Research PapersSANER 2025
Wed 5 MarDisplayed time zone: Eastern Time (US & Canada) change
07:30 - 17:00 | RegistrationResearch Papers at Atrium Lassonde (M-3500) The registration will be available throughout the day, at Atrium Lassonde. | ||
07:30 - 08:30 | |||
07:30 60mDay opening | Morning Mingle / Coffee and Networking Catering |
08:30 - 09:00 | Opening (Welcome from the GCs and PCs)Research Papers at Amphithéâtre Bernard Lamarre (C-631) Chair(s): Maria Teresa Baldassarre Department of Computer Science, University of Bari , Mohammad Hamdaqa Polytechnique Montréal, Foutse Khomh Polytechnique Montréal, Masud Rahman Dalhousie University | ||
09:00 - 10:30 | Keynote 1Research Papers at Amphithéâtre Bernard Lamarre (C-631) Chair(s): Maria Teresa Baldassarre Department of Computer Science, University of Bari , Masud Rahman Dalhousie University | ||
09:00 90mKeynote | Keynote 1: AI for Code Generation to Software Engineering Research Papers Baishakhi Ray Columbia University, New York; |
11:00 - 12:30 | Empirical Studies & LLMIndustrial Track / Research Papers / Reproducibility Studies and Negative Results (RENE) Track at L-1710 Chair(s): Diego Costa Concordia University, Canada | ||
11:00 15mTalk | Beyond pip install: Evaluating LLM agents for the automated installation of Python projects Research Papers Louis Mark Milliken KAIST, Sungmin Kang National University of Singapore, Shin Yoo Korea Advanced Institute of Science and Technology Pre-print | ||
11:18 12mTalk | On the Compression of Language Models for Code: An Empirical Study on CodeBERT Research Papers Giordano d'Aloisio University of L'Aquila, Luca Traini University of L'Aquila, Federica Sarro University College London, Antinisca Di Marco University of L'Aquila Pre-print | ||
11:30 15mTalk | Can Large Language Models Discover Metamorphic Relations? A Large-Scale Empirical Study Research Papers Jiaming Zhang University of Science and Technology Beijing, Chang-ai Sun University of Science and Technology Beijing, Huai Liu Swinburne University of Technology, Sijin Dong University of Science and Technology Beijing | ||
11:45 15mTalk | Revisiting the Non-Determinism of Code Generation by the GPT-3.5 Large Language Model Reproducibility Studies and Negative Results (RENE) Track Salimata Sawadogo Centre d'Excellence Interdisciplinaire en Intelligence Artificielle pour le Développement (CITADEL), Aminata Sabané Université Joseph KI-ZERBO, Centre d'Excellence CITADELLE, Rodrique Kafando Centre d'Excellence Interdisciplinaire en Intelligence Artificielle pour le Développement (CITADEL), Tegawendé F. Bissyandé University of Luxembourg | ||
12:00 15mTalk | Language Models to Support Multi-Label Classification of Industrial Data Industrial Track Waleed Abdeen Blekinge Institute of Technology, Michael Unterkalmsteiner , Krzysztof Wnuk Blekinge Institute of Technology , Alessio Ferrari CNR-ISTI, Panagiota Chatzipetrou |
13:00 - 14:00 | |||
13:00 60mMeeting | Steering Committee Meeting Research Papers |
14:00 - 15:30 | Smart Contracts & MicroservicesResearch Papers / Industrial Track at L-1710 Chair(s): Anthony Cleve University of Namur | ||
14:00 15mTalk | LLM-based Generation of Solidity Smart Contracts from System Requirements in Natural Language: the AstraKode Case Industrial Track Gabriele De Vito Università di Salerno, Damiano D'Amici Damiano D'Amici, Head of Product and co-founder, AstraKode S.r.l., Fabiano Izzo Fabiano Izzo, CEO and co-founder, AstraKode S.r.l., Filomena Ferrucci University of Salerno, Dario Di Nucci University of Salerno | ||
