Write a Blog >>
ICSE 2023
Sun 14 - Sat 20 May 2023 Melbourne, Australia

Call for Papers

ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. In the technical track, we invite high quality submissions of technical research papers describing original and unpublished results of software engineering research.

Please note the following important changes for 2023:

  1. As previous ICSE editions, we apply an open science policy. This year, we will ask a reviewer to perform a lightweight check on the shared artifacts (see below).
  2. There will be a second response period for a subset of the submitted papers. Please check our calendar of important dates.

Also, we will continue the initiative started in 2022, giving emphasis to the significance of the research contributions (see review criteria).

Research of Interest

ICSE welcomes submissions addressing topics across the full spectrum of Software Engineering, being inclusive of quantitative, qualitative, and mixed-methods research.

Topics of interest include:

● API design and evolution

● Apps and app store analysis

● Autonomic systems and self adaptation

● Configuration management

● Crowd-based software engineering

● Debugging and fault localization

● Design for quality, incl. privacy and security by design

● Distributed and collaborative software engineering

● Diversity, inclusion, fairness of software

● Embedded and cyber-physical systems

● Ethics in software engineering

● Evolution and maintenance

● Feedback, user, and requirements management

● Formal methods

● Green and sustainable technologies

● Human aspects of software engineering

● Human-computer interaction

● Legal aspects of software engineering

● Machine learning with and for SE

● Mining software repositories

● Model checking

● Modeling and model-driven engineering

● Parallel and distributed systems

● Performance analysis and testing

● Privacy and security

● Program analysis

● Program comprehension

● Program repair

● Program synthesis

● Programming languages

● Recommender systems

● Refactoring

● Release engineering and DevOps

● Reliability and safety

● Requirements engineering

● Reverse engineering

● SE for machine learning

● Search-based software engineering

● Software architecture and product design

● Software economics

● Software ecosystems

● Software metrics and prediction models

● Software processes

● Software reuse

● Software services and cloud-based systems

● Software testing

● Software traceability

● Software visualization

● Variability and product lines

Review Criteria

Each paper submitted to the Technical Track will be evaluated based on the following criteria:

Soundness: The extent to which the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.

Significance: The extent to which the paper’s contributions can impact the field of software engineering, and under which assumptions (if any).

Novelty: The extent to which the contributions are sufficiently original with respect to the state-of-the-art.

Verifiability and Transparency: The extent to which the paper includes sufficient information to understand how an innovation works; to understand how data was obtained, analyzed, and interpreted; and how the paper supports independent verification or replication of the paper’s claimed contributions. New this year: the artifacts attached to the paper (or hyperlinked to it) will be checked by at least one reviewer.

Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions, as well as adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below.

Reviewers will carefully consider all of these criteria during the review process, and authors should take great care in clearly addressing them all. The paper should clearly explain the claimed contributions, and how they are sound, significant, novel, and verifiable, as described above.

Each paper will be handled by an area chair. The role of the area chairs is to ensure a reviewing consistency among papers submitted within the same area of research. For this reason, we will ask the authors, upon submission, to identify up to two main areas to which the paper belongs, among the following ones:

● Artificial Intelligence and Software Engineering

● Analysis and Testing

● Dependability

● Requirements, modeling, and design

● Social Aspects

● Software Evolution

● Software Analytics

Program chairs will ultimately assign a paper to an area chair, considering the authors’ selection, the paper’s content, and (if applicable) keeping into account possible conflicts of interest.

For more information on how the ICSE PC will interpret and use these criteria in the paper evaluation process, see the ICSE 2023 Review Process and Guidelines.

How to Submit

Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).

● All submissions must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. Accepted papers will be allowed one extra page for the main text of the camera-ready version.

● Submissions must strictly conform to the IEEE conference proceedings formatting instructions specified above . Alterations of spacing, font size, and other changes that deviate from the instructions may result in desk rejection without further review.

● By submitting to the ICSE Technical Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ. In particular, papers submitted to ICSE 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2023. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.

● If the research involves human participants/subjects, the authors must adhere to the ACM Publications Policy on Research Involving Human Participants and Subjects. Upon submitting, authors will declare their compliance to such a policy.

● The ICSE 2023 Technical Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:

Authors’ names must be omitted from the submission.

○ All references to the author’s prior work should be in the third person.

○ While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to ICSE 2023.

○ During review, authors should not publicly use the submission title.

● Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.

● By submitting to the ICSE Technical Track, authors acknowledge that they conform to the authorship policy of the ACM, and the authorship policy of the IEEE.

Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site ( https://icse2023.hotcrp.com) by the submission deadline. Any submission that does not comply with these requirements may be desk rejected without further review.

We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-anonymous reviewing. Authors are encouraged to try out the experimental SIGSOFT Submission Checker to detect violations to the formatting and double anonymous guidelines. (Mind that the tool is based on heuristics. Therefore it may miss violations, and it can raise false alarms. The requirements listed in this call for papers take precedence over the results of the tool when deciding whether a paper meets the submission guidelines.)

Open Science Policy

The research track of ICSE 2023 is governed by the ICSE 2023 Open Science policies. In summary, the steering principle is that all research results should be accessible to the public and, if possible, empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Note that sharing research data is not mandatory for submission or acceptance. However, sharing is expected to be the default, and non-sharing needs to be justified. We recognize that reproducibility or replicability is not a goal in qualitative research and that, similar to industrial studies, qualitative studies often face challenges in sharing research data. For guidelines on how to report qualitative research to ensure the assessment of the reliability and credibility of research results, see the Q&A page.

Upon submission to the research track, authors are asked

● to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) – and provide instructions on how to access this data in the paper, possibly in a section named "Data Availability" after the Conclusions; or

● to include in the paper an explanation as to why this is not possible or desirable; and

● to indicate if they intend to make their data publicly available upon acceptance.

NEW! This year, at least one reviewer will check whether the enclosed package contains what is declared in the paper. This quality check process will be very lightweight, and the main aim is to ensure that authors do not submit (partially) empty packages.

Supplementary material can be uploaded via the HotCrp site or anonymously linked from the paper submission. Also, the authors must briefly describe, in the submission form, the content of the supplementary material with a short paragraph/bullet list. We strongly encourage authors to use supplementary material to provide access to anonymized data, whenever possible. Authors are asked to carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post.

Upon acceptance, authors have the possibility to separately submit their supplementary material to the ICSE 2023 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated or reproduced.

Mentoring for Prospective Authors

We are organizing an “Ask me Anything” (AMA) Session on Best practices for a successful ICSE paper in June 2022 for prospective authors to learn from the 2022 ICSE PC co-chairs, Andreas Zeller and Daniela Damian.

Details about this event will be announced a couple of months before the event will happen.

Author Response Periods

ICSE 2023 will offer response periods for authors. In such periods, the authors will have the opportunity to inspect the reviews, and to answer specific questions raised by the program committee.

ICSE 2023 will foresee two response periods. The first one is scheduled after all reviews have been completed, and serves to inform the subsequent decision making process. Authors will be able to see the full reviews, including the reviewer scores as part of the author response process. The second one follows a period of review discussion, and will involve only some papers, for which additional reviews were needed, or where, during the discussion, further questions for the authors emerged.

Note that:

● Participating in the response period is optional for the authors, i.e., omitting a rebuttal does not necessarily prejudice the paper’s outcome.

● Not being invited to participate in the second response period does not mean the paper has been rejected (nor accepted), but just that reviewers felt that a second response period was unnecessary.

Withdrawing a Paper

Authors can withdraw their paper at any moment until the final decision has been made, through the paper submission system. Resubmitting the paper to another venue before the final decision has been made without withdrawing from ICSE 2023 first is considered a violation of the concurrent submission policy, and will lead to automatic rejection from ICSE 2023 as well as any other venue adhering to this policy.

Important Dates

● Technical Track Submissions Deadline: September 1, 2022

● Technical Track Author First Response Period (all papers): November 14–19, 2022

● Technical Track Author Second Response Period (some papers): November 29–30, 2022

● Technical Track Acceptance Notification: December 9, 2022

● Technical Track Camera Ready: TBA

Conference Attendance Expectation

If a submission is accepted, at least one author of the paper is required to register for ICSE 2023 and present the paper. [We will add more info on this as soon as the ICSE 2023 format is finalized.]

