University of Science and Technology, Mingyuan Wu Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign, Yuqun Zhang Southern University of Science and Technology |
13:45 - 15:15 | Software architectures and designShowcase / Technical Track / SEET - Software Engineering Education and Training / NIER - New Ideas and Emerging Results at Meeting Room 102 Chair(s): Davide Taibi Tampere University | ||
13:45 15mTalk | Robustification of Behavioral Designs against Environmental Deviations Technical Track Changjian Zhang Carnegie Mellon University, Tarang Saluja Swarthmore College, Rômulo Meira-Góes Carnegie Mellon University, Matthew Bolton University of Virginia, David Garlan Carnegie Mellon University, Eunsuk Kang Carnegie Mellon University Pre-print | ||
14:00 15mTalk | A Qualitative Study on the Implementation Design Decisions of Developers Technical Track Jenny T. Liang Carnegie Mellon University, Maryam Arab George Mason University, Minhyuk Ko Virginia Tech, Amy Ko University of Washington, Thomas LaToza George Mason University Pre-print |
13:45 - 15:15 | Software security and privacyTechnical Track / Journal-First Papers at Meeting Room 103 Chair(s): Wei Yang University of Texas at Dallas | ||
13:45 15mTalk | BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service Technical Track I Luk Kim Purdue University, Weihang Wang University of Southern California, Yonghwi Kwon University of Virginia, Xiangyu Zhang Purdue University | ||
14:00 15mTalk | FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing Technical Track Ziqi Zhang Peking University, Yuanchun Li Institute for AI Industry Research (AIR), Tsinghua University, Bingyan Liu Peking University, Yifeng Cai Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University | ||
14:15 15mTalk | PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps Technical Track Zeya Tan Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology Pre-print | ||
14:30 15mTalk | AdHere: Automated Detection and Repair of Intrusive Ads Technical Track Yutian Yan University of Southern California, Yunhui Zheng , Xinyue Liu University at Buffalo, SUNY, Nenad Medvidović University of Southern California, Weihang Wang University of Southern California | ||
14:45 15mTalk | Bad Snakes: Understanding and Improving Python Package Index Malware Scanning Technical Track |
13:45 - 15:15 | AI systems engineeringSEIP - Software Engineering in Practice / Technical Track / NIER - New Ideas and Emerging Results / Journal-First Papers at Meeting Room 104 Chair(s): Xin Peng Fudan University | ||
13:45 15mTalk | FedDebug: Systematic Debugging for Federated Learning Applications Technical Track | ||
14:00 15mTalk | Practical and Efficient Model Extraction of Sentiment Analysis APIs Technical Track Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Victor Junqiu Wei The Hong Kong Polytechnic University, Xixian Chen Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University, Irwin King The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong | ||
14:15 15mTalk | CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models Technical Track Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Bin Luo Nanjing University Pre-print |
13:45 - 15:15 | Defect analysisJournal-First Papers / Technical Track / SEIP - Software Engineering in Practice at Meeting Room 106 Chair(s): Kla Tantithamthavorn Monash University | ||
13:45 15mTalk | RepresentThemAll: A Universal Learning Representation of Bug Reports Technical Track Sen Fang Macau University of Science and Technology, Tao Zhang Macau University of Science and Technology, Youshuai Tan Macau University of Science and Technology, He Jiang Dalian University of Technology, Xin Xia Huawei, Xiaobing Sun Yangzhou University | ||
14:00 15mTalk | Demystifying Exploitable Bugs in Smart Contracts Technical Track Zhuo Zhang Purdue University, Brian Zhang Harrison High School (Tippecanoe), Wen Xu PNM Labs, Zhiqiang Lin The Ohio State University Pre-print | ||
14:15 15mTalk | Understanding and Detecting On-the-Fly Configuration Bugs Technical Track Teng Wang National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Si Zheng National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Erci Xu National University of Defense Technology, Shaoliang Peng Hunan University, Liao Xiangke National University of Defense Technology Pre-print | ||
14:30 15mTalk | Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation Technical Track Parvez Mahbub Dalhousie University, Ohiduzzaman Shuvo Dalhousie University, Masud Rahman Dalhousie University Pre-print Media Attached |
13:45 - 15:15 | Program translation and synthesisTechnical Track / Showcase / NIER - New Ideas and Emerging Results at Meeting Room 110 Chair(s): Andy Zaidman Delft University of Technology | ||
13:45 15mTalk | Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs Technical Track Pre-print | ||
14:00 15mTalk | Triggers for Reactive Synthesis Specifications Technical Track Gal Amram Tel Aviv University, Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University, Or Pistiner Tel Aviv University, Jan Oliver Ringert Bauhaus-University Weimar Pre-print | ||
14:15 15mTalk | Using Reactive Synthesis: An End-to-End Exploratory Case Study Technical Track Pre-print | ||
14:52 15mTalk | Syntax and Domain Aware Model for Unsupervised Program Translation Technical Track Pre-print |
15:45 - 17:15 | DocumentationTechnical Track / Journal-First Papers at Level G - Plenary Room 1 Chair(s): Denys Poshyvanyk College of William and Mary | ||
15:45 15mTalk | Developer-Intent Driven Code Comment Generation Technical Track Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print | ||
16:00 15mTalk | Data Quality Matters: A Case Study of ObsoleteComment Detection Technical Track Shengbin Xu Nanjing University, Yuan Yao Nanjing University, Feng Xu Nanjing University, Tianxiao Gu TikTok Inc., Jingwei Xu , Xiaoxing Ma Nanjing University Pre-print | ||
16:15 15mTalk | Revisiting Learning-based Commit Message Generation Technical Track Jinhao Dong Peking University, Yiling Lou Fudan University, Dan Hao Peking University, Lin Tan Purdue University Pre-print | ||
16:30 15mTalk | Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality Technical Track |
15:45 - 17:15 | Software loggingTechnical Track at Meeting Room 101 Chair(s): Hongyu Zhang The University of Newcastle | ||
15:45 15mTalk | PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing Technical Track Hetong Dai Concordia University, Yiming Tang Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo | ||
16:00 15mTalk | Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction Technical Track Zhenhao Li Concordia University, Chuan Luo Beihang University, Tse-Hsun (Peter) Chen Concordia University, Weiyi Shang University of Waterloo, Shilin He Microsoft Research, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research | ||
16:15 15mTalk | On the Temporal Relations between Logging and Code Technical Track Zishuo Ding Concordia University, Yiming Tang Concordia University, Yang Li Beijing University of Posts and Telecommunications, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo Pre-print | ||
16:30 15mTalk | How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners Technical Track Guoping Rong Nanjing University, shenghui gu Nanjing University, Haifeng Shen Australian Catholic University, He Zhang Nanjing University, Hongyu Kuang Nanjing University | ||
16:45 15mTalk | When to Say What: Learning to Find Condition-Message Inconsistencies Technical Track Pre-print | ||
17:00 15mTalk | A Semantic-aware Parsing Approach for Log Analytics Technical Track Yintong Huo The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cheryl Lee The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong Pre-print |