14:15 15mTalk | Deep Smart Contract Intent Detection Research Papers Youwei Huang Institute of Intelligent Computing Technology, Suzhou, CAS, Sen Fang North Carolina State University, Jianwen Li , Bin Hu Institute of Computing Technology, Chinese Academy of Sciences, Jiachun Tao Suzhou City University, Tao Zhang Macau University of Science and Technology Pre-print | ||
14:30 15mTalk | Enhancing Microservice Migration Transformation from Monoliths with Graph Neural Networks Research Papers Deli Chen hainan university, Chunyang Ye Hainan University, Hui Zhou Hainan University, Shanyan Lai hainan university, Bo Li hainan university | ||
14:45 15mTalk | Specification Mining for Smart Contracts with Trace Slicing and Predicate Abstraction Research Papers Ye Liu , Yixuan Liu Nanyang Technological University, Yi Li Nanyang Technological University, Cyrille Artho KTH Royal Institute of Technology, Sweden | ||
15:00 15mTalk | Towards Change Impact Analysis in Microservices-based System Evolution Research Papers Tomas Cerny University of Arizona, Gabriel Goulis Systems and Industrial Engineering, University of Arizona, Amr Elsayed The University of Arizona Pre-print | ||
15:15 15mTalk | An Empirical Study on Microservices Deployment Trends, Topics and Challenges in Stack Overflow Research Papers Amina Bouaziz Laval University, Mohamed Aymen saied Laval University, Mohammed Sayagh ETS Montreal, University of Quebec, Ali Ouni ETS Montreal, University of Quebec, Mohamed Wiem Mkaouer University of Michigan - Flint |
14:00 - 15:30 | API and Dependency Analysis (Room: L-1720)Research Papers at L-1720 Chair(s): Raula Gaikovina Kula Osaka University | ||
14:00 15mTalk | Analysing Software Supply Chains of Infrastructure as Code: Extraction of Ansible Plugin Dependencies Research Papers Ruben Opdebeeck Vrije Universiteit Brussel, Bram Adams Queen's University, Coen De Roover Vrije Universiteit Brussel Pre-print | ||
14:15 15mTalk | Enhancing Automated Vulnerability Repair through Dependency Embedding and Pattern Store Research Papers Qingao Dong Beihang university, Yuanzhang Lin Beihang University, Xiang Gao Beihang University, Hailong Sun Beihang University | ||
14:30 15mTalk | Improving API Knowledge Comprehensibility: A Context-Dependent Entity Detection and Context Completion Approach using LLM Research Papers Zhang Zhang National University of Defense Technology, Xinjun Mao National University of Defense Technology, Shangwen Wang National University of Defense Technology, Kang Yang National University of Defense Technology, Tanghaoran Zhang National University of Defense Technology, Fei Gao National University of Defense Technology, Xunhui Zhang National University of Defense Technology, China | ||
14:45 15mTalk | Pay Your Attention on Lib! Android Third-Party Library Detection via Feature Language Model Research Papers Dahan Pan Shanghai Jiao Tong University, Yi Xu Shanghai Jiao Tong University, Runhan Feng Shanghai Jiao Tong University, Donghui Yu Shanghai Jiao Tong University, Jiawen Chen Shanghai Jiao Tong University, Ya Fang Shanghai Jiao Tong University, Yuanyuan Zhang Shanghai Jiao Tong University | ||
15:00 15mTalk | THINK: Tackling API Hallucinations in LLMs via Injecting Knowledge Research Papers Jiaxin Liu National University of Defense Technology, Yating Zhang National University of Defense Technology, Deze Wang National University of Defense Technology, Yiwei Li National University of Defense Technology, Wei Dong National University of Defense Technology |
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Catering |
16:00 - 17:00 | Townhall MeetingResearch Papers at Atrium Lassonde (M-3500) Chair(s): Rick Kazman University of Hawai‘i at Mānoa | ||
17:00 - 22:00 | |||
17:00 5hDinner | Dinner Catering |
Thu 6 MarDisplayed time zone: Eastern Time (US & Canada) change
07:30 - 08:30 | |||
07:30 60mDay opening | Morning Mingle / Coffee and Networking Catering |