Dates
Tracks
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 17 May

Displayed time zone: Hobart change

10:30 - 11:00
10:30
30m
Talk
Cerberus: a Program Repair Framework
DEMO - Demonstrations
Ridwan Salihin Shariffdeen National University of Singapore, Martin Mirchev National University of Singapore, Yannic Noller National University of Singapore, Abhik Roychoudhury National University of Singapore
10:30 - 11:00
10:30
30m
Talk
InputGen: A Tool for Automatic Generation of Prototype Inputs to Support Rapid Requirements Validation
DEMO - Demonstrations
Shuanglong Chang Northeast Petroleum University, Juntao Gao Northeast Petroleum University, Yilong Yang Beihang University
10:30 - 11:00
10:30
30m
Talk
FlaPy: Mining Flaky Python Tests at Scale
DEMO - Demonstrations
Martin Gruber BMW Group, University of Passau, Gordon Fraser University of Passau
Pre-print
11:00 - 12:30
11:00
15m
Talk
One Adapter for All Programming Languages? Adapter Tuning for Multilingual Tasks in Software Engineering
Technical Track
Deze Wang National University of Defense Technology, Boxing Chen , Shanshan Li National University of Defense Technology, Wei Luo , Shaoliang Peng Hunan University, Wei Dong School of Computer, National University of Defense Technology, China, Xiangke Liao National University of Defense Technology
11:15
15m
Talk
CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back
Technical Track
Zhongxin Liu Zhejiang University, Zhijie Tang Zhejiang University, Xin Xia Huawei, Xiaohu Yang Zhejiang University
Pre-print
11:30
15m
Talk
Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models
Technical Track
Shuzheng Gao Harbin institute of technology, Hongyu Zhang The University of Newcastle, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology
11:45
7m
Talk
PCR-Chain: Partial Code Reuse Assisted by Hierarchical Chaining of Prompts on Frozen Copilot
DEMO - Demonstrations
Qing Huang School of Computer Information Engineering, Jiangxi Normal University, Jiahui Zhu School of Computer Information Engineering, Jiangxi Normal University, Zhilong Li School of Computer Information Engineering, Jiangxi Normal University, Zhenchang Xing , Changjing Wang School of Computer Information Engineering, Jiangxi Normal University, Xiwei (Sherry) Xu CSIRO’s Data61
11:52
7m
Talk
Towards Learning Generalizable Code Embeddings using Task-agnostic Graph Convolutional Networks
Journal-First Papers
Zishuo Ding Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo, Tse-Hsun (Peter) Chen Concordia University
12:00
7m
Talk
deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search
Journal-First Papers
Chen Zeng National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Shanshan Li National University of Defense Technology, Xin Xia Huawei, Wang Zhiming National University of Defense Technology, Mingyang Geng National University of Defense Technology, Linxiao Bai National University of Defense Technology, Wei Dong School of Computer, National University of Defense Technology, China, Xiangke Liao National University of Defense Technology
12:07
7m
Talk
CodeS: Towards Code Model Generalization Under Distribution Shift
NIER - New Ideas and Emerging Results
Qiang Hu University of Luxembourg, Yuejun GUo University of Luxembourg, Xiaofei Xie Singapore Management University, Maxime Cordy University of Luxembourg, Luxembourg, Lei Ma University of Alberta, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
12:15
7m
Talk
Towards using Few-Shot Prompt Learning for Automating Model Completion
NIER - New Ideas and Emerging Results
Meriem Ben Chaaben Université de Montréal, DIRO, Lola Burgueño University of Malaga, Houari Sahraoui Université de Montréal
11:00 - 12:30
Fuzzing: applicationsTechnical Track / DEMO - Demonstrations at Meeting Room 101
Chair(s): Corina S. Păsăreanu Carnegie Mellon University
11:00
15m
Talk
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Technical Track
Haoxiang Jia Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zifan Xie Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Rongxin Wu Xiamen University, Maolin Sun Huazhong University of Science and Technology, Kang Chen Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Pre-print
11:15
15m
Talk
JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers
Technical Track
Mingyuan Wu Southern University of Science and Technology, Minghai Lu Southern University of Science and Technology, Heming Cui University of Hong Kong, Junjie Chen Tianjin University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
11:30
15m
Talk
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Technical Track
Maolin Sun Huazhong University of Science and Technology, Yibiao Yang Nanjing University, Ming Wen Huazhong University of Science and Technology, Yongcong Wang Huazhong University of Science and Technology, Yuming Zhou Nanjing University, Hai Jin Huazhong University of Science and Technology
Pre-print
11:45
15m
Talk
Regression Fuzzing for Deep Learning Systems
Technical Track
Hanmo You College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Junjie Chen Tianjin University, Shuang Liu Tianjin University, Shuochuan Li College of Intelligence and Computing, Tianjin University
12:00
15m
Talk
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers
Technical Track
Suyue Guo Renmin University of China, Xinyu Wan Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, China, Wenchang Shi Renmin University of China, China, Yiwei Zhang Renmin University of China, Jianjun Huang Renmin University of China, China, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Pre-print
12:15
7m
Talk
JAttack: Java JIT Testing using Template Programs
DEMO - Demonstrations
Zhiqiang Zang University of Texas at Austin, Fu-Yao Yu The University of Texas at Austin, Nathan Wiatrek The University of Texas at Austin, Milos Gligoric University of Texas at Austin, August Shi University of Texas at Austin
Pre-print
11:00 - 12:30
Mining software repositoriesTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102
Chair(s): Brittany Johnson George Mason University
11:00
15m
Talk
The untold story of code refactoring customizations in practice
Technical Track
Daniel Oliveira PUC-Rio, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Alessandro Garcia PUC-Rio, Ana Carla Bibiano PUC-Rio, Márcio Ribeiro Federal University of Alagoas, Brazil, Rohit Gheyi Federal University of Campina Grande, Baldoino Fonseca Federal University of Alagoas (UFAL)
Pre-print
11:15
15m
Talk
Data Quality for Software Vulnerability Datasets
Technical Track
Roland Croft The University of Adelaide, Muhammad Ali Babar University of Adelaide, M. Mehdi Kholoosi University of Adelaide
Pre-print
11:30
15m
Talk
Do code refactorings influence the merge effort?
Technical Track
André Oliveira Federal Fluminense University, Vania Neves Universidade Federal Fluminense (UFF), Alexandre Plastino Federal Fluminense University, Ana Carla Bibiano PUC-Rio, Alessandro Garcia PUC-Rio, Leonardo Murta Universidade Federal Fluminense (UFF)
11:45
7m
Talk
ActionsRemaker: Reproducing GitHub Actions
DEMO - Demonstrations
Hao-Nan Zhu University of California, Davis, Kevin Z. Guan University of California, Davis, Robert M. Furth University of California, Davis, Cindy Rubio-González University of California at Davis
11:52
7m
Talk
Problems with with SZZ and Features: An empirical assessment of the state of practice of defect prediction data collection
Journal-First Papers
Steffen Herbold University of Passau, Alexander Trautsch University of Passau, Alexander Trautsch Germany, Benjamin Ledel None
12:00
7m
Talk
An empirical study of issue-link algorithms: which issue-link algorithms should we use?
Journal-First Papers
Masanari Kondo Kyushu University, Yutaro Kashiwa Nara Institute of Science and Technology, Yasutaka Kamei Kyushu University, Osamu Mizuno Kyoto Institute of Technology
12:07
7m
Talk
SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification
Journal-First Papers
Weihan Ou Queen's University at Kingston, Ding Steven, H., H. Queen’s University at Kingston, Yuan Tian Queens University, Kingston, Canada, Leo Song Queen’s University at Kingston
12:15
15m
Talk
A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization
Technical Track
Hao Guan The University of Queensland, Ying Xiao Southern University of Science and Technology, Jiaying LI Microsoft, Yepang Liu Southern University of Science and Technology, Guangdong Bai University of Queensland
11:00 - 12:30
Fault localizationJournal-First Papers / Technical Track / Showcase at Meeting Room 103
Chair(s): Rui Abreu University of Porto
11:00
15m
Talk
Evaluating the Impact of Experimental Assumptions in Automated Fault Localization
Technical Track
Ezekiel Soremekun Royal Holloway, University of London, Lukas Kirschner Saarland University, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Mike Papadakis University of Luxembourg, Luxembourg
Pre-print Media Attached
11:15
15m
Talk
Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set
Technical Track
Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Yepang Liu Southern University of Science and Technology, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences
Pre-print
11:30
15m
Talk
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports
Technical Track
Sunzhou Huang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio
Pre-print Media Attached
11:45
15m
Talk
Bug localization in game software engineering: evolving simulations to locate bugs in software models of video games
Showcase
Rodrigo Casamayor SVIT Research Group. Universidad San Jorge, Lorena Arcega San Jorge University, Francisca Pérez SVIT Research Group, Universidad San Jorge, Carlos Cetina San Jorge University, Spain
DOI
12:00
7m
Talk
Real World Projects, Real Faults: Evaluating Spectrum Based Fault Localization Techniques on Python Projects
Journal-First Papers
Ratnadira Widyasari Singapore Management University, Singapore, Gede Artha Azriadi Prana Singapore Management University, Stefanus Agus Haryono Singapore Management University, Shaowei Wang University of Manitoba, David Lo Singapore Management University
12:07
7m
Talk
Effective Isolation of Fault-Correlated Variables via Statistical and Mutation Analysis
Journal-First Papers
Ming Wen Huazhong University of Science and Technology, Zifan Xie Huazhong University of Science and Technology, Kaixuan Luo Huazhong University of Science and Technology, Xiao Chen Huazhong University of Science and Technology, Yibiao Yang Nanjing University, Hai Jin Huazhong University of Science and Technology
12:15
15m
Talk
RAT: A Refactoring-Aware Traceability Model for Bug Localization
Technical Track
Feifei Niu Nanjing University, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Liguo Huang Southern Methodist University, Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Jidong Ge Nanjing University, Bin Luo Nanjing University, Alexander Egyed Johannes Kepler University Linz
File Attached
11:00 - 12:30
11:00
15m
Talk
How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms
Technical Track
Hammad Ahmad University of Michigan, Zachary Karas University of Michigan, Kimberly Diaz University of Michigan, Amir Kamil University of Michigan, Jean-Baptiste Jeannin University of Michigan at Ann Arbor, Westley Weimer University of Michigan
11:15
15m
Talk
Which of My Assumptions are Unnecessary for Realizability and Why Should I Care?
Technical Track
Rafi Shalom Tel Aviv University, Israel, Shahar Maoz Tel Aviv University
Pre-print
11:30
15m
Talk
Understanding Inconsistency in Azure Cosmos DB with TLA+
SEIP - Software Engineering in Practice
Alistair Finn Hackett University of British Columbia, Joshua Rowe Microsoft, Markus Alexander Kuppe Microsoft Research
11:45
15m
Talk
Rely/Guarantee Reasoning for Multicopy Atomic Weak Memory Models
Showcase
Nicholas Coughlin Defence Science and Technology Group, Australia, Kirsten Winter Defence Science and Technology Group, Australia, Graeme Smith The University of Queensland
12:00
7m
Talk
HOME: Heard-Of based Formal Modeling and Verification Environment for Consensus Protocols
DEMO - Demonstrations
Shumao Zhai Beihang University, Xiaozhou Li University of Oulu, Ning Ge School of Software, Beihang University
12:07
7m
Talk
CoVeriTeam Service: Verification as a Service
DEMO - Demonstrations
Dirk Beyer LMU Munich, Sudeep Kanav LMU Munich, Henrik Wachowitz LMU Munich
12:15
7m
Talk
Proofster: Automated Formal Verification
DEMO - Demonstrations
Arpan Agrawal University of Illinois Urbana-Champaign, Emily First University of Massachusetts Amherst, Zhanna Kaufman University of Massachusetts, Tom Reichel University of Illinois Urbana-Champaign, Shizhuo Zhang University of Illinois Urbana-Champaign, Timothy Zhou University of Illinois Urbana-Champaign, Alex Sanchez-Stern University of Massachusetts at Amherst, Talia Ringer University of Illinois at Urbana-Champaign, Yuriy Brun University of Massachusetts
Media Attached
12:22
7m
Talk
Anti-Patterns (Smells) in Temporal Specifications
NIER - New Ideas and Emerging Results
Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University, Jan Oliver Ringert Bauhaus-University Weimar
Pre-print
11:00 - 12:30
11:00
15m
Talk
UpCy: Safely Updating Outdated Dependencies
Technical Track
Andreas Dann Paderborn University, Ben Hermann TU Dortmund, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM
Pre-print
11:15
15m
Talk
APICAD: Augmenting API Misuse Detection Through Specifications From Code And Documents
Technical Track
Xiaoke Wang Wuhan University, Lei Zhao Wuhan University
DOI Pre-print
11:30
15m
Talk
Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis
Technical Track
Sen Yang Army Engineering University of PLA, Sen Chen Tianjin University, Lingling Fan Nankai University, Sihan Xu Nankai University, China, Zhanwei Hui Academy of Military Science, Song Huang Army Engineering University of PLA
11:45
15m
Talk
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions
Technical Track
Wu Jiahui Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Wei Tang Tsinghua University, Lyuye Zhang Nanyang Technological University, Yueming Wu Nanyang Technological University, Chengyue Liu Scantist, Kairan Sun Singapore University of Technology and Design, Lida Zhao Nanyang Technological University, Yang Liu Nanyang Technological University
12:00
15m
Talk
Scaling Web API Integrations
SEIP - Software Engineering in Practice
Pre-print
12:15
7m
Talk
Giving Back: Contributions Congruent to Library Dependency Changes in a Software Ecosystem
Journal-First Papers
Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Dong Wang Kyushu University, Japan, Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne, Patanamon Thongtanunam University of Melbourne, Takashi Ishio Future University Hakodate, Kenichi Matsumoto Nara Institute of Science and Technology
Link to publication
12:22
7m
Talk
Breaking Bad? Semantic Versioning and Impact of Breaking Changes in Maven Central
Journal-First Papers
Lina Ochoa Eindhoven University of Technology, Thomas Degueule CNRS, LaBRI, Jean-Rémy Falleri Bordeaux INP, Jurgen Vinju CWI; Eindhoven University of Technology
11:00 - 12:30
Blockchain/smart contractsTechnical Track / DEMO - Demonstrations / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 106
Chair(s): Yi Li Nanyang Technological University
11:00
15m
Talk
SmartMark: Software Watermarking Scheme for Smart Contracts
Technical Track
Taeyoung Kim Sungkyunkwan University, Yunhee Jang Sungkyunkwan University, Chanjong Lee Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, hyoungshick kim Sungkyunkwan University
11:15
15m
Talk
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum
Technical Track
Zibin Zheng School of Software Engineering, Sun Yat-sen University, Neng Zhang School of Software Engineering, Sun Yat-sen University, Jianzhong Su Sun Yat-sen University, Zhijie Zhong School of Software Engineering, Sun Yat-sen University, Mingxi Ye Sun Yat-sen University, Jiachi Chen School of Software Engineering, Sun Yat-sen University
Pre-print
11:30
15m
Talk
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts
Technical Track
Peilin Zheng Sun Yat-sen University, Xiapu Luo The Hong Kong Polytechnic University, Zibin Zheng School of Software Engineering, Sun Yat-sen University
Pre-print File Attached
11:45
15m
Talk
DAppHunter: Identifying Inconsistent Behaviors of Blockchain-based Decentralized Applications
SEIP - Software Engineering in Practice
Jianfei Zhou University of Electronic Science and Technology of China, Jiang Tianxing , Haijun Wang Ant Group, Meng Wu Ant Group, Ting Chen University of Electronic Science and Technology of China
12:00
15m
Talk
Evolutionary Approach for Concurrency Testing of Ripple Blockchain Consensus Algorithm
SEIP - Software Engineering in Practice
Martijn van Meerten Delft University of Technology, Burcu Kulahcioglu Ozkan Delft University of Technology, Annibale Panichella Delft University of Technology
12:15
7m
Talk
Siguard: Detecting Signature-Related Vulnerabilities in Smart Contracts
DEMO - Demonstrations
Jiashuo Zhang Peking University, China, Yue Li Peking University, Jianbo Gao Peking University, Zhi Guan Peking University, Zhong Chen
12:22
7m
Talk
Storage State Analysis and Extraction of Ethereum Blockchain Smart Contracts
Journal-First Papers
Maha Ayub Information Technology University (ITU) Lahore, Pakistan, Tania Saleem Information Technology University (ITU) Lahore, Pakistan, Muhammad Umar Janjua Information Technology University (ITU) Lahore, Pakistan, Talha Ahmed Information Technology University (ITU) Lahore, Pakistan
11:00 - 12:30
11:00
90m
Poster
SRC Posters
SRC - ACM Student Research Competition
Muneera Bano CSIRO's Data61, Lingxiao Jiang Singapore Management University
11:00 - 12:30
11:00
15m
Talk
Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel ContributorsDistinguished Paper Award
Technical Track
Bianca Trinkenreich Northern Arizona University, USA, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital , Anita Sarma Oregon State University, Daniel M. German University of Victoria, Marco Gerosa Northern Arizona University, Igor Steinmacher Northern Arizona University
Pre-print
11:15
15m
Talk
Cognitive Reflection in Software Verification and Testing
SEET - Software Engineering Education and Training
Kevin Buffardi California State University, Chico
11:30
15m
Talk
A Model for Understanding and Reducing Developer Burnout
SEIP - Software Engineering in Practice
Bianca Trinkenreich Northern Arizona University, USA, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital , Igor Steinmacher Northern Arizona University, Marco Gerosa Northern Arizona University, Anita Sarma Oregon State University, Marcelo Lara Globant, Michael Feathers Globant, Nick Ross Globant, Kevin Bishop Globant
Pre-print
11:45
15m
Full-paper
Designing for Cognitive Diversity: Improving the GitHub Experience for Newcomers
SEIS - Software Engineering in Society
Italo Santos Northern Arizona University, João Felipe Pimentel Northern Arizona University, Igor Wiese Federal University of Technology, Igor Steinmacher Northern Arizona University, Anita Sarma Oregon State University, Marco Gerosa Northern Arizona University
Pre-print
12:00
7m
Talk
From Anecdote to Evidence: The Relationship Between Personality and Need for Cognition of Developers
Journal-First Papers
Daniel Russo Department of Computer Science, Aalborg University, Andres R. Masegosa Aalborg University, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital
Link to publication DOI Pre-print
12:07
7m
Talk
A Qualitative Study of Developers’ Discussions of Their Problems and Joys During the Early COVID-19 Months
Journal-First Papers
Gias Uddin University of Calgary, Canada, Omar Alam Trent University, Alexander Serebrenik Eindhoven University of Technology
12:15
7m
Talk
Interpersonal trust in OSS: Exploring dimensions of trust in GitHub pull requests
NIER - New Ideas and Emerging Results
Amirali Sajadi Drexel University, Kostadin Damevski Virginia Commonwealth University, Preetha Chatterjee Drexel University, USA
Pre-print
12:22
7m
Talk
The risk-taking software engineer: A framed portrait
NIER - New Ideas and Emerging Results
Lorenz Graf-Vlachy University of Stuttgart
Pre-print
11:00 - 12:30
11:00
15m
Talk
A Model-based, Quality Attribute-guided Architecture Re-Design Process at Google
SEIP - Software Engineering in Practice
Qin Jia Google LLC, Yuanfang Cai Drexel University, Onur Çakmak Google LLC
11:15
15m
Talk
Efficient Replay-based Regression Testing for Distributed Reactive Systems in the Context of Model-driven Development
Showcase
Majid Babaei McGill University, Juergen Dingel Queen's University, Kingston, Ontario
11:30
15m
Talk
A GNN-based Recommender System to Assist the Specification of Metamodels and Models
Showcase
Juri Di Rocco University of L'Aquila, Claudio Di Sipio University of L'Aquila, Davide Di Ruscio University of L'Aquila, Phuong T. Nguyen University of L’Aquila
11:45
7m
Talk
RM2DM: A Tool for Automatic Generation of OO Design Models from Requirements Models
DEMO - Demonstrations
Zhen Tian Beihang University, Yilong Yang Beihang University, Sheng Cheng Software Engineering and Digitalization Center of China Manned Space Engineering
11:52
7m
Talk
(Journal-First Track) PRINS: Scalable Model Inference for Component-Based System Logs
Journal-First Papers
Donghwan Shin The University of Sheffield, Domenico Bianculli University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication DOI
12:00
7m
Talk
Advantages and disadvantages of (dedicated) model transformation languages: A qualitative interview study
Journal-First Papers
Stefan Höppner Ulm University, Yves Haas Institute of Software Engineering and Programming Languages, Ulm University, Matthias Tichy Ulm University, Germany, Katharina Juhnke Institute of Software Engineering and Programming Languages, Ulm University
12:07
7m
Talk
Automated Generation of Consistent Graph Models With Multiplicity Reasoning
Journal-First Papers
Kristóf Marussy Budapest University of Technology and Economics, Oszkár Semeráth Budapest University of Technology and Economics, Daniel Varro Linköping University / McGill University
12:15
7m
Talk
MLTEing Models: Negotiating, Evaluating, and Documenting Model and System Qualities
NIER - New Ideas and Emerging Results
Katherine R. Maffey AI Integration Center, Kyle Dotterrer AI Integration Center, Jennifer Niemann AI Integration Center, Iain Cruickshank Army Cyber Institute, Grace Lewis Carnegie Mellon Software Engineering Institute, Christian Kästner Carnegie Mellon University
Pre-print
11:00 - 12:30
Technical Briefing 1Technical Briefings at Meeting Room 111
11:00
90m
Talk
Quantum Software Testing: A Brief Introduction
Technical Briefings
Shaukat Ali Simula Research Laboratory, Tao Yue Simula Research Laboratory
Pre-print
13:45 - 15:15
Code smells and clonesTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Level G - Plenary Room 1
Chair(s): Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity
13:45
15m
Talk
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations
Technical Track
Yuekun Wang University of Science and Technology of China, Yuhang Ye University of Science and Technology of China, Yueming Wu Nanyang Technological University, Weiwei Zhang University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Yang Liu Nanyang Technological University
14:00
15m
Talk
Learning Graph-based Code Representations for Source-level Functional Similarity Detection
Technical Track
Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Zhenkai Liang National University of Singapore
14:15
15m
Talk
The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing
Technical Track
Qihong Chen University of California, Irvine, Rúben Câmara LASIGE and Department of Informatics are Faculdade Ciências Universidade de Lisboa,, José Campos University of Porto, Portugal, André Souto LaSiGE & FCUL, University of Lisbon, Iftekhar Ahmed University of California at Irvine
Pre-print
14:30
15m
Talk
An Empirical Comparison on the Results of Different Clone Detection Setups for C-based Projects
SEIP - Software Engineering in Practice
Yan Zhou Huawei, Jinfu Chen Centre for Software Excellence, Huawei, Canada, Yong Shi Huawei Technologies, Boyuan Chen Centre for Software Excellence, Huawei Canada, Zhen Ming (Jack) Jiang York University
14:45
7m
Talk
Developers’ perception matters: machine learning to detect developer-sensitive smells
Journal-First Papers
Daniel Oliveira PUC-Rio, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Alessandro Garcia PUC-Rio, Baldoino Fonseca Federal University of Alagoas (UFAL), Márcio Ribeiro Federal University of Alagoas, Brazil
14:52
7m
Talk
Smells in system user interactive tests
Journal-First Papers
Renaud Rwemalika University of Luxembourg, Sarra Habchi Ubisoft, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg, Marie-Claude Brasseur BGL BNP Paribas
15:00
7m
Talk
Bash in the Wild: Language Usage, Code Smells, and Bugs
Journal-First Papers
Yiwen Dong University of Waterloo, Zheyang Li University of Waterloo, Yongqiang Tian University of Waterloo, Chengnian Sun University of Waterloo, Michael W. Godfrey University of Waterloo, Canada, Mei Nagappan University of Waterloo
15:07
7m
Talk
1-to-1 or 1-to-n? Investigating the effect of function inlining on binary similarity analysis
Journal-First Papers
Ang Jia Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Wuxia Jin Xi'an Jiaotong University, Xi Xu Xi'an Jiaotong University, Zhaohui Zhou Xi'an Jiaotong University, Qiyi Tang Tencent Security Keen Lab, Sen Nie Keen Security Lab, Tencent, Shi Wu Tencent Security Keen Lab, Ting Liu Xi'an Jiaotong University
13:45 - 15:15
Fuzzing: techniques and toolsTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 101
Chair(s): Mike Papadakis University of Luxembourg, Luxembourg
13:45
7m
Talk
Neural Network Guided Evolutionary Fuzzing for Finding Traffic Violations of Autonomous Vehicles
Journal-First Papers
Ziyuan Zhong Columbia University, Gail Kaiser Columbia University, Baishakhi Ray Columbia University
13:52
15m
Talk
Reachable Code Coverage
Technical Track
Danushka Liyanage Monash University, Australia, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Kla Tantithamthavorn Monash University, Stephan Lipp Technical University of Munich
14:07
15m
Talk
Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing
Technical Track
Myungho Lee Korea University, Sooyoung Cha Sungkyunkwan University, Hakjoo Oh Korea University
14:22
15m
Talk
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation
Technical Track
Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Rongxin Wu Xiamen University, Wei Liu Nanjing University, Biao He Ant Group, Yu Ouyang Ant Group, Jiajia Li Ant Group
14:37
15m
Talk
Evaluating and Improving Hybrid Fuzzing
Technical Track
Ling Jiang Southern University of Science and Technology, Hengchen Yuan Southern University of Science and Technology, Mingyuan Wu Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign, Yuqun Zhang Southern University of Science and Technology
14:52
15m
Talk
DAISY: Effective Fuzz Driver Synthesis with Object Usage Sequence Analysis
SEIP - Software Engineering in Practice
Mingrui Zhang Tsinghua University, Beijing, China, Chijin Zhou Tsinghua University, Jianzhong Liu ShanghaiTech University, Mingzhe Wang Tsinghua University, Jie Liang , Juan Zhu , Yu Jiang Tsinghua University
13:45 - 15:15
13:45
15m
Talk
Robustification of Behavioral Designs against Environmental Deviations
Technical Track
Changjian Zhang Carnegie Mellon University, Tarang Saluja Swarthmore College, Rômulo Meira-Góes Carnegie Mellon University, Matthew Bolton University of Virginia, David Garlan Carnegie Mellon University, Eunsuk Kang Carnegie Mellon University
Pre-print
14:00
15m
Talk
A Qualitative Study on the Implementation Design Decisions of DevelopersDistinguished Paper Award
Technical Track
Jenny T. Liang Carnegie Mellon University, Maryam Arab George Mason University, Minhyuk Ko Virginia Tech, Amy Ko University of Washington, Thomas LaToza George Mason University
Pre-print
14:15
15m
Talk
Designing for Real People: Teaching Agility through User-Centric Service Design
SEET - Software Engineering Education and Training
Robert Chatley Imperial College London, Tony Field Imperial College London, Mark Wheelhouse Imperial College London, Carolyn Runcie Royal College of Art, Nick de Leon Royal College of Art, Clive Grinyer Royal College of Art
Pre-print
14:30
15m
Talk
A Decision Model for Choosing Patterns in Blockchain-Based Applications
Showcase
Xiwei (Sherry) Xu CSIRO’s Data61, ‪H M N Dilum Bandara Data61, CSIRO, Qinghua Lu CSIRO’s Data61, Ingo Weber TU Munich & Fraunhofer, Munich, Len Bass Carnegie Mellon University, Liming Zhu CSIRO’s Data61
14:45
15m
Talk
Architectural Design Decisions for Machine Learning Deployment
Showcase
Stephen John Warnett University of Vienna, Uwe Zdun University of Vienna
15:00
7m
Talk
Handling Communication via APIs for Microservices
NIER - New Ideas and Emerging Results
Vini Kanvar IBM Research, Ridhi Jain IIIT-Delhi, Srikanth Tamilselvam IBM Research
15:07
7m
Talk
Open Design Case Study - A Crowdsourcing Effort to Curate Software Design Case Studies
SEET - Software Engineering Education and Training
Chun Yong Chong Monash University Malaysia, Eunsuk Kang Carnegie Mellon University, Mary Shaw Carnegie Mellon University
Pre-print
13:45 - 15:15
Software security and privacyTechnical Track / Journal-First Papers at Meeting Room 103
Chair(s): Wei Yang University of Texas at Dallas
13:45
15m
Talk
BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service
Technical Track
I Luk Kim Purdue University, Weihang Wang University of Southern California, Yonghwi Kwon University of Virginia, Xiangyu Zhang Purdue University
14:00
15m
Talk
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing
Technical Track
Ziqi Zhang Peking University, Yuanchun Li Institute for AI Industry Research (AIR), Tsinghua University, Bingyan Liu Peking University, Yifeng Cai Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University
14:15
15m
Talk
PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps
Technical Track
Zeya Tan Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology
Pre-print
14:30
15m
Talk
AdHere: Automated Detection and Repair of Intrusive Ads
Technical Track
Yutian Yan University of Southern California, Yunhui Zheng , Xinyue Liu University at Buffalo, SUNY, Nenad Medvidović University of Southern California, Weihang Wang University of Southern California
14:45
15m
Talk
Bad Snakes: Understanding and Improving Python Package Index Malware Scanning
Technical Track
Duc Ly Vu Chainguard and FPT University, Zachary Newman Chainguard, John Speed Meyers Chainguard
15:00
7m
Talk
DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data
Journal-First Papers
Xueling Zhang Rochester Institute of Technology, John Heaps University of Texas at San Antonio, Rocky Slavin The University of Texas at San Antonio, Jianwei Niu University of Texas at San Antonio, Travis Breaux Carnegie Mellon University, Xiaoyin Wang University of Texas at San Antonio
15:07
7m
Talk
Assessing the opportunity of combining state-of-the-art Android malware detectors
Journal-First Papers
Nadia Daoudi SnT, University of Luxembourg, Kevin Allix CentraleSupelec Rennes, Tegawendé F. Bissyandé SnT, University of Luxembourg, Jacques Klein University of Luxembourg
13:45 - 15:15
13:45
15m
Talk
FedDebug: Systematic Debugging for Federated Learning Applications
Technical Track
Waris Gill Virginia Tech, Ali Anwar University of Minnesota, Muhammad Ali Gulzar Virginia Tech
14:00
15m
Talk
Practical and Efficient Model Extraction of Sentiment Analysis APIs
Technical Track
Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Victor Junqiu Wei The Hong Kong Polytechnic University, Xixian Chen Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University, Irwin King The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
14:15
15m
Talk
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models
Technical Track
Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Bin Luo Nanjing University
Pre-print
14:30
15m
Talk
Challenges in Adopting Artificial Intelligence Based User Input Verification Framework in Reporting Software Systems
SEIP - Software Engineering in Practice
Dong Jae Kim Concordia University, Tse-Hsun (Peter) Chen Concordia University, Steve Sporea , Andrei Toma ERA Environmental Management Solutions, Laura Weinkam , Sarah Sajedi ERA Environmental Management Solutions, Steve Sporea
14:45
7m
Talk
Towards Understanding Quality Challenges of the Federated Learning for Neural Networks: A First Look from the Lens of Robustness
Journal-First Papers
Amin Eslami Abyane University of Calgary, Derui Zhu Technical University of Munich, Roberto Souza University of Calgary, Lei Ma University of Alberta, Hadi Hemmati York University
14:52
7m
Talk
An Empirical Study of the Impact of Hyperparameter Tuning and Model Optimization on the Performance Properties of Deep Neural Networks
Journal-First Papers
Lizhi Liao Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo, Lei Ma University of Alberta
15:00
7m
Talk
Black-box Safety Analysis and Retraining of DNNs based on Feature Extraction and Clustering
Journal-First Papers
Mohammed Attaoui University of Luxembourg, Hazem FAHMY University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication Pre-print
15:07
7m
Talk
Iterative Assessment and Improvement of DNN Operational Accuracy
NIER - New Ideas and Emerging Results
Antonio Guerriero Università di Napoli Federico II, Roberto Pietrantuono Università di Napoli Federico II, Stefano Russo Università di Napoli Federico II
Pre-print
13:45 - 15:15
13:45
15m
Talk
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis
Technical Track
Austin Mordahl University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Dakota Soles The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas
Pre-print
14:00
15m
Talk
Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis
Technical Track
Sahar Badihi University of British Columbia, Canada, Khaled Ahmed University of British Columbia (UBC), Yi Li Nanyang Technological University, Julia Rubin University of British Columbia, Canada
Pre-print
14:15
15m
Talk
Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific Debuggers
Technical Track
Jan Reichl , Stefan Hanenberg University of Duisburg-Essen, Essen, Germany, Volker Gruhn University Duisburg-Essen
Pre-print
14:30
15m
Talk
Fonte: Finding Bug Inducing Commits from Failures
Technical Track
Gabin An KAIST, Jingun Hong SAP Labs, Naryeong Kim KAIST, Shin Yoo KAIST
Pre-print
14:45
15m
Talk
Do the Test Smells Assertion Roulette and Eager Test Impact Students’ Troubleshooting and Debugging Capabilities?
SEET - Software Engineering Education and Training
Wajdi Aljedaani University of North Texas, Mohamed Wiem Mkaouer Rochester Institute of Technology, Anthony Peruma University of Hawai‘i at Mānoa, Stephanie Ludi University of North Texas
Pre-print
15:00
7m
Talk
RexStepper: a Reference Debugger for JavaScript Regular Expressions
DEMO - Demonstrations
Luis Almeida IST, Miguel Gonzaga IST, José Fragoso Santos INESC-ID/Instituto Superior Técnico, Portugal , Rui Abreu University of Porto
15:07
7m
Talk
Toward Gaze-assisted Developer Tools
NIER - New Ideas and Emerging Results
Peng Kuang Lund University, Emma Söderberg Lund University, Diederick Niehorster Lund University, Martin Höst Lund University
Pre-print
13:45 - 15:15
13:45
15m
Talk
RepresentThemAll: A Universal Learning Representation of Bug Reports
Technical Track
Sen Fang Macau University of Science and Technology, Tao Zhang Macau University of Science and Technology, Youshuai Tan Macau University of Science and Technology, He Jiang Dalian University of Technology, Xin Xia Huawei, Xiaobing Sun Yangzhou University
14:00
15m
Talk
Demystifying Exploitable Bugs in Smart Contracts
Technical Track
Zhuo Zhang Purdue University, Brian Zhang Harrison High School (Tippecanoe), Wen Xu PNM Labs, Zhiqiang Lin The Ohio State University
Pre-print
14:15
15m
Talk
Understanding and Detecting On-the-Fly Configuration BugsDistinguished Paper Award
Technical Track
Teng Wang National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Si Zheng National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Erci Xu National University of Defense Technology, Shaoliang Peng Hunan University, Xiangke Liao National University of Defense Technology
Pre-print
14:30
15m
Talk
Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation
Technical Track
Parvez Mahbub Dalhousie University, Ohiduzzaman Shuvo Dalhousie University, Masud Rahman Dalhousie University
Pre-print Media Attached
14:45
15m
Talk
Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services
SEIP - Software Engineering in Practice
Zexin Zhong Ant Group; University of Technology Sydney, Jiangchao Liu Ant Group, Diyu Wu Ant Group, Peng Di Ant Group, Yulei Sui University of New South Wales, Sydney, Alex X. Liu Ant Group, John C.S. Lui The Chinese University of Hong Kong
15:00
7m
Talk
Exploring the relationship between performance metrics and cost saving potential of defect prediction models
Journal-First Papers
Steffen Tunkel None, Steffen Herbold University of Passau
15:07
7m
Talk
A Machine and Deep Learning analysis among SonarQube rules, Product, and Process Metrics for Faults Prediction
Journal-First Papers
Francesco Lomio Constructor Institute Schaffhausen, Sergio Moreschini Tampere University, Valentina Lenarduzzi University of Oulu
13:45 - 15:15
13:45
15m
Talk
Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First Issues
Technical Track
Xin Tan Beihang University,, Yiran Chen Beihang University, Haohua Wu Beihang University, Minghui Zhou Peking University, Li Zhang Beihang University
Pre-print
14:00
15m
Talk
From Organizations to Individuals: Psychoactive Substance Use By Professional Programmers
Technical Track
Kaia Newman University of Michigan, Madeline Endres University of Michigan, Westley Weimer University of Michigan, Brittany Johnson George Mason University
Pre-print
14:15
15m
Talk
On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical Study
Technical Track
Likang Yin University of California at Davis, Xiyu Zhang University of California Davis, Vladimir Filkov University of California at Davis, USA
14:30
15m
Talk
Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the Forefront
Technical Track
Alina Mailach Leipzig University, Norbert Siegmund Leipzig University
Pre-print
14:45
15m
Talk
Moving on from the software engineers' gambit: an approach to support the defense of software effort estimates
Technical Track
Patricia Matsubara Federal University of Mato Grosso do Sul (UFMS), Igor Steinmacher Northern Arizona University, Bruno Gadelha UFAM, Tayana Conte Universidade Federal do Amazonas
Pre-print
15:00
7m
Talk
iTrace-Toolkit: A Pipeline for Analyzing Eye-Tracking Data of Software Engineering Studies
DEMO - Demonstrations
Joshua Behler Kent State University, Praxis Weston Kent State University, Drew Guarnera College of Wooster, Bonita Sharif University of Nebraska-Lincoln, USA, Jonathan I. Maletic Kent State University
15:07
7m
Talk
Under the Bridge: Trolling and the Challenges of Recruiting Software Developers for Empirical Research Studies
NIER - New Ideas and Emerging Results
Ella Kokinda Clemson University, Makayla Moster Clemson University, James Dominic Clemson University, Paige Rodeghero Clemson University
Pre-print
13:45 - 15:15
Program translation and synthesisTechnical Track / Showcase / NIER - New Ideas and Emerging Results at Meeting Room 110
Chair(s): Andy Zaidman Delft University of Technology
13:45
15m
Talk
Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs
Technical Track
Pre-print
14:00
15m
Talk
Triggers for Reactive Synthesis Specifications
Technical Track
Gal Amram Tel Aviv University, Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University, Or Pistiner Tel Aviv University, Jan Oliver Ringert Bauhaus-University Weimar
Pre-print
14:15
15m
Talk
Using Reactive Synthesis: An End-to-End Exploratory Case Study
Technical Track
Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University
Pre-print
14:30
15m
Talk
Pegasus: A Framework for Sound Continuous Invariant Generation
Showcase
Andrew Sogokon , Stefan Mitsch Carnegie Mellon University, USA, Yong Kiam Tan Carnegie Mellon University, Katherine Kosaian CMU, Carnegie Mellon University, André Platzer Karlsruhe Institute of Technology (KIT)
14:45
7m
Talk
On ML-Based Program Translation: Perils and Promises
NIER - New Ideas and Emerging Results
Aniketh Malyala Yale University, Katelyn Zhou Silver Creek High School, Baishakhi Ray Columbia University, Saikat Chakraborty Microsoft Research
Pre-print
14:52
15m
Talk
Syntax and Domain Aware Model for Unsupervised Program Translation
Technical Track
Fang Liu Beihang University, Jia Li Peking University, Li Zhang Beihang University
Pre-print
13:45 - 15:15
Technical Briefing 5aTechnical Briefings at Meeting Room 112
13:45
90m
Talk
SAIN: A Community-Wide Software Architecture INfrastructure
Technical Briefings
Joshua Garcia University of California, Irvine, Mehdi Mirakhorli Rochester Institute of Technology, Lu Xiao Stevens Institute of Technology, Sam Malek University of California at Irvine, Rick Kazman University of Hawai‘i at Mānoa, Yuanfang Cai Drexel University, Nenad Medvidović University of Southern California
15:15 - 15:45
15:15
2m
Poster
Distribution-aware Fairness Test Generation
Posters
Sai Sathiesh Rajan Singapore University of Technology and Design, Singapore, Ezekiel Soremekun Royal Holloway, University of London, Sudipta Chattopadhyay Singapore University of Technology and Design, Yves Le Traon University of Luxembourg, Luxembourg
15:17
2m
Talk
Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods
Technical Track
Daye Nam Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University
Pre-print
15:19
2m
Talk
Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations
Technical Track
Jongwook Kim Korea University, Sunbeom So Korea University, Hakjoo Oh Korea University
15:21
2m
Talk
Demystifying Exploitable Bugs in Smart Contracts
Technical Track
Zhuo Zhang Purdue University, Brian Zhang Harrison High School (Tippecanoe), Wen Xu PNM Labs, Zhiqiang Lin The Ohio State University
Pre-print
15:23
2m
Talk
An Empirical Study of Deep Learning Models for Vulnerability Detection
Technical Track
Benjamin Steenhoek Iowa State University, Md Mahbubur Rahman Iowa State University, Richard Jiles Iowa State University, Wei Le Iowa State University
Pre-print
15:25
2m
Talk
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform
Technical Track
Matteo Paltenghi University of Stuttgart, Germany, Michael Pradel University of Stuttgart
Pre-print
15:27
2m
Talk
Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction
Technical Track
Sungmin Kang KAIST, Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo KAIST
Pre-print
15:30
2m
Talk
Automating Code-Related Tasks Through Transformers: The Impact of Pre-training
Technical Track
Rosalia Tufano Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
15:32
2m
Talk
Generic Partition Refinement and Weighted Tree Automata
Showcase
Hans-Peter Deifel Friedrich-Alexander University Erlangen-Nürnberg, Germany, Stefan Milius , Lutz Schröder University of Erlangen-Nuremberg, Thorsten Wißmann Friedrich-Alexander University Erlangen-Nürnberg
Link to publication DOI Pre-print
15:34
2m
Talk
Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing
Technical Track
Myungho Lee Korea University, Sooyoung Cha Sungkyunkwan University, Hakjoo Oh Korea University
15:36
2m
Talk
Bug localization in game software engineering: evolving simulations to locate bugs in software models of video games
Showcase
Rodrigo Casamayor SVIT Research Group. Universidad San Jorge, Lorena Arcega San Jorge University, Francisca Pérez SVIT Research Group, Universidad San Jorge, Carlos Cetina San Jorge University, Spain
DOI
15:38
2m
Poster
Don't Complete It! Preventing Unhelpful Code Completion for Productive and Sustainable Neural Code Completion Systems
Posters
Zhensu Sun The Hong Kong Polytechnic University, Xiaoning Du Monash University, Australia, Fu Song ShanghaiTech University, Shangwen Wang National University of Defense Technology, Li Li Beihang University
15:40
2m
Talk
A Qualitative Study on the Implementation Design Decisions of DevelopersDistinguished Paper Award
Technical Track
Jenny T. Liang Carnegie Mellon University, Maryam Arab George Mason University, Minhyuk Ko Virginia Tech, Amy Ko University of Washington, Thomas LaToza George Mason University
Pre-print
15:42
2m
Poster
Closing the Loop for Software Remodularisation - REARRANGE: An Effort Estimation Approach for Software Clustering-based Remodularisation
Posters
Alvin Jian Jin Tan , Chun Yong Chong Monash University Malaysia, Aldeida Aleti Monash University
15:45 - 17:15
DocumentationTechnical Track / Journal-First Papers at Level G - Plenary Room 1
Chair(s): Denys Poshyvanyk College of William and Mary
15:45
15m
Talk
Developer-Intent Driven Code Comment Generation
Technical Track
Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print
16:00
15m
Talk
Data Quality Matters: A Case Study of ObsoleteComment Detection
Technical Track
Shengbin Xu Nanjing University, Yuan Yao Nanjing University, Feng Xu Nanjing University, Tianxiao Gu TikTok Inc., Jingwei Xu , Xiaoxing Ma Nanjing University
Pre-print
16:15
15m
Talk
Revisiting Learning-based Commit Message Generation
Technical Track
Jinhao Dong Peking University, Yiling Lou Fudan University, Dan Hao Peking University, Lin Tan Purdue University
Pre-print
16:30
15m
Talk
Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality
Technical Track
Jiawei Li University of California, Irvine, Iftekhar Ahmed University of California at Irvine
16:45
7m
Talk
On the Significance of Category Prediction for Code-Comment Synchronization
Journal-First Papers
Zhen Yang City University of Hong Kong, China, Jacky Keung City University of Hong Kong, Xiao Yu Wuhan University of Technology, Yan Xiao National University of Singapore, Zhi Jin Peking University, Jingyu Zhang City University of Hong Kong
16:52
7m
Talk
Correlating Automated and Human Evaluation of Code Documentation Generation Quality
Journal-First Papers
Xing Hu Zhejiang University, Qiuyuan Chen Zhejiang University, Haoye Wang Hangzhou City University, Xin Xia Huawei, David Lo Singapore Management University, Thomas Zimmermann Microsoft Research
17:00
7m
Talk
Predictive Comment Updating with Heuristics and AST-Path-Based Neural Learning: A Two-Phase Approach
Journal-First Papers
Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Zhongxin Liu Zhejiang University, Xin Xia Huawei, Xiaoguang Mao National University of Defense Technology
Link to publication DOI Pre-print
15:45 - 17:15
Software loggingTechnical Track at Meeting Room 101
Chair(s): Hongyu Zhang The University of Newcastle
15:45
15m
Talk
PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing
Technical Track
Hetong Dai Concordia University, Yiming Tang Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo
16:00
15m
Talk
Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction
Technical Track
Zhenhao Li Concordia University, Chuan Luo Beihang University, Tse-Hsun (Peter) Chen Concordia University, Weiyi Shang University of Waterloo, Shilin He Microsoft Research, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research
16:15
15m
Talk
On the Temporal Relations between Logging and Code
Technical Track
Zishuo Ding Concordia University, Yiming Tang Concordia University, Yang Li Beijing University of Posts and Telecommunications, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo
Pre-print
16:30
15m
Talk
How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners
Technical Track
Guoping Rong Nanjing University, shenghui gu Nanjing University, Haifeng Shen Australian Catholic University, He Zhang Nanjing University, Hongyu Kuang Nanjing University
16:45
15m
Talk
When to Say What: Learning to Find Condition-Message Inconsistencies
Technical Track
Islem BOUZENIA University of Stuttgart, Michael Pradel University of Stuttgart
Pre-print
17:00
15m
Talk
A Semantic-aware Parsing Approach for Log Analytics
Technical Track
Yintong Huo The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cheryl Lee The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
Pre-print
15:45 - 17:15
15:45
7m
Talk
SoapOperaTG: A Tool for System Knowledge Graph Based Soap Opera Test Generation
DEMO - Demonstrations
Yanqi Su Australian National University, Zheming Han , Zhenchang Xing CSIRO’s Data61; Australian National University, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61
15:52
7m
Talk
GUI Testing to the Power of Parallel Q-Learning
DEMO - Demonstrations
Marco Mobilio University of Milano Bicocca, Diego Clerissi University of Milano-Bicocca, Giovanni Denaro University of Milano-Bicocca, Italy, Leonardo Mariani University of Milano-Bicocca
16:00
15m
Talk
BADGE: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing
Technical Track
Dezhi Ran Peking University, Hao Wang Peking University, China, Wenyu Wang University of Illinois Urbana-Champaign, Tao Xie Peking University
16:15
15m
Talk
Efficiency Matters: Speeding Up Automated Testing with GUI Rendering InferenceDistinguished Paper Award
Technical Track
Sidong Feng Monash University, Mulong Xie Australian National University, Chunyang Chen Monash University
Pre-print
16:30
15m
Talk
CodaMOSA: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models
Technical Track
Caroline Lemieux University of British Columbia, Jeevana Priya Inala Microsoft Research, Shuvendu K. Lahiri Microsoft Research, Siddhartha Sen Microsoft Research
16:45
15m
Talk
Simulation-Driven Automated End-to-End Test and Oracle Inference
SEIP - Software Engineering in Practice
Shreshth Tuli Meta Platforms Inc. and Imperial College, Kinga Bojarczuk Facebook, Natalija Gucevska Facebook, Mark Harman University College London, Xiaoyu Wang Meta Platforms Inc., Graham Wright Meta Platforms Inc.
17:00
7m
Talk
Reasoning-Based Software Testing
NIER - New Ideas and Emerging Results
Luca Giamattei Università di Napoli Federico II, Roberto Pietrantuono Università di Napoli Federico II, Stefano Russo Università di Napoli Federico II
Pre-print
17:07
7m
Talk
Automated Generation and Evaluation of JMH Microbenchmark Suites From Unit Tests
Journal-First Papers
Mostafa Jangali Concordia University, Yiming Tang Concordia University, Niclas Alexandersson Chalmers University of Technology, Philipp Leitner Chalmers University of Technology, Sweden / University of Gothenburg, Sweden, Jinqiu Yang Concordia University, Weiyi Shang University of Waterloo
15:45 - 17:15
15:45
15m
Talk
TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis
Technical Track
Chao Wang , Ronny Ko The Ohio State University, Yue Zhang The Ohio State University, Yuqing Yang The Ohio State University, Zhiqiang Lin The Ohio State University
16:00
15m
Talk
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities
Technical Track
Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Canada, Karthik Pattabiraman University of British Columbia
16:15
15m
Talk
Fine-grained Commit-level Vulnerability Type Prediction By CWE Tree Structure
Technical Track
Shengyi Pan Zhejiang University, Lingfeng Bao Zhejiang University, Xin Xia Huawei, David Lo Singapore Management University, Shanping Li Zhejiang University
Pre-print
16:30
15m
Paper
Security Thinking in Online Freelance Software Development
SEIS - Software Engineering in Society
Irum Rauf The Open University, UK, Marian Petre School of Computing and Communications, The Open University, UK, Thein Tun School of Computing and Communications,The Open University, UK; Simply Business, UK, Tamara Lopez The Open University, Bashar Nuseibeh The Open University, UK; Lero, University of Limerick, Ireland
16:45
7m
Talk
Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection
Journal-First Papers
Yu Nong Washington State University, Rainy Sharma Washington State University, Wahab Hamou-Lhadj Concordia University, Montreal, Canada, Xiapu Luo The Hong Kong Polytechnic University, Haipeng Cai Washington State University
Link to publication DOI Authorizer link Pre-print
16:52
8m
Talk
Training for Security: Planning the Use of a SAT in the Development Pipeline of Web Apps
SEET - Software Engineering Education and Training
Sabato Nocera University of Salerno, Simone Romano University of Salerno, Rita Francese University of Salerno, Giuseppe Scanniello University of Salerno
17:00
15m
Talk
VulGen: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning
Technical Track
Yu Nong Washington State University, Yuzhe Ou University of Texas at Dallas, Michael Pradel University of Stuttgart, Feng Chen University of Texas at Dallas, Haipeng Cai Washington State University
Pre-print
15:45 - 17:15
Development and evolution of AI-intensive systemsSEIP - Software Engineering in Practice / Technical Track / NIER - New Ideas and Emerging Results at Meeting Room 104
Chair(s): Sebastian Elbaum University of Virginia
15:45
15m
Talk
Reusing Deep Neural Network Models through Model Re-engineering
Technical Track
Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, China, Hongyu Zhang The University of Newcastle, Zhaotian Li Beihang University, Xudong Liu Beihang University
16:00
15m
Talk
PyEvolve: Automating Frequent Code Changes in Python ML Systems
Technical Track
Malinda Dilhara University of Colorado Boulder, USA, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Ameya Ketkar Uber
Pre-print
16:15
15m
Talk
DeepArc: Modularizing Neural Networks for the Model Maintenance
Technical Track
xiaoning ren , Yun Lin Shanghai Jiao Tong University; National University of Singapore, Yinxing Xue University of Science and Technology of China, Ruofan Liu National University of Singapore, Jun Sun Singapore Management University, Zhiyong Feng Tianjin University, Jin Song Dong National University of Singapore
16:30
15m
Talk
Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Technical Track
Sayem Mohammad Imtiaz Iowa State University, Fraol Batole Dept. of Computer Science, Iowa State University, Astha Singh Dept. of Computer Science, Iowa State University, Rangeet Pan IBM Research, Breno Dantas Cruz Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University
Pre-print
16:45
7m
Talk
Safe-DS: A Domain Specific Language to Make Data Science Safe
NIER - New Ideas and Emerging Results
Lars Reimann University of Bonn, Günter Kniesel-Wünsche University of Bonn
Pre-print
16:52
7m
Talk
Rapid Development of Compositional AI
NIER - New Ideas and Emerging Results
Lee Martie MIT-IBM Watson AI Lab, Jessie Rosenberg IBM, Veronique Demers MIT-IBM Watson AI Lab, Gaoyuan Zhang IBM, Onkar Bhardwaj MIT-IBM Watson AI Lab, John Henning IBM, Aditya Prasad IBM, Matt Stallone MIT-IBM Watson AI Lab, Ja Young Lee IBM, Lucy Yip IBM, Damilola Adesina IBM, Elahe Paikari IBM, Oscar Resendiz IBM, Sarah Shaw IBM, David Cox IBM
Pre-print
17:00
7m
Talk
StreamAI: Challenges of Continual Learning Systems in Production for AI Industrialization
SEIP - Software Engineering in Practice
Mariam Barry BNP Paribas, Albert Bifet University of Waikato, Institut Polytechnique de Paris, Jean Luc Billy BNP Paribas
15:45 - 17:15
Vulnerability analysis and assessmentTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105
Chair(s): Xiaoyin Wang University of Texas at San Antonio
15:45
15m
Talk
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University
Pre-print
16:00
15m
Talk
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem
Technical Track
Yulun Wu Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Qiang Li Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Pre-print
16:15
15m
Talk
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript
Technical Track
Masudul Hasan Masud Bhuiyan CISPA Helmholtz Center for Information Security, Adithya Srinivas Parthasarathy Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram, Nikos Vasilakis Massachusetts Institute of Technology, Michael Pradel University of Stuttgart, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security
Pre-print
16:30
15m
Talk
On Privacy Weaknesses and Vulnerabilities in Software Systems
Technical Track
Pattaraporn Sangaroonsilp University of Wollongong, Hoa Khanh Dam University of Wollongong, Aditya Ghose University of Wollongong
16:45
7m
Talk
A Multi-faceted Vulnerability Searching Website Powered by Aspect-level Vulnerability Knowledge Graph
DEMO - Demonstrations
Jiamou Sun CSIRO's Data61, Zhenchang Xing CSIRO’s Data61; Australian National University, Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
16:52
7m
Talk
An In-depth Study of Java Deserialization Remote-Code Execution Exploits and Vulnerabilities
Journal-First Papers
Imen Sayar IRIT, University of Toulouse, IUT Blagnac Toulouse II, 1 Place Georges Brassens, Blagnac Cedex, France, 31703, Alexandre Bartel Umeå University, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Yves Le Traon University of Luxembourg, Luxembourg
17:00
7m
Talk
Blindspots in Python and Java APIs Result in Vulnerable Code
Journal-First Papers
Yuriy Brun University of Massachusetts, Tian Lin University of Florida, Jessie Elise Somerville University of Florida, Elisha M. Myers Florida Atlantic University, Natalie C. Ebner University of Florida
Link to publication DOI Pre-print Media Attached
15:45 - 17:15
Introductory and undergraduate educationSEET - Software Engineering Education and Training at Meeting Room 106
Chair(s): Rafael Prikladnicki School of Technology at PUCRS University
15:45
15m
Talk
Are you cloud-certified? An Experience Report to Prepare Computing Undergraduates for Cloud Certification with Experiential Learning
SEET - Software Engineering Education and Training
Eng Lieh Ouh Singapore Management University, Benjamin Kok Siew Gan Singapore Management University
16:00
15m
Talk
Understanding Students' Knowledge of Programming Patterns Through Code Editing and Revising Tasks
SEET - Software Engineering Education and Training
Sara Nurollahian University of Utah, Anna Rafferty Carleton College, Eliane Wiese University of Utah
16:15
15m
Talk
Speak, Memory! Analyzing Historical Accidents to Sensitize Software Testing Novices
SEET - Software Engineering Education and Training
Natalia Silvis-Cividjian Vrije Universiteit (VU) Amsterdam, Fritz Hager NA
16:30
15m
Talk
Software startup within a university - producing industry-ready graduates
SEET - Software Engineering Education and Training
Saara Tenhunen University of Helsinki, Tomi Männistö University of Helsinki, Petri Ihantola University of Helsinki, Jami Kousa University of Helsinki, Matti Luukkainen University of Helsinki
16:45
7m
Talk
Teaching MLOps in Higher Education through Project-Based Learning
SEET - Software Engineering Education and Training
Filippo Lanubile University of Bari, Silverio Martínez-Fernández UPC-BarcelonaTech, Luigi Quaranta University of Bari, Italy
16:52
7m
Talk
Software Resurrection: Discovering Programming Pearls by Showing Modernity to Historical Software
SEET - Software Engineering Education and Training
Abhishek Dutta University of Oxford
Pre-print Media Attached File Attached
17:00
7m
Talk
Teaching Computer Science Students to Communicate Scientific Findings More Effectively
SEET - Software Engineering Education and Training
Marvin Wyrich Saarland University, Stefan Wagner University of Stuttgart
Pre-print
15:45 - 17:15
FOSE-AI & SE and DebtFoSE - Future of Software Engineering at Meeting Room 109
Chair(s): Xing Hu Zhejiang University
15:45
10m
Talk
Trustworthy and Synergistic AI4SE: Vision and Road Ahead
FoSE - Future of Software Engineering
David Lo Singapore Management University
15:55
10m
Talk
AI and ML: The Software Engineers of the Future
FoSE - Future of Software Engineering
Thomas Zimmermann Microsoft Research
16:05
10m
Talk
Generative Artificial Intelligence for Software Engineering
FoSE - Future of Software Engineering
Mark Harman Meta Platforms, Inc. and UCL
16:15
10m
Talk
Technical Debt: are we there yet?
FoSE - Future of Software Engineering
Paris Avgeriou University of Groningen, The Netherlands
16:25
50m
Panel
Panel discussion
FoSE - Future of Software Engineering

