Write a Blog >>
ICSE 2023
Sun 14 - Sat 20 May 2023 Melbourne, Australia

Call for Papers

ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. In the technical track, we invite high quality submissions of technical research papers describing original and unpublished results of software engineering research.

Please note the following important changes for 2023:

  1. As previous ICSE editions, we apply an open science policy. This year, we will ask a reviewer to perform a lightweight check on the shared artifacts (see below).
  2. There will be a second response period for a subset of the submitted papers. Please check our calendar of important dates.

Also, we will continue the initiative started in 2022, giving emphasis to the significance of the research contributions (see review criteria).

Research of Interest

ICSE welcomes submissions addressing topics across the full spectrum of Software Engineering, being inclusive of quantitative, qualitative, and mixed-methods research.

Topics of interest include:

● API design and evolution

● Apps and app store analysis

● Autonomic systems and self adaptation

● Configuration management

● Crowd-based software engineering

● Debugging and fault localization

● Design for quality, incl. privacy and security by design

● Distributed and collaborative software engineering

● Diversity, inclusion, fairness of software

● Embedded and cyber-physical systems

● Ethics in software engineering

● Evolution and maintenance

● Feedback, user, and requirements management

● Formal methods

● Green and sustainable technologies

● Human aspects of software engineering

● Human-computer interaction

● Legal aspects of software engineering

● Machine learning with and for SE

● Mining software repositories

● Model checking

● Modeling and model-driven engineering

● Parallel and distributed systems

● Performance analysis and testing

● Privacy and security

● Program analysis

● Program comprehension

● Program repair

● Program synthesis

● Programming languages

● Recommender systems

● Refactoring

● Release engineering and DevOps

● Reliability and safety

● Requirements engineering

● Reverse engineering

● SE for machine learning

● Search-based software engineering

● Software architecture and product design

● Software economics

● Software ecosystems

● Software metrics and prediction models

● Software processes

● Software reuse

● Software services and cloud-based systems

● Software testing

● Software traceability

● Software visualization

● Variability and product lines

Review Criteria

Each paper submitted to the Technical Track will be evaluated based on the following criteria:

Soundness: The extent to which the paper’s contributions and/or innovations address its research questions and are supported by rigorous application of appropriate research methods.

Significance: The extent to which the paper’s contributions can impact the field of software engineering, and under which assumptions (if any).

Novelty: The extent to which the contributions are sufficiently original with respect to the state-of-the-art.

Verifiability and Transparency: The extent to which the paper includes sufficient information to understand how an innovation works; to understand how data was obtained, analyzed, and interpreted; and how the paper supports independent verification or replication of the paper’s claimed contributions. New this year: the artifacts attached to the paper (or hyperlinked to it) will be checked by at least one reviewer.

Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions, as well as adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below.

Reviewers will carefully consider all of these criteria during the review process, and authors should take great care in clearly addressing them all. The paper should clearly explain the claimed contributions, and how they are sound, significant, novel, and verifiable, as described above.

Each paper will be handled by an area chair. The role of the area chairs is to ensure a reviewing consistency among papers submitted within the same area of research. For this reason, we will ask the authors, upon submission, to identify up to two main areas to which the paper belongs, among the following ones:

● Artificial Intelligence and Software Engineering

● Analysis and Testing

● Dependability

● Requirements, modeling, and design

● Social Aspects

● Software Evolution

● Software Analytics

Program chairs will ultimately assign a paper to an area chair, considering the authors’ selection, the paper’s content, and (if applicable) keeping into account possible conflicts of interest.

For more information on how the ICSE PC will interpret and use these criteria in the paper evaluation process, see the ICSE 2023 Review Process and Guidelines.

How to Submit

Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).

● All submissions must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. Accepted papers will be allowed one extra page for the main text of the camera-ready version.

● Submissions must strictly conform to the IEEE conference proceedings formatting instructions specified above . Alterations of spacing, font size, and other changes that deviate from the instructions may result in desk rejection without further review.

● By submitting to the ICSE Technical Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ. In particular, papers submitted to ICSE 2023 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2023. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.

● If the research involves human participants/subjects, the authors must adhere to the ACM Publications Policy on Research Involving Human Participants and Subjects. Upon submitting, authors will declare their compliance to such a policy.

● The ICSE 2023 Technical Track will employ a double-anonymous review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-anonymous review process. In particular:

Authors’ names must be omitted from the submission.

○ All references to the author’s prior work should be in the third person.

○ While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to ICSE 2023.

○ During review, authors should not publicly use the submission title.

● Further advice, guidance, and explanation about the double-anonymous review process can be found in the Q&A page.

● By submitting to the ICSE Technical Track, authors acknowledge that they conform to the authorship policy of the ACM, and the authorship policy of the IEEE.

Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site ( https://icse2023.hotcrp.com) by the submission deadline. Any submission that does not comply with these requirements may be desk rejected without further review.

We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-anonymous reviewing. Authors are encouraged to try out the experimental SIGSOFT Submission Checker to detect violations to the formatting and double anonymous guidelines. (Mind that the tool is based on heuristics. Therefore it may miss violations, and it can raise false alarms. The requirements listed in this call for papers take precedence over the results of the tool when deciding whether a paper meets the submission guidelines.)

Open Science Policy

The research track of ICSE 2023 is governed by the ICSE 2023 Open Science policies. In summary, the steering principle is that all research results should be accessible to the public and, if possible, empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability. Note that sharing research data is not mandatory for submission or acceptance. However, sharing is expected to be the default, and non-sharing needs to be justified. We recognize that reproducibility or replicability is not a goal in qualitative research and that, similar to industrial studies, qualitative studies often face challenges in sharing research data. For guidelines on how to report qualitative research to ensure the assessment of the reliability and credibility of research results, see the Q&A page.

Upon submission to the research track, authors are asked

● to make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) – and provide instructions on how to access this data in the paper, possibly in a section named "Data Availability" after the Conclusions; or

● to include in the paper an explanation as to why this is not possible or desirable; and

● to indicate if they intend to make their data publicly available upon acceptance.

NEW! This year, at least one reviewer will check whether the enclosed package contains what is declared in the paper. This quality check process will be very lightweight, and the main aim is to ensure that authors do not submit (partially) empty packages.

Supplementary material can be uploaded via the HotCrp site or anonymously linked from the paper submission. Also, the authors must briefly describe, in the submission form, the content of the supplementary material with a short paragraph/bullet list. We strongly encourage authors to use supplementary material to provide access to anonymized data, whenever possible. Authors are asked to carefully review any supplementary material to ensure it conforms to the double-anonymous policy (described above). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post.

Upon acceptance, authors have the possibility to separately submit their supplementary material to the ICSE 2023 Artifact Evaluation track, for recognition of artifacts that are reusable, available, replicated or reproduced.

Mentoring for Prospective Authors

We are organizing an “Ask me Anything” (AMA) Session on Best practices for a successful ICSE paper in June 2022 for prospective authors to learn from the 2022 ICSE PC co-chairs, Andreas Zeller and Daniela Damian.

Details about this event will be announced a couple of months before the event will happen.

Author Response Periods

ICSE 2023 will offer response periods for authors. In such periods, the authors will have the opportunity to inspect the reviews, and to answer specific questions raised by the program committee.

ICSE 2023 will foresee two response periods. The first one is scheduled after all reviews have been completed, and serves to inform the subsequent decision making process. Authors will be able to see the full reviews, including the reviewer scores as part of the author response process. The second one follows a period of review discussion, and will involve only some papers, for which additional reviews were needed, or where, during the discussion, further questions for the authors emerged.

Note that:

● Participating in the response period is optional for the authors, i.e., omitting a rebuttal does not necessarily prejudice the paper’s outcome.

● Not being invited to participate in the second response period does not mean the paper has been rejected (nor accepted), but just that reviewers felt that a second response period was unnecessary.

Withdrawing a Paper

Authors can withdraw their paper at any moment until the final decision has been made, through the paper submission system. Resubmitting the paper to another venue before the final decision has been made without withdrawing from ICSE 2023 first is considered a violation of the concurrent submission policy, and will lead to automatic rejection from ICSE 2023 as well as any other venue adhering to this policy.

Important Dates

● Technical Track Submissions Deadline: September 1, 2022

● Technical Track Author First Response Period (all papers): November 14–19, 2022

● Technical Track Author Second Response Period (some papers): November 29–30, 2022

● Technical Track Acceptance Notification: December 9, 2022

● Technical Track Camera Ready: TBA

Conference Attendance Expectation

If a submission is accepted, at least one author of the paper is required to register for ICSE 2023 and present the paper. [We will add more info on this as soon as the ICSE 2023 format is finalized.]

Dates
Wed 17 May 2023
Thu 18 May 2023
Fri 19 May 2023
Tracks
ICSE DEMO - Demonstrations
ICSE FoSE - Future of Software Engineering
ICSE Industry Forum
ICSE Journal-First Papers
ICSE NIER - New Ideas and Emerging Results
ICSE Posters
ICSE SCORE
ICSE SEET - Software Engineering Education and Training
ICSE SEIP - Software Engineering in Practice
ICSE SEIS - Software Engineering in Society
ICSE SRC - ACM Student Research Competition
ICSE Showcase
ICSE Technical Briefings
ICSE Technical Track
You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 17 May