08:30 - 09:00 | MIP Announcement & TalkResearch Papers at Amphithéâtre Bernard Lamarre (C-631) Chair(s): Bram Adams Queen's University | ||
09:00 - 10:30 | Keynote 2 Research Papers at Amphithéâtre Bernard Lamarre (C-631) Chair(s): Maria Teresa Baldassarre Department of Computer Science, University of Bari , Masud Rahman Dalhousie University | ||
09:00 90mKeynote | Keynote 2: Source Code Diff Revolution Research Papers Nikolaos Tsantalis Concordia University |
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Catering |
11:00 - 12:30 | Software Testing & DebuggingResearch Papers at L-1710 Chair(s): Coen De Roover Vrije Universiteit Brussel | ||
11:00 15mTalk | A Multi-Language Tool for Generating Unit Tests from Execution Traces Research Papers Gabriel Darbord Inria, Nicolas Anquetil University of Lille, Lille, France, Anne Etien Université de Lille, CNRS, Inria, Centrale Lille, UMR 9189 –CRIStAL, Benoit Verhaeghe Berger-Levrault | ||
11:15 15mTalk | CSE-WSS: Code Structure Enhancement Framework with Weighted Semantic Similarity for Changeset-based Bug Localization Research Papers Zhenghao Liu School of Software Engineering, South China University of Technology, Guangzhou, China, Li Yuan School of Software Engineering, South China University of Technology, Guangzhou, China, Jiexin Wang School of Software Engineering, South China University of Technology, Guangzhou, China, Yi Cai School of Software Engineering, South China University of Technology, Guangzhou, China | ||
11:30 15mTalk | From Bug Reports to Workarounds: The Real-World Impact of Compiler Bugs Research Papers | ||
11:45 15mTalk | Optimizing Class Integration Testing with Criticality-Driven Test Order Generation Research Papers yanru ding China University of Mining and Technology, Yanmei ZHANG China University of Mining and Technology, Guan Yuan China University of Mining and Technology, Shujuan Jiang China University of Mining and Technology, Wei Dai China University of Mining and Technology, Luciano Baresi Politecnico di Milano | ||
12:00 15mTalk | Generating and Contributing Test Cases for C Libraries from Client Code: A Case Study Research Papers Ahmed Zaki Imperial College London, Arindam Sharma Imperial College London, Cristian Cadar Imperial College London |
11:00 - 12:30 | Software Analysis & Recommendation SystemsResearch Papers / Industrial Track / Early Research Achievement (ERA) Track at L-1720 Chair(s): Brittany Reid Nara Institute of Science and Technology | ||
11:00 15mTalk | A First Look at Package-to-Group Mechanism: An Empirical Study of the Linux Distributions Research Papers Dongming Jin Key Lab of High-Confidence of Software Technologies (PKU), Ministry of Education, NIANYU LI ZGC Lab, China, Kai Yang Zhongguancun Laboratory, Minghui Zhou Peking University, Zhi Jin Peking University | ||
11:15 15mTalk | Preprocessing is All You Need: Boosting the Performance of Log Parsers With a General Preprocessing Framework Research Papers Qiaolin Qin Polytechnique Montréal, Roozbeh Aghili Polytechnique Montréal, Heng Li Polytechnique Montréal, Ettore Merlo Polytechnique Montreal Pre-print | ||
11:30 7mTalk | Boosting Large Language Models for System Software Retargeting: A Preliminary Study Early Research Achievement (ERA) Track Ming Zhong SKLP, Institute of Computing Technology, CAS, Fang Lv Institute of Computing Technology, Chinese Academy of Sciences, Lulin Wang , Lei Qiu SKLP, Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Hongna Geng SKLP, Institute of Computing Technology, CAS, Huimin Cui Institute of Computing Technology, Chinese Academy of Sciences, Xiaobing Feng ICT CAS | ||