15:45 - 17:15 | Test generationSEIP - Software Engineering in Practice / DEMO - Demonstrations / Technical Track / NIER - New Ideas and Emerging Results / Journal-First Papers at Meeting Room 102 Chair(s): Chunyang Chen Monash University | ||
16:00 15mTalk | BADGE: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing Technical Track Dezhi Ran Peking University, Hao Wang Peking University, China, Wenyu Wang University of Illinois Urbana-Champaign, Tao Xie Peking University | ||
16:15 15mTalk | Efficiency Matters: Speeding Up Automated Testing with GUI Rendering Inference Technical Track Sidong Feng Monash University, Mulong Xie Australian National University, Chunyang Chen Monash University Pre-print | ||
16:30 15mTalk | CodaMOSA: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models Technical Track Caroline Lemieux University of British Columbia, Jeevana Priya Inala Microsoft Research, Shuvendu K. Lahiri Microsoft Research, Siddhartha Sen Microsoft Research |
15:45 - 17:15 | Development and evolution of AI-intensive systemsSEIP - Software Engineering in Practice / Technical Track / NIER - New Ideas and Emerging Results at Meeting Room 104 Chair(s): Sebastian Elbaum University of Virginia | ||
15:45 15mTalk | Reusing Deep Neural Network Models through Model Re-engineering Technical Track Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, China, Hongyu Zhang The University of Newcastle, Zhaotian Li Beihang University, Xudong Liu Beihang University | ||
16:00 15mTalk | PyEvolve: Automating Frequent Code Changes in Python ML Systems Technical Track Malinda Dilhara University of Colorado Boulder, USA, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Ameya Ketkar Uber Pre-print | ||
16:15 15mTalk | DeepArc: Modularizing Neural Networks for the Model Maintenance Technical Track xiaoning ren , Yun Lin Shanghai Jiao Tong University; National University of Singapore, Yinxing Xue University of Science and Technology of China, Ruofan Liu National University of Singapore, Jun Sun Singapore Management University, Zhiyong Feng Tianjin University, Jin Song Dong National University of Singapore | ||
16:30 15mTalk | Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement Technical Track Sayem Mohammad Imtiaz Iowa State University, Fraol Batole Dept. of Computer Science, Iowa State University, Astha Singh Dept. of Computer Science, Iowa State University, Rangeet Pan IBM Research, Breno Dantas Cruz Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University Pre-print |
15:45 - 17:15 | Vulnerability analysis and assessmentTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105 Chair(s): Xiaoyin Wang University of Texas at San Antonio | ||
15:45 15mTalk | Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports Technical Track Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University Pre-print | ||
16:00 15mTalk | Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem Technical Track Yulun Wu Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Qiang Li Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Pre-print | ||
16:15 15mTalk | SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript Technical Track Masudul Hasan Masud Bhuiyan CISPA Helmholtz Center for Information Security, Adithya Srinivas Parthasarathy Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram, Nikos Vasilakis Massachusetts Institute of Technology, Michael Pradel University of Stuttgart, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security Pre-print | ||
16:30 15mTalk | On Privacy Weaknesses and Vulnerabilities in Software Systems Technical Track Pattaraporn Sangaroonsilp University of Wollongong, Hoa Khanh Dam University of Wollongong, Aditya Ghose University of Wollongong |
Thu 18 MayDisplayed time zone: Hobart change
11:00 - 12:30 | Defect detection and predictionTechnical Track / SEIP - Software Engineering in Practice at Level G - Plenary Room 1 Chair(s): Wei Le Iowa State University | ||
11:00 15mTalk | Detecting Exception Handling Bugs in C++ Programs Technical Track Hao Zhang Institute of Software, Chinese Academy of Sciences, Ji Luo Institute of Software, Chinese Academy of Sciences, Mengze Hu Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Zongyan Qiu Peking University | ||
11:15 15mTalk | Learning to Boost Disjunctive Static Bug-Finders Technical Track | ||
11:30 15mTalk | Predicting Bugs by Monitoring Developers During Task Execution Technical Track Gennaro Laudato University of Molise, Simone Scalabrino University of Molise, Nicole Novielli University of Bari, Filippo Lanubile University of Bari, Rocco Oliveto University of Molise | ||
11:45 15mTalk | Detecting Isolation Bugs via Transaction Oracle Construction Technical Track Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Jiansen Song , Dong Wang Institute of software, Chinese academy of sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Lei Chen Inspur Software Group Co., Ltd., Hanmo Wang Inspur Software Group Co., Ltd., Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print | ||
12:00 15mTalk | SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk Technical Track Siwei Cui Texas A & M University, Yifei Gao Texas A&M University, Rainer Unterguggenberger Lam Research, Wilfried Pichler Lam Research, Sean Livingstone Texas A&M University, Jeff Huang Texas A&M University Pre-print |
11:00 - 12:30 | Studies on gender in SESEIS - Software Engineering in Society / Technical Track / SEET - Software Engineering Education and Training at Meeting Room 101 Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick | ||
11:00 15mTalk | “STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software Developers Technical Track Sterre van Breukelen Eindhoven University of Technology, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Sebastian Baltes SAP SE & University of Adelaide, Alexander Serebrenik Eindhoven University of Technology Pre-print |
11:00 - 12:30 | AI testing 1Technical Track / DEMO - Demonstrations / Journal-First Papers at Meeting Room 102 Chair(s): Matthew B Dwyer University of Virginia | ||
11:00 15mTalk | When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study Technical Track Pre-print | ||
11:15 15mTalk | Fuzzing Automatic Differentiation in Deep-Learning Libraries Technical Track Chenyuan Yang University of Illinois at Urbana-Champaign, Yinlin Deng University of Illinois at Urbana-Champaign, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuxing Tu Huazhong University of Science and Technology, Hanchi Li University of Science and Technology of China, Lingming Zhang University of Illinois at Urbana-Champaign | ||
11:30 15mTalk | Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective Technical Track Zenan Li Nanjing University, China, Maorun Zhang Nanjing University, China, Jingwei Xu , Yuan Yao Nanjing University, Chun Cao Nanjing University, Taolue Chen Birkbeck University of London, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University Pre-print | ||
12:07 15mTalk | Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion Technical Track Yuanyuan Yuan The Hong Kong University of Science and Technology, Qi Pang HKUST, Shuai Wang Hong Kong University of Science and Technology |
11:00 - 12:30 | Code reviewJournal-First Papers / SEIP - Software Engineering in Practice / Technical Track at Meeting Room 103 Chair(s): Thomas LaToza George Mason University | ||
11:30 15mTalk | Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions Technical Track Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Waterloo, Shane McIntosh University of Waterloo Pre-print |
11:00 - 12:30 | Program repair techniques and applicationsTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 104 Chair(s): Xuan-Bach D. Le University of Melbourne | ||