Displayed time zone: Hobart change

11:00 - 12:30
11:00
15m
Talk
One Adapter for All Programming Languages? Adapter Tuning for Multilingual Tasks in Software Engineering
Technical Track
Deze Wang National University of Defense Technology, Boxing Chen , Shanshan Li National University of Defense Technology, Wei Luo , Shaoliang Peng Hunan University, Wei Dong School of Computer, National University of Defense Technology, China, Liao Xiangke National University of Defense Technology
11:15
15m
Talk
CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back
Technical Track
Zhongxin Liu Zhejiang University, Zhijie Tang Zhejiang University, Xin Xia Huawei, Xiaohu Yang Zhejiang University
Pre-print
11:30
15m
Talk
Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models
Technical Track
Shuzheng Gao Harbin institute of technology, Hongyu Zhang The University of Newcastle, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology
11:00 - 12:30
Fuzzing: applicationsTechnical Track / DEMO - Demonstrations at Meeting Room 101
Chair(s): Corina S. Păsăreanu Carnegie Mellon University
11:00
15m
Talk
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Technical Track
Haoxiang Jia Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zifan Xie Huazhong University of Science and Technology, Xiaochen Guo Huazhong University of Science and Technology, Rongxin Wu Xiamen University, Maolin Sun Huazhong University of Science and Technology, Kang Chen Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Pre-print
11:15
15m
Talk
JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers
Technical Track
Mingyuan Wu Southern University of Science and Technology, Minghai Lu Southern University of Science and Technology, Heming Cui University of Hong Kong, Junjie Chen Tianjin University, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
11:30
15m
Talk
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Technical Track
Maolin Sun Huazhong University of Science and Technology, Yibiao Yang Nanjing University, Ming Wen Huazhong University of Science and Technology, Yongcong Wang Huazhong University of Science and Technology, Yuming Zhou Nanjing University, Hai Jin Huazhong University of Science and Technology
Pre-print
11:45
15m
Talk
Regression Fuzzing for Deep Learning Systems
Technical Track
Hanmo You College of Intelligence and Computing, Tianjin University, Zan Wang Tianjin University, China, Junjie Chen Tianjin University, Shuang Liu Tianjin University, Shuochuan Li College of Intelligence and Computing, Tianjin University
12:00
15m
Talk
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers
Technical Track
Suyue Guo Renmin University of China, Xinyu Wan Renmin University of China, Wei You Renmin University of China, Bin Liang Renmin University of China, China, Wenchang Shi Renmin University of China, China, Yiwei Zhang Renmin University of China, Jianjun Huang Renmin University of China, China, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
Pre-print
11:00 - 12:30
Mining software repositoriesTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102
Chair(s): Brittany Johnson George Mason University
11:00
15m
Talk
The untold story of code refactoring customizations in practice
Technical Track
Daniel Oliveira PUC-Rio, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Alessandro Garcia PUC-Rio, Ana Carla Bibiano PUC-Rio, Márcio Ribeiro Federal University of Alagoas, Brazil, Rohit Gheyi Federal University of Campina Grande, Baldoino Fonseca Federal University of Alagoas (UFAL)
Pre-print
11:15
15m
Talk
Data Quality for Software Vulnerability Datasets
Technical Track
Roland Croft The University of Adelaide, Muhammad Ali Babar University of Adelaide, M. Mehdi Kholoosi University of Adelaide
Pre-print
11:30
15m
Talk
Do code refactorings influence the merge effort?
Technical Track
André Oliveira Federal Fluminense University, Vania Neves Universidade Federal Fluminense (UFF), Alexandre Plastino Federal Fluminense University, Ana Carla Bibiano PUC-Rio, Alessandro Garcia PUC-Rio, Leonardo Murta Universidade Federal Fluminense (UFF)
12:15
15m
Talk
A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization
Technical Track
Hao Guan The University of Queensland, Ying Xiao Southern University of Science and Technology, Jiaying LI Microsoft, Yepang Liu Southern University of Science and Technology, Guangdong Bai University of Queensland
11:00 - 12:30
Fault localizationJournal-First Papers / Technical Track / Showcase at Meeting Room 103
Chair(s): Rui Abreu University of Porto
11:00
15m
Talk
Evaluating the Impact of Experimental Assumptions in Automated Fault Localization
Technical Track
Ezekiel Soremekun Royal Holloway, University of London, Lukas Kirschner Saarland University, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Mike Papadakis University of Luxembourg, Luxembourg
Pre-print Media Attached
11:15
15m
Talk
Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set
Technical Track
Jiwei Yan Institute of Software at Chinese Academy of Sciences, China, MiaoMiao Wang Technology Center of Software Engineering, ISCAS, China. University of Chinese Academy of Sciences, China., Yepang Liu Southern University of Science and Technology, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Long Zhang Institute of Software, Chinese Academy of Sciences
Pre-print
11:30
15m
Talk
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports
Technical Track
Sunzhou Huang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio
Pre-print Media Attached
12:15
15m
Talk
RAT: A Refactoring-Aware Traceability Model for Bug Localization
Technical Track
Feifei Niu University of Ottawa, Wesley Assunção Johannes Kepler University Linz, Austria & Pontifical Catholic University of Rio de Janeiro, Brazil, Liguo Huang Southern Methodist University, Christoph Mayr-Dorn JOHANNES KEPLER UNIVERSITY LINZ, Jidong Ge Nanjing University, Bin Luo Nanjing University, Alexander Egyed Johannes Kepler University Linz
File Attached
11:00 - 12:30
11:00
15m
Talk
How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms
Technical Track
Hammad Ahmad University of Michigan, Zachary Karas University of Michigan, Kimberly Diaz University of Michigan, Amir Kamil University of Michigan, Jean-Baptiste Jeannin University of Michigan at Ann Arbor, Westley Weimer University of Michigan
11:15
15m
Talk
Which of My Assumptions are Unnecessary for Realizability and Why Should I Care?
Technical Track
Rafi Shalom Tel Aviv University, Israel, Shahar Maoz Tel Aviv University
Pre-print
11:00 - 12:30
11:00
15m
Talk
UpCy: Safely Updating Outdated Dependencies
Technical Track
Andreas Dann Paderborn University, Ben Hermann TU Dortmund, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM
Pre-print
11:15
15m
Talk
APICAD: Augmenting API Misuse Detection Through Specifications From Code And Documents
Technical Track
Xiaoke Wang Wuhan University, Lei Zhao Wuhan University
DOI Pre-print
11:30
15m
Talk
Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis
Technical Track
Sen Yang Army Engineering University of PLA, Sen Chen Tianjin University, Lingling Fan Nankai University, Sihan Xu Nankai University, China, Zhanwei Hui Academy of Military Science, Song Huang Army Engineering University of PLA
11:45
15m
Talk
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions
Technical Track
Wu Jiahui Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Wei Tang Tsinghua University, Lyuye Zhang Nanyang Technological University, Yueming Wu Nanyang Technological University, Chengyue Liu Scantist, Kairan Sun Singapore University of Technology and Design, Lida Zhao Nanyang Technological University, Yang Liu Nanyang Technological University
11:00 - 12:30
Blockchain/smart contractsTechnical Track / DEMO - Demonstrations / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 106
Chair(s): Yi Li Nanyang Technological University
11:00
15m
Talk
SmartMark: Software Watermarking Scheme for Smart Contracts
Technical Track
Taeyoung Kim Sungkyunkwan University, Yunhee Jang Sungkyunkwan University, Chanjong Lee Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, hyoungshick kim Sungkyunkwan University
11:15
15m
Talk
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum
Technical Track
Zibin Zheng School of Software Engineering, Sun Yat-sen University, Neng Zhang School of Software Engineering, Sun Yat-sen University, Jianzhong Su Sun Yat-sen University, Zhijie Zhong School of Software Engineering, Sun Yat-sen University, Mingxi Ye Sun Yat-sen University, Jiachi Chen School of Software Engineering, Sun Yat-sen University
Pre-print
11:30
15m
Talk
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts
Technical Track
Peilin Zheng Sun Yat-sen University, Xiapu Luo The Hong Kong Polytechnic University, Zibin Zheng School of Software Engineering, Sun Yat-sen University
Pre-print File Attached
11:00 - 12:30
11:00
15m
Talk
Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel ContributorsDistinguished Paper Award
Technical Track
Bianca Trinkenreich Northern Arizona University, USA, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital , Anita Sarma Oregon State University, Daniel M. German University of Victoria, Marco Gerosa Northern Arizona University, Igor Steinmacher Northern Arizona University
Pre-print
13:45 - 15:15
Code smells and clonesTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Level G - Plenary Room 1
Chair(s): Sigrid Eldh Ericsson AB, Mälardalen University, Carleton Unviersity
13:45
15m
Talk
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations
Technical Track
Yuekun Wang University of Science and Technology of China, Yuhang Ye University of Science and Technology of China, Yueming Wu Nanyang Technological University, Weiwei Zhang University of Science and Technology of China, Yinxing Xue University of Science and Technology of China, Yang Liu Nanyang Technological University
14:00
15m
Talk
Learning Graph-based Code Representations for Source-level Functional Similarity Detection
Technical Track
Jiahao Liu National University of Singapore, Jun Zeng National University of Singapore, Xiang Wang University of Science and Technology of China, Zhenkai Liang National University of Singapore
14:15
15m
Talk
The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing
Technical Track
Qihong Chen University of California, Irvine, Rúben Câmara LASIGE and Department of Informatics are Faculdade Ciências Universidade de Lisboa,, José Campos University of Porto, Portugal, André Souto LaSiGE & FCUL, University of Lisbon, Iftekhar Ahmed University of California at Irvine
Pre-print
13:45 - 15:15
Fuzzing: techniques and toolsTechnical Track / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 101
Chair(s): Mike Papadakis University of Luxembourg, Luxembourg
13:52
15m
Talk
Reachable Code Coverage
Technical Track
Danushka Liyanage Monash University, Australia, Marcel Böhme MPI-SP, Germany and Monash University, Australia, Kla Tantithamthavorn Monash University, Stephan Lipp Technical University of Munich
14:07
15m
Talk
Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing
Technical Track
Myungho Lee Korea University, Sooyoung Cha Sungkyunkwan University, Hakjoo Oh Korea University
14:22
15m
Talk
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation
Technical Track
Sicong Cao Yangzhou University, Xiaobing Sun Yangzhou University, Xiaoxue Wu Yangzhou University, Lili Bo Yangzhou University, Bin Li Yangzhou University, Rongxin Wu Xiamen University, Wei Liu Nanjing University, Biao He Ant Group, Yu Ouyang Ant Group, Jiajia Li Ant Group
14:37
15m
Talk
Evaluating and Improving Hybrid Fuzzing
Technical Track
Ling Jiang Southern University of Science and Technology, Hengchen Yuan Southern University of Science and Technology, Mingyuan Wu Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign, Yuqun Zhang Southern University of Science and Technology
13:45 - 15:15
13:45
15m
Talk
Robustification of Behavioral Designs against Environmental Deviations
Technical Track
Changjian Zhang Carnegie Mellon University, Tarang Saluja Swarthmore College, Rômulo Meira-Góes Carnegie Mellon University, Matthew Bolton University of Virginia, David Garlan Carnegie Mellon University, Eunsuk Kang Carnegie Mellon University
Pre-print
14:00
15m
Talk
A Qualitative Study on the Implementation Design Decisions of DevelopersDistinguished Paper Award
Technical Track
Jenny T. Liang Carnegie Mellon University, Maryam Arab George Mason University, Minhyuk Ko Virginia Tech, Amy Ko University of Washington, Thomas LaToza George Mason University
Pre-print
13:45 - 15:15
Software security and privacyTechnical Track / Journal-First Papers at Meeting Room 103
Chair(s): Wei Yang University of Texas at Dallas
13:45
15m
Talk
BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service
Technical Track
I Luk Kim Purdue University, Weihang Wang University of Southern California, Yonghwi Kwon University of Virginia, Xiangyu Zhang Purdue University
14:00
15m
Talk
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing
Technical Track
Ziqi Zhang Peking University, Yuanchun Li Institute for AI Industry Research (AIR), Tsinghua University, Bingyan Liu Peking University, Yifeng Cai Peking University, Ding Li Peking University, Yao Guo Peking University, Xiangqun Chen Peking University
14:15
15m
Talk
PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps
Technical Track
Zeya Tan Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology
Pre-print
14:30
15m
Talk
AdHere: Automated Detection and Repair of Intrusive Ads
Technical Track
Yutian Yan University of Southern California, Yunhui Zheng , Xinyue Liu University at Buffalo, SUNY, Nenad Medvidović University of Southern California, Weihang Wang University of Southern California
14:45
15m
Talk
Bad Snakes: Understanding and Improving Python Package Index Malware Scanning
Technical Track
Duc Ly Vu Chainguard and FPT University, Zachary Newman Chainguard, John Speed Meyers Chainguard
13:45 - 15:15
13:45
15m
Talk
FedDebug: Systematic Debugging for Federated Learning Applications
Technical Track
Waris Gill Virginia Tech, Ali Anwar University of Minnesota, Muhammad Ali Gulzar Virginia Tech
14:00
15m
Talk