15:45 - 17:15
Showcase panelShowcase at Meeting Room 110
15:45 - 17:15
Technical Briefing 7Technical Briefings at Meeting Room 111
15:45
90m
Talk
Methodology and Guidelines for Evaluating Multi-Objective Search-Based Software Engineering
Technical Briefings
Miqing Li University of Birmingham, Tao Chen University of Birmingham
15:45 - 17:15
Technical Briefing 5bTechnical Briefings at Meeting Room 112
15:45
90m
Talk
SAIN: A Community-Wide Software Architecture INfrastructure
Technical Briefings
Joshua Garcia University of California, Irvine, Mehdi Mirakhorli Rochester Institute of Technology, Lu Xiao Stevens Institute of Technology, Sam Malek University of California at Irvine, Rick Kazman University of Hawai‘i at Mānoa, Yuanfang Cai Drexel University, Nenad Medvidović University of Southern California

Thu 18 May

Displayed time zone: Hobart change

10:30 - 11:00
10:30
30m
Talk
RM2DM: A Tool for Automatic Generation of OO Design Models from Requirements Models
DEMO - Demonstrations
Zhen Tian Beihang University, Yilong Yang Beihang University, Sheng Cheng Software Engineering and Digitalization Center of China Manned Space Engineering
10:30 - 11:00
10:30
30m
Talk
What Would You do? An Ethical AI Quiz
DEMO - Demonstrations
Wei Teo Monash University, Ze Teoh Monash University, Dayang Abang Arabi Monash University, Morad Aboushadi Monash University, Khairenn Lai Monash University, Zhe Ng Monash University, Aastha Pant Monash Univeristy, Rashina Hoda Monash University, Kla Tantithamthavorn Monash University, Burak Turhan University of Oulu
Pre-print Media Attached
11:00 - 12:30
Defect detection and predictionTechnical Track / SEIP - Software Engineering in Practice at Level G - Plenary Room 1
Chair(s): Wei Le Iowa State University
11:00
15m
Talk
Detecting Exception Handling Bugs in C++ Programs
Technical Track
Hao Zhang Institute of Software, Chinese Academy of Sciences, Ji Luo Institute of Software, Chinese Academy of Sciences, Mengze Hu Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Zongyan Qiu Peking University
11:15
15m
Talk
Learning to Boost Disjunctive Static Bug-Finders
Technical Track
Yoonseok Ko Meta, Hakjoo Oh Korea University
11:30
15m
Talk
Predicting Bugs by Monitoring Developers During Task Execution
Technical Track
Gennaro Laudato University of Molise, Simone Scalabrino University of Molise, Nicole Novielli University of Bari, Filippo Lanubile University of Bari, Rocco Oliveto University of Molise
11:45
15m
Talk
Detecting Isolation Bugs via Transaction Oracle Construction
Technical Track
Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Jiansen Song , Dong Wang Institute of software, Chinese academy of sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Lei Chen Inspur Software Group Co., Ltd., Hanmo Wang Inspur Software Group Co., Ltd., Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print
12:00
15m
Talk
SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk
Technical Track
Siwei Cui Texas A & M University, Yifei Gao Texas A&M University, Rainer Unterguggenberger Lam Research, Wilfried Pichler Lam Research, Sean Livingstone Texas A&M University, Jeff Huang Texas A&M University
Pre-print
12:15
15m
Talk
CONAN: Diagnosing Batch Failures for Cloud Systems
SEIP - Software Engineering in Practice
Liqun Li Microsoft Research, Xu Zhang Microsoft Research, Shilin He Microsoft Research, Yu Kang Microsoft Research, Hongyu Zhang The University of Newcastle, Minghua Ma Microsoft Research, Yingnong Dang Microsoft Azure, Zhangwei Xu Microsoft Azure, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research
File Attached
11:00 - 12:30
Studies on gender in SESEIS - Software Engineering in Society / Technical Track / SEET - Software Engineering Education and Training at Meeting Room 101
Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick
11:00
15m
Talk
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software DevelopersDistinguished Paper Award
Technical Track
Sterre van Breukelen Eindhoven University of Technology, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Sebastian Baltes SAP SE & University of Adelaide, Alexander Serebrenik Eindhoven University of Technology
Pre-print
11:15
15m
Talk
The ABC of Pair Programming: Gender-dependent Attitude, Behavior and Code of Young Learners
SEET - Software Engineering Education and Training
Isabella Graßl University of Passau, Gordon Fraser University of Passau
Pre-print
11:30
15m
Talk
Engaging Girls in Computer Science: Do Single-Gender Interdisciplinary Classes Help?
SEET - Software Engineering Education and Training
Kai Marquardt Karlsruhe Institute of Technology (KIT), Lucia Happe Karlsruhe Institute of Technology, Ingo Wagner Karlsruhe Institute of Technology (KIT)
Pre-print
11:45
15m
Paper
Fundamentalists, Integrationists, & Transformationists: An Empirical Theory of Men Software Engineers' Orientations in Gender Inequalities
SEIS - Software Engineering in Society
Yi Wang Beijing University of Posts and Telecommunications, Xinyue Zhang Beijing University of Posts and Telecommunications, Wei Wang Beijing University of Posts and Telecommunications
12:00
15m
Paper
Draw a Software Engineer Test - An Investigation into Children's Perception of Software Engineering Profession
SEIS - Software Engineering in Society
Claudia Maria Cutrupi Norwegian University of Science and Technology (NTNU), Irene Zanardi USI Università della Svizzera italiana, Letizia Jaccheri Norwegian University of Science and Technology (NTNU), Monica Landoni USI Università della Svizzera italiana
12:15
15m
Full-paper
Benefits and Limitations of Remote Work to LGBTQIA+ Software Professionals
SEIS - Software Engineering in Society
Ronnie de Souza Santos Cape Breton University, Cleyton V. C. de Magalhaes CESAR School, Paul Ralph Dalhousie University
Pre-print
11:00 - 12:30
11:00
15m
Talk
When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study
Technical Track
Vincenzo Riccio University of Udine, Paolo Tonella USI Lugano
Pre-print
11:15
15m
Talk
Fuzzing Automatic Differentiation in Deep-Learning Libraries
Technical Track
Chenyuan Yang University of Illinois at Urbana-Champaign, Yinlin Deng University of Illinois at Urbana-Champaign, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuxing Tu Huazhong University of Science and Technology, Hanchi Li University of Science and Technology of China, Lingming Zhang University of Illinois at Urbana-Champaign
11:30
15m
Talk
Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective
Technical Track
Zenan Li Nanjing University, China, Maorun Zhang Nanjing University, China, Jingwei Xu , Yuan Yao Nanjing University, Chun Cao Nanjing University, Taolue Chen Birkbeck University of London, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University
Pre-print
11:45
7m
Talk
DeepJudge: A Testing Framework for Copyright Protection of Deep Learning Models
DEMO - Demonstrations
Jialuo Chen Zhejiang University, Youcheng Sun The University of Manchester, Jingyi Wang Zhejiang University, Peng Cheng Zhejiang University, Xingjun Ma Deakin University
11:52
7m
Talk
DeepCrime: from Real Faults to Mutation Testing Tool for Deep Learning
DEMO - Demonstrations
Nargiz Humbatova USI Lugano, Gunel Jahangirova King's College London, Paolo Tonella USI Lugano
12:00
7m
Talk
DiverGet: a Search-Based Software Testing approach for Deep Neural Network Quantization assessment
Journal-First Papers
Ahmed Haj Yahmed École Polytechnique de Montréal, Houssem Ben Braiek École Polytechnique de Montréal, Foutse Khomh Polytechnique Montréal, Sonia Bouzidi National Institute of Applied Science and Technology, Rania Zaatour Potsdam Institute for Climate Impact Research
12:07
15m
Talk
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion
Technical Track
Yuanyuan Yuan The Hong Kong University of Science and Technology, Qi Pang HKUST, Shuai Wang Hong Kong University of Science and Technology
11:00 - 12:30
11:00
15m
Talk
Workflow analysis of data science code in public GitHub repositories
Journal-First Papers
Dhivyabharathi Ramasamy Department of Informatics, University of Zurich, Zurich, Switzerland, Cristina Sarasua Department of Informatics, University of Zurich, Zurich, Switzerland, Alberto Bacchelli University of Zurich, Abraham Bernstein Department of Informatics, University of Zurich, Zurich, Switzerland
11:15
15m
Talk
Quality Evaluation of Modern Code Reviews Through Intelligent Biometric Program Comprehension
Journal-First Papers
Haytham Hijazi CISUC, DEI, University of Coimbra, João Durães CISUC, Polytechnic Institute of Coimbra, Ricardo Couceiro University of Coimbra, Raul Barbosa CISUC, DEI, University of Coimbra, João Castelhano ICNAS, University of Coimbra, Júlio Medeiros CISUC, DEI, University of Coimbra, Miguel Castelo Branco ICNAS/CIBIT, University of Coimbra, Paulo Carvalho University of Coimbra, Henrique Madeira University of Coimbra
11:30
15m
Talk
Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions
Technical Track
Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Waterloo, Shane McIntosh University of Waterloo
Pre-print
11:45
15m
Talk
Please fix this mutant: How do developers resolve mutants surfaced during code review?
SEIP - Software Engineering in Practice
Goran Petrovic Google; Universität Passau, René Just University of Washington, Marko Ivanković Google; Universität Passau, Gordon Fraser University of Passau
12:00
15m
Talk
Using Large-scale Heterogeneous Graph Representation Learning for Code Review Recommendations at Microsoft
SEIP - Software Engineering in Practice
Jiyang Zhang University of Texas at Austin, Chandra Maddila Microsoft Research, Ram Bairi Microsoft Research, Christian Bird Microsoft Research, Ujjwal Raizada Microsoft Research, Apoorva Agrawal Microsoft Research, Yamini Jhawar Microsoft Research, Kim Herzig Microsoft, Arie van Deursen Delft University of Technology
Pre-print Media Attached
12:15
7m
Talk
A mixed-methods analysis of micro-collaborative coding practices in OpenStack
Journal-First Papers
Armstrong Foundjem Queen's University, Eleni Constantinou University of Cyprus, Tom Mens University of Mons, Bram Adams Queen's University, Kingston, Ontario
11:00 - 12:30
Program repair techniques and applicationsTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 104
Chair(s): Xuan-Bach D. Le University of Melbourne
11:00
15m
Talk
Better Automatic Program Repair by Using Bug Reports and Tests Together
Technical Track
Manish Motwani Georgia Institute of Technology, Yuriy Brun University of Massachusetts
Pre-print
11:15
15m
Talk
CCTEST: Testing and Repairing Code Completion Systems
Technical Track
Li Zongjie , Chaozheng Wang Harbin Institute of Technology, Zhibo Liu Hong Kong University of Science and Technology, Haoxuan Wang EPFL, Dong Chen HKUST, Shuai Wang Hong Kong University of Science and Technology, Cuiyun Gao Harbin Institute of Technology
11:30
7m
Talk
A Controlled Experiment of Different Code Representations for Learning-Based Program Repair
Journal-First Papers
Marjane Namavar University of British Columbia, Noor Nashid University of British Columbia, Ali Mesbah University of British Columbia (UBC)
Link to publication Pre-print
11:37
7m
Talk
Patching Locking Bugs Statically with Crayons
Journal-First Papers
Juan Alfredo Cruz-Carlon IT University of Copenhagen, Mahsa Varshosaz IT University of Copenhagen, Denmark, Claire Le Goues Carnegie Mellon University, Andrzej Wąsowski IT University of Copenhagen, Denmark
11:45
15m
Talk
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Technical Track
Nan Jiang Purdue University, Thibaud Lutellier University of Alberta, Yiling Lou Fudan University, Lin Tan Purdue University, Dan Goldwasser Purdue University, Xiangyu Zhang Purdue University
Pre-print
12:00
15m
Talk
Rete: Learning Namespace Representation for Program RepairDistinguished Paper Award
Technical Track
Nikhil Parasaram University College London, Earl T. Barr University College London, Sergey Mechtaev University College London
Link to publication Pre-print
12:15
7m
Talk
Cerberus: a Program Repair Framework
DEMO - Demonstrations
Ridwan Salihin Shariffdeen National University of Singapore, Martin Mirchev National University of Singapore, Yannic Noller National University of Singapore, Abhik Roychoudhury National University of Singapore
12:22
7m
Talk
Predicting Patch Correctness Based on the Similarity of Failing Test Cases
Journal-First Papers
Haoye Tian University of Luxembourg, Yinghua LI University of Luxembourg, Weiguo PIAN University of Luxembourg, Abdoul Kader Kaboré SnT, University of Luxembourg, Kui Liu Huawei Software Engineering Application Technology Lab, Andrew Habib SnT, University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé SnT, University of Luxembourg
11:00 - 12:30
11:00
15m
Talk
AI-based Question Answering Assistance for Analyzing Natural-language Requirements
Technical Track
Saad Ezzini Lancaster University, Sallam Abualhaija University of Luxembourg, Chetan Arora Monash University, Mehrdad Sabetzadeh University of Ottawa
Pre-print
11:15
15m
Talk
Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation
Technical Track
Alessio Ferrari CNR-ISTI, Paola Spoletini Kennesaw State University
Pre-print
11:30
15m
Talk
BARA: A Dynamic State-based Serious Game for Teaching Requirements Elicitation
SEET - Software Engineering Education and Training
Yu Liu Beijing University of Technology, Tong Li Beijing University of Technology, Zheqing Huang Beijing University of Technology, Zhen Yang Beijing University of Technology
11:45
15m
Experience report
Hackathons as Inclusive Spaces for Prototyping Software in Open Social Innovation with NGOs
SEIS - Software Engineering in Society
12:00
15m
Talk
Theory as a Source of Software Requirements
Showcase
Ruzanna Chitchyan University of Bristol
12:15
15m
Talk
Automated Question Answering for Improved Understanding of Compliance Requirements: A Multi-Document Study
Showcase
Sallam Abualhaija University of Luxembourg, Chetan Arora Monash University, Amin Sleimi SnT, University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
11:00 - 12:30
11:00
15m
Talk
Data-driven Recurrent Set Learning For Non-termination Analysis
Technical Track
Zhilei Han Tsinghua University, Fei He Tsinghua University
11:15
15m
Talk
Compiling Parallel Symbolic Execution with Continuations
Technical Track
Guannan Wei Purdue University, Songlin Jia Purdue University, Ruiqi Gao Purdue University, Haotian Deng Purdue University, Shangyin Tan UC Berkeley, Oliver Bračevac Purdue University, Tiark Rompf Purdue University
Pre-print
11:30
15m
Talk
Verifying Data Constraint Equivalence in FinTech Systems
Technical Track
Chengpeng Wang Hong Kong University of Science and Technology, Gang Fan Ant Group, Peisen Yao Zhejing University, Fuxiong Pan Ant Group, Charles Zhang Hong Kong University of Science and Technology
Pre-print
11:45
15m
Talk
Tolerate Control-Flow Changes for Sound Data Race Prediction
Technical Track
Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yuqi Guo Institute of Software, Chinese Academy of Sciences, Beijing, China, Long Zhang Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences
12:00
7m
Talk
TSVD4J: Thread-Safety Violation Detection for Java
DEMO - Demonstrations
Shanto Rahman University of Texas at Austin, Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin
12:07
7m
Talk
What Petri Nets Oblige Us to Say Comparing Approaches for Behavior Composition
Journal-First Papers
Achiya Elyasaf Ben-Gurion University of the Negev, Tom Yaacov Ben-Gurion University of the Negev, Gera Weiss Ben-Gurion University of the Negev
Link to publication DOI
12:15
7m
Talk
A Novel and Pragmatic Scenario Modeling Framework with Verification-in-the-loop for Autonomous Driving Systems
NIER - New Ideas and Emerging Results
Dehui Du East China Normal University, Bo Li East China Normal University, Chenghang Zheng East China Normal University
11:00 - 12:30
11:00
90m
Demonstration
SRC Presentations
SRC - ACM Student Research Competition
Muneera Bano CSIRO's Data61, Lingxiao Jiang Singapore Management University
11:00 - 12:30
Testing of mobile, web and gamesTechnical Track / DEMO - Demonstrations / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 109
Chair(s): Wei Yang University of Texas at Dallas
11:00
15m
Talk
Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing
Technical Track
Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xing Che Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print
11:15
15m
Talk
Detecting Dialog-Related Keyboard Navigation Failures in Web Applications
Technical Track
Paul T. Chiou University of Southern California, Ali S. Alotaibi University of Southern California, William G.J. Halfond University of Southern California
11:30
15m
Talk
COLUMBUS: Android App Testing Through Systematic Callback Exploration
Technical Track
Priyanka Bose University of California, Santa Barbara, Dipanjan Das University of California, Santa Barbara, Saastha Vasan University of California, Santa Barbara, Sebastiano Mariani VMware, Inc., Ilya Grishchenko University of California, Santa Barbara, Andrea Continella University of Twente, Antonio Bianchi Purdue University, Christopher Kruegel University of California, Santa Barbara, Giovanni Vigna UC Santa Barbara
11:45
15m
Talk
GameRTS: A Regression Testing Framework for Video Games
Technical Track
Jiongchi Yu Singapore Management University, Singapore, Yuechen Wu Fuxi AI Lab, Netease Inc., China, Xiaofei Xie Singapore Management University, Wei Le Iowa State University, Lei Ma University of Alberta, Yingfeng Chen Fuxi AI Lab of Netease, Yujing Hu Fuxi AI Lab, Netease Inc., China, Fan Zhang Zhejiang University, China
12:00
15m
Talk
Widget Detection-based Testing for Industrial Mobile Games
SEIP - Software Engineering in Practice
Xiongfei Wu Kyushu University, Jiaming Ye Kyushu University, Ke Chen Fuxi AI Lab of Netease, Xiaofei Xie Singapore Management University, Yujing Hu Fuxi AI Lab, Netease Inc., China, Ruochen Huang University of Alberta, Lei Ma University of Alberta, Jianjun Zhao Kyushu University
12:15
7m
Talk
AVGUST: A Tool for Generating Usage-Based Tests from Videos of App Executions
DEMO - Demonstrations
Saghar Talebipour University of Southern California, Hyojae Park Sharon High School, Kesina Baral George Mason University, Leon Yee Valley Christian High School, Safwat Ali Khan George Mason University, Kevin Moran George Mason University, Yuriy Brun University of Massachusetts, Nenad Medvidović University of Southern California, Yixue Zhao Information Sciences Institute
Pre-print Media Attached
12:22
7m
Talk
Fragment-Based Test Generation For Web Apps
Journal-First Papers
Rahulkrishna Yandrapally University of British Columbia, Canada, Ali Mesbah University of British Columbia (UBC)
Link to publication Pre-print
11:00 - 12:30
FOSE-Testing, Security, AI and ProductivityFoSE - Future of Software Engineering at Meeting Room 110
Chair(s): Hoa Khanh Dam University of Wollongong
11:00
10m
Talk
The Future of Software Testing
FoSE - Future of Software Engineering
Aldeida Aleti Monash University
11:10
10m
Talk
The Future of Software Security: Beyond the Security Silo to All of Us
FoSE - Future of Software Engineering
Laurie Williams North Carolina State University
11:20
10m
Talk
Enabling Flow in Software Development
FoSE - Future of Software Engineering
Gail Murphy University of British Columbia
11:30
10m
Talk
How is the rapid progress in Artificial Intelligence affecting the future of Software Engineering?
FoSE - Future of Software Engineering
Lionel Briand University of Luxembourg; University of Ottawa
11:40
50m
Panel
Panel discussion
FoSE - Future of Software Engineering

11:00 - 12:30
Technical Briefing 4aTechnical Briefings at Meeting Room 111
11:00
90m
Talk
Conducting Eye Tracking Studies in Software Engineering - Methodology and Pipeline
Technical Briefings
Bonita Sharif University of Nebraska-Lincoln, USA, Andrew Begel Carnegie Mellon University, Jonathan I. Maletic Kent State University
File Attached
11:00 - 12:30
Industry forum 1Industry Forum at Meeting Room 112
Chair(s): Kelly Blincoe University of Auckland
11:00
15m
Talk
Boosting Static Analysis with Dynamic Runtime Data at WhatsApp Server
Industry Forum
11:15
15m
Talk
Personalized action suggestions in low-code automation platforms
Industry Forum
Saksham Gupta Microsoft, Gust Verbruggen Microsoft, Mukul Singh Microsoft, Sumit Gulwani Microsoft, Vu Le Microsoft
11:30
15m
Talk
Towards formal repair and verification of industry-scale deep neural networks
Industry Forum
Satoshi Munakata Fujitsu, Susumu Tokumoto Fujitsu Limited, Koji Yamamoto Fujitsu, Kazuki Munakata Fujitsu
11:45
15m
Talk
Challenges and Solution Strategies to Setup an MLOps Process to Develop and Assess a Driverless Regional Train Example
Industry Forum
Marc Zeller Siemens AG, Martin Rothfelder Siemens AG, Cornel Klein Siemens AG
12:00
15m
Talk
Automated Feature Document Review via Interpretable Deep Learning
Industry Forum
yeming ZTE Corporation, Yuanfan Chen ZTE Corporation, Xin Zhang Peking University, Jinning He ZTE, Jicheng Cao ZTE Corporation, Dong Liu ZTE, Shengyu Cheng ZTE Corporation, Jing Gao ZTE Corporation, Hailiang Dai ZTE Corporation
13:45 - 15:15
13:45
15m
Talk
Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots
Technical Track
Amir Ghorbani University of Victoria, Nathan Cassee Eindhoven University of Technology, Derek Robinson University of Victoria, Adam Alami Aalborg University, Neil Ernst University of Victoria, Alexander Serebrenik Eindhoven University of Technology, Andrzej Wąsowski IT University of Copenhagen, Denmark
Pre-print
14:00
15m
Talk
Flexible and Optimal Dependency Management via Max-SMT
Technical Track
Donald Pinckney Northeastern University, Federico Cassano Northeastern University, Arjun Guha Northeastern University and Roblox Research, Jonathan Bell Northeastern University, Massimiliano Culpo np-complete, S.r.l., Todd Gamblin Lawrence Livermore National Laboratory
Pre-print
14:15
15m
Talk
Towards More Effective AI-assisted Programming: A Systematic Design Exploration to Improve Visual Studio IntelliCode's User Experience
SEIP - Software Engineering in Practice
Priyan Vaithilingam Harvard University, Elena Glassman Harvard University, Peter Groenwegen , Sumit Gulwani Microsoft, Austin Z. Henley Microsoft, Rohan Malpani , David Pugh , Arjun Radhakrishna Microsoft, Gustavo Soares Microsoft, Joey Wang , Aaron Yim
14:30
7m
Talk
DeepLog: Deep-Learning-Based Log Recommendation
DEMO - Demonstrations
Yang Zhang Hebei University of Science and Technology, Xiaosong Chang Hebei University of Science and Technology, Lining Fang Hebei University of Science and Technology, Yifan Lu Hebei University of Science and Technology
14:37
7m
Talk
ShellFusion: An Answer Generator for Shell Programming Tasks via Knowledge Fusion
DEMO - Demonstrations
Zhongqi Chen School of Software Engineering, Sun Yat-sen University, Neng Zhang School of Software Engineering, Sun Yat-sen University, Pengyue Si School of Software Engineering, Sun Yat-sen University, ChenQinde School of Software Engineering, Sun Yat-sen University, Chao Liu Chongqing University, Zibin Zheng School of Software Engineering, Sun Yat-sen University
14:45
7m
Talk
Revisiting, Benchmarking and Exploring API Recommendation: How Far are We?
Journal-First Papers
Yun Peng Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Wenwei Gu The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Wenxuan Wang The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Michael Lyu The Chinese University of Hong Kong
14:52
7m
Talk
Semantically-enhanced Topic Recommendation Systems for Software Projects
Journal-First Papers
Maliheh Izadi Delft University of Technology, Mahtab Nejati University of Waterloo, Abbas Heydarnoori Bowling Green State University
15:00
7m
Talk
Code Librarian: A Software Package Recommendation System
SEIP - Software Engineering in Practice
Lili Tao JP Morgan Chase & Co, Alexandru-Petre Cazan JP Morgan Chase & Co, Senad Ibraimoski JP Morgan Chase & Co, Sean Moran JP Morgan Chase & Co
13:45 - 15:15
Diversity and inclusion in SESEIS - Software Engineering in Society at Meeting Room 101
Chair(s): Xiao Liu School of Information Technology, Deakin University
13:45
15m
Paper
At the Margins: Marginalized Groups' Ethical Concerns about Software
SEIS - Software Engineering in Society
Lauren Olson Vrije Universiteit Amsterdam, Emitzá Guzmán Vrije Universiteit Amsterdam, Florian Kunneman Vrije Universiteit Amsterdam
Pre-print File Attached
14:00
15m
Paper
Do Users Act Equitably? Understanding User Bias Through a Large In-Person Study
SEIS - Software Engineering in Society
Yang Liu Rochester Institute of Technology, Heather Moses Rochester Institute of Technology, Mark Sternefeld Rochester Institute of Technology, Samuel Malachowsky Rochester Institute of Technology, Daniel Krutz Rochester Institute of Technology
14:15
15m
Paper
Developing Software for Diverse Socio-Economic End Users: Lessons Learned from A Case Study of Fisherfolk Communities in Bangladesh
SEIS - Software Engineering in Society
Tanjila Kanij Monash University, Misita Anwar Monash University, Gillian Oliver Monash University, Md Khalid Hossain Monash Universit
14:30
15m
Full-paper
Walking Down the Road to Independent Mobility: An Adaptive Route Training System for the Cognitively Impaired
SEIS - Software Engineering in Society
Konstantin Rink Bielefeld University of Applied Sciences, Tristan Gruschka Bielefeld University of Applied Sciences, Patrick Palsbröker Bielefeld University of Applied Sciences, Marcos Baez Bielefeld University of Applied Sciences, Dominic Becking Bielefeld University of Applied Sciences, Udo Seelmeyer Bielefeld University of Applied Sciences, Gudrun Dobslaw Bielefeld University of Applied Sciences, Patricia Stolz Bielefeld University of Applied Sciences and Arts
14:45
15m
Paper
Diversity Awareness in Software Engineering Participant Research
SEIS - Software Engineering in Society
Riya Dutta Concordia University, Diego Costa Concordia University, Canada, Emad Shihab Concordia Univeristy, Tanja Tajmel Concordia University
Pre-print
15:00
7m
Vision and Emerging Results
Harmful Terms in Computing: Towards Widespread Detection and Correction
SEIS - Software Engineering in Society
Hana Winchester Saint Ursula Academy, Alicia Boyd New York University, Brittany Johnson George Mason University
13:45 - 15:15
Program repair with and for AITechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102
Chair(s): Julia Rubin University of British Columbia, Canada
13:45
15m
Talk
Impact of Code Language Models on Automated Program Repair
Technical Track
Nan Jiang Purdue University, Kevin Liu Lynbrook High School, Thibaud Lutellier University of Alberta, Lin Tan Purdue University
Pre-print
14:00
15m
Talk
Tare: Type-Aware Neural Program Repair
Technical Track
Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Wenjie Zhang Peking University, Yingfei Xiong Peking University, Lu Zhang Peking University
14:15
15m
Talk
Template-based Neural Program Repair
Technical Track
Xiangxin Meng Beihang University, Beijing, China, Xu Wang Beihang University, Hongyu Zhang The University of Newcastle, Hailong Sun School of Computer Science and Engineering, Beihang University, Beijing,China, Xudong Liu Beihang University, Chunming Hu Beihang University
Pre-print
14:30
15m
Talk
Automated Repair of Programs from Large Language Models
Technical Track
Zhiyu Fan National University of Singapore, Singapore, Xiang Gao Beihang University, China, Martin Mirchev National University of Singapore, Abhik Roychoudhury National University of Singapore, Shin Hwei Tan Southern University of Science and Technology
14:45
15m
Talk
Automated Program Repair in the Era of Large Pre-trained Language Models
Technical Track
Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Yuxiang Wei University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
15:00
7m
Talk
AIREPAIR: A Repair Platform for Neural Networks
DEMO - Demonstrations
Xidan Song Department of Computer Science, University of Manchester, UK, Youcheng Sun The University of Manchester, Mustafa A. Mustafa Department of Computer Science, University of Manchester, UK, imec-COSIC, KU Leuven, Belgium, Lucas C. Cordeiro University of Manchester
15:07
7m
Talk
Arachne: Search Based Repair of Deep Neural Networks
Journal-First Papers
Jeongju Sohn University of Luxembourg, Sungmin Kang KAIST, Shin Yoo KAIST
Link to publication DOI Pre-print
13:45 - 15:15
13:45
15m
Talk
Demystifying Issues, Challenges, and Solutions for Multilingual Software Development
Technical Track
Haoran Yang Washington State University, Weile Lian Washington State University, Shaowei Wang University of Manitoba, Haipeng Cai Washington State University
Pre-print
14:00
15m
Talk
Testability Refactoring in Pull Requests: Patterns and Trends
Technical Track
Pavel Reich University of Hamburg, Walid Maalej University of Hamburg
Pre-print
14:15
15m
Talk
Usability-Oriented Design of Liquid Types for Java
Technical Track
Catarina Gamboa CMU and LASIGE, Paulo Canelas Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University, Alcides Fonseca University of Lisbon
DOI
14:30
15m
Talk
A Theorem Proving Approach to Programming Language Semantics
SEET - Software Engineering Education and Training
Subhajit Roy IIT Kanpur
14:45
7m
Talk
RIdiom: Automatically Refactoring Non-idiomatic Python Code with Pythonic Idioms
DEMO - Demonstrations
zejun zhang Australian National University, Zhenchang Xing CSIRO’s Data61; Australian National University, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
14:52
7m
Talk
An Empirical Study of Data Constraint Implementations in Java
Journal-First Papers
Juan Manuel Florez CQSE America, Laura Moreno CQSE America, Zenong Zhang The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas, Andrian Marcus University of Texas at Dallas
14:59
7m
Talk
Learning To Predict User-Defined Types
Journal-First Papers
Kevin Jesse University of California at Davis, USA, Prem Devanbu University of California at Davis, Anand Ashok Sawant University of California, Davis
13:45 - 15:15
AI bias and fairnessDEMO - Demonstrations / Technical Track / Journal-First Papers at Meeting Room 104
Chair(s): Amel Bennaceur The Open University, UK
13:45
15m
Talk
Towards Understanding Fairness and its Composition in Ensemble Machine Learning
Technical Track
Usman Gohar Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Hridesh Rajan Iowa State University
Pre-print
14:00
15m
Talk
Fairify: Fairness Verification of Neural Networks
Technical Track
Sumon Biswas Carnegie Mellon University, Hridesh Rajan Iowa State University
Pre-print
14:15
15m
Talk
Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models
Technical Track
Jiri Gesi University of California, Irvine, Xinyun Shen University of California, Irvine, Yunfan Geng University of California, Irvine, Qihong Chen University of California, Irvine, Iftekhar Ahmed University of California at Irvine
14:30
15m
Talk
Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks
Technical Track
Verya Monjezi University of Texas at El Paso, Ashutosh Trivedi University of Colorado Boulder, Gang Tan Pennsylvania State University, Saeid Tizpaz-Niari University of Texas at El Paso
Pre-print
14:45
7m
Talk
Seldonian Toolkit: Building Software with Safe and Fair Machine Learning
DEMO - Demonstrations
Austin Hoag Berkeley Existential Risk Initiative, James E. Kostas University of Massachusetts, Bruno Castro da Silva University of Massachusetts, Philip S. Thomas University of Massachusetts, Yuriy Brun University of Massachusetts
Pre-print Media Attached
14:52
7m
Talk
What Would You do? An Ethical AI Quiz
DEMO - Demonstrations
Wei Teo Monash University, Ze Teoh Monash University, Dayang Abang Arabi Monash University, Morad Aboushadi Monash University, Khairenn Lai Monash University, Zhe Ng Monash University, Aastha Pant Monash Univeristy, Rashina Hoda Monash University, Kla Tantithamthavorn Monash University, Burak Turhan University of Oulu
Pre-print Media Attached
15:00
7m
Talk
Search-Based Fairness Testing for Regression-Based Machine Learning Systems
Journal-First Papers
Anjana Perera Oracle Labs, Australia, Aldeida Aleti Monash University, Kla Tantithamthavorn Monash University, Jirayus Jiarpakdee Monash University, Australia, Burak Turhan University of Oulu, Lisa Kuhn Monash University, Katie Walker Monash University
Link to publication DOI
15:07
7m
Talk
FairMask: Better Fairness via Model-based Rebalancing of Protected Attributes
Journal-First Papers
Kewen Peng North Carolina State University, Tim Menzies North Carolina State University, Joymallya Chakraborty North Carolina State University
Link to publication Pre-print
13:45 - 15:15
13:45
15m
Talk
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
Technical Track
Kaifa ZHAO The Hong Kong Polytechnic University, Xian Zhan The Hong Kong Polytechnic University, Le Yu The Hong Kong Polytechnic University, Shiyao Zhou The Hong Kong Polytechnic University, Hao Zhou Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China, Xiapu Luo The Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology
Pre-print
14:00
15m
Talk
Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation
Technical Track
Zhiyuan Chang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:15
15m
Talk
DocToModel: Automated Authoring of Models from Diverse Requirements Specification Documents
SEIP - Software Engineering in Practice
Asha Rajbhoj TCS Research, Padmalata Nistala TCS Research, Vinay Kulkarni Tata Consultancy Services Research, Shivani Soni TCS Research, Ajim Pathan TCS Research
14:30
15m
Talk
Environment-Driven Abstraction Identification for Requirements-Based Testing
Showcase
Zedong Peng , Prachi Rathod , Nan Niu University of Cincinnati, Tanmay Bhowmik Mississippi State University, Hui Liu Beijing Institute of Technology, Lin Shi ISCAS, Zhi Jin Peking University
14:45
7m
Talk
A Web-Based Tool for Using Storyboard of Android Apps
DEMO - Demonstrations
Yuxin Zhang Tianjin University, Sen Chen Tianjin University, Lingling Fan Nankai University
14:52
7m
Talk
InputGen: A Tool for Automatic Generation of Prototype Inputs to Support Rapid Requirements Validation
DEMO - Demonstrations
Shuanglong Chang Northeast Petroleum University, Juntao Gao Northeast Petroleum University, Yilong Yang Beihang University
15:00
7m
Talk
A Software Requirements Ecosystem: Linking Forum, Issue Tracker, and FAQs for Requirements Management
Journal-First Papers
James Tizard University of Auckland, Peter Devine The University of Auckland, Hechen Wang University of Auckland, Kelly Blincoe University of Auckland
15:07
7m
Talk
Towards Human-Centred Crowd Computing: Software for Better Use of Computational Resources
NIER - New Ideas and Emerging Results
Niroshinie Fernando Deakin University, Chetan Arora Monash University, Seng W.Loke Deakin University, Lubna Alam Deakin University, Stephen La Macchia Deakin University, Helen Graesser Deakin University
Pre-print
13:45 - 15:15
SE for security 2Technical Track / Journal-First Papers at Meeting Room 106
Chair(s): Cristian Cadar Imperial College London, UK
13:45
15m
Talk
SLR: From Saltzer & Schoeder to 2021…
Journal-First Papers
Nikhil Patnaik University of Bristol, Andrew C Dwyer University of Durham, Joseph Hallett , Awais Rashid University of Bristol, UK
14:00
15m
Talk
On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN)
Technical Track
Viktoria Koscinski Rochester Institute of Technology, Sara Hashemi Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
14:15
15m
Talk
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon
Technical Track
Ita Ryan University College Cork, Utz Roedig University College Cork, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital
Pre-print
14:30
15m
Talk
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Technical Track
Setu Kumar Basak North Carolina State University, Lorenzo Neil North Carolina State University, Bradley Reaves North Carolina State University, Laurie Williams North Carolina State University
Pre-print
14:45
15m
Talk
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGXDistinguished Paper Award
Technical Track
Xinyuan Miao Shanghai Jiao Tong University, Ziyi Lin Alibaba Group, Shaojun Wang Alibaba Group, Lei Yu Alibaba Group, Sanhong Li Alibaba Inc., Zihan Wang Shanghai Jiao Tong University, Pengbo Nie Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, He Jiang Dalian University of Technology
Pre-print
15:00
15m
Talk
Keyword Extraction From Specification Documents for Planning Security Mechanisms
Technical Track
Jeffy Jahfar Poozhithara Apple Inc. and University of Washington Bothell, Hazeline Asuncion University of Washington Bothell, Brent Lagesse University of Washington Bothell
Pre-print
13:45 - 15:15
Software EvolutionTechnical Track / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 109
Chair(s): Sebastiano Panichella Zurich University of Applied Sciences
13:45
15m
Talk
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization
Technical Track
Wuxia Jin Xi'an Jiaotong University, Yitong Dai Xi'an Jiaotong University, Jianguo Zheng Xi'an Jiaotong University, Yu Qu UC Riverside, Ming Fan Xi'an Jiaotong University, Zhenyu Huang Honor Device Co., Ltd., Dezhi Huang Honor Device Co., Ltd., Ting Liu Xi'an Jiaotong University
14:00
15m
Talk
SEIP: Investigating a NASA Cyclomatic Complexity Policy on Maintenance Risk of a Critical System
SEIP - Software Engineering in Practice
Daniel Port University of Hawai‘i at Mānoa, Bill Taber , LiGuo Huang Dept. of Computer Science, Southern Methodist University, Dallas, TX, 75205
14:15
15m
Talk
Aegis: Attribution of Control Plane Change Impact across Layers and Components for Cloud Systems
SEIP - Software Engineering in Practice
Xiaohan Yan Microsoft Azure, Ken Hsieh , Yasitha Liyanage , Minghua Ma Microsoft Research, Murali Chintalapati Microsoft Azure, Qingwei Lin Microsoft Research, Yingnong Dang Microsoft Azure, Dongmei Zhang Microsoft Research
14:30
15m
Talk
An Empirical Study on Change-induced Incidents at Ant Group
SEIP - Software Engineering in Practice
Yifan Wu Peking University, Bingxu Chai , Ying Li School of Software and Microelectronics, Peking University, Beijing, China, Bingchang Liu Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Jianguo Li Ant Group, Yong Yang , Wei Jiang
14:45
15m
Talk
Fulfilling Industrial Needs for Consistency Among Engineering Artifacts
SEIP - Software Engineering in Practice
Luciano Marchezan Johannes Kepler University Linz, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Edvin Herac , Felix Keplinger Johannes Kepler University, Linz, Alexander Egyed Johannes Kepler University Linz, Christophe Lauwerys
15:00
7m
Talk
The Co-evolution of the WordPress Platform and its Plugins
Journal-First Papers
Jiahuei Lin Queen’s University Software Analysis and Intelligence Lab (SAIL), Canada, Mohammed Sayagh ETS Montreal, University of Quebec, Ahmed E. Hassan Queen’s University
15:07
7m
Talk
Client-Specific Upgrade Compatibility Checking via Knowledge-Guided Discovery
Journal-First Papers
Chenguang Zhu Meta, Mengshi Zhang Meta, Xiuheng Wu Nanyang Technological University, Singapore, Xiufeng Xu Nanyang Technological University, Yi Li Nanyang Technological University
Link to publication DOI Pre-print
13:45 - 15:15
Test quality and improvementTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 110
Chair(s): Guowei Yang University of Queensland
13:45
15m
Talk
Test Selection for Unified Regression Testing
Technical Track
Shuai Wang University of Illinois at Urbana-Champaign, Xinyu Lian University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign
Pre-print
14:00
15m
Talk
ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search
Technical Track
Rongqi Pan University of Ottawa, Taher A Ghaleb University of Ottawa, Lionel Briand University of Luxembourg; University of Ottawa
14:15
15m
Talk
Measuring and Mitigating Gaps in Structural Testing
Technical Track
Soneya Binta Hossain University of Virginia, Matthew B Dwyer University of Virginia, Sebastian Elbaum University of Virginia, Anh Nguyen-Tuong University of Virginia
Pre-print
14:30
7m
Talk
FlaPy: Mining Flaky Python Tests at Scale
DEMO - Demonstrations
Martin Gruber BMW Group, University of Passau, Gordon Fraser University of Passau
Pre-print
14:37
7m
Talk
Scalable and Accurate Test Case Prioritization in Continuous Integration Contexts
Journal-First Papers
Ahmadreza Saboor Yaraghi University of Ottawa, Mojtaba Bagherzadeh University of Ottawa, Nafiseh Kahani University of Carlton, Lionel Briand University of Luxembourg; University of Ottawa
14:45
7m
Talk
Flakify: A Black-Box, Language Model-based Predictor for Flaky Tests
Journal-First Papers
Sakina Fatima University of Ottawa, Taher A Ghaleb University of Ottawa, Lionel Briand University of Luxembourg; University of Ottawa
14:52
7m
Talk
Developer-centric test amplification
Journal-First Papers
Carolin Brandt Delft University of Technology, Andy Zaidman Delft University of Technology
Pre-print
15:00
7m
Talk
How Developers Engineer Test Cases: An Observational Study
Journal-First Papers
Maurício Aniche Delft University of Technology, Christoph Treude University of Melbourne, Andy Zaidman Delft University of Technology
Pre-print
13:45 - 15:15
Technical Briefing 4bTechnical Briefings at Meeting Room 111
13:45
90m
Talk
Conducting Eye Tracking Studies in Software Engineering - Methodology and Pipeline
Technical Briefings
Bonita Sharif University of Nebraska-Lincoln, USA, Andrew Begel Carnegie Mellon University, Jonathan I. Maletic Kent State University
File Attached
13:45 - 15:15
Industry forum 2Industry Forum at Meeting Room 112
Chair(s): Steve Versteeg Microsoft
13:45
15m
Talk
Challenges of Testing an Evolving Cancer Registration Support System in Practice
Industry Forum
Christoph Laaber Simula Research Laboratory, Tao Yue Simula Research Laboratory, Shaukat Ali Simula Research Laboratory, Thomas Schwitalla Cancer Registry of Norway, Jan F. Nygård Cancer Registry of Norway
14:00
15m
Talk
Can we Knapsack Software Defect Prediction? Nokia 5G Case
Industry Forum
Szymon Stradowski Nokia & Wrocław University of Science and Technology, Lech Madeyski Wroclaw University of Science and Technology
14:15
15m
Talk
UnitTestBot: Automated Unit Test Generation for C Code in Integrated Development Environments
Industry Forum
Dmitry Ivanov Huawei, Alexey Babushkin , Saveliy Grigoryev Huawei, Pavel Iatchenii , Vladislav Kalugin Huawei, Egor Kichin Huawei, Egor Kulikov Huawei, Aleksandr Misonizhnik Saint-Petersburg State University, Dmitry Mordvinov Huawei, Sergey Morozov Huawei, Olga Naumenko Huawei, Alexey Pleshakov , Pavel Ponomarev Meta; Georgia Institute of Technology, Svetlana Shmidt Huawei, Alexey Utkin , Vadim Volodin , Arseniy Volynets
14:30
15m
Talk
Challenges of Evolving Legacy Software in a Small Team
Industry Forum
Bowie Owens CSIRO, Geoffrey Lee CSIRO, Zili Zhu CSIRO, Thomas Lo CSIRO
14:45
15m
Talk
Prioritizing Industrial Security Findings in Agile Software Development Projects
Industry Forum
Markus Voggenreiter Siemens Technology / LMU Munich, Ulrich Schöpp fortiss GmbH
15:00
15m
Talk
Enhancing Maritime Data Standardization and Integrity using Docker and Blockchain
Industry Forum
Shuai Wang DNV AS, Nikita Karandikar DNV AS, Knut Erik Knutsen DNV AS, Xiao Gang Tony Tong DNV Global, Tom Edseth DNV AS, Zealo Xu Zile DNV Global
15:15 - 15:45
15:15
2m
Short-paper
Values@Runtime: An Adaptive Framework for Operationalising Values
SEIS - Software Engineering in Society
Amel Bennaceur The Open University, UK, Diane Hassett Lero, University of Limerick, Ireland, Bashar Nuseibeh The Open University, UK; Lero, University of Limerick, Ireland, Andrea Zisman The Open University, UK
15:17
2m
Talk
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports
Technical Track
Sunzhou Huang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio
Pre-print Media Attached
15:19
2m
Talk
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University
Pre-print
15:21
2m
Short-paper
Contradicting Motivations in Civic Tech Software Development: Analysis of a Grassroots Project
SEIS - Software Engineering in Society
Antti Knutas LUT University, Dominik Siemon LUT University, Natasha Tylosky LUT University, Giovanni Maccani Ideas for Change
Pre-print
15:24
2m
Talk
Usability-Oriented Design of Liquid Types for Java
Technical Track
Catarina Gamboa CMU and LASIGE, Paulo Canelas Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University, Alcides Fonseca University of Lisbon
DOI
15:26
2m
Talk
When to Say What: Learning to Find Condition-Message Inconsistencies
Technical Track
Islem BOUZENIA University of Stuttgart, Michael Pradel University of Stuttgart
Pre-print
15:31
2m
Poster
GLAD: Neural Predicate Synthesis to Repair Omission Faults
Posters
Sungmin Kang KAIST, Shin Yoo KAIST
15:33
2m
Short-paper
Gender Representation Among Contributors to Open-Source Infrastructure - An Analysis of 20 Package Manager Ecosystems
SEIS - Software Engineering in Society
Huilian Sophie Qiu Carnegie Mellon University, Zihe H Zhao Rice University, Tielin Katy Yu Carnegie Mellon University, Justin Wang Carnegie Mellon University, Alexander Ma Carnegie Mellon University, Hongbo Fang Carnegie Mellon University, Laura Dabbish Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
15:35
2m
Short-paper
Software Engineering for Smart Things in Public Spaces: Initial Insights and Challenges
SEIS - Software Engineering in Society
Amna Batool Deakin University, Seng W.Loke Deakin University, Niroshinie Fernando Deakin University, Jonathan Kua Deakin University
15:38
2m
Short-paper
Workplace Discrimination in Software Engineering: Where We Stand Today
SEIS - Software Engineering in Society
Xin Zhao Seattle University, Riley Young Seattle University
15:40
2m
Talk
A GNN-based Recommender System to Assist the Specification of Metamodels and Models
Showcase
Juri Di Rocco University of L'Aquila, Claudio Di Sipio University of L'Aquila, Davide Di Ruscio University of L'Aquila, Phuong T. Nguyen University of L’Aquila
15:42
2m
Talk
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis
Technical Track
Austin Mordahl University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Dakota Soles The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas
Pre-print

Fri 19 May

Displayed time zone: Hobart change

10:30 - 11:00
10:30
30m
Talk
CryptOpt: Automatic Optimization of Straightline Code
DEMO - Demonstrations
Joel Kuepper University of Adelaide, Andres Erbsen MIT, Jason Gross MIT CSAIL, Owen Conoly MIT, Chuyue Sun Stanford, Samuel Tian MIT, David Wu University of Adelaide, Adam Chlipala Massachusetts Institute of Technology, Chitchanok Chuengsatiansup University of Adelaide, Daniel Genkin Georgia Tech, Markus Wagner Monash University, Australia, Yuval Yarom Ruhr University Bochum
Link to publication
10:30 - 11:00
10:30
30m
Talk
TSVD4J: Thread-Safety Violation Detection for Java
DEMO - Demonstrations
Shanto Rahman University of Texas at Austin, Chengpeng Li University of Texas at Austin, August Shi University of Texas at Austin
11:00 - 12:30
11:00
15m
Talk
Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Technical Track
Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong
Pre-print
11:15
15m
Talk
Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models
Technical Track
Toufique Ahmed University of California at Davis, Supriyo Ghosh Microsoft, Chetan Bansal Microsoft Research, Thomas Zimmermann Microsoft Research, Xuchao Zhang Microsoft, Saravanakumar Rajmohan Microsoft 365
Pre-print
11:30
15m
Talk
Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data
Technical Track
Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong
Pre-print
11:45
15m
Talk
LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly
Technical Track
Guangba  Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Pairui Li Tencent Inc., Tianjun Weng Tencent Inc., Haibing Zheng Tencent, Yuetang Deng Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University
Pre-print
12:00
15m
Talk
TraceArk: Towards Actionable Performance Anomaly Alerting for Online Service Systems
SEIP - Software Engineering in Practice
Zhengran Zeng Southern University of Science and Technology, Yuqun Zhang Southern University of Science and Technology, Yong Xu Microsoft Research, Minghua Ma Microsoft Research, Bo Qiao Microsoft Research, Wentao Zou , Qingjun Chen , Meng Zhang , Xu Zhang Microsoft Research, Hongyu Zhang The University of Newcastle, Xuedong Gao , Hao Fan , Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research
12:15
7m
Talk
ActivFORMS: A Formally-Founded Model-Based Approach to Engineer Self-Adaptive Systems
Journal-First Papers
Danny Weyns KU Leuven, M. Usman Iftikhar KU Leuven / Linnaeus University
12:22
7m
Talk
Auto-Logging: AI-centred Logging Instrumentation
NIER - New Ideas and Emerging Results
Jasmin Bogatinovski Technical University Berlin, Odej  Kao Technische Universität Berlin
Pre-print
11:00 - 12:30
AI testing 2Technical Track / Journal-First Papers at Meeting Room 101
Chair(s): Gunel Jahangirova USI Lugano, Switzerland
11:00
15m
Talk
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation
Technical Track
Qiang Hu University of Luxembourg, Yuejun GUo University of Luxembourg, Xiaofei Xie Singapore Management University, Maxime Cordy University of Luxembourg, Luxembourg, Lei Ma University of Alberta, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Pre-print
11:15
15m
Talk
Testing the Plasticity of Reinforcement Learning Based Systems
Journal-First Papers
Matteo Biagiola Università della Svizzera italiana, Paolo Tonella USI Lugano
Link to publication DOI Pre-print
11:30
15m
Talk
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Technical Track
Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
11:45
15m
Talk
Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests
Technical Track
Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Saikat Dutta University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
12:00
15m
Talk
Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems
Technical Track
Fitash ul haq , Donghwan Shin The University of Sheffield, Lionel Briand University of Luxembourg; University of Ottawa
Pre-print
12:15
15m
Talk
Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects
Technical Track
Linyi Li University of Illinois at Urbana-Champaign, Yuhao Zhang University of Wisconsin-Madison, Luyao Ren Peking University, China, Yingfei Xiong Peking University, Tao Xie Peking University
Pre-print
11:00 - 12:30
11:00
15m
Talk
Automatic prediction of rejected edits in Stack Overflow
Journal-First Papers
Saikat Mondal University of Saskatchewan, Gias Uddin University of Calgary, Canada, Chanchal K. Roy University of Saskatchewan
Link to publication DOI Pre-print
11:15
15m
Talk
Automated Summarization of Stack Overflow Posts
Technical Track
Bonan Kou Purdue University, Muhao Chen University of Southern California, Tianyi Zhang Purdue University
11:30
15m
Talk
Semi-Automatic, Inline and Collaborative Web Page Code Curations
Technical Track
Roy Rutishauser University of Zurich, André N. Meyer University of Zurich, Reid Holmes University of British Columbia, Thomas Fritz University of Zurich
11:45
15m
Talk
You Don’t Know Search: Helping Users Find Code by Automatically Evaluating Alternative Queries
SEIP - Software Engineering in Practice
Rijnard van Tonder Sourcegraph
12:00
7m
Talk
TECHSUMBOT: A Stack Overflow Answer Summarization Tool for Technical Query
DEMO - Demonstrations
Chengran Yang Singapore Management University, Bowen Xu Singapore Management University, Jiakun Liu Singapore Management University, David Lo Singapore Management University
12:07
8m
Talk
An empirical study of question discussions on Stack Overflow
Journal-First Papers
Wenhan Zhu University of Waterloo, Haoxiang Zhang Centre for Software Excellence at Huawei Canada, Ahmed E. Hassan Queen’s University, Michael W. Godfrey University of Waterloo, Canada
12:15
15m
Talk
Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence
Technical Track
zejun zhang Australian National University, Zhenchang Xing , Xin Xia Huawei, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61
11:00 - 12:30
Program comprehensionTechnical Track / Journal-First Papers at Meeting Room 103
Chair(s): Oscar Chaparro College of William and Mary
11:00
15m
Talk
Code Comprehension Confounders: A Study of Intelligence and Personality
Journal-First Papers
Stefan Wagner University of Stuttgart, Marvin Wyrich Saarland University
Link to publication Pre-print
11:15
15m
Talk
Identifying Key Classes for Initial Software Comprehension: Can We Do It Better?
Technical Track
Weifeng Pan Zhejiang Gongshang University, China, Xin Du Zhejiang Gongshang University, China, Hua Ming Oakland University, Dae-Kyoo Kim Oakland University, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc
11:30
15m
Talk
Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods
Technical Track
Daye Nam Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University
Pre-print
11:45
15m
Talk
Evidence Profiles for Validity Threats in Program Comprehension Experiments
Technical Track
Marvin Muñoz Barón University of Stuttgart, Marvin Wyrich Saarland University, Daniel Graziotin University of Stuttgart, Stefan Wagner University of Stuttgart
Pre-print
12:00
15m
Talk
Developers’ Visuo-spatial Mental Model and Program Comprehension
Technical Track
Abir Bouraffa University of Hamburg, Gian-Luca Fuhrmann , Walid Maalej University of Hamburg
Pre-print
12:15
15m
Talk
Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension
Technical Track
Shuzheng Gao Harbin institute of technology, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology, Jun Sun Singapore Management University, David Lo Singapore Management University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China
11:00 - 12:30
11:00
15m
Talk
SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics
Technical Track
Dehai Zhao Australian National University, Australia, Zhenchang Xing , Xin Xia Huawei, Deheng Ye Tencent AI Lab, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
11:15
15m
Talk
AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces
Technical Track
S M Hasan Mansur George Mason University, Sabiha Salma George Mason University, Damilola Awofisayo Duke University, Kevin Moran George Mason University
11:30
15m
Talk
Carving UI Tests to Generate API Tests and API Specification
Technical Track
Rahulkrishna Yandrapally University of British Columbia, Canada, Saurabh Sinha IBM Research, Rachel Tzoref-Brill IBM Research, Ali Mesbah University of British Columbia (UBC)
Pre-print
11:45
15m
Talk
CFG2VEC: Hierarchical Graph Neural Network for Cross-Architectural Software Reverse Engineering
SEIP - Software Engineering in Practice
Shih-Yuan Yu UCI, Yonatan Achamyeleh UCI, Chonghan Wang UCI, Anton Kocheturov Siemens Technology, Patrick Eisen Siemens Technology, Mohammad Al Faruque UCI
12:00
15m
Talk
Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network
Technical Track
Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yuhui Su Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
12:15
7m
Talk
VID2XML: Automatic Extraction of a Complete XML Data from Mobile Programming Screencasts
Journal-First Papers
Mohammad D. Alahmadi Department of Software Engineering, College of Computer Science and Engineering, University of Jeddah, Jeddah, Saudi Arabia.
11:00 - 12:30
11:00
15m
Talk
A Theory of Scrum Team Effectiveness
Journal-First Papers
Christiaan Verwijs The Liberators, Daniel Russo Department of Computer Science, Aalborg University
Link to publication DOI
11:15
15m
Talk
Sustainability is Stratified: Toward a Better Theory of Sustainable Software Engineering
Technical Track
Erin Schultz Dalhousie University, Sean McGuire Dalhousie University, Bimpe Ayoola Dalhousie University, Paul Ralph Dalhousie University
Pre-print
11:30
15m
Talk
Overcoming Challenges in DevOps Education through Teaching Methods
SEET - Software Engineering Education and Training
Samuel Ferino Federal University of Rio Grande do Norte, Marcelo Fernandes Federal Institute of Rio Grande do Norte, Elder Cirilo Federal University of São João del Rei, Lucas Agnez Federal University of Rio Grande do Norte, Bruno Batista Federal University of Rio Grande do Norte, Uirá Kulesza Federal University of Rio Grande do Norte, Eduardo Aranha Federal University of Rio Grande do Norte, Christoph Treude University of Melbourne
Pre-print
11:45
15m
Talk
Do Software Security Practices Yield Fewer Vulnerabilities?
SEIP - Software Engineering in Practice
Nusrat Zahan North Carolina State University, Shohanuzzaman Shohan , Dan Harris , Laurie Williams North Carolina State University
Pre-print
12:00
15m
Talk
A/B Integrations: 7 Lessons Learned from Enabling A/B testing as a Product Feature
SEIP - Software Engineering in Practice
12:15
7m
Talk
Towards Supporting Emotion Awareness in Retrospective Meetings
NIER - New Ideas and Emerging Results
Daniela Grassi, Filippo Lanubile University of Bari, Nicole Novielli University of Bari, Alexander Serebrenik Eindhoven University of Technology
Pre-print
12:22
7m
Talk
Test-Driven Development Benefits Beyond Design Quality: Flow State and Developer Experience
NIER - New Ideas and Emerging Results
Pedro Calais Stone Co., Lissa Franzini Stone Co.
11:00 - 12:30
11:00
15m
Talk
DLInfer: Deep Learning with Static Slicing for Python Type Inference
Technical Track
Yanyan Yan Nanjing University, Yang Feng Nanjing University, Hongcheng Fan Nanjing University, Baowen Xu Nanjing University
11:15
15m
Talk
ViolationTracker: Building Precise Histories for Static Analysis Violations
Technical Track
Ping Yu Fudan University, China, Yijian Wu Fudan University, Xin Peng Fudan University, Jiahan Peng Fudan University, Jian Zhang Fudan University, Peicheng Xie Fudan University, Wenyun Zhao Fudan University, China
Pre-print
11:30
15m
Talk
On the use of static analysis to engage students with software quality improvement: An experience with PMD
SEET - Software Engineering Education and Training
Eman Abdullah AlOmar Stevens Institute of Technology, Salma Abdullah AlOmar NA, Mohamed Wiem Mkaouer Rochester Institute of Technology
Pre-print
11:45
15m
Talk
Long-term Static Analysis Rule Quality Monitoring Using True Negatives
SEIP - Software Engineering in Practice
Linghui Luo Amazon Web Services, Rajdeep Mukherjee Amazon Web Services, Omer Tripp Amazon, Martin Schäf Amazon Web Services, Qiang Zhou Amazon Web Services, Daniel J Sanchez Amazon Alexa
12:00
15m
Talk
A Language-agnostic Framework for Mining Static Analysis Rules from Code Changes
SEIP - Software Engineering in Practice
David Baker Effendi Stellenbosch University, Berk Cirisci IRIF, University Paris Diderot and CNRS, France, Rajdeep Mukherjee Amazon Web Services, Hoan Anh Nguyen Amazon, Omer Tripp Amazon
12:15
7m
Talk
GradeStyle: GitHub-Integrated and Automated Assessment of Java Code Style
SEET - Software Engineering Education and Training
Callum Iddon University of Auckland, Nasser Giacaman The University of Auckland, Valerio Terragni University of Auckland
12:22
7m
Talk
The Challenges of Shift Left Static Analysis
SEIP - Software Engineering in Practice
Quoc-Sang Phan Facebook, Inc., KimHao Nguyen University of Nebraska-Lincoln, ThanhVu Nguyen George Mason University
11:00 - 12:30
Testing of database and low-level softwareTechnical Track / SEIP - Software Engineering in Practice / DEMO - Demonstrations / Journal-First Papers at Meeting Room 109
Chair(s): Michael Pradel University of Stuttgart
11:00
15m
Talk
Compiler Test-Program Generation via Memoized Configuration Search
Technical Track
Junjie Chen Tianjin University, Chenyao Suo College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Peiqi Chen College of Intelligence and Computing, Tianjin University, Xingjian Li College of Intelligence and Computing, Tianjin University
11:15
15m
Talk
Generating Test Databases for Database-Backed Applications
Technical Track
Cong Yan Microsoft Research, Suman Nath Microsoft Research, Shan Lu University of Chicago
11:30
15m
Talk
Testing Database Engines via Query Plan GuidanceDistinguished Paper Award
Technical Track
Jinsheng Ba National University of Singapore, Manuel Rigger National University of Singapore
Pre-print
11:45
15m
Talk
Testing Database Systems via Differential Query Execution
Technical Track
Jiansen Song , Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print
12:00
15m
Talk
Achieving Last-Mile Functional Coverage in Testing Chip Design Software Implementations
SEIP - Software Engineering in Practice
Ming Yan College of Intelligence and Computing, Tianjin University, Junjie Chen Tianjin University, Hangyu Mao , Jiajun Jiang Tianjin University, Jianye Hao Tianjin University, Xingjian Li College of Intelligence and Computing, Tianjin University, Zhao Tian Tianjin University, Zhichao Chen , Dong Li , Dong Li , Yanwei Guo , Wulong Liu , Bin Wang , Yuefeng Sun , Yongshun Cui
12:15
7m
Talk
Randomized Differential Testing of RDF Stores
DEMO - Demonstrations
Rui Yang Institute of Software, Chinese Academy of Sciences, Yingying Zheng Institute of Software Chinese Academy of Sciences, Lei Tang Institute of Software Chinese Academy of Sciences, Wensheng Dou Institute of Software Chinese Academy of Sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School
Pre-print
12:22
7m
Talk
Boosting Compiler Testing via Compiler Optimization Exploration
Journal-First Papers
Junjie Chen Tianjin University, Chenyao Suo College of Intelligence and Computing, Tianjin University
11:00 - 12:30
FOSE-Human & Tools, Ethics and QuantumFoSE - Future of Software Engineering at Meeting Room 110
Chair(s): Hourieh Khalajzadeh Deakin University, Australia
11:00
10m
Talk
Software Engineering for Big Data and Hardware Heterogeneity
FoSE - Future of Software Engineering
Miryung Kim University of California at Los Angeles, USA
File Attached
11:10
10m
Talk
Got ethics?
FoSE - Future of Software Engineering
Tim Menzies North Carolina State University
Pre-print
11:20
10m
Talk
The path to quantum at scale
FoSE - Future of Software Engineering
11:30
10m
Talk
The Software Revolution of Obfuscation
FoSE - Future of Software Engineering
Myra Cohen Iowa State University
11:40
50m
Panel
Panel discussion
FoSE - Future of Software Engineering

11:00 - 12:30
Technical Briefing 6Technical Briefings at Meeting Room 112
11:00
90m
Talk
The Landscape of Source Code Representation Learning in AI-Driven Software Engineering Tasks
Technical Briefings
Sridhar Chimalakonda IIT Tirupati, Debeshee Das Indian Institute of Technology Tirupati, Alex Mathai IBM India Research Labs, Srikanth Tamilselvam IBM Research, Atul Kumar IBM India Research Labs
13:45 - 15:15
Software performanceDEMO - Demonstrations / NIER - New Ideas and Emerging Results / Technical Track / SEIP - Software Engineering in Practice at Level G - Plenary Room 1
Chair(s): Philipp Leitner Chalmers University of Technology, Sweden / University of Gothenburg, Sweden
13:45
15m
Talk
Analyzing the Impact of Workloads on Modeling the Performance of Configurable Software Systems
Technical Track
Stefan Mühlbauer Leipzig University, Florian Sattler Saarland Informatics Campus, Saarland University, Christian Kaltenecker Saarland University, Germany, Johannes Dorn Leipzig University, Sven Apel Saarland University, Norbert Siegmund Leipzig University
Pre-print
14:00
15m
Talk
Twins or False Friends? A Study on Energy Consumption and Performance of Configurable Software
Technical Track
Max Weber Leipzig University, Christian Kaltenecker Saarland University, Germany, Florian Sattler Saarland Informatics Campus, Saarland University, Sven Apel Saarland University, Norbert Siegmund Leipzig University
Link to publication
14:15
15m
Talk
Auto-tuning elastic applications in production
SEIP - Software Engineering in Practice
Adalberto R. Sampaio Jr Huawei Canada, Ivan Beschastnikh University of British Columbia, Daryl Maier IBM Canada, Don Bourne IBM Canada, Vijay Sundaresan IBM Canada
14:30
7m
Talk
CryptOpt: Automatic Optimization of Straightline Code
DEMO - Demonstrations
Joel Kuepper University of Adelaide, Andres Erbsen MIT, Jason Gross MIT CSAIL, Owen Conoly MIT, Chuyue Sun Stanford, Samuel Tian MIT, David Wu University of Adelaide, Adam Chlipala Massachusetts Institute of Technology, Chitchanok Chuengsatiansup University of Adelaide, Daniel Genkin Georgia Tech, Markus Wagner Monash University, Australia, Yuval Yarom Ruhr University Bochum
Link to publication
14:37
7m
Talk
Performance Analysis with Bayesian Inference
NIER - New Ideas and Emerging Results
Noric Couderc Lund University, Christoph Reichenbach Lund University, Emma Söderberg Lund University
14:45
15m
Talk
Runtime Performance Prediction for Deep Learning Models with Graph Neural Network
SEIP - Software Engineering in Practice
Yanjie Gao Microsoft Research, Xianyu Gu Tsinghua University, Hongyu Zhang The University of Newcastle, Haoxiang Lin Microsoft Research, Mao Yang Microsoft Research
Pre-print
15:00
7m
Talk
Judging Adam: Studying the Performance of Optimization Methods on ML4SE Tasks
NIER - New Ideas and Emerging Results
Dmitry Pasechnyuk Mohammed bin Zayed University of Artificial Intelligence, UAE, Anton Prazdnichnykh , Mikhail Evtikhiev JetBrains Research, Timofey Bryksin JetBrains Research
15:07
7m
Talk
Who Ate My Memory? Towards Attribution in Memory Management
SEIP - Software Engineering in Practice
Gunnar Kudrjavets University of Groningen, Ayushi Rastogi University of Groningen, The Netherlands, Jeff Thomas Meta Platforms, Inc., Nachiappan Nagappan Facebook
Pre-print
13:45 - 15:15
Code generationJournal-First Papers / Technical Track at Meeting Room 101
Chair(s): Iftekhar Ahmed University of California at Irvine
13:45
15m
Talk
Learning Deep Semantics for Test Completion
Technical Track
Pengyu Nie University of Texas at Austin, Rahul Banerjee The University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Raymond Mooney The University of Texas at Austin, Milos Gligoric University of Texas at Austin
14:00
15m
Talk
Dynamic Human-in-the-Loop Assertion Generation
Journal-First Papers
Lucas Zamprogno University of British Columbia, Braxton Hall University of British Columbia, Reid Holmes University of British Columbia, Joanne M. Atlee University of Waterloo
14:15
15m
Talk
SkCoder: A Sketch-based Approach for Automatic Code Generation
Technical Track
Jia Li Peking University, Yongmin Li Peking University, Ge Li Peking University, Zhi Jin Peking University, Xing Hu Zhejiang University
Pre-print
14:30
15m
Talk
An Empirical Comparison of Pre-Trained Models of Source Code
Technical Track
Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Dongxiao Chen Software Institute, Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University
Pre-print
14:45
15m
Talk
On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot
Technical Track
Antonio Mastropaolo Università della Svizzera italiana, Luca Pascarella ETH Zurich, Emanuela Guglielmi University of Molise, Matteo Ciniselli Università della Svizzera Italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
15:00
15m
Talk
Source Code Recommender Systems: The Practitioners' Perspective
Technical Track
Matteo Ciniselli Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Emad Aghajani Software Institute, USI Università della Svizzera italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
13:45 - 15:15
Cyber-physical systems developmentSEIP - Software Engineering in Practice / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102
Chair(s): Andrzej Wąsowski IT University of Copenhagen, Denmark
13:45
15m
Talk
Hybrid Cloudification of Legacy Software for Efficient Simulation of Gas Turbine Designs
SEIP - Software Engineering in Practice
Fozail Ahmad McGill University, Maruthi Rangappa , Neeraj Katiyar McGill University, Canada, Martin Staniszewski Siemens Energy, Daniel Varro Linköping University / McGill University
14:00
15m
Talk
Automated Misconfiguration Repair of Configurable Cyber-Physical Systems with Search: an Industrial Case Study on Elevator Dispatching Algorithms
SEIP - Software Engineering in Practice
Pablo Valle University of Mondragon, Aitor Arrieta Mondragon University, Maite Arratibel Orona
Pre-print
14:15
7m
Talk
WirelessDT: A Digital Twin Platform for Real-Time Evaluation of Wireless Software Applications
DEMO - Demonstrations
Zhongzheng Lai The University of Sydney, Dong Yuan The University of Sydney, Huaming Chen The University of Sydney, Yu Zhang The University of Sydney, Wei Bao The University of Sydney
Media Attached
14:22
7m
Talk
MROS: A framework for robot self-adaptation
DEMO - Demonstrations
Gustavo Rezende Silva Cognitive Robotics, Delft University of Technology, Darko Bozhinoski Université Libre de Bruxelles, Mario Garzon Oviedo Department of Cognitive Robotics, Delft University of Technology, Mariano Ramírez Montero Cognitive Robotics, Delft University of Technology, Nadia Hammoudeh Garcia Fraunhofer IPA, Harshavardhan Deshpande Fraunhofer IPA, Andrzej Wąsowski IT University of Copenhagen, Denmark, Carlos Hernández Corbato Delft University of Technology
14:30
7m
Talk
Mind the Gap! A Study on the Transferability of Virtual vs Physical-world Testing of Autonomous Driving Systems
Journal-First Papers
Andrea Stocco Technical University of Munich & fortiss, Brian Pulfer University of Geneva, Paolo Tonella USI Lugano
14:37
7m
Talk
Uncertainty-aware Prediction Validator in Deep Learning Models for Cyber-physical System Data (Journal First Presentation)
Journal-First Papers
Ferhat Ozgur Catak University of Stavanger, Norway, Tao Yue Simula Research Laboratory, Shaukat Ali Simula Research Laboratory
14:45
7m
Talk
Uncertainty-aware Robustness Assessment of Industrial Elevator Systems
Journal-First Papers
Liping Han Nanjing University of Aeronautics and Astronautics & Simula Research Laboratory, Shaukat Ali Simula Research Laboratory, Tao Yue Simula Research Laboratory, Aitor Arrieta Mondragon University, Maite Arratibel Orona
14:52
7m
Talk
Learning Configurations of Operating Environment of Autonomous Vehicles to Maximize their Collisions
Journal-First Papers
Chengjie Lu Simula Research Laboratory and University of Oslo, Shi Yize Nanjing University of Aeronautics and Astronautics, Huihui Zhang Weifang University, Man Zhang Kristiania University, Tiexin Wang Nanjing University of Aeronautics and Astronautics, Tao Yue Simula Research Laboratory, Shaukat Ali Simula Research Laboratory
Link to publication DOI Pre-print
15:00
7m
Talk
FalsifAI: Falsification of AI-Enabled Hybrid Control Systems Guided by Time-Aware Coverage Criteria
Journal-First Papers
Zhenya Zhang Kyushu University, Deyun Lyu Kyushu university, Paolo Arcaini National Institute of Informatics , Lei Ma University of Alberta, Ichiro Hasuo National Institute of Informatics, Japan, Jianjun Zhao Kyushu University
Link to publication DOI
13:45 - 15:15
13:45
15m
Talk
Safe low-level code without overhead is practical
Technical Track
Pre-print
14:00
15m
Talk
Sibyl: Improving Software Engineering Tools with SMT SelectionDistinguished Paper Award
Technical Track
Will Leeson University of Virgina, Matthew B Dwyer University of Virginia, Antonio Filieri AWS and Imperial College London
Pre-print
14:15
15m
Talk
Make Your Tools Sparkle with Trust: The PICSE Framework for Trust in Software Tools
SEIP - Software Engineering in Practice
Brittany Johnson George Mason University, Christian Bird Microsoft Research, Denae Ford Microsoft Research, Nicole Forsgren Microsoft Research, Thomas Zimmermann Microsoft Research
Pre-print
14:30
15m
Talk
CoCoSoDa: Effective Contrastive Learning for Code Search
Technical Track
Ensheng Shi Xi'an Jiaotong University, Wenchao Gu The Chinese University of Hong Kong, Yanlin Wang School of Software Engineering, Sun Yat-sen University, Lun Du Microsoft Research Asia, Hongyu Zhang The University of Newcastle, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Hongbin Sun Xi'an Jiaotong University
Pre-print
14:45
7m
Talk
Task Context: A Tool for Predicting Code Context Models for Software Development Tasks
DEMO - Demonstrations
Yifeng Wang Zhejiang University, Yuhang Lin Zhejiang University, Zhiyuan Wan Zhejiang University, Xiaohu Yang Zhejiang University
Pre-print Media Attached
14:52
7m
Talk
Continuously Accelerating Research
NIER - New Ideas and Emerging Results
Sergey Mechtaev University College London, Jonathan Bell Northeastern University, Christopher Steven Timperley Carnegie Mellon University, Earl T. Barr University College London, Michael Hilton Carnegie Mellon University
Pre-print
15:00
7m
Talk
An Alternative to Cells for Selective Execution of Data Science Pipelines
NIER - New Ideas and Emerging Results
Lars Reimann University of Bonn, Günter Kniesel-Wünsche University of Bonn
Pre-print
15:07
7m
Talk
pytest-inline: An Inline Testing Tool for Python
DEMO - Demonstrations
Yu Liu University of Texas at Austin, Zachary Thurston Cornell University, Alan Han Cornell University, Pengyu Nie University of Texas at Austin, Milos Gligoric University of Texas at Austin, Owolabi Legunsen Cornell University
13:45 - 15:15
13:45
15m
Talk
Coverage Guided Fault Injection for Cloud Systems
Technical Track
Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wensheng Dou Institute of Software Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Wenhan Feng Institute of Software Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print
14:00
15m
Talk
Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations
Technical Track
Jongwook Kim Korea University, Sunbeom So Korea University, Hakjoo Oh Korea University
14:15
15m
Talk
Identifying Defect Injection Risks from Analysis and Design Diagrams: An Industrial Case Study at Sony
SEIP - Software Engineering in Practice
Yoji Imanishi Sony Global Manufacturing&Operations, Kazuhiro Kumon Sony Global Manufacturing&Operations, Shuji Morisaki Nagoya University
14:30
7m
Talk
DaMAT: A Data-driven Mutation Analysis Tool
DEMO - Demonstrations
Enrico Viganò University of Luxembourg, Oscar Cornejo SnT Centre, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Pre-print
14:37
7m
Talk
Mutation testing in the wild: findings from GitHub
Journal-First Papers
Ana B. Sánchez University of Seville, Pedro Delgado-Pérez Universidad de Cádiz, Inmaculada Medina-Bulo Universidad de Cádiz, Sergio Segura University of Seville
Link to publication DOI
14:45
7m
Talk
An Experimental Assessment of Using Theoretical Defect Predictors to Guide Search-Based Software Testing
Journal-First Papers
Anjana Perera Oracle Labs, Australia, Aldeida Aleti Monash University, Burak Turhan University of Oulu, Marcel Böhme MPI-SP, Germany and Monash University, Australia
Link to publication DOI
14:52
7m
Talk
Assurance Cases as Data: A Manifesto
NIER - New Ideas and Emerging Results
Claudio Menghi McMaster University, Canada, Torin Viger , Alessio Di Sandro University of Toronto, Chris Rees Critical Systems Labs, Jeffrey Joyce Critical System Labs Inc., Marsha Chechik University of Toronto
15:00
7m
Talk
Predictive Mutation Analysis via Natural Language Channel in Source Code
Journal-First Papers
Jinhan Kim KAIST, Juyoung Jeon Handong Global University, Shin Hong Handong Global University, Shin Yoo KAIST
Link to publication Pre-print
13:45 - 15:15
Vulnerability detectionTechnical Track / Journal-First Papers at Meeting Room 106
Chair(s): Cuiyun Gao Harbin Institute of Technology
13:45
15m
Talk
An Empirical Study of Deep Learning Models for Vulnerability Detection
Technical Track
Benjamin Steenhoek Iowa State University, Md Mahbubur Rahman Iowa State University, Richard Jiles Iowa State University, Wei Le Iowa State University
Pre-print
14:00
15m
Talk
DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection
Technical Track
Wenbo Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Yi Li New Jersey Institute of Technology, Jiyuan Zhang University of Illinois Urbana-Champaign, Aashish Yadavally The University of Texas at Dallas
Pre-print
14:15
15m
Talk
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model
Technical Track
Bin Yuan Huazhong University of Science and Technology, Yifan Lu Huazhong University of Science and Technology, Yilin Fang Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Deqing Zou Huazhong University of Science and Technology, Zhen Li Huazhong University of Science and Technology, Zhi Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
14:30
15m
Talk
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Technical Track
Xin-Cheng Wen Harbin Institute of Technology, Yupan Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Hongyu Zhang The University of Newcastle, Jie M. Zhang King's College London, Qing Liao Harbin Institute of Technology
14:45
15m
Talk
Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays!
Technical Track
Xu Yang University of Manitoba, Shaowei Wang University of Manitoba, Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology
Pre-print
15:00
7m
Talk
Learning from What We Know: How to Perform Vulnerability Prediction using Noisy Historical Data
Journal-First Papers
Aayush Garg University of Luxembourg, Luxembourg, Renzo Degiovanni SnT, University of Luxembourg, Matthieu Jimenez SnT, University of Luxembourg, Maxime Cordy University of Luxembourg, Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Link to publication DOI Authorizer link Pre-print Media Attached
15:07
7m
Talk
Do I really need all this work to find vulnerabilities? An empirical case study comparing vulnerability detection techniques on a Java application
Journal-First Papers
Sarah Elder North Carolina State University, Nusrat Zahan North Carolina State University, Rui Shu North Carolina State University, Valeri Kozarev North Carolina State University, Tim Menzies North Carolina State University, Laurie Williams North Carolina State University
13:45 - 15:15
SE educationSEET - Software Engineering Education and Training at Meeting Room 109
Chair(s): Alexander Serebrenik Eindhoven University of Technology
13:45
15m
Talk
Persona-based Assessment of Software Engineering Student Research Projects: An Experience Report
SEET - Software Engineering Education and Training
Chetan Arora Monash University, Laura Tubino Deakin University, Andrew Cain School of Information Technology, Deakin University, Kevin Lee Deakin University, Vasudha Malhotra Deakin University
14:00
15m
Talk
Exposing Software Engineering Students to Stressful Projects: Does Diversity Matter?
SEET - Software Engineering Education and Training
Isabella Graßl University of Passau, Gordon Fraser University of Passau, Stefan Trieflinger Reutlingen University, Marco Kuhrmann Reutlingen University
Pre-print
14:15
15m
Talk
“Software is the easy part of Software Engineering” - Lessons and Experiences from A Large-Scale, Multi-Team Capstone Course
SEET - Software Engineering Education and Training
Ze Shi (Zane) Li University of Victoria, Canada, Nowshin Nawar Arony University of Victoria, Kezia Devathasan University of Victoria, Daniela Damian University of Victoria
Pre-print
14:30
15m
Talk
Attribution-based Personas in Virtual Software Engineering Education
SEET - Software Engineering Education and Training
Klaudia Madhi School of Computation, Information and Technology, Technical University of Munich, Munich, Germany, Lara Marie Reimer School of Computation, Information and Technology, Technical University of Munich, Munich, Germany; Institute for Digital Medicine, University Hospital Bonn, Bonn, Germany, Stephan M. Jonas Institute for Digital Medicine, University Hospital Bonn, Bonn, Germany
14:45
15m
Talk
Leveraging Diversity in Software Engineering Education through Community Engaged Learning and a Supportive Network
SEET - Software Engineering Education and Training
Nowshin Nawar Arony University of Victoria, Kezia Devathasan University of Victoria, Ze Shi (Zane) Li University of Victoria, Canada, Daniela Damian University of Victoria
Pre-print
13:45 - 15:15
Issue reporting and reproductionTechnical Track / DEMO - Demonstrations at Meeting Room 110
Chair(s): Daniel Russo Department of Computer Science, Aalborg University
13:45
15m
Talk
Incident-aware Duplicate Ticket Aggregation for Cloud Systems
Technical Track
Jinyang Liu The Chinese University of Hong Kong, Shilin He Microsoft Research, Zhuangbin Chen Chinese University of Hong Kong, China, Liqun Li Microsoft Research, Yu Kang Microsoft Research, Xu Zhang Microsoft Research, Pinjia He Chinese University of Hong Kong at Shenzhen, Hongyu Zhang The University of Newcastle, Qingwei Lin Microsoft Research, Zhangwei Xu Microsoft Azure, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research, Michael Lyu The Chinese University of Hong Kong
14:00
15m
Talk
Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction
Technical Track
Sungmin Kang KAIST, Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo KAIST
Pre-print
14:15
15m
Talk
On the Reproducibility of Software Defect Datasets
Technical Track
Hao-Nan Zhu University of California, Davis, Cindy Rubio-González University of California at Davis
14:30
15m
Talk
Context-aware Bug Reproduction for Mobile Apps
Technical Track
Yuchao Huang , Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Song Wang York University, Chunyang Chen Monash University, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:45
15m
Talk
Read It, Don't Watch It: Captioning Bug Recordings Automatically
Technical Track
Sidong Feng Monash University, Mulong Xie Australian National University, Yinxing Xue University of Science and Technology of China, Chunyang Chen Monash University
Pre-print
15:00
7m
Talk
BURT: A Chatbot for Interactive Bug Reporting
DEMO - Demonstrations
Yang Song College of William and Mary, Junayed Mahmud George Mason University, Nadeeshan De Silva William & Mary, Ying Zhou University of Texas at Dallas, Oscar Chaparro College of William and Mary, Kevin Moran George Mason University, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk College of William and Mary
15:15 - 15:45
15:45 - 17:15
15:45
15m
Talk
DuetCS: Code Style Transfer through Generation and Retrieval
Technical Track
Binger Chen Technische Universität Berlin, Ziawasch Abedjan Leibniz Universität Hannover
16:00
15m
Talk
Understanding Why and Predicting When Developers Adhere to Code-Quality Standards
SEIP - Software Engineering in Practice
Manish Motwani Georgia Institute of Technology, Yuriy Brun University of Massachusetts
Pre-print
16:15
15m
Talk
Code Compliance Assessment as a Learning Problem
SEIP - Software Engineering in Practice
16:30
15m
Talk
An Empirical Study on Quality Issues of Deep Learning Platform
SEIP - Software Engineering in Practice
Yanjie Gao Microsoft Research, Xiaoxiang Shi , Haoxiang Lin Microsoft Research, Hongyu Zhang The University of Newcastle, Hao Wu , Rui Li , Mao Yang Microsoft Research
Pre-print
16:45
7m
Talk
Can static analysis tools find more defects? A qualitative study of design rule violations found by code review
Journal-First Papers
Sahar Mehrpour George Mason University, USA, Thomas LaToza George Mason University
16:52
7m
Talk
DebtFree: minimizing labeling cost in self-admitted technical debt identification using semi-supervised learning
Journal-First Papers
Huy Tu North Carolina State University, USA, Tim Menzies North Carolina State University
Link to publication Pre-print
17:00
7m
Talk
FIXME: synchronize with database! An empirical study of data access self-admitted technical debt
Journal-First Papers
Biruk Asmare Muse Polytechnique Montréal, Csaba Nagy Software Institute - USI, Lugano, Anthony Cleve University of Namur, Foutse Khomh Polytechnique Montréal, Giuliano Antoniol Polytechnique Montréal
17:07
7m
Talk
How does quality deviate in stable releases by backporting?
NIER - New Ideas and Emerging Results
Jarin Tasnim University of Saskatchewan, Debasish Chakroborti University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Kevin Schneider University of Saskatchewan
Link to publication Pre-print
15:45 - 17:15
SE education methods and toolsTechnical Track / SEET - Software Engineering Education and Training at Meeting Room 101
Chair(s): Andrew Begel Carnegie Mellon University
15:45
15m
Talk
On the Applicability of Language Models to Block-Based Programs
Technical Track
Elisabeth Griebl University of Passau, Benedikt Fein University of Passau, Florian Obermueller University of Passau, Gordon Fraser University of Passau, René Just University of Washington
16:00
15m
Talk
Improving Grading Outcomes in Software Engineering Projects Through Automated Contributions Summaries
SEET - Software Engineering Education and Training
Kai Presler-Marshall Bowdoin College, Sarah Heckman North Carolina State University, Kathryn Stolee North Carolina State University
16:15
15m
Talk
Analyzing the Quality of Submissions in Online Programming Courses
SEET - Software Engineering Education and Training
Maria Tigina JetBrains Research, Anastasiia Birillo JetBrains Research, Yaroslav Golubev JetBrains Research, Hieke Keuning Utrecht University, Nikolay Vyahhi Stepik, Timofey Bryksin JetBrains Research
Pre-print
16:30
15m
Talk
A Metric for Measuring Software Engineering Post-Graduate Outcomes
SEET - Software Engineering Education and Training
Travis Breaux Carnegie Mellon University, Jennifer Moritz Carnegie Mellon University
16:45
7m
Talk
Using Focus to Personalise Learning and Feedback in Software Engineering Education
SEET - Software Engineering Education and Training
Bansri Amish Modi School of Information Technology, Deakin University, Andrew Cain School of Information Technology, Deakin University, Guy Wood-Bradley Deakin University, Jake Renzella University of New South Wales, Sydney
16:52
7m
Talk
Shaping a Tool for Developing Computing Students’ Professional Identity - Industry Perspectives
SEET - Software Engineering Education and Training
Laura Tubino Deakin University, Kerri Morgan Deakin University, Guy Wood-Bradley Deakin University, Andrew Cain School of Information Technology, Deakin University
17:00
7m
Talk
REFERENT: Transformer based Feedback Generation using Assignment Information for Programming Course
SEET - Software Engineering Education and Training
Jinseok Heo Sungkyunkwan University, Hohyeon Jeong Sungkyunkwan University, Dongwook Choi SungKyunKwan University, Eunseok Lee Sungkyunkwan University
17:07
7m
Talk
Factors Affecting Compilable State at Each Keystroke in CS1
SEET - Software Engineering Education and Training
Steven Scott Utah State University, Arto Hellas Aalto University, Juho Leinonen The University of Auckland, John Edwards Utah State University
15:45 - 17:15
15:45
15m
Talk
MTTM: Metamorphic Testing for Textual Content Moderation Software
Technical Track
Wenxuan Wang The Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Yizhan Huang The Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong at Shenzhen, Michael Lyu The Chinese University of Hong Kong
16:00
15m
Talk
Metamorphic Shader Fusion for Testing Graphics Shader Compilers
Technical Track
Dongwei Xiao The Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
16:15
15m
Paper
Metamorphic Testing and Debugging of Tax Preparation Software
SEIS - Software Engineering in Society
Saeid Tizpaz-Niari University of Texas at El Paso, Verya Monjezi University of Texas at El Paso, Morgan Wagner University of Texas at El Paso, Shiva Darian University of Colorado Boulder, Krystia Reed University of Texas at El Paso, Ashutosh Trivedi University of Colorado Boulder
Pre-print
16:30
7m
Talk
Biasfinder: Metamorphic test generation to uncover bias for sentiment analysis systems
Journal-First Papers
Muhammad Hilmi Asyrofi School of Computing and Information Systems, Singapore Management University, Zhou Yang Singapore Management University, Imam Nur Bani Yusuf Singapore Management University, Singapore, Hong Jin Kang UCLA, Ferdian Thung Singapore Management University, David Lo Singapore Management University
16:37
7m
Talk
Automated Metamorphic Testing using Transitive Relations for Specializing Stance Detection Models
SEIP - Software Engineering in Practice
Alisa Arno IBM Research - Tokyo, Futoshi Iwama IBM Research - Tokyo, Mikio Takeuchi IBM Research - Tokyo
16:45
15m
Talk
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform
Technical Track
Matteo Paltenghi University of Stuttgart, Germany, Michael Pradel University of Stuttgart
Pre-print
15:45 - 17:15
Pre-trained and few shot learning for SETechnical Track / Journal-First Papers at Meeting Room 103
Chair(s): Yiling Lou Fudan University
15:45
15m
Talk
On the validity of pre-trained transformers for natural language processing in the software engineering domain
Journal-First Papers
Alexander Trautsch University of Passau, Julian von der Mosel , Steffen Herbold University of Passau
16:00
15m
Talk
Automating Code-Related Tasks Through Transformers: The Impact of Pre-training
Technical Track
Rosalia Tufano Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
16:15
15m
Talk
Log Parsing with Prompt-based Few-shot Learning
Technical Track
Van-Hoang Le The University of Newcastle, Hongyu Zhang The University of Newcastle
Pre-print
16:30
15m
Talk
Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning
Technical Track
Noor Nashid University of British Columbia, Mifta Sintaha University of British Columbia, Ali Mesbah University of British Columbia (UBC)
Pre-print
16:45
15m
Paper
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry
Technical Track
Wenxin Jiang Purdue University, Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Taylor R. Schorlemmer Purdue University, Rohan Sethi Loyola University Chicago, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory, James C. Davis Purdue University
Pre-print
17:00
15m
Talk
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning
Technical Track
Shangqing Liu Nanyang Technological University, bozhi wu Nanyang Technological University, Xiaofei Xie Singapore Management University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University
15:45 - 17:15
15:45
15m
Talk
Stubbifier: debloating dynamic server-side JavaScript applications
Journal-First Papers
Alexi Turcotte Northeastern University, Ellen Arteca Northeastern University, Ashish Mishra Purdue University, Saba Alimadadi Simon Fraser University, Frank Tip Northeastern University
16:00
15m
Talk
DStream: A Streaming-Based Highly Parallel IFDS Framework
Technical Track
Xizao Wang Nanjing University, Zhiqiang Zuo Nanjing University, Lei Bu Nanjing University, Jianhua Zhao Nanjing University, China
16:15
15m
Talk
(Partial) Program Dependence Learning
Technical Track
Aashish Yadavally The University of Texas at Dallas, Wenbo Wang New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas
Pre-print
16:30
15m
Talk
MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems
Technical Track
Yicheng Ouyang University of Illinois at Urbana-Champaign, Kailai Shao Ant Group, Kunqiu Chen Southern University of Science and Technology, Ruobing Shen Peking University, Chao Chen Ant Group, Mingze Xu Ant Group, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print
16:45
15m
Talk
Incremental Call Graph Construction in Industrial Practice
SEIP - Software Engineering in Practice
Zelin Zhao Ant Group, Xizao Wang Nanjing University, Zhaogui Xu Ant Group, Zhenhao Tang Ant Group, Yongchao Li Ant Group, Peng Di Ant Group
17:00
15m
Talk
Generic Partition Refinement and Weighted Tree Automata
Showcase
Hans-Peter Deifel Friedrich-Alexander University Erlangen-Nürnberg, Germany, Stefan Milius , Lutz Schröder University of Erlangen-Nuremberg, Thorsten Wißmann Friedrich-Alexander University Erlangen-Nürnberg
Link to publication DOI Pre-print
15:45 - 17:15
Vulnerability testing and patchingTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105
Chair(s): Cristian Cadar Imperial College London, UK
15:45
15m
Talk
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
Technical Track
Jiamou Sun CSIRO's Data61, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Thong Hoang Data61, CSIRO, Dehai Zhao Australian National University, Australia
16:00
15m
Talk
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java ProjectsDistinguished Paper Award
Technical Track
Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Wu Jiahui Nanyang Technological University, Yang Liu Nanyang Technological University
16:15
15m
Talk
Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs
Technical Track
Davide Corradini University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona
Pre-print
16:30
7m
Talk
Patchmatch: A Tool for Locating Patches of Open Source Project Vulnerabilities
DEMO - Demonstrations
Kedi Shen Zhejiang university city college, Yun Zhang Zhejiang University City College, Lingfeng Bao Zhejiang University, Zhiyuan Wan Zhejiang University, Zhuorong Li Zhejiang university city college, Minghui Wu Zhejiang University City College}
16:37
8m
Talk
Software Updates Strategies: a Quantitative Evaluation against Advanced Persistent Threats
Journal-First Papers
Giorgio Di Tizio University of Trento, Michele Armellini University of Trento, Fabio Massacci University of Trento; Vrije Universiteit Amsterdam
16:45
7m
Talk
SSPCatcher: Learning to Catch Security Patches
Journal-First Papers
Arthur D. Sawadogo Université du Québec à Montréal, Tegawendé F. Bissyandé SnT, University of Luxembourg, Naouel Moha École de Technologie Supérieure (ETS), Kevin Allix CentraleSupelec Rennes, Jacques Klein University of Luxembourg, Li Li Beihang University, Yves Le Traon University of Luxembourg, Luxembourg
16:52
15m
Talk
CoLeFunDa: Explainable Silent Vulnerability Fix Identification
Technical Track
Jiayuan Zhou Huawei, Michael Pacheco Centre for Software Excellence, Huawei, Jinfu Chen Centre for Software Excellence, Huawei, Canada, Xing Hu Zhejiang University, Xin Xia Huawei, David Lo Singapore Management University, Ahmed E. Hassan Queen’s University
15:45 - 17:15
Cyber-physical systems testingSEIP - Software Engineering in Practice / Technical Track / Journal-First Papers at Meeting Room 106
Chair(s): Shahar Maoz Tel Aviv University
15:45
15m
Talk
Data-driven Mutation Analysis for Cyber-Physical Systems
Journal-First Papers
Enrico Viganò University of Luxembourg, Oscar Cornejo SnT Centre, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel Briand University of Luxembourg; University of Ottawa
Link to publication Pre-print
16:00
15m
Talk
Finding Causally Different Tests for an Industrial Control System
Technical Track
Chris Poskitt Singapore Management University, Yuqi Chen ShanghaiTech University, China, Jun Sun Singapore Management University, Yu Jiang Tsinghua University
DOI Pre-print File Attached
16:15
15m
Talk
Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software
Technical Track
Yuqi Huai University of California, Irvine, Yuntianyi Chen University of California, Irvine, Sumaya Almanee University of California, Irvine, Tuan Ngo VNU University of Engineering and Technology, Xiang Liao University of California, Irvine, Ziwen Wan University of California, Irvine, Qi Alfred Chen University of California, Irvine, Joshua Garcia University of California, Irvine
Pre-print
16:30
15m
Talk
Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems
Technical Track
Garrett Christian University of Virginia, Trey Woodlief University of Virginia, Sebastian Elbaum University of Virginia
Pre-print
16:45
15m
Talk
Automated Test Case Generation for Safety-Critical Software in Scade
SEIP - Software Engineering in Practice
Elson Kurian University of Milano Bicocca, Pietro Braione University of Milano-Bicocca, Daniela Briola University of Milano Bicocca, Dario D'Avino , Matteo Modonato , Giovanni Denaro University of Milano-Bicocca, Italy
17:00
7m
Talk
Single and Multi-objective Test Cases Prioritization for Self-driving Cars in Virtual Environments
Journal-First Papers
Christian Birchler Zurich University of Applied Sciences, Sajad Khatiri USI-Lugnao & Zurich University of Applied Sciences, Pouria Derakhshanfar JetBrains Research, Sebastiano Panichella Zurich University of Applied Sciences, Annibale Panichella Delft University of Technology
17:07
7m
Talk
Parameter Coverage for Testing of Autonomous Driving Systems Under Uncertainty
Journal-First Papers
Thomas Laurent JSPS@National Institute of Informatics, Japan, Stefan Klikovits Johannes Kepler University, Linz, Paolo Arcaini National Institute of Informatics , Fuyuki Ishikawa National Institute of Informatics, Anthony Ventresque Trinity College Dublin & Lero, Ireland
Link to publication DOI
15:45 - 17:15
15:45
7m
Talk
Upstream Bug Management in Linux Distributions - An Empirical Study of Debian and Fedora Practices
Journal-First Papers
Jiahuei Lin Queen’s University Software Analysis and Intelligence Lab (SAIL), Canada, Haoxiang Zhang Centre for Software Excellence at Huawei Canada, Bram Adams Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen’s University
15:52
7m
Vision and Emerging Results
Treat societally impactful scientific insights as open-source software artifacts
SEIS - Software Engineering in Society
Cynthia C. S. Liem Delft University of Technology, Andrew M. Demetriou Delft University of Technology
Pre-print
16:00
15m
Talk
Rules of Engagement: Why and How Companies Participate in OSS
Technical Track
Mariam Guizani Oregon State University, Aileen Abril Castro-Guzman Oregon State University, Anita Sarma Oregon State University, Igor Steinmacher Northern Arizona University
Pre-print
16:15
15m
Paper
An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead
Technical Track
Boming Xia CSIRO's Data61 & University of New South Wales, Tingting Bi Data61, CSIRO, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
Pre-print
16:30
15m
Talk
Open Source Software Onboarding as a University Course: An Experience Report
SEET - Software Engineering Education and Training
Hao He Peking University, Minghui Zhou Peking University, Qingye Wang Peking University, China, Jingyue Li Norwegian University of Science and Technology
Pre-print
16:45
15m
Talk
An Empirical Study of License Conflict in Free and Open Source Software
SEIP - Software Engineering in Practice
Xing Cui Institute of Software, Chinese Academy of Sciences, Jingzheng Wu Institute of Software, The Chinese Academy of Sciences, Yanjun Wu Institute of Software, Chinese Academy of Sciences, Xu Wang Institute of Software, Chinese Academy of Sciences, Tianyue Luo , Sheng Qu Institute of Software, Chinese Academy of Sciences, Xiang Ling Institute of Software, Chinese Academy of Sciences, Mutian Yang
17:00
7m
Talk
LicenseRec: Knowledge based Open Source License Recommendation for OSS Projects
DEMO - Demonstrations
Weiwei Xu Peking University, Xin Wu Peking University, Runzhi He Peking University, Minghui Zhou Peking University
Pre-print
17:07
7m
Talk
Will you come back to contribute? Investigating the inactivity of OSS core developers in GitHub
Journal-First Papers
Fabio Calefato University of Bari, Marco Gerosa Northern Arizona University, Giuseppe Iaffaldano University of Bari, Filippo Lanubile University of Bari, Igor Steinmacher Northern Arizona University
Link to publication DOI Pre-print