11:00 15mTalk | Better Automatic Program Repair by Using Bug Reports and Tests Together Technical Track Pre-print | ||
11:15 15mTalk | CCTEST: Testing and Repairing Code Completion Systems Technical Track Li Zongjie , Chaozheng Wang Harbin Institute of Technology, Zhibo Liu Hong Kong University of Science and Technology, Haoxuan Wang EPFL, Dong Chen HKUST, Shuai Wang Hong Kong University of Science and Technology, Cuiyun Gao Harbin Institute of Technology | ||
11:45 15mTalk | KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair Technical Track Nan Jiang Purdue University, Thibaud Lutellier University of Alberta, Yiling Lou Fudan University, Lin Tan Purdue University, Dan Goldwasser Purdue University, Xiangyu Zhang Purdue University Pre-print | ||
12:00 15mTalk | Rete: Learning Namespace Representation for Program Repair Technical Track Nikhil Parasaram University College London, Earl T. Barr University College London, Sergey Mechtaev University College London Link to publication Pre-print |
11:00 - 12:30 | Requirements elicitation and understandingTechnical Track / SEIS - Software Engineering in Society / SEET - Software Engineering Education and Training / Showcase at Meeting Room 105 Chair(s): Jane Cleland-Huang University of Notre Dame | ||
11:00 15mTalk | AI-based Question Answering Assistance for Analyzing Natural-language Requirements Technical Track Saad Ezzini Lancaster University, Sallam Abualhaija University of Luxembourg, Chetan Arora Monash University, Mehrdad Sabetzadeh University of Ottawa Pre-print | ||
11:15 15mTalk | Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation Technical Track Pre-print |
11:00 - 12:30 | Software verificationJournal-First Papers / NIER - New Ideas and Emerging Results / Technical Track / DEMO - Demonstrations at Meeting Room 106 Chair(s): Youcheng Sun The University of Manchester | ||
11:00 15mTalk | Data-driven Recurrent Set Learning For Non-termination Analysis Technical Track | ||
11:15 15mTalk | Compiling Parallel Symbolic Execution with Continuations Technical Track Guannan Wei Purdue University, Songlin Jia Purdue University, Ruiqi Gao Purdue University, Haotian Deng Purdue University, Shangyin Tan UC Berkeley, Oliver Bračevac Purdue University, Tiark Rompf Purdue University Pre-print | ||
11:30 15mTalk | Verifying Data Constraint Equivalence in FinTech Systems Technical Track Chengpeng Wang Hong Kong University of Science and Technology, Gang Fan Ant Group, Peisen Yao Zhejing University, Fuxiong Pan Ant Group, Charles Zhang Hong Kong University of Science and Technology Pre-print | ||
11:45 15mTalk | Tolerate Control-Flow Changes for Sound Data Race Prediction Technical Track Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yuqi Guo Institute of Software, Chinese Academy of Sciences, Beijing, China, Long Zhang Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences |
11:00 - 12:30 | Testing of mobile, web and gamesTechnical Track / DEMO - Demonstrations / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 109 Chair(s): Wei Yang University of Texas at Dallas | ||
11:00 15mTalk | Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing Technical Track Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xing Che Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences Pre-print | ||
11:15 15mTalk | Detecting Dialog-Related Keyboard Navigation Failures in Web Applications Technical Track Paul T. Chiou University of Southern California, Ali S. Alotaibi University of Southern California, William G.J. Halfond University of Southern California | ||
11:30 15mTalk | COLUMBUS: Android App Testing Through Systematic Callback Exploration Technical Track Priyanka Bose University of California, Santa Barbara, Dipanjan Das University of California, Santa Barbara, Saastha Vasan University of California, Santa Barbara, Sebastiano Mariani VMware, Inc., Ilya Grishchenko University of California, Santa Barbara, Andrea Continella University of Twente, Antonio Bianchi Purdue University, Christopher Kruegel University of California, Santa Barbara, Giovanni Vigna UC Santa Barbara | ||
11:45 15mTalk | GameRTS: A Regression Testing Framework for Video Games Technical Track Jiongchi Yu Singapore Management University, Singapore, Yuechen Wu Fuxi AI Lab, Netease Inc., China, Xiaofei Xie Singapore Management University, Wei Le Iowa State University, Lei Ma University of Alberta, Yingfeng Chen Fuxi AI Lab of Netease, Yujing Hu Fuxi AI Lab, Netease Inc., China, Fan Zhang Zhejiang University, China |
13:45 - 15:15 | Recommender systemsDEMO - Demonstrations / Technical Track / SEIP - Software Engineering in Practice / Journal-First Papers at Level G - Plenary Room 1 Chair(s): Kevin Moran George Mason University | ||
13:45 15mTalk | Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots Technical Track Amir Ghorbani University of Victoria, Nathan Cassee Eindhoven University of Technology, Derek Robinson University of Victoria, Adam Alami Aalborg University, Neil Ernst University of Victoria, Alexander Serebrenik Eindhoven University of Technology, Andrzej Wąsowski IT University of Copenhagen, Denmark Pre-print | ||
14:00 15mTalk | Flexible and Optimal Dependency Management via Max-SMT Technical Track Donald Pinckney Northeastern University, Federico Cassano Northeastern University, Arjun Guha Northeastern University and Roblox Research, Jonathan Bell Northeastern University, Massimiliano Culpo np-complete, S.r.l., Todd Gamblin Lawrence Livermore National Laboratory Pre-print |
13:45 - 15:15 | Program repair with and for AITechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102 Chair(s): Julia Rubin University of British Columbia, Canada | ||
13:45 15mTalk | Impact of Code Language Models on Automated Program Repair Technical Track Nan Jiang Purdue University, Kevin Liu Lynbrook High School, Thibaud Lutellier University of Alberta, Lin Tan Purdue University Pre-print | ||
14:00 15mTalk | Tare: Type-Aware Neural Program Repair Technical Track Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Wenjie Zhang Peking University, Yingfei Xiong Peking University, Lu Zhang Peking University | ||
14:15 15mTalk | Template-based Neural Program Repair Technical Track Xiangxin Meng Beihang University, Beijing, China, Xu Wang Beihang University, Hongyu Zhang The University of Newcastle, Hailong Sun School of Computer Science and Engineering, Beihang University, Beijing,China, Xudong Liu Beihang University, Chunming Hu Beihang University Pre-print | ||
14:30 15mTalk | Automated Repair of Programs from Large Language Models Technical Track Zhiyu Fan National University of Singapore, Singapore, Xiang Gao Beihang University, China, Martin Mirchev National University of Singapore, Abhik Roychoudhury National University of Singapore, Shin Hwei Tan Southern University of Science and Technology | ||
14:45 15mTalk | Automated Program Repair in the Era of Large Pre-trained Language Models Technical Track Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Yuxiang Wei University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign |
13:45 - 15:15 | Programming languagesDEMO - Demonstrations / Technical Track / Journal-First Papers / SEET - Software Engineering Education and Training at Meeting Room 103 Chair(s): Jean-Guy Schneider Monash University | ||
13:45 15mTalk | Demystifying Issues, Challenges, and Solutions for Multilingual Software Development Technical Track Haoran Yang Washington State University, Weile Lian Washington State University, Shaowei Wang University of Manitoba, Haipeng Cai Washington State University Pre-print | ||
14:00 15mTalk | Testability Refactoring in Pull Requests: Patterns and Trends Technical Track Pre-print | ||