Practical and Efficient Model Extraction of Sentiment Analysis APIs
Technical Track
Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Victor Junqiu Wei The Hong Kong Polytechnic University, Xixian Chen Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University, Irwin King The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
14:15
15m
Talk
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models
Technical Track
Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Bin Luo Nanjing University
Pre-print
13:45 - 15:15
13:45
15m
Talk
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis
Technical Track
Austin Mordahl University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Dakota Soles The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas
Pre-print
14:00
15m
Talk
Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis
Technical Track
Sahar Badihi University of British Columbia, Canada, Khaled Ahmed University of British Columbia (UBC), Yi Li Nanyang Technological University, Julia Rubin University of British Columbia, Canada
Pre-print
14:15
15m
Talk
Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific Debuggers
Technical Track
Jan Reichl , Stefan Hanenberg University of Duisburg-Essen, Essen, Germany, Volker Gruhn University Duisburg-Essen
Pre-print
14:30
15m
Talk
Fonte: Finding Bug Inducing Commits from Failures
Technical Track
Gabin An KAIST, Jingun Hong SAP Labs, Naryeong Kim KAIST, Shin Yoo KAIST
Pre-print
13:45 - 15:15
13:45
15m
Talk
RepresentThemAll: A Universal Learning Representation of Bug Reports
Technical Track
Sen Fang Macau University of Science and Technology, Tao Zhang Macau University of Science and Technology, Youshuai Tan Macau University of Science and Technology, He Jiang Dalian University of Technology, Xin Xia Huawei, Xiaobing Sun Yangzhou University
14:00
15m
Talk
Demystifying Exploitable Bugs in Smart Contracts
Technical Track
Zhuo Zhang Purdue University, Brian Zhang Harrison High School (Tippecanoe), Wen Xu PNM Labs, Zhiqiang Lin The Ohio State University
Pre-print
14:15
15m
Talk
Understanding and Detecting On-the-Fly Configuration BugsDistinguished Paper Award
Technical Track
Teng Wang National University of Defense Technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Si Zheng National University of Defense Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Erci Xu National University of Defense Technology, Shaoliang Peng Hunan University, Liao Xiangke National University of Defense Technology
Pre-print
14:30
15m
Talk
Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation
Technical Track
Parvez Mahbub Dalhousie University, Ohiduzzaman Shuvo Dalhousie University, Masud Rahman Dalhousie University
Pre-print Media Attached
13:45 - 15:15
13:45
15m
Talk
Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First Issues
Technical Track
Xin Tan Beihang University,, Yiran Chen Beihang University, Haohua Wu Beihang University, Minghui Zhou Peking University, Li Zhang Beihang University
Pre-print
14:00
15m
Talk
From Organizations to Individuals: Psychoactive Substance Use By Professional Programmers
Technical Track
Kaia Newman University of Michigan, Madeline Endres University of Michigan, Westley Weimer University of Michigan, Brittany Johnson George Mason University
Pre-print
14:15
15m
Talk
On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical Study
Technical Track
Likang Yin University of California at Davis, Xiyu Zhang University of California Davis, Vladimir Filkov University of California at Davis, USA
14:30
15m
Talk
Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the Forefront
Technical Track
Alina Mailach Leipzig University, Norbert Siegmund Leipzig University
Pre-print
14:45
15m
Talk
Moving on from the software engineers' gambit: an approach to support the defense of software effort estimates
Technical Track
Patricia Matsubara Federal University of Mato Grosso do Sul (UFMS), Igor Steinmacher Northern Arizona University, Bruno Gadelha UFAM, Tayana Conte Universidade Federal do Amazonas
Pre-print
13:45 - 15:15
Program translation and synthesisTechnical Track / Showcase / NIER - New Ideas and Emerging Results at Meeting Room 110
Chair(s): Andy Zaidman Delft University of Technology
13:45
15m
Talk
Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs
Technical Track
Pre-print
14:00
15m
Talk
Triggers for Reactive Synthesis Specifications
Technical Track
Gal Amram Tel Aviv University, Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University, Or Pistiner Tel Aviv University, Jan Oliver Ringert Bauhaus-University Weimar
Pre-print
14:15
15m
Talk
Using Reactive Synthesis: An End-to-End Exploratory Case Study
Technical Track
Dor Ma'ayan Tel Aviv University, Shahar Maoz Tel Aviv University
Pre-print
14:52
15m
Talk
Syntax and Domain Aware Model for Unsupervised Program Translation
Technical Track
Fang Liu Beihang University, Jia Li Peking University, Li Zhang Beihang University
Pre-print
15:15 - 15:45
15:17
2m
Talk
Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods
Technical Track
Daye Nam Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University
Pre-print
15:19
2m
Talk
Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations
Technical Track
Jongwook Kim Korea University, Sunbeom So Korea University, Hakjoo Oh Korea University
15:21
2m
Talk
Demystifying Exploitable Bugs in Smart Contracts
Technical Track
Zhuo Zhang Purdue University, Brian Zhang Harrison High School (Tippecanoe), Wen Xu PNM Labs, Zhiqiang Lin The Ohio State University
Pre-print
15:23
2m
Talk
An Empirical Study of Deep Learning Models for Vulnerability Detection
Technical Track
Benjamin Steenhoek Iowa State University, Md Mahbubur Rahman Iowa State University, Richard Jiles Iowa State University, Wei Le Iowa State University
Pre-print
15:25
2m
Talk
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform
Technical Track
Matteo Paltenghi University of Stuttgart, Germany, Michael Pradel University of Stuttgart
Pre-print
15:27
2m
Talk
Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction
Technical Track
Sungmin Kang KAIST, Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo KAIST
Pre-print
15:30
2m
Talk
Automating Code-Related Tasks Through Transformers: The Impact of Pre-training
Technical Track
Rosalia Tufano Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
15:34
2m
Talk
Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing
Technical Track
Myungho Lee Korea University, Sooyoung Cha Sungkyunkwan University, Hakjoo Oh Korea University
15:40
2m
Talk
A Qualitative Study on the Implementation Design Decisions of DevelopersDistinguished Paper Award
Technical Track
Jenny T. Liang Carnegie Mellon University, Maryam Arab George Mason University, Minhyuk Ko Virginia Tech, Amy Ko University of Washington, Thomas LaToza George Mason University
Pre-print
15:45 - 17:15
DocumentationTechnical Track / Journal-First Papers at Level G - Plenary Room 1
Chair(s): Denys Poshyvanyk College of William and Mary
15:45
15m
Talk
Developer-Intent Driven Code Comment Generation
Technical Track
Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software Chinese Academy of Sciences, Lin Shi ISCAS, Song Wang York University, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print
16:00
15m
Talk
Data Quality Matters: A Case Study of ObsoleteComment Detection
Technical Track
Shengbin Xu Nanjing University, Yuan Yao Nanjing University, Feng Xu Nanjing University, Tianxiao Gu TikTok Inc., Jingwei Xu , Xiaoxing Ma Nanjing University
Pre-print
16:15
15m
Talk
Revisiting Learning-based Commit Message Generation
Technical Track
Jinhao Dong Peking University, Yiling Lou Fudan University, Dan Hao Peking University, Lin Tan Purdue University
Pre-print
16:30
15m
Talk
Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality
Technical Track
Jiawei Li University of California, Irvine, Iftekhar Ahmed University of California at Irvine
15:45 - 17:15
Software loggingTechnical Track at Meeting Room 101
Chair(s): Hongyu Zhang The University of Newcastle
15:45
15m
Talk
PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing
Technical Track
Hetong Dai Concordia University, Yiming Tang Concordia University, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo
16:00
15m
Talk
Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction
Technical Track
Zhenhao Li Concordia University, Chuan Luo Beihang University, Tse-Hsun (Peter) Chen Concordia University, Weiyi Shang University of Waterloo, Shilin He Microsoft Research, Qingwei Lin Microsoft Research, Dongmei Zhang Microsoft Research
16:15
15m
Talk
On the Temporal Relations between Logging and Code
Technical Track
Zishuo Ding Concordia University, Yiming Tang Concordia University, Yang Li Beijing University of Posts and Telecommunications, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo
Pre-print
16:30
15m
Talk
How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners
Technical Track
Guoping Rong Nanjing University, shenghui gu Nanjing University, Haifeng Shen Australian Catholic University, He Zhang Nanjing University, Hongyu Kuang Nanjing University
16:45
15m
Talk
When to Say What: Learning to Find Condition-Message Inconsistencies
Technical Track
Islem BOUZENIA University of Stuttgart, Michael Pradel University of Stuttgart
Pre-print
17:00
15m
Talk
A Semantic-aware Parsing Approach for Log Analytics
Technical Track
Yintong Huo The Chinese University of Hong Kong, Yuxin Su Sun Yat-sen University, Cheryl Lee The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
Pre-print
15:45 - 17:15
16:00
15m
Talk
BADGE: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing
Technical Track
Dezhi Ran Peking University, Hao Wang Peking University, China, Wenyu Wang University of Illinois Urbana-Champaign, Tao Xie Peking University
16:15
15m
Talk
Efficiency Matters: Speeding Up Automated Testing with GUI Rendering InferenceDistinguished Paper Award
Technical Track
Sidong Feng Monash University, Mulong Xie Australian National University, Chunyang Chen Monash University
Pre-print
16:30
15m
Talk
CodaMOSA: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models
Technical Track
Caroline Lemieux University of British Columbia, Jeevana Priya Inala Microsoft Research, Shuvendu K. Lahiri Microsoft Research, Siddhartha Sen Microsoft Research
15:45 - 17:15
15:45
15m
Talk
TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis
Technical Track
Chao Wang , Ronny Ko The Ohio State University, Yue Zhang The Ohio State University, Yuqing Yang The Ohio State University, Zhiqiang Lin The Ohio State University
16:00
15m
Talk
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities
Technical Track
Asem Ghaleb University of British Columbia, Julia Rubin University of British Columbia, Canada, Karthik Pattabiraman University of British Columbia
16:15
15m
Talk
Fine-grained Commit-level Vulnerability Type Prediction By CWE Tree Structure
Technical Track
Shengyi Pan Zhejiang University, Lingfeng Bao Zhejiang University, Xin Xia Huawei, David Lo Singapore Management University, Shanping Li Zhejiang University
Pre-print
17:00
15m
Talk
VulGen: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning
Technical Track
Yu Nong Washington State University, Yuzhe Ou University of Texas at Dallas, Michael Pradel University of Stuttgart, Feng Chen University of Texas at Dallas, Haipeng Cai Washington State University
Pre-print
15:45 - 17:15
Development and evolution of AI-intensive systemsSEIP - Software Engineering in Practice / Technical Track / NIER - New Ideas and Emerging Results at Meeting Room 104
Chair(s): Sebastian Elbaum University of Virginia
15:45
15m
Talk
Reusing Deep Neural Network Models through Model Re-engineering
Technical Track
Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, China, Hongyu Zhang The University of Newcastle, Zhaotian Li Beihang University, Xudong Liu Beihang University
16:00
15m
Talk
PyEvolve: Automating Frequent Code Changes in Python ML Systems
Technical Track
Malinda Dilhara University of Colorado Boulder, USA, Danny Dig JetBrains Research & University of Colorado Boulder, USA, Ameya Ketkar Uber
Pre-print
16:15
15m
Talk
DeepArc: Modularizing Neural Networks for the Model Maintenance
Technical Track
xiaoning ren , Yun Lin Shanghai Jiao Tong University; National University of Singapore, Yinxing Xue University of Science and Technology of China, Ruofan Liu National University of Singapore, Jun Sun Singapore Management University, Zhiyong Feng Tianjin University, Jin Song Dong National University of Singapore
16:30
15m
Talk
Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Technical Track
Sayem Mohammad Imtiaz Iowa State University, Fraol Batole Dept. of Computer Science, Iowa State University, Astha Singh Dept. of Computer Science, Iowa State University, Rangeet Pan IBM Research, Breno Dantas Cruz Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University
Pre-print
15:45 - 17:15
Vulnerability analysis and assessmentTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105
Chair(s): Xiaoyin Wang University of Texas at San Antonio
15:45
15m
Talk
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University
Pre-print
16:00
15m
Talk
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem
Technical Track
Yulun Wu Huazhong University of Science and Technology, Zeliang Yu Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Qiang Li Huazhong University of Science and Technology, Deqing Zou Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Pre-print
16:15
15m
Talk
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript
Technical Track
Masudul Hasan Masud Bhuiyan CISPA Helmholtz Center for Information Security, Adithya Srinivas Parthasarathy Indian Institute of Information Technology, Design and Manufacturing, Kancheepuram, Nikos Vasilakis Massachusetts Institute of Technology, Michael Pradel University of Stuttgart, Cristian-Alexandru Staicu CISPA Helmholtz Center for Information Security
Pre-print
16:30
15m
Talk
On Privacy Weaknesses and Vulnerabilities in Software Systems
Technical Track
Pattaraporn Sangaroonsilp University of Wollongong, Hoa Khanh Dam University of Wollongong, Aditya Ghose University of Wollongong