11:37 15mTalk | Analyzing Logs of Large-Scale Software Systems using Time Curves Visualization Industrial Track Dmytro Borysenkov , Adriano Vogel , Sören Henning Johannes Kepler University Linz, Esteban Pérez Wohlfeil | ||
11:52 15mTalk | Building Your Own Product Copilot: Challenges, Opportunities, and Needs Industrial Track Chris Parnin Georgia Tech, Gustavo Soares Microsoft, Rahul Pandita GitHub, Inc., Sumit Gulwani Microsoft, Jessica Rich , Austin Henley University of Tennessee | ||
12:07 15mTalk | Filter-based Repair of Semantic Segmentation in Safety-Critical Systems Industrial Track Sebastian Schneider , Tomas Sujovolsky , Paolo Arcaini National Institute of Informatics
, Fuyuki Ishikawa National Institute of Informatics, Truong Vinh Truong Duy |
11:00 - 12:30 | Program AnalysisResearch Papers at M-1410 Chair(s): Rrezarta Krasniqi University of North Carolina at Charlotte | ||
11:00 15mTalk | Adapting Knowledge Prompt Tuning for Enhanced Automated Program Repair Research Papers | ||
11:15 15mTalk | A Metric for Measuring the Impact of Rare Paths on Program Coverage Research Papers | ||
11:30 15mTalk | A Progressive Transformer for Unifying Binary Code Embedding and Knowledge Transfer Research Papers Hanxiao Lu Columbia University, Hongyu Cai Purdue University, Yiming Liang Purdue University, Antonio Bianchi Purdue University, Z. Berkay Celik Purdue University | ||
11:45 15mTalk | Is This You, LLM? Recognizing AI-written Programs with Multilingual Code Stylometry Research Papers Andrea Gurioli DISI - University of Bologna, Maurizio Gabbrielli DISI - University of Bologna, Stefano Zacchiroli Télécom Paris, Polytechnic Institute of Paris Pre-print | ||
12:00 15mTalk | SpeedGen: Enhancing Code Efficiency through Large Language Model-Based Performance Optimization Research Papers Nils Purschke Technical University of Munich, Sven Kirchner Technical University of Munich, Alois Knoll Technical University of Munich | ||
12:15 15mTalk | StriCT-BJ: A String Constraint Benchmark from Real Java Programs Research Papers Chi Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jian Zhang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences |
14:00 - 15:30 | Defect Prediction & AnalysisResearch Papers / Industrial Track / Journal First Track at L-1710 Chair(s): Rrezarta Krasniqi University of North Carolina at Charlotte | ||
14:00 15mTalk | An ensemble learning method based on neighborhood granularity discrimination index and its application in software defect prediction Research Papers Yuqi Sha College of Information Science and Technology,Qingdao University of Science and Technology, Feng Jiang College of Information Science and Technology,Qingdao University of Science and Technology, Qiang Hu College of Information Science and Technology, Qingdao University of Science and technology, Yifan He Institute of Cosmetic Regulatory Science,Beijing Technology and Business University | ||
14:15 15mTalk | ALOGO: A Novel and Effective Framework for Online Cross-project Defect Prediction Research Papers Rongrong Shi Beijing Jiaotong University, Yuxin He Beijing Jiaotong University, Ying Liu Beijing Jiaotong University, Zonghao Li Beijing Jiaotong University, Jingxin Su Beijing Jiaotong University, Haonan Tong Beijing Jiaotong University | ||
14:30 15mTalk | Cross-System Software Log-based Anomaly Detection Using Meta-Learning Research Papers Yuqing Wang University of Helsinki, Finland, Mika Mäntylä University of Helsinki and University of Oulu, Jesse Nyyssölä University of Helsinki, Ke Ping University of Helsinki, Liqiang Wang University of Wyoming Pre-print | ||
14:45 15mTalk | RADICE: Causal Graph Based Root Cause Analysis for System Performance Diagnostic Industrial Track Andrea Tonon Huawei Ireland Research Center, Meng Zhang Shandong University, Bora Caglayan Huawei Ireland Research Center, Fei Shen Huawei Nanjing Research Center, Tong Gui , Mingxue Wang Huawei Ireland Research Center, Rong Zhou | ||
15:00 15mTalk | Can We Trust the Actionable Guidance from Explainable AI Techniques in Defect Prediction? Research Papers | ||
15:15 15mTalk | Making existing software quantum safe: A case study on IBM Db2 Journal First Track Lei Zhang , Andriy Miranskyy Toronto Metropolitan University (formerly Ryerson University), Walid Rjaibi IBM Canada Lab, Greg Stager IBM Canada Lab, Michael Gray IBM, John Peck IBM |
15:30 - 16:00 | |||
15:30 30mCoffee break | Break Catering |
16:00 - 17:00 | Ask Me Anything Session (New Comers Onboarding)Research Papers at L-1710 Chair(s): Jeremy Bradbury Ontario Tech University, Foutse Khomh Polytechnique Montréal | ||
16:00 - 17:00 | Software EcosystemJournal First Track / Early Research Achievement (ERA) Track / Research Papers at M-2101 Chair(s): Chris Parnin Microsoft | ||
16:00 15mTalk | CapAssess: An Endeavor to Assess and Enhance Linux Capabilities Utilization Research Papers Jingzi Meng Institute of Information Engineering, Chinese Academy of Sciences, Yuewu Wang University of Chinese Academy of Sciences, Lingguang Lei Institute of Information Engineering, Chinese Academy of Sciences, Jiwu Jing University of Chinese Academy of Sciences, Pingjian Wang Institute of Information Engineering, Chinese Academy of Sciences, Chunjing Kou University of Chinese Academy of Sciences, Wang Peng University of Chinese Academy of Sciences | ||
16:15 7mTalk | Service Extraction from Object-Oriented Monolithic Systems: Supporting Incremental Migration Early Research Achievement (ERA) Track Soufyane Labsari Université Lille, CNRS, Centrale Lille, Inria, UMR 9189 - CRIStAL, Imen Sayar Univ. Lille, CNRS, Inria, Centrale Lille, UMR 9189 CRIStAL, F-59000 Lille, France, Nicolas Anquetil University of Lille, Lille, France, Benoit Verhaeghe Berger-Levrault, Anne Etien Université de Lille, CNRS, Inria, Centrale Lille, UMR 9189 –CRIStAL | ||
16:22 15mTalk | GitHub Marketplace for Automation and Innovation in Software Production Journal First Track Sk Golam Saroar York University, Waseefa Ahmed York University, Elmira Onagh York University, Maleknaz Nayebi York University | ||
16:37 15mTalk | Protect Your Secrets: Understanding and Measuring Data Exposure in VSCode Extensions Research Papers Pre-print |
18:00 - 22:00 | |||
18:00 4hDinner | Dinner Catering |
Fri 7 MarDisplayed time zone: Eastern Time (US & Canada) change
07:30 - 08:30 | |||
07:30 60mDay opening | Morning Mingle / Coffee and Networking Catering |
09:00 - 10:30 | Keynote 3: IVADOResearch Papers at Amphithéâtre Bernard Lamarre (C-631) Chair(s): Foutse Khomh Polytechnique Montréal | ||
09:00 10mTalk | IVADO Presentation Research Papers | ||
09:10 40mKeynote | Keynote 3: Advances and Challenges in Foundation Agents: From Brain-Inspired Intelligence to Evolutionary, Collaborative, and Safe Systems Research Papers Bang Liu DIRO & Mila, Université de Montréal | ||
09:50 40mTalk | Keynote 4: LLMs: Facts, Lies, Reasoning and Software Agents in the Real World Research Papers Chris Pal Polytechnique Montreal |
10:30 - 11:00 | |||
10:30 30mCoffee break | Break Catering |
11:00 - 12:30 | Change Management & Program ComprehensionReproducibility Studies and Negative Results (RENE) Track / Research Papers / Early Research Achievement (ERA) Track at L-1710 Chair(s): Masud Rahman Dalhousie University | ||
11:00 15mTalk | AdvFusion: Adapter-based Knowledge Transfer for Code Summarization on Code Language Models Research Papers Iman Saberi University of British Columbia Okanagan, Amirreza Esmaeili University of British Columbia, Fatemeh Hendijani Fard University of British Columbia, Chen Fuxiang University of Leicester | ||