14:15 15mTalk | Usability-Oriented Design of Liquid Types for Java Technical Track Catarina Gamboa CMU and LASIGE, Paulo Canelas Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University, Alcides Fonseca University of Lisbon DOI |
13:45 - 15:15 | AI bias and fairnessDEMO - Demonstrations / Technical Track / Journal-First Papers at Meeting Room 104 Chair(s): Amel Bennaceur The Open University, UK | ||
13:45 15mTalk | Towards Understanding Fairness and its Composition in Ensemble Machine Learning Technical Track Usman Gohar Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Hridesh Rajan Iowa State University Pre-print | ||
14:00 15mTalk | Fairify: Fairness Verification of Neural Networks Technical Track Pre-print | ||
14:15 15mTalk | Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models Technical Track Jiri Gesi University of California, Irvine, Xinyun Shen University of California, Irvine, Yunfan Geng University of California, Irvine, Qihong Chen University of California, Irvine, Iftekhar Ahmed University of California at Irvine | ||
14:30 15mTalk | Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks Technical Track Verya Monjezi University of Texas at El Paso, Ashutosh Trivedi University of Colorado Boulder, Gang (Gary) Tan Pennsylvania State University, Saeid Tizpaz-Niari University of Texas at El Paso Pre-print |
13:45 - 15:15 | Requirements engineeringDEMO - Demonstrations / Technical Track / NIER - New Ideas and Emerging Results / Showcase / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 105 Chair(s): Luciano Baresi Politecnico di Milano | ||
13:45 15mTalk | Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps Technical Track Kaifa ZHAO The Hong Kong Polytechnic University, Xian Zhan The Hong Kong Polytechnic University, Le Yu The Hong Kong Polytechnic University, Shiyao Zhou The Hong Kong Polytechnic University, Hao Zhou Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China, Xiapu Luo The Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology Pre-print | ||
14:00 15mTalk | Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation Technical Track Zhiyuan Chang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences |
13:45 - 15:15 | SE for security 2Technical Track / Journal-First Papers at Meeting Room 106 Chair(s): Cristian Cadar Imperial College London, UK | ||
14:00 15mTalk | On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN) Technical Track Viktoria Koscinski Rochester Institute of Technology, Sara Hashemi Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology | ||
14:15 15mTalk | Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon Technical Track Ita Ryan University College Cork, Utz Roedig University College Cork, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital Pre-print | ||
14:30 15mTalk | What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts? Technical Track Setu Kumar Basak North Carolina State University, Lorenzo Neil North Carolina State University, Bradley Reaves North Carolina State University, Laurie Williams North Carolina State University Pre-print | ||
14:45 15mTalk | Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGX Technical Track Xinyuan Miao Shanghai Jiao Tong University, Ziyi Lin Alibaba Group, Shaojun Wang Alibaba Group, Lei Yu Alibaba Group, Sanhong Li Alibaba Inc., Zihan Wang Shanghai Jiao Tong University, Pengbo Nie Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, He Jiang Dalian University of Technology Pre-print | ||
15:00 15mTalk | Keyword Extraction From Specification Documents for Planning Security Mechanisms Technical Track Jeffy Jahfar Poozhithara Apple Inc. and University of Washington Bothell, Hazeline Asuncion University of Washington Bothell, Brent Lagesse University of Washington Bothell Pre-print |
13:45 - 15:15 | Software EvolutionTechnical Track / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 109 Chair(s): Sebastiano Panichella Zurich University of Applied Sciences | ||
13:45 15mTalk | Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization Technical Track Wuxia Jin Xi'an Jiaotong University, Yitong Dai Xi'an Jiaotong University, Jianguo Zheng Xi'an Jiaotong University, Yu Qu UC Riverside, Ming Fan Xi'an Jiaotong University, Zhenyu Huang Honor Device Co., Ltd., Dezhi Huang Honor Device Co., Ltd., Ting Liu Xi'an Jiaotong University |
13:45 - 15:15 | Test quality and improvementTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 110 Chair(s): Guowei Yang University of Queensland | ||
13:45 15mTalk | Test Selection for Unified Regression Testing Technical Track Shuai Wang University of Illinois at Urbana-Champaign, Xinyu Lian University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign Pre-print | ||
14:00 15mTalk | ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search Technical Track Rongqi Pan University of Ottawa, Taher A Ghaleb University of Ottawa, Lionel Briand University of Luxembourg; University of Ottawa | ||
14:15 15mTalk | Measuring and Mitigating Gaps in Structural Testing Technical Track Soneya Binta Hossain University of Virginia, Matthew B Dwyer University of Virginia, Sebastian Elbaum University of Virginia, Anh Nguyen-Tuong University of Virginia Pre-print |
Fri 19 MayDisplayed time zone: Hobart change
11:00 - 12:30 | Runtime analysis and self-adaptationTechnical Track / NIER - New Ideas and Emerging Results / SEIP - Software Engineering in Practice / Journal-First Papers at Level G - Plenary Room 1 Chair(s): Domenico Bianculli University of Luxembourg | ||
11:00 15mTalk | Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention Technical Track Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:15 15mTalk | Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models Technical Track Toufique Ahmed University of California at Davis, Supriyo Ghosh Microsoft, Chetan Bansal Microsoft Research, Thomas Zimmermann Microsoft Research, Xuchao Zhang Microsoft, Saravanakumar Rajmohan Microsoft 365 Pre-print | ||
11:30 15mTalk | Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data Technical Track Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong Pre-print | ||
11:45 15mTalk | LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly Technical Track Guangba Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Pairui Li Tencent Inc., Tianjun Weng Tencent Inc., Haibing Zheng Tencent, Yuetang Deng Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University Pre-print |
11:00 - 12:30 | AI testing 2Technical Track / Journal-First Papers at Meeting Room 101 Chair(s): Gunel Jahangirova USI Lugano, Switzerland | ||
11:00 15mTalk | Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation Technical Track Qiang Hu University of Luxembourg, Yuejun GUo University of Luxembourg, Xiaofei Xie Singapore Management University, Maxime Cordy University of Luxembourg, Luxembourg, Lei Ma University of Alberta, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg Pre-print | ||
11:30 15mTalk | CC: Causality-Aware Coverage Criterion for Deep Neural Networks Technical Track Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology | ||
11:45 15mTalk | Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests Technical Track Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Saikat Dutta University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign | ||
12:00 15mTalk | Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems Technical Track Fitash ul haq , Donghwan Shin The University of Sheffield, Lionel Briand University of Luxembourg; University of Ottawa Pre-print | ||
12:15 15mTalk | Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects Technical Track Linyi Li University of Illinois at Urbana-Champaign, Yuhao Zhang University of Wisconsin-Madison, Luyao Ren Peking University, China, Yingfei Xiong Peking University, Tao Xie Peking University Pre-print |