Thu 18 May

Displayed time zone: Hobart change

11:00 - 12:30
Defect detection and predictionTechnical Track / SEIP - Software Engineering in Practice at Level G - Plenary Room 1
Chair(s): Wei Le Iowa State University
11:00
15m
Talk
Detecting Exception Handling Bugs in C++ Programs
Technical Track
Hao Zhang Institute of Software, Chinese Academy of Sciences, Ji Luo Institute of Software, Chinese Academy of Sciences, Mengze Hu Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China, Zongyan Qiu Peking University
11:15
15m
Talk
Learning to Boost Disjunctive Static Bug-Finders
Technical Track
Yoonseok Ko Meta, Hakjoo Oh Korea University
11:30
15m
Talk
Predicting Bugs by Monitoring Developers During Task Execution
Technical Track
Gennaro Laudato University of Molise, Simone Scalabrino University of Molise, Nicole Novielli University of Bari, Filippo Lanubile University of Bari, Rocco Oliveto University of Molise
11:45
15m
Talk
Detecting Isolation Bugs via Transaction Oracle Construction
Technical Track
Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Jiansen Song , Dong Wang Institute of software, Chinese academy of sciences, Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Lei Chen Inspur Software Group Co., Ltd., Hanmo Wang Inspur Software Group Co., Ltd., Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print
12:00
15m
Talk
SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk
Technical Track
Siwei Cui Texas A & M University, Yifei Gao Texas A&M University, Rainer Unterguggenberger Lam Research, Wilfried Pichler Lam Research, Sean Livingstone Texas A&M University, Jeff Huang Texas A&M University
Pre-print
11:00 - 12:30
Studies on gender in SESEIS - Software Engineering in Society / Technical Track / SEET - Software Engineering Education and Training at Meeting Room 101
Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick
11:00
15m
Talk
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software DevelopersDistinguished Paper Award
Technical Track
Sterre van Breukelen Eindhoven University of Technology, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Sebastian Baltes SAP SE & University of Adelaide, Alexander Serebrenik Eindhoven University of Technology
Pre-print
11:00 - 12:30
11:00
15m
Talk
When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study
Technical Track
Vincenzo Riccio University of Udine, Paolo Tonella USI Lugano
Pre-print
11:15
15m
Talk
Fuzzing Automatic Differentiation in Deep-Learning Libraries
Technical Track
Chenyuan Yang University of Illinois at Urbana-Champaign, Yinlin Deng University of Illinois at Urbana-Champaign, Jiayi Yao The Chinese University of Hong Kong, Shenzhen, Yuxing Tu Huazhong University of Science and Technology, Hanchi Li University of Science and Technology of China, Lingming Zhang University of Illinois at Urbana-Champaign
11:30
15m
Talk
Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective
Technical Track
Zenan Li Nanjing University, China, Maorun Zhang Nanjing University, China, Jingwei Xu , Yuan Yao Nanjing University, Chun Cao Nanjing University, Taolue Chen Birkbeck University of London, Xiaoxing Ma Nanjing University, Jian Lv Nanjing University
Pre-print
12:07
15m
Talk
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion
Technical Track
Yuanyuan Yuan The Hong Kong University of Science and Technology, Qi Pang HKUST, Shuai Wang Hong Kong University of Science and Technology
11:00 - 12:30
11:30
15m
Talk
Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions
Technical Track
Mahtab Nejati University of Waterloo, Mahmoud Alfadel University of Waterloo, Shane McIntosh University of Waterloo
Pre-print
11:00 - 12:30
Program repair techniques and applicationsTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 104
Chair(s): Xuan-Bach D. Le University of Melbourne
11:00
15m
Talk
Better Automatic Program Repair by Using Bug Reports and Tests Together
Technical Track
Manish Motwani Georgia Institute of Technology, Yuriy Brun University of Massachusetts
Pre-print
11:15
15m
Talk
CCTEST: Testing and Repairing Code Completion Systems
Technical Track
Li Zongjie , Chaozheng Wang Harbin Institute of Technology, Zhibo Liu Hong Kong University of Science and Technology, Haoxuan Wang EPFL, Dong Chen HKUST, Shuai Wang Hong Kong University of Science and Technology, Cuiyun Gao Harbin Institute of Technology
11:45
15m
Talk
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Technical Track
Nan Jiang Purdue University, Thibaud Lutellier University of Alberta, Yiling Lou Fudan University, Lin Tan Purdue University, Dan Goldwasser Purdue University, Xiangyu Zhang Purdue University
Pre-print
12:00
15m
Talk
Rete: Learning Namespace Representation for Program RepairDistinguished Paper Award
Technical Track
Nikhil Parasaram University College London, Earl T. Barr University College London, Sergey Mechtaev University College London
Link to publication Pre-print
11:00 - 12:30
11:00
15m
Talk
AI-based Question Answering Assistance for Analyzing Natural-language Requirements
Technical Track
Saad Ezzini Lancaster University, Sallam Abualhaija University of Luxembourg, Chetan Arora Monash University, Mehrdad Sabetzadeh University of Ottawa
Pre-print
11:15
15m
Talk
Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation
Technical Track
Alessio Ferrari CNR-ISTI, Paola Spoletini Kennesaw State University
Pre-print
11:00 - 12:30
11:00
15m
Talk
Data-driven Recurrent Set Learning For Non-termination Analysis
Technical Track
Zhilei Han Tsinghua University, Fei He Tsinghua University
11:15
15m
Talk
Compiling Parallel Symbolic Execution with Continuations
Technical Track
Guannan Wei Purdue University, Songlin Jia Purdue University, Ruiqi Gao Purdue University, Haotian Deng Purdue University, Shangyin Tan UC Berkeley, Oliver Bračevac Purdue University, Tiark Rompf Purdue University
Pre-print
11:30
15m
Talk
Verifying Data Constraint Equivalence in FinTech Systems
Technical Track
Chengpeng Wang Hong Kong University of Science and Technology, Gang Fan Ant Group, Peisen Yao Zhejing University, Fuxiong Pan Ant Group, Charles Zhang Hong Kong University of Science and Technology
Pre-print
11:45
15m
Talk
Tolerate Control-Flow Changes for Sound Data Race Prediction
Technical Track
Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yuqi Guo Institute of Software, Chinese Academy of Sciences, Beijing, China, Long Zhang Institute of Software, Chinese Academy of Sciences, Yan Cai Institute of Software at Chinese Academy of Sciences
11:00 - 12:30
Testing of mobile, web and gamesTechnical Track / DEMO - Demonstrations / Journal-First Papers / SEIP - Software Engineering in Practice at Meeting Room 109
Chair(s): Wei Yang University of Texas at Dallas
11:00
15m
Talk
Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing
Technical Track
Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Xing Che Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
Pre-print
11:15
15m
Talk
Detecting Dialog-Related Keyboard Navigation Failures in Web Applications
Technical Track
Paul T. Chiou University of Southern California, Ali S. Alotaibi University of Southern California, William G.J. Halfond University of Southern California
11:30
15m
Talk
COLUMBUS: Android App Testing Through Systematic Callback Exploration
Technical Track
Priyanka Bose University of California, Santa Barbara, Dipanjan Das University of California, Santa Barbara, Saastha Vasan University of California, Santa Barbara, Sebastiano Mariani VMware, Inc., Ilya Grishchenko University of California, Santa Barbara, Andrea Continella University of Twente, Antonio Bianchi Purdue University, Christopher Kruegel University of California, Santa Barbara, Giovanni Vigna UC Santa Barbara
11:45
15m
Talk
GameRTS: A Regression Testing Framework for Video Games
Technical Track
Jiongchi Yu Singapore Management University, Singapore, Yuechen Wu Fuxi AI Lab, Netease Inc., China, Xiaofei Xie Singapore Management University, Wei Le Iowa State University, Lei Ma University of Alberta, Yingfeng Chen Fuxi AI Lab of Netease, Yujing Hu Fuxi AI Lab, Netease Inc., China, Fan Zhang Zhejiang University, China
13:45 - 15:15
13:45
15m
Talk
Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots
Technical Track
Amir Ghorbani University of Victoria, Nathan Cassee Eindhoven University of Technology, Derek Robinson University of Victoria, Adam Alami Aalborg University, Neil Ernst University of Victoria, Alexander Serebrenik Eindhoven University of Technology, Andrzej Wąsowski IT University of Copenhagen, Denmark
Pre-print
14:00
15m
Talk
Flexible and Optimal Dependency Management via Max-SMT
Technical Track
Donald Pinckney Northeastern University, Federico Cassano Northeastern University, Arjun Guha Northeastern University and Roblox Research, Jonathan Bell Northeastern University, Massimiliano Culpo np-complete, S.r.l., Todd Gamblin Lawrence Livermore National Laboratory
Pre-print
13:45 - 15:15
Program repair with and for AITechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 102
Chair(s): Julia Rubin University of British Columbia, Canada
13:45
15m
Talk
Impact of Code Language Models on Automated Program Repair
Technical Track
Nan Jiang Purdue University, Kevin Liu Lynbrook High School, Thibaud Lutellier University of Alberta, Lin Tan Purdue University
Pre-print
14:00
15m
Talk
Tare: Type-Aware Neural Program Repair
Technical Track
Qihao Zhu Peking University, Zeyu Sun Zhongguancun Laboratory, Wenjie Zhang Peking University, Yingfei Xiong Peking University, Lu Zhang Peking University
14:15
15m
Talk
Template-based Neural Program Repair
Technical Track
Xiangxin Meng Beihang University, Beijing, China, Xu Wang Beihang University, Hongyu Zhang The University of Newcastle, Hailong Sun School of Computer Science and Engineering, Beihang University, Beijing,China, Xudong Liu Beihang University, Chunming Hu Beihang University
Pre-print
14:30
15m
Talk
Automated Repair of Programs from Large Language Models
Technical Track
Zhiyu Fan National University of Singapore, Singapore, Xiang Gao Beihang University, China, Martin Mirchev National University of Singapore, Abhik Roychoudhury National University of Singapore, Shin Hwei Tan Southern University of Science and Technology
14:45
15m
Talk
Automated Program Repair in the Era of Large Pre-trained Language Models
Technical Track
Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Yuxiang Wei University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
13:45 - 15:15
13:45
15m
Talk
Demystifying Issues, Challenges, and Solutions for Multilingual Software Development
Technical Track
Haoran Yang Washington State University, Weile Lian Washington State University, Shaowei Wang University of Manitoba, Haipeng Cai Washington State University
Pre-print
14:00
15m
Talk
Testability Refactoring in Pull Requests: Patterns and Trends
Technical Track
Pavel Reich University of Hamburg, Walid Maalej University of Hamburg
Pre-print
14:15
15m
Talk
Usability-Oriented Design of Liquid Types for Java
Technical Track
Catarina Gamboa CMU and LASIGE, Paulo Canelas Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University, Alcides Fonseca University of Lisbon
DOI
13:45 - 15:15
AI bias and fairnessDEMO - Demonstrations / Technical Track / Journal-First Papers at Meeting Room 104
Chair(s): Amel Bennaceur The Open University, UK
13:45
15m
Talk
Towards Understanding Fairness and its Composition in Ensemble Machine Learning
Technical Track
Usman Gohar Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Hridesh Rajan Iowa State University
Pre-print
14:00
15m
Talk
Fairify: Fairness Verification of Neural Networks
Technical Track
Sumon Biswas Carnegie Mellon University, Hridesh Rajan Iowa State University
Pre-print
14:15
15m
Talk
Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models
Technical Track
Jiri Gesi University of California, Irvine, Xinyun Shen University of California, Irvine, Yunfan Geng University of California, Irvine, Qihong Chen University of California, Irvine, Iftekhar Ahmed University of California at Irvine
14:30
15m
Talk
Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks
Technical Track
Verya Monjezi University of Texas at El Paso, Ashutosh Trivedi University of Colorado Boulder, Gang (Gary) Tan Pennsylvania State University, Saeid Tizpaz-Niari University of Texas at El Paso
Pre-print
13:45 - 15:15
13:45
15m
Talk
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
Technical Track
Kaifa ZHAO The Hong Kong Polytechnic University, Xian Zhan The Hong Kong Polytechnic University, Le Yu The Hong Kong Polytechnic University, Shiyao Zhou The Hong Kong Polytechnic University, Hao Zhou Department of Computing, The Hong Kong Polytechnic University, Hong Kong, China, Xiapu Luo The Hong Kong Polytechnic University, Haoyu Wang Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology
Pre-print
14:00
15m
Talk
Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation
Technical Track
Zhiyuan Chang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
13:45 - 15:15
SE for security 2Technical Track / Journal-First Papers at Meeting Room 106
Chair(s): Cristian Cadar Imperial College London, UK
14:00
15m
Talk
On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN)
Technical Track
Viktoria Koscinski Rochester Institute of Technology, Sara Hashemi Rochester Institute of Technology, Mehdi Mirakhorli Rochester Institute of Technology
14:15
15m
Talk
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon
Technical Track
Ita Ryan University College Cork, Utz Roedig University College Cork, Klaas-Jan Stol Lero; University College Cork; SINTEF Digital
Pre-print
14:30
15m
Talk
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Technical Track
Setu Kumar Basak North Carolina State University, Lorenzo Neil North Carolina State University, Bradley Reaves North Carolina State University, Laurie Williams North Carolina State University
Pre-print
14:45
15m
Talk
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGXDistinguished Paper Award
Technical Track
Xinyuan Miao Shanghai Jiao Tong University, Ziyi Lin Alibaba Group, Shaojun Wang Alibaba Group, Lei Yu Alibaba Group, Sanhong Li Alibaba Inc., Zihan Wang Shanghai Jiao Tong University, Pengbo Nie Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University, Beijun Shen Shanghai Jiao Tong University, He Jiang Dalian University of Technology
Pre-print
15:00
15m
Talk
Keyword Extraction From Specification Documents for Planning Security Mechanisms
Technical Track
Jeffy Jahfar Poozhithara Apple Inc. and University of Washington Bothell, Hazeline Asuncion University of Washington Bothell, Brent Lagesse University of Washington Bothell
Pre-print
13:45 - 15:15
Software EvolutionTechnical Track / SEIP - Software Engineering in Practice / Journal-First Papers at Meeting Room 109
Chair(s): Sebastiano Panichella Zurich University of Applied Sciences
13:45
15m
Talk
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization
Technical Track
Wuxia Jin Xi'an Jiaotong University, Yitong Dai Xi'an Jiaotong University, Jianguo Zheng Xi'an Jiaotong University, Yu Qu UC Riverside, Ming Fan Xi'an Jiaotong University, Zhenyu Huang Honor Device Co., Ltd., Dezhi Huang Honor Device Co., Ltd., Ting Liu Xi'an Jiaotong University
13:45 - 15:15
Test quality and improvementTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 110
Chair(s): Guowei Yang University of Queensland
13:45
15m
Talk
Test Selection for Unified Regression Testing
Technical Track
Shuai Wang University of Illinois at Urbana-Champaign, Xinyu Lian University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign
Pre-print
14:00
15m
Talk
ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search
Technical Track
Rongqi Pan University of Ottawa, Taher A Ghaleb University of Ottawa, Lionel Briand University of Luxembourg; University of Ottawa
14:15
15m
Talk
Measuring and Mitigating Gaps in Structural Testing
Technical Track
Soneya Binta Hossain University of Virginia, Matthew B Dwyer University of Virginia, Sebastian Elbaum University of Virginia, Anh Nguyen-Tuong University of Virginia
Pre-print
15:15 - 15:45
15:17
2m
Talk
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports
Technical Track
Sunzhou Huang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio
Pre-print Media Attached
15:19
2m
Talk
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Yunbo Lyu Singapore Management University, Le-Cong Thanh The University of Melbourne, Hong Jin Kang UCLA, Ratnadira Widyasari Singapore Management University, Singapore, Zhipeng Zhao Singapore Management University, Xuan-Bach D. Le University of Melbourne, Ming Li Nanjing University, David Lo Singapore Management University
Pre-print
15:24
2m
Talk
Usability-Oriented Design of Liquid Types for Java
Technical Track
Catarina Gamboa CMU and LASIGE, Paulo Canelas Carnegie Mellon University, Christopher Steven Timperley Carnegie Mellon University, Alcides Fonseca University of Lisbon
DOI
15:26
2m
Talk
When to Say What: Learning to Find Condition-Message Inconsistencies
Technical Track
Islem BOUZENIA University of Stuttgart, Michael Pradel University of Stuttgart
Pre-print
15:42
2m
Talk
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis
Technical Track
Austin Mordahl University of Texas at Dallas, Zenong Zhang The University of Texas at Dallas, Dakota Soles The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas
Pre-print