11:15 15mTalk | EarlyPR: Early Prediction of Potential Pull-Requests from Forks Research Papers | ||
11:30 15mTalk | The Hidden Challenges of Merging: A Tool-Based Exploration Research Papers Luciana Gomes UFCG, Melina Mongiovi Federal University of Campina Grande, Brazil, Sabrina Souto UEPB, Everton L. G. Alves Federal University of Campina Grande | ||
11:45 7mTalk | On the Performance of Large Language Models for Code Change Intent Classification Early Research Achievement (ERA) Track Issam Oukay Department of Software and IT Engineering, ETS Montreal, University of Quebec, Montreal, Canada, Moataz Chouchen Department of Electrical and Computer Engineering, Concordia University, Montreal, Canada, Ali Ouni ETS Montreal, University of Quebec, Fatemeh Hendijani Fard University of British Columbia | ||
11:52 15mTalk | Revisiting Method-Level Change Prediction: Comparative Evaluation at Different Granularities Reproducibility Studies and Negative Results (RENE) Track Hiroto Sugimori School of Computing, Institute of Science Tokyo, Shinpei Hayashi Institute of Science Tokyo DOI Pre-print |
11:00 - 12:30 | Mining Software RepositoriesResearch Papers / Early Research Achievement (ERA) Track / Journal First Track / Reproducibility Studies and Negative Results (RENE) Track at L-1720 Chair(s): Brittany Reid Nara Institute of Science and Technology | ||
11:00 15mTalk | An Empirical Study of Transformer Models on Automatically Templating GitHub Issue Reports Research Papers Jin Zhang Hunan Normal University, Maoqi Peng Hunan Normal University, Yang Zhang National University of Defense Technology, China | ||
11:15 15mTalk | How to Select Pre-Trained Code Models for Reuse? A Learning Perspective Research Papers Zhangqian Bi Huazhong University of Science and Technology, Yao Wan Huazhong University of Science and Technology, Zhaoyang Chu Huazhong University of Science and Technology, Yufei Hu Huazhong University of Science and Technology, Junyi Zhang Huazhong University of Science and Technology, Hongyu Zhang Chongqing University, Guandong Xu University of Technology, Hai Jin Huazhong University of Science and Technology Pre-print | ||
11:30 7mTalk | Uncovering the Challenges: A Study of Corner Cases in Bug-Inducing Commits Early Research Achievement (ERA) Track | ||
11:37 15mTalk | A Bot Identification Model and Tool Based on GitHub Activity Sequences Journal First Track Natarajan Chidambaram University of Mons, Alexandre Decan University of Mons; F.R.S.-FNRS, Tom Mens University of Mons | ||
11:52 15mTalk | Does the Tool Matter? Exploring Some Causes of Threats to Validity in Mining Software Repositories Reproducibility Studies and Negative Results (RENE) Track Nicole Hoess Technical University of Applied Sciences Regensburg, Carlos Paradis No Affiliation, Rick Kazman University of Hawai‘i at Mānoa, Wolfgang Mauerer Technical University of Applied Sciences Regensburg |
14:00 - 15:00 | IMC2 - Cyber Security PanelResearch Papers at Amphithéâtre Bernard Lamarre (C-631) Chair(s): Mohammad Hamdaqa Polytechnique Montréal | ||
15:00 - 15:30 | |||
15:00 30mCoffee break | Break Catering |
15:30 - 17:00 | Software SecurityEarly Research Achievement (ERA) Track / Research Papers at L-1710 Chair(s): Sabbir M. Saleh University of Western Ontario | ||
15:30 15mTalk | Characterizing Logs in Vulnerability Reports: In-Depth Analysis and Security Implications Research Papers Yao Shu Wuhan University, Lianyu Zheng Wuhan University, Jinfu Chen Wuhan University, Jifeng Xuan Wuhan University | ||