11:00 - 12:30 | Developers' forumsSEIP - Software Engineering in Practice / Journal-First Papers / Technical Track / DEMO - Demonstrations at Meeting Room 102 Chair(s): Omar Haggag Monash University, Australia | ||
11:15 15mTalk | Automated Summarization of Stack Overflow Posts Technical Track Bonan Kou Purdue University, Muhao Chen University of Southern California, Tianyi Zhang Purdue University | ||
11:30 15mTalk | Semi-Automatic, Inline and Collaborative Web Page Code Curations Technical Track Roy Rutishauser University of Zurich, André N. Meyer University of Zurich, Reid Holmes University of British Columbia, Thomas Fritz University of Zurich | ||
12:15 15mTalk | Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence Technical Track zejun zhang Australian National University, Zhenchang Xing , Xin Xia Huawei, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61 |
11:00 - 12:30 | Program comprehensionTechnical Track / Journal-First Papers at Meeting Room 103 Chair(s): Oscar Chaparro College of William and Mary | ||
11:15 15mTalk | Identifying Key Classes for Initial Software Comprehension: Can We Do It Better? Technical Track Weifeng Pan Zhejiang Gongshang University, China, Xin Du Zhejiang Gongshang University, China, Hua Ming Oakland University, Dae-Kyoo Kim Oakland University, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc | ||
11:30 15mTalk | Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods Technical Track Daye Nam Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University Pre-print | ||
11:45 15mTalk | Evidence Profiles for Validity Threats in Program Comprehension Experiments Technical Track Marvin Muñoz Barón University of Stuttgart, Marvin Wyrich Saarland University, Daniel Graziotin University of Stuttgart, Stefan Wagner University of Stuttgart Pre-print | ||
12:00 15mTalk | Developers’ Visuo-spatial Mental Model and Program Comprehension Technical Track Pre-print | ||
12:15 15mTalk | Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension Technical Track Shuzheng Gao Harbin institute of technology, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology, Jun Sun Singapore Management University, David Lo Singapore Management University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China |
11:00 - 12:30 | Reverse engineeringTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 104 Chair(s): Wei Le Iowa State University | ||
11:00 15mTalk | SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics Technical Track Dehai Zhao Australian National University, Australia, Zhenchang Xing , Xin Xia Huawei, Deheng Ye Tencent AI Lab, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61 | ||
11:15 15mTalk | AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces Technical Track S M Hasan Mansur George Mason University, Sabiha Salma George Mason University, Damilola Awofisayo Duke University, Kevin Moran George Mason University | ||
11:30 15mTalk | Carving UI Tests to Generate API Tests and API Specification Technical Track Rahulkrishna Yandrapally University of British Columbia, Canada, Saurabh Sinha IBM Research, Rachel Tzoref-Brill IBM Research, Ali Mesbah University of British Columbia (UBC) Pre-print | ||
12:00 15mTalk | Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network Technical Track Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yuhui Su Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences |
11:00 - 12:30 | Software processesNIER - New Ideas and Emerging Results / SEIP - Software Engineering in Practice / SEET - Software Engineering Education and Training / Journal-First Papers / Technical Track at Meeting Room 105 Chair(s): Rashina Hoda Monash University | ||
11:15 15mTalk | Sustainability is Stratified: Toward a Better Theory of Sustainable Software Engineering Technical Track Erin Schultz Dalhousie University, Sean McGuire Dalhousie University, Bimpe Ayoola Dalhousie University, Paul Ralph Dalhousie University Pre-print |
11:00 - 12:30 | Static analysisTechnical Track / SEET - Software Engineering Education and Training / SEIP - Software Engineering in Practice at Meeting Room 106 Chair(s): Marsha Chechik University of Toronto | ||
11:00 15mTalk | DLInfer: Deep Learning with Static Slicing for Python Type Inference Technical Track Yanyan Yan Nanjing University, Yang Feng Nanjing University, Hongcheng Fan Nanjing University, Baowen Xu Nanjing University | ||
11:15 15mTalk | ViolationTracker: Building Precise Histories for Static Analysis Violations Technical Track Ping Yu Fudan University, China, Yijian Wu Fudan University, Xin Peng Fudan University, Jiahan Peng Fudan University, Jian Zhang Fudan University, Peicheng Xie Fudan University, Wenyun Zhao Fudan University, China Pre-print |
11:00 - 12:30 | Testing of database and low-level softwareTechnical Track / SEIP - Software Engineering in Practice / DEMO - Demonstrations / Journal-First Papers at Meeting Room 109 Chair(s): Michael Pradel University of Stuttgart | ||
11:00 15mTalk | Compiler Test-Program Generation via Memoized Configuration Search Technical Track Junjie Chen Tianjin University, Chenyao Suo College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Peiqi Chen College of Intelligence and Computing, Tianjin University, Xingjian Li College of Intelligence and Computing, Tianjin University | ||
11:15 15mTalk | Generating Test Databases for Database-Backed Applications Technical Track | ||
11:30 15mTalk | Testing Database Engines via Query Plan Guidance Technical Track Pre-print | ||
11:45 15mTalk | Testing Database Systems via Differential Query Execution Technical Track Jiansen Song , Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print |
13:45 - 15:15 | Code generationJournal-First Papers / Technical Track at Meeting Room 101 Chair(s): Iftekhar Ahmed University of California at Irvine | ||
13:45 15mTalk | Learning Deep Semantics for Test Completion Technical Track Pengyu Nie University of Texas at Austin, Rahul Banerjee The University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Raymond Mooney The University of Texas at Austin, Milos Gligoric University of Texas at Austin | ||
14:15 15mTalk | SkCoder: A Sketch-based Approach for Automatic Code Generation Technical Track Jia Li Peking University, Yongmin Li Peking University, Ge Li Peking University, Zhi Jin Peking University, Xing Hu Zhejiang University Pre-print | ||
14:30 15mTalk | An Empirical Comparison of Pre-Trained Models of Source Code Technical Track Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Dongxiao Chen Software Institute, Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University Pre-print | ||
14:45 15mTalk | On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot Technical Track Antonio Mastropaolo Università della Svizzera italiana, Luca Pascarella ETH Zurich, Emanuela Guglielmi University of Molise, Matteo Ciniselli Università della Svizzera Italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana | ||
15:00 15mTalk | Source Code Recommender Systems: The Practitioners' Perspective Technical Track Matteo Ciniselli Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Emad Aghajani Software Institute, USI Università della Svizzera italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana |
13:45 - 15:15 | Software development toolsDEMO - Demonstrations / Technical Track / SEIP - Software Engineering in Practice / NIER - New Ideas and Emerging Results at Meeting Room 104 Chair(s): Xing Hu Zhejiang University | ||
13:45 15mTalk | Safe low-level code without overhead is practical Technical Track Pre-print | ||
14:00 15mTalk | Sibyl: Improving Software Engineering Tools with SMT Selection Technical Track Will Leeson University of Virgina, Matthew B Dwyer University of Virginia, Antonio Filieri AWS and Imperial College London Pre-print | ||