Fri 19 May

Displayed time zone: Hobart change

11:00 - 12:30
11:00
15m
Talk
Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Technical Track
Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Yongqiang Yang Huawei Technologies, Michael Lyu The Chinese University of Hong Kong
Pre-print
11:15
15m
Talk
Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models
Technical Track
Toufique Ahmed University of California at Davis, Supriyo Ghosh Microsoft, Chetan Bansal Microsoft Research, Thomas Zimmermann Microsoft Research, Xuchao Zhang Microsoft, Saravanakumar Rajmohan Microsoft 365
Pre-print
11:30
15m
Talk
Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data
Technical Track
Cheryl Lee The Chinese University of Hong Kong, Tianyi Yang The Chinese University of Hong Kong, Zhuangbin Chen Chinese University of Hong Kong, China, Yuxin Su Sun Yat-sen University, Michael Lyu The Chinese University of Hong Kong
Pre-print
11:45
15m
Talk
LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly
Technical Track
Guangba  Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Pairui Li Tencent Inc., Tianjun Weng Tencent Inc., Haibing Zheng Tencent, Yuetang Deng Tencent, Zibin Zheng School of Software Engineering, Sun Yat-sen University
Pre-print
11:00 - 12:30
AI testing 2Technical Track / Journal-First Papers at Meeting Room 101
Chair(s): Gunel Jahangirova USI Lugano, Switzerland
11:00
15m
Talk
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation
Technical Track
Qiang Hu University of Luxembourg, Yuejun GUo University of Luxembourg, Xiaofei Xie Singapore Management University, Maxime Cordy University of Luxembourg, Luxembourg, Lei Ma University of Alberta, Mike Papadakis University of Luxembourg, Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
Pre-print
11:30
15m
Talk
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Technical Track
Zhenlan Ji The Hong Kong University of Science and Technology, Pingchuan Ma HKUST, Yuanyuan Yuan The Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
11:45
15m
Talk
Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests
Technical Track
Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Saikat Dutta University of Illinois at Urbana-Champaign, Sasa Misailovic University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
12:00
15m
Talk
Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems
Technical Track
Fitash ul haq , Donghwan Shin The University of Sheffield, Lionel Briand University of Luxembourg; University of Ottawa
Pre-print
12:15
15m
Talk
Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects
Technical Track
Linyi Li University of Illinois at Urbana-Champaign, Yuhao Zhang University of Wisconsin-Madison, Luyao Ren Peking University, China, Yingfei Xiong Peking University, Tao Xie Peking University
Pre-print
11:00 - 12:30
11:15
15m
Talk
Automated Summarization of Stack Overflow Posts
Technical Track
Bonan Kou Purdue University, Muhao Chen University of Southern California, Tianyi Zhang Purdue University
11:30
15m
Talk
Semi-Automatic, Inline and Collaborative Web Page Code Curations
Technical Track
Roy Rutishauser University of Zurich, André N. Meyer University of Zurich, Reid Holmes University of British Columbia, Thomas Fritz University of Zurich
12:15
15m
Talk
Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence
Technical Track
zejun zhang Australian National University, Zhenchang Xing , Xin Xia Huawei, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Qinghua Lu CSIRO’s Data61
11:00 - 12:30
Program comprehensionTechnical Track / Journal-First Papers at Meeting Room 103
Chair(s): Oscar Chaparro College of William and Mary
11:15
15m
Talk
Identifying Key Classes for Initial Software Comprehension: Can We Do It Better?
Technical Track
Weifeng Pan Zhejiang Gongshang University, China, Xin Du Zhejiang Gongshang University, China, Hua Ming Oakland University, Dae-Kyoo Kim Oakland University, Zijiang Yang Xi'an Jiaotong University and GuardStrike Inc
11:30
15m
Talk
Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods
Technical Track
Daye Nam Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Vincent J. Hellendoorn Carnegie Mellon University
Pre-print
11:45
15m
Talk
Evidence Profiles for Validity Threats in Program Comprehension Experiments
Technical Track
Marvin Muñoz Barón University of Stuttgart, Marvin Wyrich Saarland University, Daniel Graziotin University of Stuttgart, Stefan Wagner University of Stuttgart
Pre-print
12:00
15m
Talk
Developers’ Visuo-spatial Mental Model and Program Comprehension
Technical Track
Abir Bouraffa University of Hamburg, Gian-Luca Fuhrmann , Walid Maalej University of Hamburg
Pre-print
12:15
15m
Talk
Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension
Technical Track
Shuzheng Gao Harbin institute of technology, Cuiyun Gao Harbin Institute of Technology, Chaozheng Wang Harbin Institute of Technology, Jun Sun Singapore Management University, David Lo Singapore Management University, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China
11:00 - 12:30
11:00
15m
Talk
SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics
Technical Track
Dehai Zhao Australian National University, Australia, Zhenchang Xing , Xin Xia Huawei, Deheng Ye Tencent AI Lab, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
11:15
15m
Talk
AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces
Technical Track
S M Hasan Mansur George Mason University, Sabiha Salma George Mason University, Damilola Awofisayo Duke University, Kevin Moran George Mason University
11:30
15m
Talk
Carving UI Tests to Generate API Tests and API Specification
Technical Track
Rahulkrishna Yandrapally University of British Columbia, Canada, Saurabh Sinha IBM Research, Rachel Tzoref-Brill IBM Research, Ali Mesbah University of British Columbia (UBC)
Pre-print
12:00
15m
Talk
Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network
Technical Track
Zhe Liu Institute of Software, Chinese Academy of Sciences, Chunyang Chen Monash University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yuhui Su Institute of Software, Chinese Academy of Sciences, Yuekai Huang Institute of Software, Chinese Academy of Sciences, Jun Hu Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
11:00 - 12:30
11:15
15m
Talk
Sustainability is Stratified: Toward a Better Theory of Sustainable Software Engineering
Technical Track
Erin Schultz Dalhousie University, Sean McGuire Dalhousie University, Bimpe Ayoola Dalhousie University, Paul Ralph Dalhousie University
Pre-print
11:00 - 12:30
11:00
15m
Talk
DLInfer: Deep Learning with Static Slicing for Python Type Inference
Technical Track
Yanyan Yan Nanjing University, Yang Feng Nanjing University, Hongcheng Fan Nanjing University, Baowen Xu Nanjing University
11:15
15m
Talk
ViolationTracker: Building Precise Histories for Static Analysis Violations
Technical Track
Ping Yu Fudan University, China, Yijian Wu Fudan University, Xin Peng Fudan University, Jiahan Peng Fudan University, Jian Zhang Fudan University, Peicheng Xie Fudan University, Wenyun Zhao Fudan University, China
Pre-print
11:00 - 12:30
Testing of database and low-level softwareTechnical Track / SEIP - Software Engineering in Practice / DEMO - Demonstrations / Journal-First Papers at Meeting Room 109
Chair(s): Michael Pradel University of Stuttgart
11:00
15m
Talk
Compiler Test-Program Generation via Memoized Configuration Search
Technical Track
Junjie Chen Tianjin University, Chenyao Suo College of Intelligence and Computing, Tianjin University, Jiajun Jiang Tianjin University, Peiqi Chen College of Intelligence and Computing, Tianjin University, Xingjian Li College of Intelligence and Computing, Tianjin University
11:15
15m
Talk
Generating Test Databases for Database-Backed Applications
Technical Track
Cong Yan Microsoft Research, Suman Nath Microsoft Research, Shan Lu University of Chicago
11:30
15m
Talk
Testing Database Engines via Query Plan GuidanceDistinguished Paper Award
Technical Track
Jinsheng Ba National University of Singapore, Manuel Rigger National University of Singapore
Pre-print
11:45
15m
Talk
Testing Database Systems via Differential Query Execution
Technical Track
Jiansen Song , Wensheng Dou Institute of Software Chinese Academy of Sciences, Ziyu Cui Institute of Software Chinese Academy of Sciences, Qianwang Dai Institute of Software Chinese Academy of Sciences, Wei Wang , Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print
13:45 - 15:15
Software performanceDEMO - Demonstrations / NIER - New Ideas and Emerging Results / Technical Track / SEIP - Software Engineering in Practice at Level G - Plenary Room 1
Chair(s): Philipp Leitner Chalmers University of Technology, Sweden / University of Gothenburg, Sweden
13:45
15m
Talk
Analyzing the Impact of Workloads on Modeling the Performance of Configurable Software Systems
Technical Track
Stefan Mühlbauer Leipzig University, Florian Sattler Saarland Informatics Campus, Saarland University, Christian Kaltenecker Saarland University, Germany, Johannes Dorn Leipzig University, Sven Apel Saarland University, Norbert Siegmund Leipzig University
Pre-print
14:00
15m
Talk
Twins or False Friends? A Study on Energy Consumption and Performance of Configurable Software
Technical Track
Max Weber Leipzig University, Christian Kaltenecker Saarland University, Germany, Florian Sattler Saarland Informatics Campus, Saarland University, Sven Apel Saarland University, Norbert Siegmund Leipzig University
Link to publication
13:45 - 15:15
Code generationJournal-First Papers / Technical Track at Meeting Room 101
Chair(s): Iftekhar Ahmed University of California at Irvine
13:45
15m
Talk
Learning Deep Semantics for Test Completion
Technical Track
Pengyu Nie University of Texas at Austin, Rahul Banerjee The University of Texas at Austin, Junyi Jessy Li University of Texas at Austin, USA, Raymond Mooney The University of Texas at Austin, Milos Gligoric University of Texas at Austin
14:15
15m
Talk
SkCoder: A Sketch-based Approach for Automatic Code Generation
Technical Track
Jia Li Peking University, Yongmin Li Peking University, Ge Li Peking University, Zhi Jin Peking University, Xing Hu Zhejiang University
Pre-print
14:30
15m
Talk
An Empirical Comparison of Pre-Trained Models of Source Code
Technical Track
Changan Niu Software Institute, Nanjing University, Chuanyi Li Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688, Dongxiao Chen Software Institute, Nanjing University, Jidong Ge Nanjing University, Bin Luo Nanjing University
Pre-print
14:45
15m
Talk
On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot
Technical Track
Antonio Mastropaolo Università della Svizzera italiana, Luca Pascarella ETH Zurich, Emanuela Guglielmi University of Molise, Matteo Ciniselli Università della Svizzera Italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
15:00
15m
Talk
Source Code Recommender Systems: The Practitioners' Perspective
Technical Track
Matteo Ciniselli Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Emad Aghajani Software Institute, USI Università della Svizzera italiana, Simone Scalabrino University of Molise, Rocco Oliveto University of Molise, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
13:45 - 15:15
13:45
15m
Talk
Safe low-level code without overhead is practical
Technical Track
Pre-print
14:00
15m
Talk
Sibyl: Improving Software Engineering Tools with SMT SelectionDistinguished Paper Award
Technical Track
Will Leeson University of Virgina, Matthew B Dwyer University of Virginia, Antonio Filieri AWS and Imperial College London
Pre-print
14:30
15m
Talk
CoCoSoDa: Effective Contrastive Learning for Code Search