15:45 15mTalk | Conan: Uncover Consensus Issues in Distributed Databases Using Fuzzing-driven Fault Injection Research Papers Haojia Huang Sun Yat-Sen Universty, Pengfei Chen Sun Yat-sen University, Guangba Yu Sun Yat-sen University, Haiyu Huang Sun Yat-sen University, Jia Chang Huawei, Jun Li Huawei, Jian Han Huawei | ||
16:00 15mTalk | Dissecting APKs from Google Play: Trends, Insights and Security Implications Research Papers Pedro Jesús Ruiz Jiménez University of Luxembourg, Jordan Samhi University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg | ||
16:15 15mTalk | WakeMint: Detecting Sleepminting Vulnerabilities in NFT Smart Contracts Research Papers Lei Xiao Sun Yat-sen University, Shuo Yang Sun Yat-sen University, Wen Chen Energy Development Research Institute, China Southern Power Grid Company Limited, Zibin Zheng Sun Yat-sen University | ||
16:30 7mTalk | On Categorizing Open Source Software Security Vulnerability Reporting Mechanisms on GitHub Early Research Achievement (ERA) Track Sushawapak Kancharoendee , Thanat Phichitphanphong , Chanikarn Jongyingyos Mahidol University, Brittany Reid Nara Institute of Science and Technology, Raula Gaikovina Kula Osaka University, Morakot Choetkiertikul Mahidol University, Thailand, Chaiyong Rakhitwetsagul Mahidol University, Thailand, Thanwadee Sunetnanta Mahidol University |
17:30 - 18:30 | |||
Unscheduled Events
Not scheduled Talk | Opening (Welcome from the GCs and PCs) Research Papers |
Accepted Papers
Call for Papers
The Research Track of the 32nd edition of the IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2025) invites high-quality submissions of papers describing original and unpublished research results. We encourage submissions describing various types of research, e.g., empirical, theoretical, and tool-oriented. The topics of the submissions should be of direct interest to the software analysis, evolution, and reengineering community. Topics of interest include, but are not limited to:
-AI for Software Engineering;
-Software Engineering for AI;
-Generative AI and LLM;
-Software Tools for Software Evolution and Maintenance;
-Software Analysis, Parsing, and Fact Extraction;
-Software Reverse Engineering and Reengineering;
-Program Comprehension;
-Software Evolution Analysis;
-Software Architecture Recovery and Reverse Architecting;
-Program Transformation and Refactoring;
-Mining Software Repositories and Software Analytics;
-Software Visualization;
-Software Reconstruction and Migration;
-Software Maintenance and Evolution;
-Program Repair;
-Software Release Engineering, Continuous Integration and Delivery;
-Empirical studies on all the above topics;
-Education related to all of the above topics;
-Legal aspects.
Special Issue
Authors of selected research papers accepted at SANER 2025 will be invited to submit revised, extended versions of their manuscripts for a special issue featured by Springer’s Empirical Software Engineering Journal (EMSE). The best papers from the conference will be awarded. More details on this matter will be shared soon.
Evaluation Criteria
Research papers will be reviewed by at least three members of the Program Committee. Submissions will be evaluated based on the following criteria:
-Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods;
-Significance: The extent to which the paper’s contributions are important with respect to open software engineering challenges;
-Novelty: The extent to which the contribution is sufficiently original and is clearly explained with respect to the state-of-the-art;
-Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions;
-Presentation: The extent to which the paper’s quality of writing meets the standards of SANER, including clear descriptions and explanations, appropriate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below.