14:30 15mTalk | CoCoSoDa: Effective Contrastive Learning for Code Search Technical Track Ensheng Shi Xi'an Jiaotong University, Wenchao Gu The Chinese University of Hong Kong, Yanlin Wang School of Software Engineering, Sun Yat-sen University, Lun Du Microsoft Research Asia, Hongyu Zhang The University of Newcastle, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Hongbin Sun Xi'an Jiaotong University Pre-print |
13:45 - 15:15 | Fault injection and mutationJournal-First Papers / NIER - New Ideas and Emerging Results / SEIP - Software Engineering in Practice / DEMO - Demonstrations / Technical Track at Meeting Room 105 Chair(s): Lingxiao Jiang Singapore Management University | ||
13:45 15mTalk | Coverage Guided Fault Injection for Cloud Systems Technical Track Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wensheng Dou Institute of Software Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Wenhan Feng Institute of Software Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences Pre-print | ||
14:00 15mTalk | Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations Technical Track |
13:45 - 15:15 | Vulnerability detectionTechnical Track / Journal-First Papers at Meeting Room 106 Chair(s): Cuiyun Gao Harbin Institute of Technology | ||
13:45 15mTalk | An Empirical Study of Deep Learning Models for Vulnerability Detection Technical Track Benjamin Steenhoek Iowa State University, Md Mahbubur Rahman Iowa State University, Richard Jiles Iowa State University, Wei Le Iowa State University Pre-print | ||
14:00 15mTalk | DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection Technical Track Wenbo Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Yi Li New Jersey Institute of Technology, Jiyuan Zhang University of Illinois Urbana-Champaign, Aashish Yadavally The University of Texas at Dallas Pre-print | ||
14:15 15mTalk | Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model Technical Track Bin Yuan Huazhong University of Science and Technology, Yifan Lu Huazhong University of Science and Technology, Yilin Fang Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Deqing Zou Huazhong University of Science and Technology, Zhen Li Huazhong University of Science and Technology, Zhi Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology | ||
14:30 15mTalk | Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning Technical Track Xin-Cheng Wen Harbin Institute of Technology, Yupan Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Hongyu Zhang The University of Newcastle, Jie M. Zhang King's College London, Qing Liao Harbin Institute of Technology | ||
14:45 15mTalk | Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays! Technical Track Xu Yang University of Manitoba, Shaowei Wang University of Manitoba, Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology Pre-print |
13:45 - 15:15 | Issue reporting and reproductionTechnical Track / DEMO - Demonstrations at Meeting Room 110 Chair(s): Daniel Russo Department of Computer Science, Aalborg University | ||
13:45 15mTalk | Incident-aware Duplicate Ticket Aggregation for Cloud Systems Technical Track Jinyang Liu The Chinese University of Hong Kong, Shilin He Microsoft Research, Zhuangbin Chen Chinese University of Hong Kong, China, Liqun Li Microsoft Research, Yu Kang Microsoft Research, Xu Zhang Microsoft Research, Pinjia He Chinese University of Hong Kong at Shenzhen, Hongyu Zhang The University of Newcastle, Qingwei Lin Microsoft Research, Zhangwei Xu Microsoft Azure, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research, Michael Lyu The Chinese University of Hong Kong | ||
14:00 15mTalk | Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction Technical Track Pre-print | ||
14:15 15mTalk | On the Reproducibility of Software Defect Datasets Technical Track | ||
14:30 15mTalk | Context-aware Bug Reproduction for Mobile Apps Technical Track Yuchao Huang , Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Song Wang York University, Chunyang Chen Monash University, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences | ||
14:45 15mTalk | Read It, Don't Watch It: Captioning Bug Recordings Automatically Technical Track Sidong Feng Monash University, Mulong Xie Australian National University, Yinxing Xue University of Science and Technology of China, Chunyang Chen Monash University Pre-print |
15:15 - 15:45 | |||
15:45 - 17:15 | Software qualityJournal-First Papers / NIER - New Ideas and Emerging Results / SEIP - Software Engineering in Practice / Technical Track at Level G - Plenary Room 1 Chair(s): Valentina Lenarduzzi University of Oulu | ||
15:45 15mTalk | DuetCS: Code Style Transfer through Generation and Retrieval Technical Track |
15:45 - 17:15 | SE education methods and toolsTechnical Track / SEET - Software Engineering Education and Training at Meeting Room 101 Chair(s): Andrew Begel Carnegie Mellon University | ||
15:45 15mTalk | On the Applicability of Language Models to Block-Based Programs Technical Track Elisabeth Griebl University of Passau, Benedikt Fein University of Passau, Florian Obermueller University of Passau, Gordon Fraser University of Passau, René Just University of Washington |
15:45 - 17:15 | Metamorphic testingSEIP - Software Engineering in Practice / Technical Track / Journal-First Papers / SEIS - Software Engineering in Society at Meeting Room 102 Chair(s): Shiva Nejati University of Ottawa | ||
15:45 15mTalk | MTTM: Metamorphic Testing for Textual Content Moderation Software Technical Track Wenxuan Wang The Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Yizhan Huang The Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong at Shenzhen, Michael Lyu The Chinese University of Hong Kong | ||
16:00 15mTalk | Metamorphic Shader Fusion for Testing Graphics Shader Compilers Technical Track Dongwei Xiao The Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology | ||
16:45 15mTalk | MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform Technical Track Pre-print |
15:45 - 17:15 | Pre-trained and few shot learning for SETechnical Track / Journal-First Papers at Meeting Room 103 Chair(s): Yiling Lou Fudan University | ||
16:00 15mTalk | Automating Code-Related Tasks Through Transformers: The Impact of Pre-training Technical Track Rosalia Tufano Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Gabriele Bavota Software Institute, USI Università della Svizzera italiana | ||
16:15 15mTalk | Log Parsing with Prompt-based Few-shot Learning Technical Track Pre-print | ||
16:30 15mTalk | Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning Technical Track Noor Nashid University of British Columbia, Mifta Sintaha University of British Columbia, Ali Mesbah University of British Columbia (UBC) Pre-print | ||
16:45 15mPaper | An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry Technical Track Wenxin Jiang Purdue University, Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Taylor R. Schorlemmer Purdue University, Rohan Sethi Loyola University Chicago, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory, James C. Davis Purdue University Pre-print | ||
17:00 15mTalk | ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning Technical Track Shangqing Liu Nanyang Technological University, bozhi wu Nanyang Technological University, Xiaofei Xie Singapore Management University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University |
15:45 - 17:15 | Program analysisShowcase / Journal-First Papers / Technical Track / SEIP - Software Engineering in Practice at Meeting Room 104 Chair(s): Marsha Chechik University of Toronto | ||
16:00 15mTalk | DStream: A Streaming-Based Highly Parallel IFDS Framework Technical Track Xizao Wang Nanjing University, Zhiqiang Zuo Nanjing University, Lei Bu Nanjing University, Jianhua Zhao Nanjing University, China | ||
16:15 15mTalk | (Partial) Program Dependence Learning Technical Track Aashish Yadavally The University of Texas at Dallas, Wenbo Wang New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas Pre-print | ||
16:30 15mTalk | MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems Technical Track Yicheng Ouyang University of Illinois at Urbana-Champaign, Kailai Shao Ant Group, Kunqiu Chen Southern University of Science and Technology, Ruobing Shen Peking University, Chao Chen Ant Group, Mingze Xu Ant Group, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign Pre-print |
15:45 - 17:15 | Vulnerability testing and patchingTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105 Chair(s): Cristian Cadar Imperial College London, UK | ||
15:45 15mTalk | Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation Technical Track Jiamou Sun CSIRO's Data61, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Thong Hoang Data61, CSIRO, Dehai Zhao Australian National University, Australia | ||
16:00 15mTalk | Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects Technical Track Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Wu Jiahui Nanyang Technological University, Yang Liu Nanyang Technological University | ||
16:15 15mTalk | Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs Technical Track Davide Corradini University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona Pre-print | ||
16:52 15mTalk | CoLeFunDa: Explainable Silent Vulnerability Fix Identification Technical Track Jiayuan Zhou Huawei, Michael Pacheco Centre for Software Excellence, Huawei, Jinfu Chen Centre for Software Excellence, Huawei, Canada, Xing Hu Zhejiang University, Xin Xia Huawei, David Lo Singapore Management University, Ahmed E. Hassan Queen’s University |
15:45 - 17:15 | Cyber-physical systems testingSEIP - Software Engineering in Practice / Technical Track / Journal-First Papers at Meeting Room 106 Chair(s): Shahar Maoz Tel Aviv University | ||
16:00 15mTalk | Finding Causally Different Tests for an Industrial Control System Technical Track Chris Poskitt Singapore Management University, Yuqi Chen ShanghaiTech University, China, Jun Sun Singapore Management University, Yu Jiang Tsinghua University DOI Pre-print File Attached | ||
16:15 15mTalk | Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software Technical Track Yuqi Huai University of California, Irvine, Yuntianyi Chen University of California, Irvine, Sumaya Almanee University of California, Irvine, Tuan Ngo VNU University of Engineering and Technology, Xiang Liao University of California, Irvine, Ziwen Wan University of California, Irvine, Alfred Chen University of California, Irvine, Joshua Garcia University of California, Irvine Pre-print | ||
16:30 15mTalk | Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems Technical Track Garrett Christian University of Virginia, Trey Woodlief University of Virginia, Sebastian Elbaum University of Virginia Pre-print |
15:45 - 17:15 | Software ecosystemsSEET - Software Engineering Education and Training / Technical Track / DEMO - Demonstrations / Journal-First Papers / SEIP - Software Engineering in Practice / SEIS - Software Engineering in Society at Meeting Room 110 Chair(s): Sebastian Baltes SAP SE & University of Adelaide | ||
16:00 15mTalk | Rules of Engagement: Why and How Companies Participate in OSS Technical Track Mariam Guizani Oregon State University, Aileen Abril Castro-Guzman Oregon State University, Anita Sarma Oregon State University, Igor Steinmacher Northern Arizona University Pre-print | ||
16:15 15mPaper | An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead Technical Track Boming Xia CSIRO's Data61 & University of New South Wales, Tingting Bi Data61, CSIRO, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Liming Zhu CSIRO’s Data61 Pre-print |
Accepted Papers
.
ICSE 2023 open science policy
ICSE 2023 open science policy
As a conference sponsored by ACM SIGSOFT, ICSE 2023 adheres to open science policies as adopted by SIGSOFT. The text below is based on v0.9.9 of these policies.
Open science policies
Openness in science is key to fostering progress via transparency and availability of all outputs produced at each investigative steps. Transparency and availability of research outputs allow better reproducibility, replicability of quantitative studies and recoverability of qualitative studies. Open science builds the core for excellence in evidence-based research.
As an internationally renowned forum for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, experiences, and challenges in the field of software engineering, ICSE 2023 (continuing the tradition of previous editions) actively supports setting standards for how we conduct this kind of research.
To this end, we have explicitly committed ourselves to foster openness to our research outcomes. In particular, we support the adoption of open data and open source principles. We encourage all contributing authors to disclose the (anonymized and curated) data to increase reproducibility, replicability, and/or recoverability of the studies.
Principles
Research output should be publicly and freely accessible by anyone, permanently.
Artifacts related to a study (which include, but are not limited to, raw and transformed data, extended proofs, appendices, analysis scripts, software, virtual machines and containers, and qualitative codebooks) and the paper itself should, in principle, be made available on the Internet:
- without any barrier (e.g., paywalls, registration forms, request mechanisms),
- under a proper open license that specifies purposes for re-use and repurposing, properly archived and preserved ,
- provided that there are no ethical, legal, technical, economic, or sensible barriers preventing the disclosure.
Open artifacts
Fostering artifacts as open data and open source should be done as:
● Archived on preserved digital repositories such aszenodo.org,figshare.com,www.softwareheritage.org, osf.io, or institutional repositories. GitHub, GitLab, and similar services for version control systems do not offer properly archived and preserved data. Personal or institutional websites, consumer cloud storage such as Dropbox, or services such as Academia.edu and Researchgate.net do not provide properly archived and preserved data.
● Released under a proper open data license such as the CC0 dedication or the CC-BY 4.0 license when publishing the data.
● Software can be released under an open source license.
● Different open licenses, if mandated by institutions or regulations, are also permitted.
● We encourage authors to make artifacts available upon submission (either privately or publicly) and upon acceptance (publicly).
Supporting statement
We ask authors to provide a supporting statement on the data availability (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section.
Authors who cannot disclose data for the reasons stated in the principles of the policies should provide a short statement in their submitted papers in a section named Data Availability after the Conclusion section.
Please note that the success of the open science initiative depends on the willingness (and possibilities) of authors to disclose their data and that all submissions will undergo the same review process independent of whether they disclose their analysis code or data.
HOWTOs
A step-by-step approach to disclosing artifacts for (doubly-anonymous) peer review and make it open data upon acceptance is available online .
A step-by-step approach to automatically archive a GitHub repository to Zenodo.org is available at https://guides.github.com/activities/citable-code/ .
A step-by-step approach to automatically archive a GitHub repository to figshare.com is available at https://knowledge.figshare.com/articles/item/how-to-connect-figshare-with-your-github-account .
A proposal for artifact evaluation by SIGSOFT is available at https://github.com/acmsigsoft/artifact-evaluation .
A proposal for open science in software engineering, including explanations for structuring an open artifact, is available at https://arxiv.org/abs/1904.06499 .
Open Access
We encourage ICSE 2023 authors to self-archive their pre- and post-prints in open and preserved repositories. Self-archiving is legal and allowed by most publishers (granted in the copyright transfer agreement), and it will enable anybody in the world to reach papers barrier-free.
Upon acceptance to ICSE 2023, we encourage authors to revise their article according to the peers’ comments, generate a PDF version of it (post-print), and submit it to arXiv.org or their institutional repository.
Unless authors are willing to pay the publisher for open access of their published papers (gold open access), they should pick the “arXiv.org - Non-exclusive license to distribute” license https://arxiv.org/licenses/nonexclusive-distrib/1.0/license.html when submitting to arXiv.
Authors should avoid a Creative Commons license for their preprints, in any repository, if the published papers are not open access. More infos available here: https://avandeursen.com/2016/11/06/green-open-access-faq/#creative-commons .
Note: Authors are not allowed to self-archive the PDF of the published article as typeset by the publisher (a.k.a. “publisher proof,” “published paper,” “the digital library version”).
HOWTOs
A comprehensive FAQ for open access and self-archiving is available at https://avandeursen.com/2016/11/06/green-open-access-faq/ .
Instructions for reviewers
ICSE 2023 has adopted an open science stance and introduced guidelines for authors (available at https://conf.researchr.org/track/icse-2023/icse-2023-open-science-policies ). The policies invite authors to provide all research artifacts for peer review, self-archive their pre- and post-prints, and archive artifacts as open data upon acceptance. We kindly ask you to pay attention to the following, while reviewing:
- All open science steps are optional for authors and reviewers. You are invited, but not required, to inspect the provided artifacts as part of your review efforts.
- All reasons for partial disclosure of data (or lack thereof) should be trusted.
- Submissions have to undergo the same review process independent of whether they disclose their analysis code or data. You are invited to complain in your review of any absence of data, but please do not let it influence your review of submissions. You are free to welcome further disclosure of data and help authors in doing so, with your review.
- Open science is challenging for qualitative studies. Please be welcoming of qualitative studies which open their artifacts even in a limited way. Furthermore, when evaluating artifacts from qualitative studies that was made available for peer review, please keep in mind that authors of qualitative studies might have underlying ontological and epistemological stances that differ from those of authors of quantitative studies. Concepts such as replicability and reproducibility might apply partially or not apply at all with qualitative studies.
- Providing research artifacts might introduce issues with doubly-anonymous reviews. We ask you not to actively hunt the identity of authors, especially in case they self-archived a preprint of their submission. License
- New! this year, for every paper, one designated reviewer will perform a lightweight check of the online/attached data (if available). Note this is not a thorough replicability check as it is done by the artifact track, but it has mainly the goal to check whether the dataset contains what was declared.
These open science policies are based on open science policies by Daniel Graziotin, licensed under CC0 1.0.
Q/A
Please note that the processes described in this document are not used by all tracks. Check in the call for papers whether
- sharing data is expected, and how.
- double-anonymous review is used or not.
Empirical Studies and Sharing of Data
I am doing research with industry. What if I cannot share data from my research?
We absolutely welcome research with industry, as it often conveys important lessons about software engineering in practice – and we perfectly understand that industry data may be subject to confidentiality issues or legal requirements. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of confidentiality agreements". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.
I am doing user studies. What if I cannot share data from my empirical study?
We absolutely welcome user studies! However, we also perfectly understand that sharing raw data can be subject to constraints such as privacy issues. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of privacy issues". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.
I am doing qualitative research. What information should I include to help reviewers assess my research results and the readers use my results?
Best practices for addressing the reliability and credibility of qualitative research suggest providing detailed arguments and rationale for qualitative approaches, procedures and analyses. Therefore, authors are advised to provide as much transparency as possible into these details of their study. For example, clearly explain details and decisions such as 1) context of study, 2) the participant-selection process and the theoretical basis for selecting those participants, 3) collection of data or evidence from participants, and 4) data analysis methods, e.g. justify their choice theoretically and how they relate to the original research questions, and make explicit how the themes and concepts were identified from the data. Further, provide sufficient detail to bridge the gap between the interpretation of findings presented and the collected evidence by, for example, numbering quotations and labeling sources. Similar to replicability in quantitative research, the transparency aims to ensure a study’s methods are available for inspection and interpretation. However, replicability or repeatability is not the goal, as qualitative methods are inherently interpretive and emphasize context. As a consequence, reporting qualitative research might require more space in the paper; authors should consider providing enough evidence for their claims while being mindful with the use of space.
Finally, when qualitative data is counted and used for quantitative methods, authors should report the technique and results in assessing rigour in data analysis procedures, such as inter-reliability tests or triangulation over different data sources or methods—, and justify how they achieved rigour if no such methods were used.
I can make my data set / my tool available, but it may reveal my identity. What should I do?
See this question under "double-anonymous submissions", below.
Double-Anonymous Submissions
Why double-anonymous?
There are many reasons for a submission track to employ a double-anonymous review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-anonymous reviewing, see Claire Le Goues’s very well-argued, referenced and evidenced blog posting in favor of double-anonymous review processes for Software Engineering conferences . See also a list of double-anonymous resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.
How can I prepare my paper for double-anonymous reviewing?
You must make every reasonable effort to honor the double-anonymous review process, but you do not need to guarantee that your identity is undiscoverable. The double-anonymous aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
- Omit all authors’ names from the title page.
- Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper.
- Do not rely on non-anonymous supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. Supplementary information might result in revealing author identities.
Here is some excellent advice on anonymization from ACM .
I previously published an earlier version of this work in a venue that doesn’t have double-anonymous. What should I do about acknowledging that previous work?
If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.
If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.
Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?
It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-anonymous review because prior dissertation publication does not compromise novelty. In the final post-review, camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-anonymous review process, please refrain from citing the dissertation, to increase anonymity.
You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.
What if we want to cite some unpublished work of our own (as motivation for example)?
If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures ). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works. If your work is a tool, a data set, or some other resource, see the question on ‘resources already made available’, above.
Can I disseminate a non-anonymized version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?
You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. Whenever possible, please avoid posting your manuscript on public archives (e.g, ArXiV) before or during the submission period. Would you still prefer to do so, carefully avoid adding to the manuscript any reference to ICSE 2023 (E.g., using footnotes saying “Submitted to ICSE 2023”).
I can make my data set / my tool available, but it may reveal my identity. What should I do?
Please make an effort to anonymize your data set / your tool such that it does not reveal your identity. If that is impossible, place a warning next to the link that this may reveal your identity.