Technical Track
Ensheng Shi Xi'an Jiaotong University, Wenchao Gu The Chinese University of Hong Kong, Yanlin Wang School of Software Engineering, Sun Yat-sen University, Lun Du Microsoft Research Asia, Hongyu Zhang The University of Newcastle, Shi Han Microsoft Research, Dongmei Zhang Microsoft Research, Hongbin Sun Xi'an Jiaotong University
Pre-print
13:45 - 15:15
13:45
15m
Talk
Coverage Guided Fault Injection for Cloud Systems
Technical Track
Yu Gao Institute of Software, Chinese Academy of Sciences, China, Wensheng Dou Institute of Software Chinese Academy of Sciences, Dong Wang Institute of software, Chinese academy of sciences, Wenhan Feng Institute of Software Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Hua Zhong Institute of Software Chinese Academy of Sciences, Tao Huang Institute of Software Chinese Academy of Sciences
Pre-print
14:00
15m
Talk
Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations
Technical Track
Jongwook Kim Korea University, Sunbeom So Korea University, Hakjoo Oh Korea University
13:45 - 15:15
Vulnerability detectionTechnical Track / Journal-First Papers at Meeting Room 106
Chair(s): Cuiyun Gao Harbin Institute of Technology
13:45
15m
Talk
An Empirical Study of Deep Learning Models for Vulnerability Detection
Technical Track
Benjamin Steenhoek Iowa State University, Md Mahbubur Rahman Iowa State University, Richard Jiles Iowa State University, Wei Le Iowa State University
Pre-print
14:00
15m
Talk
DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection
Technical Track
Wenbo Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang New Jersey Institute of Technology, Yi Li New Jersey Institute of Technology, Jiyuan Zhang University of Illinois Urbana-Champaign, Aashish Yadavally The University of Texas at Dallas
Pre-print
14:15
15m
Talk
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model
Technical Track
Bin Yuan Huazhong University of Science and Technology, Yifan Lu Huazhong University of Science and Technology, Yilin Fang Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Deqing Zou Huazhong University of Science and Technology, Zhen Li Huazhong University of Science and Technology, Zhi Li Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
14:30
15m
Talk
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Technical Track
Xin-Cheng Wen Harbin Institute of Technology, Yupan Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Hongyu Zhang The University of Newcastle, Jie M. Zhang King's College London, Qing Liao Harbin Institute of Technology
14:45
15m
Talk
Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays!
Technical Track
Xu Yang University of Manitoba, Shaowei Wang University of Manitoba, Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology
Pre-print
13:45 - 15:15
Issue reporting and reproductionTechnical Track / DEMO - Demonstrations at Meeting Room 110
Chair(s): Daniel Russo Department of Computer Science, Aalborg University
13:45
15m
Talk
Incident-aware Duplicate Ticket Aggregation for Cloud Systems
Technical Track
Jinyang Liu The Chinese University of Hong Kong, Shilin He Microsoft Research, Zhuangbin Chen Chinese University of Hong Kong, China, Liqun Li Microsoft Research, Yu Kang Microsoft Research, Xu Zhang Microsoft Research, Pinjia He Chinese University of Hong Kong at Shenzhen, Hongyu Zhang The University of Newcastle, Qingwei Lin Microsoft Research, Zhangwei Xu Microsoft Azure, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research, Michael Lyu The Chinese University of Hong Kong
14:00
15m
Talk
Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction
Technical Track
Sungmin Kang KAIST, Juyeon Yoon Korea Advanced Institute of Science and Technology, Shin Yoo KAIST
Pre-print
14:15
15m
Talk
On the Reproducibility of Software Defect Datasets
Technical Track
Hao-Nan Zhu University of California, Davis, Cindy Rubio-González University of California at Davis
14:30
15m
Talk
Context-aware Bug Reproduction for Mobile Apps
Technical Track
Yuchao Huang , Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhe Liu Institute of Software, Chinese Academy of Sciences, Song Wang York University, Chunyang Chen Monash University, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
14:45
15m
Talk
Read It, Don't Watch It: Captioning Bug Recordings Automatically
Technical Track
Sidong Feng Monash University, Mulong Xie Australian National University, Yinxing Xue University of Science and Technology of China, Chunyang Chen Monash University
Pre-print
15:15 - 15:45
15:45 - 17:15
15:45
15m
Talk
DuetCS: Code Style Transfer through Generation and Retrieval
Technical Track
Binger Chen Technische Universität Berlin, Ziawasch Abedjan Leibniz Universität Hannover
15:45 - 17:15
SE education methods and toolsTechnical Track / SEET - Software Engineering Education and Training at Meeting Room 101
Chair(s): Andrew Begel Carnegie Mellon University
15:45
15m
Talk
On the Applicability of Language Models to Block-Based Programs
Technical Track
Elisabeth Griebl University of Passau, Benedikt Fein University of Passau, Florian Obermueller University of Passau, Gordon Fraser University of Passau, René Just University of Washington
15:45 - 17:15
15:45
15m
Talk
MTTM: Metamorphic Testing for Textual Content Moderation Software
Technical Track
Wenxuan Wang The Chinese University of Hong Kong, Jen-tse Huang The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Yizhan Huang The Chinese University of Hong Kong, Shuqing Li The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong at Shenzhen, Michael Lyu The Chinese University of Hong Kong
16:00
15m
Talk
Metamorphic Shader Fusion for Testing Graphics Shader Compilers
Technical Track
Dongwei Xiao The Hong Kong University of Science and Technology, Zhibo Liu Hong Kong University of Science and Technology, Shuai Wang Hong Kong University of Science and Technology
16:45
15m
Talk
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform
Technical Track
Matteo Paltenghi University of Stuttgart, Germany, Michael Pradel University of Stuttgart
Pre-print
15:45 - 17:15
Pre-trained and few shot learning for SETechnical Track / Journal-First Papers at Meeting Room 103
Chair(s): Yiling Lou Fudan University
16:00
15m
Talk
Automating Code-Related Tasks Through Transformers: The Impact of Pre-training
Technical Track
Rosalia Tufano Università della Svizzera Italiana, Luca Pascarella ETH Zurich, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
16:15
15m
Talk
Log Parsing with Prompt-based Few-shot Learning
Technical Track
Van-Hoang Le The University of Newcastle, Hongyu Zhang The University of Newcastle
Pre-print
16:30
15m
Talk
Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning
Technical Track
Noor Nashid University of British Columbia, Mifta Sintaha University of British Columbia, Ali Mesbah University of British Columbia (UBC)
Pre-print
16:45
15m
Paper
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry
Technical Track
Wenxin Jiang Purdue University, Nicholas Synovic Loyola University Chicago, Matt Hyatt Loyola University Chicago, Taylor R. Schorlemmer Purdue University, Rohan Sethi Loyola University Chicago, Yung-Hsiang Lu Purdue University, George K. Thiruvathukal Loyola University Chicago and Argonne National Laboratory, James C. Davis Purdue University
Pre-print
17:00
15m
Talk
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning
Technical Track
Shangqing Liu Nanyang Technological University, bozhi wu Nanyang Technological University, Xiaofei Xie Singapore Management University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Yang Liu Nanyang Technological University
15:45 - 17:15
16:00
15m
Talk
DStream: A Streaming-Based Highly Parallel IFDS Framework
Technical Track
Xizao Wang Nanjing University, Zhiqiang Zuo Nanjing University, Lei Bu Nanjing University, Jianhua Zhao Nanjing University, China
16:15
15m
Talk
(Partial) Program Dependence Learning
Technical Track
Aashish Yadavally The University of Texas at Dallas, Wenbo Wang New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas
Pre-print
16:30
15m
Talk
MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems
Technical Track
Yicheng Ouyang University of Illinois at Urbana-Champaign, Kailai Shao Ant Group, Kunqiu Chen Southern University of Science and Technology, Ruobing Shen Peking University, Chao Chen Ant Group, Mingze Xu Ant Group, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print
15:45 - 17:15
Vulnerability testing and patchingTechnical Track / Journal-First Papers / DEMO - Demonstrations at Meeting Room 105
Chair(s): Cristian Cadar Imperial College London, UK
15:45
15m
Talk
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
Technical Track
Jiamou Sun CSIRO's Data61, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Thong Hoang Data61, CSIRO, Dehai Zhao Australian National University, Australia
16:00
15m
Talk
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java ProjectsDistinguished Paper Award
Technical Track
Lyuye Zhang Nanyang Technological University, Chengwei Liu Nanyang Technological University, Singapore, Zhengzi Xu Nanyang Technological University, Sen Chen Tianjin University, Lingling Fan Nankai University, Lida Zhao Nanyang Technological University, Wu Jiahui Nanyang Technological University, Yang Liu Nanyang Technological University
16:15
15m
Talk
Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs
Technical Track
Davide Corradini University of Verona, Michele Pasqua University of Verona, Mariano Ceccato University of Verona
Pre-print
16:52
15m
Talk
CoLeFunDa: Explainable Silent Vulnerability Fix Identification
Technical Track
Jiayuan Zhou Huawei, Michael Pacheco Centre for Software Excellence, Huawei, Jinfu Chen Centre for Software Excellence, Huawei, Canada, Xing Hu Zhejiang University, Xin Xia Huawei, David Lo Singapore Management University, Ahmed E. Hassan Queen’s University
15:45 - 17:15
Cyber-physical systems testingSEIP - Software Engineering in Practice / Technical Track / Journal-First Papers at Meeting Room 106
Chair(s): Shahar Maoz Tel Aviv University
16:00
15m
Talk
Finding Causally Different Tests for an Industrial Control System
Technical Track
Chris Poskitt Singapore Management University, Yuqi Chen ShanghaiTech University, China, Jun Sun Singapore Management University, Yu Jiang Tsinghua University
DOI Pre-print File Attached
16:15
15m
Talk
Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software
Technical Track
Yuqi Huai University of California, Irvine, Yuntianyi Chen University of California, Irvine, Sumaya Almanee University of California, Irvine, Tuan Ngo VNU University of Engineering and Technology, Xiang Liao University of California, Irvine, Ziwen Wan University of California, Irvine, Alfred Chen University of California, Irvine, Joshua Garcia University of California, Irvine
Pre-print
16:30
15m
Talk
Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems
Technical Track
Garrett Christian University of Virginia, Trey Woodlief University of Virginia, Sebastian Elbaum University of Virginia
Pre-print
15:45 - 17:15
16:00
15m
Talk
Rules of Engagement: Why and How Companies Participate in OSS
Technical Track
Mariam Guizani Oregon State University, Aileen Abril Castro-Guzman Oregon State University, Anita Sarma Oregon State University, Igor Steinmacher Northern Arizona University
Pre-print
16:15
15m
Paper
An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead
Technical Track
Boming Xia CSIRO's Data61 & University of New South Wales, Tingting Bi Data61, CSIRO, Zhenchang Xing , Qinghua Lu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
Pre-print