Accepted Papers

Title
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities
Technical Track
A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization
Technical Track
AdHere: Automated Detection and Repair of Intrusive Ads
Technical Track
AI-based Question Answering Assistance for Analyzing Natural-language Requirements
Technical Track
Pre-print
AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces
Technical Track
Analyzing the Impact of Workloads on Modeling the Performance of Configurable Software Systems
Technical Track
Pre-print
An Empirical Comparison of Pre-Trained Models of Source Code
Technical Track
Pre-print
An Empirical Study of Deep Learning Models for Vulnerability Detection
Technical Track
Pre-print
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry
Technical Track
Pre-print
An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead
Technical Track
Pre-print
APICAD: Augmenting API Misuse Detection Through Specifications From Code And Documents
Technical Track
DOI Pre-print
A Qualitative Study on the Implementation Design Decisions of DevelopersDistinguished Paper Award
Technical Track
Pre-print
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation
Technical Track
Pre-print
A Semantic-aware Parsing Approach for Log Analytics
Technical Track
Pre-print
ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search
Technical Track
Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs
Technical Track
Pre-print
Automated Program Repair in the Era of Large Pre-trained Language Models
Technical Track
Automated Repair of Programs from Large Language Models
Technical Track
Automated Summarization of Stack Overflow Posts
Technical Track
Automating Code-Related Tasks Through Transformers: The Impact of Pre-training
Technical Track
Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots
Technical Track
Pre-print
BADGE: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing
Technical Track
Bad Snakes: Understanding and Improving Python Package Index Malware Scanning
Technical Track
Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests
Technical Track
Better Automatic Program Repair by Using Bug Reports and Tests Together
Technical Track
Pre-print
BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service
Technical Track
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts
Technical Track
Pre-print File Attached
Carving UI Tests to Generate API Tests and API Specification
Technical Track
Pre-print
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Technical Track
CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back
Technical Track
Pre-print
CCTEST: Testing and Repairing Code Completion Systems
Technical Track
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Pre-print
CoCoSoDa: Effective Contrastive Learning for Code Search
Technical Track
Pre-print
CodaMOSA: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models
Technical Track
Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions
Technical Track
Pre-print
CoLeFunDa: Explainable Silent Vulnerability Fix Identification
Technical Track
COLUMBUS: Android App Testing Through Systematic Callback Exploration
Technical Track
Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality
Technical Track
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations
Technical Track
Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis
Technical Track
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java ProjectsDistinguished Paper Award
Technical Track
Compiler Test-Program Generation via Memoized Configuration Search
Technical Track
Compiling Parallel Symbolic Execution with Continuations
Technical Track
Pre-print
Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs
Technical Track
Pre-print
Context-aware Bug Reproduction for Mobile Apps
Technical Track
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning
Technical Track
Coverage Guided Fault Injection for Cloud Systems
Technical Track
Pre-print
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models
Technical Track
Pre-print
Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation
Technical Track
Data-driven Recurrent Set Learning For Non-termination Analysis
Technical Track
Data Quality for Software Vulnerability Datasets
Technical Track
Pre-print
Data Quality Matters: A Case Study of ObsoleteComment Detection
Technical Track
Pre-print
Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Technical Track
Pre-print
DeepArc: Modularizing Neural Networks for the Model Maintenance
Technical Track
DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection
Technical Track
Pre-print
Demystifying Exploitable Bugs in Smart Contracts
Technical Track
Pre-print
Demystifying Issues, Challenges, and Solutions for Multilingual Software Development
Technical Track
Pre-print
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
Technical Track
Pre-print
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization
Technical Track
Detecting Dialog-Related Keyboard Navigation Failures in Web Applications
Technical Track
Detecting Exception Handling Bugs in C++ Programs
Technical Track
Detecting Isolation Bugs via Transaction Oracle Construction
Technical Track
Pre-print
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Technical Track
Pre-print
Developer-Intent Driven Code Comment Generation
Technical Track
Pre-print
Developers’ Visuo-spatial Mental Model and Program Comprehension
Technical Track
Pre-print
Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction
Technical Track
Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations
Technical Track
DLInfer: Deep Learning with Static Slicing for Python Type Inference
Technical Track
Do code refactorings influence the merge effort?
Technical Track
Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays!
Technical Track
Pre-print
Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific Debuggers
Technical Track
Pre-print
Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel ContributorsDistinguished Paper Award
Technical Track
Pre-print
Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software
Technical Track
Pre-print
DStream: A Streaming-Based Highly Parallel IFDS Framework
Technical Track
DuetCS: Code Style Transfer through Generation and Retrieval
Technical Track
Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data
Technical Track
Pre-print
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis
Technical Track
Pre-print
Efficiency Matters: Speeding Up Automated Testing with GUI Rendering InferenceDistinguished Paper Award
Technical Track
Pre-print
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model
Technical Track
Evaluating and Improving Hybrid Fuzzing
Technical Track
Evaluating the Impact of Experimental Assumptions in Automated Fault Localization
Technical Track
Pre-print Media Attached
Evidence Profiles for Validity Threats in Program Comprehension Experiments
Technical Track
Pre-print
Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network
Technical Track
Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation
Technical Track
Pre-print Media Attached
Fairify: Fairness Verification of Neural Networks
Technical Track
Pre-print
Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence
Technical Track
FedDebug: Systematic Debugging for Federated Learning Applications
Technical Track
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing
Technical Track
Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing
Technical Track
Pre-print
Finding Causally Different Tests for an Industrial Control System
Technical Track
DOI Pre-print File Attached
Fine-grained Commit-level Vulnerability Type Prediction By CWE Tree Structure
Technical Track
Pre-print
Flexible and Optimal Dependency Management via Max-SMT
Technical Track
Pre-print
Fonte: Finding Bug Inducing Commits from Failures
Technical Track
Pre-print
From Organizations to Individuals: Psychoactive Substance Use By Professional Programmers
Technical Track
Pre-print
Fuzzing Automatic Differentiation in Deep-Learning Libraries
Technical Track
GameRTS: A Regression Testing Framework for Video Games
Technical Track
Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems
Technical Track
Pre-print
Generating Test Databases for Database-Backed Applications
Technical Track
Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Technical Track
Pre-print
How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners
Technical Track
How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms
Technical Track
Identifying Key Classes for Initial Software Comprehension: Can We Do It Better?
Technical Track
Impact of Code Language Models on Automated Program Repair
Technical Track
Pre-print
Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods
Technical Track
Pre-print
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation
Technical Track
Incident-aware Duplicate Ticket Aggregation for Cloud Systems
Technical Track
Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks
Technical Track
Pre-print
Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First Issues
Technical Track
Pre-print
JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers
Technical Track
Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models
Technical Track
Keyword Extraction From Specification Documents for Planning Security Mechanisms
Technical Track
Pre-print
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Technical Track
Pre-print
Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction
Technical Track
Pre-print
Learning Deep Semantics for Test Completion
Technical Track
Learning Graph-based Code Representations for Source-level Functional Similarity Detection
Technical Track
Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing
Technical Track
Learning to Boost Disjunctive Static Bug-Finders
Technical Track
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGXDistinguished Paper Award
Technical Track
Pre-print
Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models
Technical Track
Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective
Technical Track
Pre-print
Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set
Technical Track
Pre-print
Log Parsing with Prompt-based Few-shot Learning
Technical Track
Pre-print
LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly
Technical Track
Pre-print
Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems
Technical Track
Pre-print
Measuring and Mitigating Gaps in Structural Testing
Technical Track
Pre-print
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon
Technical Track
Pre-print
Metamorphic Shader Fusion for Testing Graphics Shader Compilers
Technical Track
MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems
Technical Track
Pre-print
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform
Technical Track
Pre-print
Moving on from the software engineers' gambit: an approach to support the defense of software effort estimates
Technical Track
Pre-print
MTTM: Metamorphic Testing for Textual Content Moderation Software
Technical Track
On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN)
Technical Track
One Adapter for All Programming Languages? Adapter Tuning for Multilingual Tasks in Software Engineering
Technical Track
On Privacy Weaknesses and Vulnerabilities in Software Systems
Technical Track
On the Applicability of Language Models to Block-Based Programs
Technical Track
On the Reproducibility of Software Defect Datasets
Technical Track
On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot
Technical Track
On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical Study
Technical Track
On the Temporal Relations between Logging and Code
Technical Track
Pre-print
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers
Technical Track
Pre-print
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions
Technical Track
(Partial) Program Dependence Learning
Technical Track
Pre-print
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports
Technical Track
Pre-print Media Attached
PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing
Technical Track
Practical and Efficient Model Extraction of Sentiment Analysis APIs
Technical Track
Predicting Bugs by Monitoring Developers During Task Execution
Technical Track
PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps
Technical Track
Pre-print
PyEvolve: Automating Frequent Code Changes in Python ML Systems
Technical Track
Pre-print
RAT: A Refactoring-Aware Traceability Model for Bug Localization
Technical Track
File Attached
Reachable Code Coverage
Technical Track
Read It, Don't Watch It: Captioning Bug Recordings Automatically
Technical Track
Pre-print
Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models
Technical Track
Pre-print
Regression Fuzzing for Deep Learning Systems
Technical Track
Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects
Technical Track
Pre-print
RepresentThemAll: A Universal Learning Representation of Bug Reports
Technical Track
Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis
Technical Track
Pre-print
Rete: Learning Namespace Representation for Program RepairDistinguished Paper Award
Technical Track
Link to publication Pre-print
Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning
Technical Track
Pre-print
Reusing Deep Neural Network Models through Model Re-engineering
Technical Track
Revisiting Learning-based Commit Message Generation
Technical Track
Pre-print
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion
Technical Track
Robustification of Behavioral Designs against Environmental Deviations
Technical Track
Pre-print
Rules of Engagement: Why and How Companies Participate in OSS
Technical Track
Pre-print
Safe low-level code without overhead is practical
Technical Track
Pre-print
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript
Technical Track
Pre-print
SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics
Technical Track
Semi-Automatic, Inline and Collaborative Web Page Code Curations
Technical Track
Sibyl: Improving Software Engineering Tools with SMT SelectionDistinguished Paper Award
Technical Track
Pre-print
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
Technical Track
SkCoder: A Sketch-based Approach for Automatic Code Generation
Technical Track
Pre-print
SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk
Technical Track
Pre-print
SmartMark: Software Watermarking Scheme for Smart Contracts
Technical Track
Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the Forefront
Technical Track
Pre-print
Source Code Recommender Systems: The Practitioners' Perspective
Technical Track
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software DevelopersDistinguished Paper Award
Technical Track
Pre-print
Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation
Technical Track
Pre-print
Sustainability is Stratified: Toward a Better Theory of Sustainable Software Engineering
Technical Track
Pre-print
Syntax and Domain Aware Model for Unsupervised Program Translation
Technical Track
Pre-print
TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis
Technical Track
Tare: Type-Aware Neural Program Repair
Technical Track
Template-based Neural Program Repair
Technical Track
Pre-print
Testability Refactoring in Pull Requests: Patterns and Trends
Technical Track
Pre-print
Testing Database Engines via Query Plan GuidanceDistinguished Paper Award
Technical Track
Pre-print
Testing Database Systems via Differential Query Execution
Technical Track
Pre-print
Test Selection for Unified Regression Testing
Technical Track
Pre-print
The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing
Technical Track
Pre-print
The untold story of code refactoring customizations in practice
Technical Track
Pre-print
Tolerate Control-Flow Changes for Sound Data Race Prediction
Technical Track
Towards Understanding Fairness and its Composition in Ensemble Machine Learning
Technical Track
Pre-print
Triggers for Reactive Synthesis Specifications
Technical Track
Pre-print
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum
Technical Track
Pre-print
Twins or False Friends? A Study on Energy Consumption and Performance of Configurable Software
Technical Track
Link to publication
Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension
Technical Track
Understanding and Detecting On-the-Fly Configuration BugsDistinguished Paper Award
Technical Track
Pre-print
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem
Technical Track
Pre-print
UpCy: Safely Updating Outdated Dependencies
Technical Track
Pre-print
Usability-Oriented Design of Liquid Types for Java
Technical Track
DOI
Using Reactive Synthesis: An End-to-End Exploratory Case Study
Technical Track
Pre-print
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Technical Track
Pre-print
Verifying Data Constraint Equivalence in FinTech Systems
Technical Track
Pre-print
ViolationTracker: Building Precise Histories for Static Analysis Violations
Technical Track
Pre-print
VulGen: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning
Technical Track
Pre-print
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Technical Track
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Technical Track
Pre-print
When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study
Technical Track
Pre-print
When to Say What: Learning to Find Condition-Message Inconsistencies
Technical Track
Pre-print
Which of My Assumptions are Unnecessary for Realizability and Why Should I Care?
Technical Track
Pre-print

.

ICSE 2023 open science policy

As a conference sponsored by ACM SIGSOFT, ICSE 2023 adheres to open science policies as adopted by SIGSOFT. The text below is based on v0.9.9 of these policies.

Open science policies

Openness in science is key to fostering progress via transparency and availability of all outputs produced at each investigative steps. Transparency and availability of research outputs allow better reproducibility, replicability of quantitative studies and recoverability of qualitative studies. Open science builds the core for excellence in evidence-based research.

As an internationally renowned forum for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, experiences, and challenges in the field of software engineering, ICSE 2023 (continuing the tradition of previous editions) actively supports setting standards for how we conduct this kind of research.

To this end, we have explicitly committed ourselves to foster openness to our research outcomes. In particular, we support the adoption of open data and open source principles. We encourage all contributing authors to disclose the (anonymized and curated) data to increase reproducibility, replicability, and/or recoverability of the studies.

Principles

Research output should be publicly and freely accessible by anyone, permanently.

Artifacts related to a study (which include, but are not limited to, raw and transformed data, extended proofs, appendices, analysis scripts, software, virtual machines and containers, and qualitative codebooks) and the paper itself should, in principle, be made available on the Internet:

  1. without any barrier (e.g., paywalls, registration forms, request mechanisms),
  2. under a proper open license that specifies purposes for re-use and repurposing, properly archived and preserved ,
  3. provided that there are no ethical, legal, technical, economic, or sensible barriers preventing the disclosure.

Open artifacts

Fostering artifacts as open data and open source should be done as:

● Archived on preserved digital repositories such aszenodo.org,figshare.com,www.softwareheritage.org, osf.io, or institutional repositories. GitHub, GitLab, and similar services for version control systems do not offer properly archived and preserved data. Personal or institutional websites, consumer cloud storage such as Dropbox, or services such as Academia.edu and Researchgate.net do not provide properly archived and preserved data.

● Released under a proper open data license such as the CC0 dedication or the CC-BY 4.0 license when publishing the data.

● Software can be released under an open source license.

● Different open licenses, if mandated by institutions or regulations, are also permitted.

● We encourage authors to make artifacts available upon submission (either privately or publicly) and upon acceptance (publicly).

Supporting statement

We ask authors to provide a supporting statement on the data availability (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section.

Authors who cannot disclose data for the reasons stated in the principles of the policies should provide a short statement in their submitted papers in a section named Data Availability after the Conclusion section.

Please note that the success of the open science initiative depends on the willingness (and possibilities) of authors to disclose their data and that all submissions will undergo the same review process independent of whether they disclose their analysis code or data.

HOWTOs

A step-by-step approach to disclosing artifacts for (doubly-anonymous) peer review and make it open data upon acceptance is available online .

A step-by-step approach to automatically archive a GitHub repository to Zenodo.org is available at https://guides.github.com/activities/citable-code/ .

A step-by-step approach to automatically archive a GitHub repository to figshare.com is available at https://knowledge.figshare.com/articles/item/how-to-connect-figshare-with-your-github-account .

A proposal for artifact evaluation by SIGSOFT is available at https://github.com/acmsigsoft/artifact-evaluation .

A proposal for open science in software engineering, including explanations for structuring an open artifact, is available at https://arxiv.org/abs/1904.06499 .

Open Access

We encourage ICSE 2023 authors to self-archive their pre- and post-prints in open and preserved repositories. Self-archiving is legal and allowed by most publishers (granted in the copyright transfer agreement), and it will enable anybody in the world to reach papers barrier-free.

Upon acceptance to ICSE 2023, we encourage authors to revise their article according to the peers’ comments, generate a PDF version of it (post-print), and submit it to arXiv.org or their institutional repository.

Unless authors are willing to pay the publisher for open access of their published papers (gold open access), they should pick the “arXiv.org - Non-exclusive license to distribute” license https://arxiv.org/licenses/nonexclusive-distrib/1.0/license.html when submitting to arXiv.

Authors should avoid a Creative Commons license for their preprints, in any repository, if the published papers are not open access. More infos available here: https://avandeursen.com/2016/11/06/green-open-access-faq/#creative-commons .

Note: Authors are not allowed to self-archive the PDF of the published article as typeset by the publisher (a.k.a. “publisher proof,” “published paper,” “the digital library version”).

HOWTOs

A comprehensive FAQ for open access and self-archiving is available at https://avandeursen.com/2016/11/06/green-open-access-faq/ .

Instructions for reviewers

ICSE 2023 has adopted an open science stance and introduced guidelines for authors (available at https://conf.researchr.org/track/icse-2023/icse-2023-open-science-policies ). The policies invite authors to provide all research artifacts for peer review, self-archive their pre- and post-prints, and archive artifacts as open data upon acceptance. We kindly ask you to pay attention to the following, while reviewing:

  1. All open science steps are optional for authors and reviewers. You are invited, but not required, to inspect the provided artifacts as part of your review efforts.
  2. All reasons for partial disclosure of data (or lack thereof) should be trusted.
  3. Submissions have to undergo the same review process independent of whether they disclose their analysis code or data. You are invited to complain in your review of any absence of data, but please do not let it influence your review of submissions. You are free to welcome further disclosure of data and help authors in doing so, with your review.
  4. Open science is challenging for qualitative studies. Please be welcoming of qualitative studies which open their artifacts even in a limited way. Furthermore, when evaluating artifacts from qualitative studies that was made available for peer review, please keep in mind that authors of qualitative studies might have underlying ontological and epistemological stances that differ from those of authors of quantitative studies. Concepts such as replicability and reproducibility might apply partially or not apply at all with qualitative studies.
  5. Providing research artifacts might introduce issues with doubly-anonymous reviews. We ask you not to actively hunt the identity of authors, especially in case they self-archived a preprint of their submission. License
  6. New! this year, for every paper, one designated reviewer will perform a lightweight check of the online/attached data (if available). Note this is not a thorough replicability check as it is done by the artifact track, but it has mainly the goal to check whether the dataset contains what was declared.

These open science policies are based on open science policies by Daniel Graziotin, licensed under CC0 1.0.

Please note that the processes described in this document are not used by all tracks. Check in the call for papers whether

  • sharing data is expected, and how.
  • double-anonymous review is used or not.

Empirical Studies and Sharing of Data

I am doing research with industry. What if I cannot share data from my research?

We absolutely welcome research with industry, as it often conveys important lessons about software engineering in practice – and we perfectly understand that industry data may be subject to confidentiality issues or legal requirements. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of confidentiality agreements". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.

I am doing user studies. What if I cannot share data from my empirical study?

We absolutely welcome user studies! However, we also perfectly understand that sharing raw data can be subject to constraints such as privacy issues. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of privacy issues". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.

I am doing qualitative research. What information should I include to help reviewers assess my research results and the readers use my results?

Best practices for addressing the reliability and credibility of qualitative research suggest providing detailed arguments and rationale for qualitative approaches, procedures and analyses. Therefore, authors are advised to provide as much transparency as possible into these details of their study. For example, clearly explain details and decisions such as 1) context of study, 2) the participant-selection process and the theoretical basis for selecting those participants, 3) collection of data or evidence from participants, and 4) data analysis methods, e.g. justify their choice theoretically and how they relate to the original research questions, and make explicit how the themes and concepts were identified from the data. Further, provide sufficient detail to bridge the gap between the interpretation of findings presented and the collected evidence by, for example, numbering quotations and labeling sources. Similar to replicability in quantitative research, the transparency aims to ensure a study’s methods are available for inspection and interpretation. However, replicability or repeatability is not the goal, as qualitative methods are inherently interpretive and emphasize context. As a consequence, reporting qualitative research might require more space in the paper; authors should consider providing enough evidence for their claims while being mindful with the use of space.

Finally, when qualitative data is counted and used for quantitative methods, authors should report the technique and results in assessing rigour in data analysis procedures, such as inter-reliability tests or triangulation over different data sources or methods—, and justify how they achieved rigour if no such methods were used.

I can make my data set / my tool available, but it may reveal my identity. What should I do?

See this question under "double-anonymous submissions", below.

Double-Anonymous Submissions

Why double-anonymous?

There are many reasons for a submission track to employ a double-anonymous review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-anonymous reviewing, see Claire Le Goues’s very well-argued, referenced and evidenced blog posting in favor of double-anonymous review processes for Software Engineering conferences . See also a list of double-anonymous resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller​​ and Alberto Bacchelli​​.

How can I prepare my paper for double-anonymous reviewing?

You must make every reasonable effort to honor the double-anonymous review process, but you do not need to guarantee that your identity is undiscoverable. The double-anonymous aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:

  1. Omit all authors’ names from the title page.
  2. Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper.
  3. Do not rely on non-anonymous supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. Supplementary information might result in revealing author identities.

Here is some excellent advice on anonymization from ACM .

I previously published an earlier version of this work in a venue that doesn’t have double-anonymous. What should I do about acknowledging that previous work?

If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.

If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.

Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?

It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-anonymous review because prior dissertation publication does not compromise novelty. In the final post-review, camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-anonymous review process, please refrain from citing the dissertation, to increase anonymity.

You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.

What if we want to cite some unpublished work of our own (as motivation for example)?

If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures ). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works. If your work is a tool, a data set, or some other resource, see the question on ‘resources already made available’, above.

Can I disseminate a non-anonymized version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?

You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. Whenever possible, please avoid posting your manuscript on public archives (e.g, ArXiV) before or during the submission period. Would you still prefer to do so, carefully avoid adding to the manuscript any reference to ICSE 2023 (E.g., using footnotes saying “Submitted to ICSE 2023”).

I can make my data set / my tool available, but it may reveal my identity. What should I do?

Please make an effort to anonymize your data set / your tool such that it does not reveal your identity. If that is impossible, place a warning next to the link that this may reveal your identity.