Submission Instructions
Submitted papers must have been neither previously accepted for publication nor concurrently submitted for review in another journal, book, conference, or workshop. All submissions must come in PDF format and conform, at the time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt font, LaTEX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option. IEEE paper templates can be accessed from their official location. Also, papers must comply with the IEEE Policy on Authorship. All submissions must be in English. All papers must be submitted in PDF format through the web-based submission system https://easychair.org/conferences/?conf=saner2025. Submissions should not exceed 12 pages (the last 2 pages for references only) and should be uploaded electronically in PDF format via EasyChair. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Important note: SANER 2025 follows a full double-anonymous review process. To be compliant with the double-anonymous policy, submitted papers must adhere to the following rules (largely reused from ASE 2017 double-anonymous instructions):
-Author names and affiliations must be omitted;
-References to authors’ own related work must be in the third person. (For example, not We build on our previous work… but rather We build on the work of…);
-There may be cases in which the current submission is a clear follow-up of one of your previous works, and despite what was recommended in the previous point, reviewers will associate authorship of such a previous work with the current submission. In this case, you may decide to anonymize the reference itself at submission time. For example: based on previous results [10] .. where the reference is reported as [10] Anonymous Authors. Omitted per double-blind reviewing. In doing so, however, please make sure that the SANER 2025 submission is self-contained and that its content can be reviewed and understood without accessing the previous paper;
-Do not include acknowledgments of people, grants, organizations, etc. that would give away your identity. You may, of course, add these acknowledgments in the camera-ready version;
-If you use an identifiable naming convention for your work, such as a project name, use a different name for your submission, which you may indicate has been changed for double-blind reviewing. This includes names that may unblind individual authors and their institutions. For example, if your project is called GoogleDeveloperHelper, which makes it clear the work was done at Google, for the submission version, use the name DeveloperHelper or BigCompanyDeveloperHelper instead;
-Avoid revealing the institution affiliations of authors or at which the work was performed. For example, if the evaluation includes a user study conducted with undergraduates from the CS 101 class that you teach, you might say “The study participants consist of 200 students in an introductory CS course”. You can of course add the institutional information to the camera-ready. Similar suggestions apply to work conducted in specific organizations (e.g., industrial studies). In such cases, avoid mentioning the organization’s name. Instead, you may refer to the organization as Org or Company. When appropriate and when this does not help too much in revealing the company’s name, you might mention the context (e.g., financial organization, videogame development company, etc.);
-Avoid linking directly to code repositories or tool deployments which can reveal your identity. Whenever possible, please use the EasyChair additional material field to submit a .zip or .tgz file including additional material. This is of course possible for small attachments. In other cases, you may post anonymized links (with a warning that the following link may reveal authors’ identities), including links to anonymized code or deployments. When creating such repositories, a good practice can be asking somebody in your team to test the anonymization of the repository and its content. If the anonymization is difficult to achieve and you still want to provide the availability of data/tools, you can simply state that you will link to the code or deployment in the camera-ready version. Program committee members are asked to keep into account the double-blind policy when reviewing papers, and therefore not require full availability of artifacts at submission time.
-SANER 2025 believes in open science and that open science aids reproducibility and replicability. To improve these factors, we encourage authors to consider disclosing the source code and datasets used within their paper, including extractors, survey data, etc. By sharing this information your contribution will be more impactful because others can follow up on your work and cite it. Please consider using Zenodo, Figshare, or other services that provide DOIs and allow anonymous and semi-anonymous methods of archiving software and datasets. Archive.org is recommended for the dissemination of larger datasets. These datasets, anonymized through Zenodo and other services, should be linked within the paper itself. Instructions for double-blind friendly uploading of datasets are available here: https://ineed.coffee/post/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance.html.
-To submit your paper, please use the same submission link. After clicking on “Make a New Submission,” you will be presented with a list of all available tracks. Be sure to select the correct track (e.g., Short Papers and Posters Track), as illustrated in the attached screenshot.
Important Dates
-Abstract submission deadline: October 04, 2024 AoE
-Paper submission deadline: October 13, 2024 AoE
-Notifications: November 29, 2024 AoE
-Camera Ready: December 27, 2024 AoE