Accepted Papers

Title
AChecker: Statically Detecting Smart Contract Access Control Vulnerabilities
Technical Track
A Comprehensive Study of Real-World Bugs in Machine Learning Model Optimization
Technical Track
AdHere: Automated Detection and Repair of Intrusive Ads
Technical Track
AI-based Question Answering Assistance for Analyzing Natural-language Requirements
Technical Track
Pre-print
AidUI: Toward Automated Recognition of Dark Patterns in User Interfaces
Technical Track
Analyzing the Impact of Workloads on Modeling the Performance of Configurable Software Systems
Technical Track
Pre-print
An Empirical Comparison of Pre-Trained Models of Source Code
Technical Track
Pre-print
An Empirical Study of Deep Learning Models for Vulnerability Detection
Technical Track
Pre-print
An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry
Technical Track
Pre-print
An Empirical Study on Software Bill of Materials: Where We Stand and the Road Ahead
Technical Track
Pre-print
APICAD: Augmenting API Misuse Detection Through Specifications From Code And Documents
Technical Track
DOI Pre-print
A Qualitative Study on the Implementation Design Decisions of DevelopersDistinguished Paper Award
Technical Track
Pre-print
Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy Estimation
Technical Track
Pre-print
A Semantic-aware Parsing Approach for Log Analytics
Technical Track
Pre-print
ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary Search
Technical Track
Automated Black-box Testing of Mass Assignment Vulnerabilities in RESTful APIs
Technical Track
Pre-print
Automated Program Repair in the Era of Large Pre-trained Language Models
Technical Track
Automated Repair of Programs from Large Language Models
Technical Track
Automated Summarization of Stack Overflow Posts
Technical Track
Automating Code-Related Tasks Through Transformers: The Impact of Pre-training
Technical Track
Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub Bots
Technical Track
Pre-print
BADGE: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI Testing
Technical Track
Bad Snakes: Understanding and Improving Python Package Index Malware Scanning
Technical Track
Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning Tests
Technical Track
Better Automatic Program Repair by Using Bug Reports and Tests Together
Technical Track
Pre-print
BFTDetector: Automatic Detection of Business Flow Tampering for Digital Content Service
Technical Track
BSHUNTER: Detecting and Tracing Defects of Bitcoin Scripts
Technical Track
Pre-print File Attached
Carving UI Tests to Generate API Tests and API Specification
Technical Track
Pre-print
CC: Causality-Aware Coverage Criterion for Deep Neural Networks
Technical Track
CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query Back
Technical Track
Pre-print
CCTEST: Testing and Repairing Code Completion Systems
Technical Track
Chronos: Time-Aware Zero-Shot Identification of Libraries from Vulnerability Reports
Technical Track
Pre-print
CoCoSoDa: Effective Contrastive Learning for Code Search
Technical Track
Pre-print
CodaMOSA: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language Models
Technical Track
Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and Perceptions
Technical Track
Pre-print
CoLeFunDa: Explainable Silent Vulnerability Fix Identification
Technical Track
COLUMBUS: Android App Testing Through Systematic Callback Exploration
Technical Track
Commit Message Matters: Investigating Impact and Evolution of Commit Message Quality
Technical Track
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations
Technical Track
Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis
Technical Track
Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java ProjectsDistinguished Paper Award
Technical Track
Compiler Test-Program Generation via Memoized Configuration Search
Technical Track
Compiling Parallel Symbolic Execution with Continuations
Technical Track
Pre-print
Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent Programs
Technical Track
Pre-print
Context-aware Bug Reproduction for Mobile Apps
Technical Track
ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning
Technical Track
Coverage Guided Fault Injection for Cloud Systems
Technical Track
Pre-print
CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code Models
Technical Track
Pre-print
Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation
Technical Track
Data-driven Recurrent Set Learning For Non-termination Analysis
Technical Track
Data Quality for Software Vulnerability Datasets
Technical Track
Pre-print
Data Quality Matters: A Case Study of ObsoleteComment Detection
Technical Track
Pre-print
Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and Replacement
Technical Track
Pre-print
DeepArc: Modularizing Neural Networks for the Model Maintenance
Technical Track
DeepVD: Toward Class-Separation Features for Neural Network Vulnerability Detection
Technical Track
Pre-print
Demystifying Exploitable Bugs in Smart Contracts
Technical Track
Pre-print
Demystifying Issues, Challenges, and Solutions for Multilingual Software Development
Technical Track
Pre-print
Demystifying Privacy Policy of Third-Party Libraries in Mobile Apps
Technical Track
Pre-print
Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization
Technical Track
Detecting Dialog-Related Keyboard Navigation Failures in Web Applications
Technical Track
Detecting Exception Handling Bugs in C++ Programs
Technical Track
Detecting Isolation Bugs via Transaction Oracle Construction
Technical Track
Pre-print
Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces
Technical Track
Pre-print
Developer-Intent Driven Code Comment Generation
Technical Track
Pre-print
Developers’ Visuo-spatial Mental Model and Program Comprehension
Technical Track
Pre-print
Did We Miss Something Important? Studying and Exploring Variable-Aware Log Abstraction
Technical Track
Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random Mutations
Technical Track
DLInfer: Deep Learning with Static Slicing for Python Type Inference
Technical Track
Do code refactorings influence the merge effort?
Technical Track
Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays!
Technical Track
Pre-print
Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific Debuggers
Technical Track
Pre-print
Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel ContributorsDistinguished Paper Award
Technical Track
Pre-print
Doppelganger Test Generation for Revealing Bugs in Autonomous Driving Software
Technical Track
Pre-print
DStream: A Streaming-Based Highly Parallel IFDS Framework
Technical Track
DuetCS: Code Style Transfer through Generation and Retrieval
Technical Track
Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source Data
Technical Track
Pre-print
ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static Analysis
Technical Track
Pre-print
Efficiency Matters: Speeding Up Automated Testing with GUI Rendering InferenceDistinguished Paper Award
Technical Track
Pre-print
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model
Technical Track
Evaluating and Improving Hybrid Fuzzing
Technical Track
Evaluating the Impact of Experimental Assumptions in Automated Fault Localization
Technical Track
Pre-print Media Attached
Evidence Profiles for Validity Threats in Program Comprehension Experiments
Technical Track
Pre-print
Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution Network
Technical Track
Explaining Software Bugs Leveraging Code Structures in Neural Machine Translation
Technical Track
Pre-print Media Attached
Fairify: Fairness Verification of Neural Networks
Technical Track
Pre-print
Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical Evidence
Technical Track
FedDebug: Systematic Debugging for Federated Learning Applications
Technical Track
FedSlice: Protecting Federated Learning Models from Malicious Participants with Model Slicing
Technical Track
Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI Testing
Technical Track
Pre-print
Finding Causally Different Tests for an Industrial Control System
Technical Track
DOI Pre-print File Attached
Fine-grained Commit-level Vulnerability Type Prediction By CWE Tree Structure
Technical Track
Pre-print
Flexible and Optimal Dependency Management via Max-SMT
Technical Track
Pre-print
Fonte: Finding Bug Inducing Commits from Failures
Technical Track
Pre-print
From Organizations to Individuals: Psychoactive Substance Use By Professional Programmers
Technical Track
Pre-print
Fuzzing Automatic Differentiation in Deep-Learning Libraries
Technical Track
GameRTS: A Regression Testing Framework for Video Games
Technical Track
Generating Realistic and Diverse Tests for LiDAR-Based Perception Systems
Technical Track
Pre-print
Generating Test Databases for Database-Backed Applications
Technical Track
Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal Attention
Technical Track
Pre-print
How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial Practitioners
Technical Track
How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about Algorithms
Technical Track
Identifying Key Classes for Initial Software Comprehension: Can We Do It Better?
Technical Track
Impact of Code Language Models on Automated Program Repair
Technical Track
Pre-print
Improving API Knowledge Discovery with ML: A Case Study of Comparable API Methods
Technical Track
Pre-print
Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object Generation
Technical Track
Incident-aware Duplicate Ticket Aggregation for Cloud Systems
Technical Track
Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural Networks
Technical Track
Pre-print
Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First Issues
Technical Track
Pre-print
JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time Compilers
Technical Track
Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence Models
Technical Track
Keyword Extraction From Specification Documents for Planning Security Mechanisms
Technical Track
Pre-print
KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program Repair
Technical Track
Pre-print
Large Language Models are Few-shot Testers: Exploring LLM-based General Bug Reproduction
Technical Track
Pre-print
Learning Deep Semantics for Test Completion
Technical Track
Learning Graph-based Code Representations for Source-level Functional Similarity Detection
Technical Track
Learning Seed-Adaptive Mutation Strategies for Greybox Fuzzing
Technical Track
Learning to Boost Disjunctive Static Bug-Finders
Technical Track
Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGXDistinguished Paper Award
Technical Track
Pre-print
Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning Models
Technical Track
Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment Perspective
Technical Track
Pre-print
Locating Framework-specific Crashing Faults with Compact and Explainable Candidate Set
Technical Track
Pre-print
Log Parsing with Prompt-based Few-shot Learning
Technical Track
Pre-print
LogReducer: Identify and Reduce Log Hotspots in Kernel on the Fly
Technical Track
Pre-print
Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled Systems
Technical Track
Pre-print
Measuring and Mitigating Gaps in Structural Testing
Technical Track
Pre-print
Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the Moon
Technical Track
Pre-print
Metamorphic Shader Fusion for Testing Graphics Shader Compilers
Technical Track
MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice Systems
Technical Track
Pre-print
MorphQ: Metamorphic Testing of the Qiskit Quantum Computing Platform
Technical Track
Pre-print
Moving on from the software engineers' gambit: an approach to support the defense of software effort estimates
Technical Track
Pre-print
MTTM: Metamorphic Testing for Textual Content Moderation Software
Technical Track
On-Demand Security Requirements Synthesis with Relational Generative Adversarial Networks (RelGAN)
Technical Track
One Adapter for All Programming Languages? Adapter Tuning for Multilingual Tasks in Software Engineering
Technical Track
On Privacy Weaknesses and Vulnerabilities in Software Systems
Technical Track
On the Applicability of Language Models to Block-Based Programs
Technical Track
On the Reproducibility of Software Defect Datasets
Technical Track
On the Robustness of Code Generation Techniques: An Empirical Study on GitHub Copilot
Technical Track
On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical Study
Technical Track
On the Temporal Relations between Logging and Code
Technical Track
Pre-print
Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers
Technical Track
Pre-print
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions
Technical Track
(Partial) Program Dependence Learning
Technical Track
Pre-print
PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports
Technical Track
Pre-print Media Attached
PILAR: Studying and Mitigating the Influence of Configurations on Log Parsing
Technical Track
Practical and Efficient Model Extraction of Sentiment Analysis APIs
Technical Track
Predicting Bugs by Monitoring Developers During Task Execution
Technical Track
PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android Apps
Technical Track
Pre-print
PyEvolve: Automating Frequent Code Changes in Python ML Systems
Technical Track
Pre-print
RAT: A Refactoring-Aware Traceability Model for Bug Localization
Technical Track
File Attached
Reachable Code Coverage
Technical Track
Read It, Don't Watch It: Captioning Bug Recordings Automatically
Technical Track
Pre-print
Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models
Technical Track
Pre-print
Regression Fuzzing for Deep Learning Systems
Technical Track
Reliability Assurance for Deep Neural Network Architectures Against Numerical Defects
Technical Track
Pre-print
RepresentThemAll: A Universal Learning Representation of Bug Reports
Technical Track
Responsibility in Context: On Applicability of Slicing in Semantic Regression Analysis
Technical Track
Pre-print
Rete: Learning Namespace Representation for Program RepairDistinguished Paper Award
Technical Track
Link to publication Pre-print
Retrieval-Based Prompt Selection for Code-Related Few-Shot Learning
Technical Track
Pre-print
Reusing Deep Neural Network Models through Model Re-engineering
Technical Track
Revisiting Learning-based Commit Message Generation
Technical Track
Pre-print
Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware Criterion
Technical Track
Robustification of Behavioral Designs against Environmental Deviations
Technical Track
Pre-print
Rules of Engagement: Why and How Companies Participate in OSS
Technical Track
Pre-print
Safe low-level code without overhead is practical
Technical Track
Pre-print
SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScript
Technical Track
Pre-print
SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video Analytics
Technical Track
Semi-Automatic, Inline and Collaborative Web Page Code Curations
Technical Track
Sibyl: Improving Software Engineering Tools with SMT SelectionDistinguished Paper Award
Technical Track
Pre-print
Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect Explanation
Technical Track
SkCoder: A Sketch-based Approach for Automatic Code Generation
Technical Track
Pre-print
SmallRace: Static Race Detection for Dynamic Languages - A Case on Smalltalk
Technical Track
Pre-print
SmartMark: Software Watermarking Scheme for Smart Contracts
Technical Track
Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the Forefront
Technical Track
Pre-print
Source Code Recommender Systems: The Practitioners' Perspective
Technical Track
“STILL AROUND”: Experiences and Survival Strategies of Veteran Women Software DevelopersDistinguished Paper Award
Technical Track
Pre-print
Strategies, Benefits and Challenges of App Store-inspired Requirements Elicitation
Technical Track
Pre-print
Sustainability is Stratified: Toward a Better Theory of Sustainable Software Engineering
Technical Track
Pre-print
Syntax and Domain Aware Model for Unsupervised Program Translation
Technical Track
Pre-print
TAINTMINI: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis
Technical Track
Tare: Type-Aware Neural Program Repair
Technical Track
Template-based Neural Program Repair
Technical Track
Pre-print
Testability Refactoring in Pull Requests: Patterns and Trends
Technical Track
Pre-print
Testing Database Engines via Query Plan GuidanceDistinguished Paper Award
Technical Track
Pre-print
Testing Database Systems via Differential Query Execution
Technical Track
Pre-print
Test Selection for Unified Regression Testing
Technical Track
Pre-print
The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum Computing
Technical Track
Pre-print
The untold story of code refactoring customizations in practice
Technical Track
Pre-print
Tolerate Control-Flow Changes for Sound Data Race Prediction
Technical Track
Towards Understanding Fairness and its Composition in Ensemble Machine Learning
Technical Track
Pre-print
Triggers for Reactive Synthesis Specifications
Technical Track
Pre-print
Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on Ethereum
Technical Track
Pre-print
Twins or False Friends? A Study on Energy Consumption and Performance of Configurable Software
Technical Track
Link to publication
Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code Comprehension
Technical Track
Understanding and Detecting On-the-Fly Configuration BugsDistinguished Paper Award
Technical Track
Pre-print
Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem
Technical Track
Pre-print
UpCy: Safely Updating Outdated Dependencies
Technical Track
Pre-print
Usability-Oriented Design of Liquid Types for Java
Technical Track
DOI
Using Reactive Synthesis: An End-to-End Exploratory Case Study
Technical Track
Pre-print
Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs
Technical Track
Pre-print
Verifying Data Constraint Equivalence in FinTech Systems
Technical Track
Pre-print
ViolationTracker: Building Precise Histories for Static Analysis Violations
Technical Track
Pre-print
VulGen: Realistic Vulnerability Generation Via Pattern Mining and Deep Learning
Technical Track
Pre-print
Vulnerability Detection with Graph Simplification and Enhanced Graph Representation Learning
Technical Track
What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?
Technical Track
Pre-print
When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical Study
Technical Track
Pre-print
When to Say What: Learning to Find Condition-Message Inconsistencies
Technical Track
Pre-print
Which of My Assumptions are Unnecessary for Realizability and Why Should I Care?
Technical Track
Pre-print

.

ICSE 2023 open science policy

As a conference sponsored by ACM SIGSOFT, ICSE 2023 adheres to open science policies as adopted by SIGSOFT. The text below is based on v0.9.9 of these policies.

Open science policies

Openness in science is key to fostering progress via transparency and availability of all outputs produced at each investigative steps. Transparency and availability of research outputs allow better reproducibility, replicability of quantitative studies and recoverability of qualitative studies. Open science builds the core for excellence in evidence-based research.

As an internationally renowned forum for researchers, practitioners, and educators to present and discuss the most recent innovations, trends, experiences, and challenges in the field of software engineering, ICSE 2023 (continuing the tradition of previous editions) actively supports setting standards for how we conduct this kind of research.

To this end, we have explicitly committed ourselves to foster openness to our research outcomes. In particular, we support the adoption of open data and open source principles. We encourage all contributing authors to disclose the (anonymized and curated) data to increase reproducibility, replicability, and/or recoverability of the studies.

Principles

Research output should be publicly and freely accessible by anyone, permanently.

Artifacts related to a study (which include, but are not limited to, raw and transformed data, extended proofs, appendices, analysis scripts, software, virtual machines and containers, and qualitative codebooks) and the paper itself should, in principle, be made available on the Internet:

  1. without any barrier (e.g., paywalls, registration forms, request mechanisms),
  2. under a proper open license that specifies purposes for re-use and repurposing, properly archived and preserved ,
  3. provided that there are no ethical, legal, technical, economic, or sensible barriers preventing the disclosure.

Open artifacts

Fostering artifacts as open data and open source should be done as:

● Archived on preserved digital repositories such aszenodo.org,figshare.com,www.softwareheritage.org, osf.io, or institutional repositories. GitHub, GitLab, and similar services for version control systems do not offer properly archived and preserved data. Personal or institutional websites, consumer cloud storage such as Dropbox, or services such as Academia.edu and Researchgate.net do not provide properly archived and preserved data.

● Released under a proper open data license such as the CC0 dedication or the CC-BY 4.0 license when publishing the data.

● Software can be released under an open source license.

● Different open licenses, if mandated by institutions or regulations, are also permitted.

● We encourage authors to make artifacts available upon submission (either privately or publicly) and upon acceptance (publicly).

Supporting statement

We ask authors to provide a supporting statement on the data availability (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section.

Authors who cannot disclose data for the reasons stated in the principles of the policies should provide a short statement in their submitted papers in a section named Data Availability after the Conclusion section.

Please note that the success of the open science initiative depends on the willingness (and possibilities) of authors to disclose their data and that all submissions will undergo the same review process independent of whether they disclose their analysis code or data.

HOWTOs

A step-by-step approach to disclosing artifacts for (doubly-anonymous) peer review and make it open data upon acceptance is available online .

A step-by-step approach to automatically archive a GitHub repository to Zenodo.org is available at https://guides.github.com/activities/citable-code/ .

A step-by-step approach to automatically archive a GitHub repository to figshare.com is available at https://knowledge.figshare.com/articles/item/how-to-connect-figshare-with-your-github-account .

A proposal for artifact evaluation by SIGSOFT is available at https://github.com/acmsigsoft/artifact-evaluation .

A proposal for open science in software engineering, including explanations for structuring an open artifact, is available at https://arxiv.org/abs/1904.06499 .

Open Access

We encourage ICSE 2023 authors to self-archive their pre- and post-prints in open and preserved repositories. Self-archiving is legal and allowed by most publishers (granted in the copyright transfer agreement), and it will enable anybody in the world to reach papers barrier-free.

Upon acceptance to ICSE 2023, we encourage authors to revise their article according to the peers’ comments, generate a PDF version of it (post-print), and submit it to arXiv.org or their institutional repository.

Unless authors are willing to pay the publisher for open access of their published papers (gold open access), they should pick the “arXiv.org - Non-exclusive license to distribute” license https://arxiv.org/licenses/nonexclusive-distrib/1.0/license.html when submitting to arXiv.

Authors should avoid a Creative Commons license for their preprints, in any repository, if the published papers are not open access. More infos available here: https://avandeursen.com/2016/11/06/green-open-access-faq/#creative-commons .

Note: Authors are not allowed to self-archive the PDF of the published article as typeset by the publisher (a.k.a. “publisher proof,” “published paper,” “the digital library version”).

HOWTOs

A comprehensive FAQ for open access and self-archiving is available at https://avandeursen.com/2016/11/06/green-open-access-faq/ .

Instructions for reviewers

ICSE 2023 has adopted an open science stance and introduced guidelines for authors (available at https://conf.researchr.org/track/icse-2023/icse-2023-open-science-policies ). The policies invite authors to provide all research artifacts for peer review, self-archive their pre- and post-prints, and archive artifacts as open data upon acceptance. We kindly ask you to pay attention to the following, while reviewing:

  1. All open science steps are optional for authors and reviewers. You are invited, but not required, to inspect the provided artifacts as part of your review efforts.
  2. All reasons for partial disclosure of data (or lack thereof) should be trusted.
  3. Submissions have to undergo the same review process independent of whether they disclose their analysis code or data. You are invited to complain in your review of any absence of data, but please do not let it influence your review of submissions. You are free to welcome further disclosure of data and help authors in doing so, with your review.
  4. Open science is challenging for qualitative studies. Please be welcoming of qualitative studies which open their artifacts even in a limited way. Furthermore, when evaluating artifacts from qualitative studies that was made available for peer review, please keep in mind that authors of qualitative studies might have underlying ontological and epistemological stances that differ from those of authors of quantitative studies. Concepts such as replicability and reproducibility might apply partially or not apply at all with qualitative studies.
  5. Providing research artifacts might introduce issues with doubly-anonymous reviews. We ask you not to actively hunt the identity of authors, especially in case they self-archived a preprint of their submission. License
  6. New! this year, for every paper, one designated reviewer will perform a lightweight check of the online/attached data (if available). Note this is not a thorough replicability check as it is done by the artifact track, but it has mainly the goal to check whether the dataset contains what was declared.

These open science policies are based on open science policies by Daniel Graziotin, licensed under CC0 1.0.

Please note that the processes described in this document are not used by all tracks. Check in the call for papers whether

  • sharing data is expected, and how.
  • double-anonymous review is used or not.

Empirical Studies and Sharing of Data

I am doing research with industry. What if I cannot share data from my research?

We absolutely welcome research with industry, as it often conveys important lessons about software engineering in practice – and we perfectly understand that industry data may be subject to confidentiality issues or legal requirements. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of confidentiality agreements". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.

I am doing user studies. What if I cannot share data from my empirical study?

We absolutely welcome user studies! However, we also perfectly understand that sharing raw data can be subject to constraints such as privacy issues. If you cannot share data, please state the reason in the submission form and the paper; a typical wording would be "The raw data obtained in this study cannot be shared because of privacy issues". Having said that, even sharing a subset of your data (for instance, the data used for figures and tables in the paper, an anonymized subset, or one that aggregates over the entire dataset), analysis procedures or scripts, would be useful.

I am doing qualitative research. What information should I include to help reviewers assess my research results and the readers use my results?

Best practices for addressing the reliability and credibility of qualitative research suggest providing detailed arguments and rationale for qualitative approaches, procedures and analyses. Therefore, authors are advised to provide as much transparency as possible into these details of their study. For example, clearly explain details and decisions such as 1) context of study, 2) the participant-selection process and the theoretical basis for selecting those participants, 3) collection of data or evidence from participants, and 4) data analysis methods, e.g. justify their choice theoretically and how they relate to the original research questions, and make explicit how the themes and concepts were identified from the data. Further, provide sufficient detail to bridge the gap between the interpretation of findings presented and the collected evidence by, for example, numbering quotations and labeling sources. Similar to replicability in quantitative research, the transparency aims to ensure a study’s methods are available for inspection and interpretation. However, replicability or repeatability is not the goal, as qualitative methods are inherently interpretive and emphasize context. As a consequence, reporting qualitative research might require more space in the paper; authors should consider providing enough evidence for their claims while being mindful with the use of space.

Finally, when qualitative data is counted and used for quantitative methods, authors should report the technique and results in assessing rigour in data analysis procedures, such as inter-reliability tests or triangulation over different data sources or methods—, and justify how they achieved rigour if no such methods were used.

I can make my data set / my tool available, but it may reveal my identity. What should I do?

See this question under "double-anonymous submissions", below.

Double-Anonymous Submissions

Why double-anonymous?

There are many reasons for a submission track to employ a double-anonymous review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-anonymous reviewing, see Claire Le Goues’s very well-argued, referenced and evidenced blog posting in favor of double-anonymous review processes for Software Engineering conferences . See also a list of double-anonymous resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller​​ and Alberto Bacchelli​​.

How can I prepare my paper for double-anonymous reviewing?

You must make every reasonable effort to honor the double-anonymous review process, but you do not need to guarantee that your identity is undiscoverable. The double-anonymous aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:

  1. Omit all authors’ names from the title page.
  2. Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper.
  3. Do not rely on non-anonymous supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. Supplementary information might result in revealing author identities.

Here is some excellent advice on anonymization from ACM .

I previously published an earlier version of this work in a venue that doesn’t have double-anonymous. What should I do about acknowledging that previous work?

If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.

If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.

Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?

It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-anonymous review because prior dissertation publication does not compromise novelty. In the final post-review, camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-anonymous review process, please refrain from citing the dissertation, to increase anonymity.

You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.

What if we want to cite some unpublished work of our own (as motivation for example)?

If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures ). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works. If your work is a tool, a data set, or some other resource, see the question on ‘resources already made available’, above.

Can I disseminate a non-anonymized version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?

You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. Whenever possible, please avoid posting your manuscript on public archives (e.g, ArXiV) before or during the submission period. Would you still prefer to do so, carefully avoid adding to the manuscript any reference to ICSE 2023 (E.g., using footnotes saying “Submitted to ICSE 2023”).

I can make my data set / my tool available, but it may reveal my identity. What should I do?

Please make an effort to anonymize your data set / your tool such that it does not reveal your identity. If that is impossible, place a warning next to the link that this may reveal your identity.

:
: