Registered Report Track SANER 2026
This program is tentative and subject to change.
Wed 18 MarDisplayed time zone: Athens change
09:00 - 09:30 | |||
11:00 - 12:30 | Session 1B - LLMs for Testing and Automated RepairResearch Track / Reproducibility Studies and Negative Results (RENE) Track / Short Papers and Posters Track / Early Research Achievement (ERA) Track / Tool Demo Track at Megaron Beta | ||
11:00 15mTalk | HieraTest: Hierarchical Dependency–Driven Framework with Multi-Strategy Repair for LLM-based Unit Test Generation Research Track Weichang Liu Zhejiang University, Junwei Zhang Zhejiang University, Xiaochun Zhu Insigma Hengtian Software LTD, Bo Zhou Northeastern University | ||
11:15 15mTalk | TestForge: A Benchmarking Framework for LLM-Based Test Case Generation Research Track Marco Vieira University of North Carolina at Charlotte, Bhavain Shah University of North Carolina at Charlotte, Priyam Ashish Shah University of North Carolina at Charlotte, Vineet Khadloya Salesforce | ||
11:30 15mTalk | RM -RF: Reward Model for Run-Free Unit Test Evaluation Research Track Elena Bruches Siberian Neuronets LLC, Daniil Grebenkin Siberian Neuronets LLC, Mikhail Klementev Siberian Neuronets LLC, Vadim Alperovich T-Technologies, Roman Derunets Siberian Neuronets LLC, Dari Baturova Siberian Neuronets LLC, Georgiy Mkrtchyan T-Technologies, Oleg Sedukhin Siberian Neuronets LLC, Ivan Bondarenko Novosibirsk State University, Nikolay Bushkov T-Technologies, Stanislav Moiseev T-Technologies Pre-print | ||
11:45 15mTalk | Can We Classify Flaky Tests Using Only Test Code? An LLM-Based Empirical Study Reproducibility Studies and Negative Results (RENE) Track Alexander Berndt , Vekil Bekmyradov SAP, Rainer Gemulla University of Mannheim, Marcus Kessel University of Mannheim, Thomas Bach SAP, Sebastian Baltes Heidelberg University | ||
12:00 7mTalk | Integrating A Large Language Model Into Search-based Automated Program Repair Short Papers and Posters Track | ||
12:07 7mTalk | RisConFix: LLM-based Automated Repair of Risk-Prone Drone Configurations Short Papers and Posters Track Liping Han Nanjing University of Posts and Telecommunications, Tingting Nie Nanjing University of Posts and Telecommunications, Le Yu Nanjing University of Posts and Telecommunications, Mingzhe Hu Nanjing University of Posts and Telecommunications, Tao Yue Beihang University | ||
12:14 7mTalk | Leveraging Mutation Analysis for LLM-based Repair of Quantum Programs Early Research Achievement (ERA) Track Chihiro Yoshida The University of Osaka, Yuta Ishimoto Kyushu University, Olivier Nourry The University of Osaka, Masanari Kondo Kyushu University, Makoto Matsushita The University of Osaka, Yasutaka Kamei Kyushu University, Yoshiki Higo Osaka University | ||
12:21 7mTalk | AI-Assisted Semantic Modeling of Languages for Symbolic Execution Driven Unit Test Generation Tool Demo Track Mokshith Reddy Tanguturi , Atul Kumar IBM Research India, Nandakishore S Menon IBM Research India, Sridhar Chimalakonda Indian Institute of Technology Tirupati | ||
14:00 - 15:30 | Session 2B - Security, Vulnerabilities, and MisusesResearch Track / Industrial Track at Megaron Beta | ||
14:00 15mTalk | What You Trust Is Insecure: Demystifying How Developers (Mis)Use Trusted Execution Environments in Practice Research Track Yuqing Niu , Jieke Shi Singapore Management University, Ruidong Han Singapore Management University, Ye Liu Singapore Management University, Chengyan Ma Singapore Management University, Yunbo Lyu Singapore Management University, David Lo Singapore Management University Pre-print | ||
14:15 15mTalk | From Patterns to Precision: LLM-Guided Detection of Signature Verification Flaws in Smart Contracts Research Track | ||
14:30 15mTalk | SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports Research Track Sogol Masoumzadeh Mcgill University, Yufei Li McGill University, Shane McIntosh University of Waterloo, Daniel Varro Linköping University / McGill University, Lili Wei McGill University | ||
14:45 15mTalk | MLmisFinder: A Specification and Detection Approach of Machine Learning Service Misuses Research Track Hadil Ben Amor Ecole de Technologie Supérieure, Niruthiha Selvanayagam Ecole de Technologie Supérieure, Manel Abdellatif École de Technologie Supérieure, Taher A. Ghaleb Trent University, Naouel Moha École de Technologie Supérieure (ETS) | ||
15:00 15mTalk | VulTerminator: Bringing Back Template-Based Automated Repair for Fixing Java Vulnerabilities Research Track Quang-Cuong Bui Hamburg University of Technology, Emanuele Iannone Hamburg University of Technology, Riccardo Scandariato Hamburg University of Technology Pre-print | ||
15:15 15mTalk | From Legacy Designs to Vulnerability Fixes: Understanding SAST Adoption in Non-Technological Companies Industrial Track Luis Henrique Vieira Amaral University of Brasília, Brazil, Michael Schlichtig Heinz Nixdorf Institut, Paderborn University, Wagner Emanuel , Joilton Almeida de Jesus , Carine Ferreira , Jérôme Kempf , Rodrigo Bonifácio Informatics Center - CIn/UFPE and Computer Science Department / University of Brasília, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM, Laerte Peotta University of Brasília, Brazil, Gustavo Pinto Zup Innovation & UFPA, Márcio Ribeiro Federal University of Alagoas, Brazil | ||
14:00 - 15:30 | Session 2A - Refactoring, Code Smells, and Software MaintenanceResearch Track / Early Research Achievement (ERA) Track / Journal First Track / Industrial Track / Short Papers and Posters Track at Panorama | ||
14:00 15mTalk | An Empirical Analysis of Code Clones in GitHub Actions Workflows Research Track Guillaume Cardoen University of Mons, Tom Mens University of Mons, Alexandre Decan University of Mons; F.R.S.-FNRS | ||
14:15 15mTalk | Reusing Legacy Code in Wasm: Key Challenges of Compilation and Code Semantics Preservation Research Track Sara Baradaran University of Southern California, Liyan Huang University of Southern California, Mukund Raghothaman University of Southern California, Weihang Wang University of Southern California Pre-print | ||
14:30 15mTalk | Cold-Start Anti-Patterns and Refactorings in Serverless Systems: An Empirical Study Research Track SYED SALAUDDIN MOHAMMAD TARIQ University of Michigan - Dearborn, Foyzul Hassan University of Michigan at Dearborn, Amiangshu Bosu Wayne State University, Probir Roy University of Michigan at Dearborn | ||
14:45 15mTalk | Prescriptive procedure for manual code smell annotation Journal First Track Simona Prokić Faculty of Technical Sciences, University of Novi Sad, Nikola Luburić Faculty of Technical Sciences, University of Novi Sad, Jelena Slivka Faculty of Technical Sciences, University of Novi Sad, Aleksandar Kovačević Faculty of Technical Sciences, University of Novi Sad | ||
15:00 15mTalk | Transpilation using Recursive Rewrite Rules: From Legacy to Maintainable Code Industrial Track Tristan Albers , Jos Hegge , Pierre van de Laar TNO-ESI, Niels Brouwers , Paul Nelissen , Wilbert Alberts , George Azis , Theo Baan , Danny Handoko , Quint van der Linden | ||
15:15 7mTalk | Evaluating Cross-Language Transfer for Refactoring Detection with Large Language Models Early Research Achievement (ERA) Track Siyuan Liu Nara Institute of Science and Technology, Nabhan Suwanachote Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Brittany Reid Nara Institute of Science and Technology, Hajimu Iida Nara Institute of Science and Technology | ||
15:22 7mTalk | Design Pattern-based Code Refactoring with LLMs Short Papers and Posters Track Bartolomeo Zisa Università di Pisa, Lucia Passaro University of Pisa, Jacopo Soldani University of Pisa, Italy | ||
16:00 - 17:30 | Session 3B - Evolution and Security of Mobile SystemsResearch Track / Short Papers and Posters Track at Megaron Beta | ||
16:00 15mTalk | Relocate and Emulate: Re-Hosting Android’s Application Layer Research Track Thomas Sutter University of Bern, Timo Kehrer University of Bern, Marc Rennhard Zurich University of Applied Sciences, Bernhard Tellenbach Armasuisse Cyber-Defence Campus | ||
16:15 15mTalk | Scratching the Iceberg: Unveiling the Outdated Third-Party Native Libraries in Android Apps Research Track Shiyang Zhang Tianjin University, Chengwei Liu Nanyang Technological University, Sen Chen Nankai University, Lyuye Zhang Nanyang Technological University, Yang Liu Nanyang Technological University | ||
16:30 15mTalk | Dialing Danger: Large-Scale Mining and Risk Assessment of Android Secret Codes in OEM Firmware Research Track Ruoyan Lin Shandong University, Shishuai Yang Zhengzhou University of Aeronautics, Fenghao Xu Southeast University, Wenrui Diao Shandong University | ||
16:45 15mTalk | InstruMate: A Systematic Framework for Assessing Android App Repackaging Resilience Research Track Leandro de Souza Oliveira , Rodrigo Bonifácio Informatics Center - CIn/UFPE and Computer Science Department / University of Brasília, Joanna C. S. Santos University of Notre Dame, Rui Rua New York University Abu Dhabi | ||
17:00 15mTalk | An Empirical Study of Privacy Leakage Vulnerability in Third-Party Android Logs Libraries Research Track Yixi Zhao University of Waterloo, Kundi Yao Ontario Tech University, Yiming Tang Rochester Institute of Technology, Weiyi Shang University of Waterloo | ||
17:15 7mTalk | AMF-GR: Adaptive Matrix Factorization and Graph Fusion for Android Library Recommendation Short Papers and Posters Track Abhinav Jamwal Dept. of Computer Science & Engineering, Indian Institute of Technology, Roorkee, India, Sandeep Kumar Dept. of Computer Science & Engineering, Indian Institute of Technology, Roorkee, India | ||
17:22 7mTalk | BUPLinker: Bridging Users and Developers in Mobile Application Evolution Short Papers and Posters Track Ayana Uematsu Waseda University, Hironori Washizaki Waseda University, Naoyasu Ubayashi Waseda University, Masanari Kondo Kyushu University, Juichi Takahashi AGEST, Inc, Yohei Takagi AGEST Inc. | ||
Thu 19 MarDisplayed time zone: Athens change
11:00 - 12:30 | Session 4B - Vulnerability Detection and LocalizationEarly Research Achievement (ERA) Track / Research Track / Short Papers and Posters Track / Industrial Track at Megaron Beta | ||
11:00 15mTalk | InterGNN: Using Context for Detecting Inter-procedural Vulnerabilities Industrial Track Sebastian Sierra Bosch Research, Jochen Quante Bosch Research, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM | ||
11:15 15mTalk | VFLAGENT: A Chain-of-Thought-Guided Multi-Agent Collaboration Framework for Vulnerable Function Localization Research Track Minghe Bai Nanjing University of Posts and Telecommunications, Wei Chen Institute of Software at Chinese Academy of Sciences, Shuo Li Nankai University, China;Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences;, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences | ||
11:30 15mTalk | VulCMS: A Vulnerability Detection System Based on Centrality Analysis and Multi-Scale Attention Research Track Wenjing Cai School of Cybersecurity, Northwestern Polytechnical University, Jianfei Wang School of Software, Northwestern Polytechnical University, Jianfei Wang School of Software, Northwestern Polytechnical University, Lipeng Gao School of Software, Northwestern Polytechnical University | ||
11:45 15mTalk | Towards Secure Oracle Usage: Understanding and Detecting Oracle Vulnerabilities in Smart Contracts Research Track Ziming Chen Peking University, Yue Li Peking University, Jiashuo Zhang Peking University, China, Jianbo Gao Peking University, Che Wang Peking University, China, Jiakun Hao Peking University, Anming Xie Peking University, Zhi Guan Peking University, Zhong Chen | ||
12:00 7mTalk | Synergizing LLM-Driven Semantic Reasoning with Assertion-Guided Analysis for Enhanced Vulnerability Detection Early Research Achievement (ERA) Track Ying Wang Xidian University, Jie Su Xidian University, Cheng Wen Xidian University, rong wang , Cong Tian Xidian University, Zhenhua Duan Xidian University, Shengchao Qin Xidian University Media Attached | ||
12:07 7mTalk | Toward Reliable Detection of Malicious eBPF: Construction and Validation of a Large-Scale Bytecode Dataset Short Papers and Posters Track Yujin Kwon Duksung Women’s University, Yujeong Choi Duksung Women’s University, Dohwan Ji Hanbat National University, Jinyoung Kim Sungkyunkwan University | ||
12:14 7mTalk | Towards Online Malware Detection using Process Resource Utilization Metrics Short Papers and Posters Track Themistoklis Diamantopoulos Electrical and Computer Engineering Dept, Aristotle University of Thessaloniki, Dimosthenis Natsos Aristotle University of Thessaloniki, Andreas Symeonidis Electrical and Computer Engineering Dept., Aristotle University of Thessaloniki Pre-print | ||
12:21 8mTalk | From Data Leak to Secret Misses: The Impact of Data Leakage on Secret Detection Models Short Papers and Posters Track | ||
11:00 - 12:30 | |||
11:00 15mTalk | GDPO: Dual Learning for Self-Supervised Code Summarization in the Era of Large Language Models Research Track Chen Xiao , Wang Shuwei Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences, Zhang Weize Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences, Jiang Zhengwei Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences, Wang Qiuyun Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences | ||
11:15 15mTalk | Mind the Merge: Evaluating the Effects of Token Merging on Pre-trained Models for Code Research Track Mootez Saad Dalhousie University, Hao Li Queen's University, Tushar Sharma Dalhousie University, Ahmed E. Hassan Queen’s University | ||
11:30 15mTalk | CONCORD: A DSL for Generating Simplified and Scalable Graph-Based Code Representations Research Track Pre-print | ||
11:45 15mTalk | Combining Static Code Analysis and Large Language Models Improves Correctness and Performance of Algorithm Recognition Research Track Denis Neumüller Ulm University, Sebastian Boll Ulm University, David Schüler Ulm University, Matthias Tichy Ulm University | ||
12:00 15mTalk | A Multi-Modal Retrieval-Augmented Framework for Compiler Backend Generation with LLMs Research Track Ming Zhong SKLP, Institute of Computing Technology, CAS, Fang Lv Institute of Computing Technology, Chinese Academy of Sciences, Hongna Geng , Xin Sun , Lulin Wang , Lulin Wang , Huimin Cui Institute of Computing Technology, Chinese Academy of Sciences, Xiaobing Feng ICT CAS | ||
12:15 7mTalk | Static Analysis assisted Knowledge Graph based Automatic Functionality Discovery for Mainframe Applications Tool Demo Track Sasaank Janapati , Atul Kumar IBM Research India, Nandakishore S Menon IBM Research India, Sridhar Chimalakonda Indian Institute of Technology Tirupati | ||
14:00 - 15:30 | Session 5B - Techniques and Tools for Testing and VerificationJournal First Track / Research Track / Tool Demo Track / Early Research Achievement (ERA) Track at Megaron Beta | ||
14:00 15mTalk | STELLAR: A Search-Based Testing Framework for Large Language Model Applications Research Track Lev Sorokin BMW Group, Technical University of Munich, Ivan Vasilev BMW Group, Technische Universität München, Germany, Ken Friedl BMW Group, Andrea Stocco Technical University of Munich, fortiss Pre-print File Attached | ||
14:15 15mTalk | Assessing Large Language Models in Verifying Concurrent Programs Research Track Ridhi Jain Technology Innovation Institute (TII), Abu Dhabi, UAE, Rahul Purandare University of Nebraska-Lincoln | ||
14:30 15mTalk | Understanding the Effectiveness of Mutators in Mutation-based Protocol Fuzzing Research Track Xiyuan Zhang East China Normal University, Jiayi Jiang East China Normal University, Yiutak Choi East China Normal University, Ting Su East China Normal University, Haiying Sun East China Normal University, Chengcheng Wan East China Normal University, Geguang Pu East China Normal University, China | ||
14:45 15mTalk | Test Amplification for REST APIs Using "Out-of-the-box" Large Language Models Journal First Track Tolgahan Bardakci University of Antwerp and Flanders Make, Serge Demeyer University of Antwerp and Flanders Make vzw, Mutlu Beyazıt University of Antwerp and Flanders Make vzw | ||
15:00 7mTalk | Preserving Concurrency-Revealing Seeds in Fuzzing of Concurrent Programs via Tuple-Based Coverage Evaluation Early Research Achievement (ERA) Track Junjie Huang Xidian University, Cheng Wen Xidian University, Jie Su Xidian University, Zhiwu Xu Shenzhen University, Bin Yu Xidian University, Shengchao Qin Xidian University, Cong Tian Xidian University Media Attached | ||
15:07 7mTalk | CV: Interactive Visualization of Verification Results Tool Demo Track Vitalii Mordan Trusted AI Research Center, Vadim Mutilin ISP RAS Research Center for Trusted Artificial Intelligence Pre-print Media Attached | ||
15:14 7mTalk | MuSe: a Mutation Testing Plugin for the Remix IDE Tool Demo Track Gerardo Iuliano University of Salerno, Daniele Carangelo , Carmine Calabrese , Dario Di Nucci University of Salerno | ||
14:00 - 15:30 | Session 5C - Specification-Driven Code and Model DevelopmentIndustrial Track / Early Research Achievement (ERA) Track / Short Papers and Posters Track / Research Track / Registered Report Track at Megaron Gamma | ||
14:00 15mTalk | Requirement Formalization using Large Language Models Research Track Zhiyuan Hu National University of Defense Technology, Wei Ma Singapore Management University, Qiang Wang Academy of Military Sciences, Lingxiao Jiang Singapore Management University, Dongsheng Li National University of Defense Technology | ||
14:15 15mTalk | Understanding Specification-Driven Code Generation with LLMs: An Empirical Study Design Registered Report Track Giovanni Rosa Universidad Rey Juan Carlos, David Moreno-Lumbreras Universidad Rey Juan Carlos, Gregorio Robles Universidad Rey Juan Carlos, Jesus M. Gonzalez-Barahona Universidad Rey Juan Carlos Pre-print | ||
14:30 15mTalk | AI-Assisted Requirements Traceability for Large-Scale Optical Network Systems: An Industrial Experience Report Industrial Track | ||
14:45 15mTalk | From Textual Descriptions to Code: A Filtering Approach for Locating Business Rules Industrial Track Nour Ayachi Univ. Lille, Inria, CNRS, Centrale Lille, UMR 9189 CRIStAL F-59000 Lille, France, Benoit Verhaeghe Berger-Levrault, Christopher Fuhrman École de technologie supérieure, Nicolas Anquetil University of Lille, Lille, France | ||
15:00 7mTalk | Generating User Clones from Questionnaires: A Lightweight Approach to Requirements Elicitation Short Papers and Posters Track Mai Hirabayashi Waseda University, Hironori Washizaki Waseda University, Naoyasu Ubayashi Waseda University, Juichi Takahashi AGEST, Inc, Yohei Takagi AGEST Inc. | ||
15:07 7mTalk | How Well Does Knowledge Injection Enhance LLM-aided Formal Protocol Modeling? Early Research Achievement (ERA) Track Yajia Lin Xidian University, Jie Su Xidian University, Cheng Wen Xidian University, rong wang , Cong Tian Xidian University, Zhenhua Duan Xidian University, Shengchao Qin Xidian University Media Attached | ||
15:14 7mTalk | LLM Driven Business Rule Extraction from Enterprise Applications Early Research Achievement (ERA) Track Shrishti Pradhan TCS Research, Aishwarya Malvade TCS Research, Raveendra Kumar Medicherla TCS Research, Tata Consultancy Services, Manasi Patwardhan TCS Research | ||
15:21 7mTalk | SQL3M: Token Efficient Text-to-SQL Generation Short Papers and Posters Track Ibrahim Ücelehan Johannes Gutenberg University Mainz, Alina Geiger Johannes Gutenberg University Mainz, Dominik Sobania University of Duisburg-Essen, Germany | ||
14:00 - 15:30 | Session 5A - Robustness and Reliability of LLM Code GenerationShort Papers and Posters Track / Research Track / Tool Demo Track / Early Research Achievement (ERA) Track at Panorama | ||
14:00 7mTalk | Failure-Aware Enhancements for Large Language Model (LLM) Code Generation: An Empirical study on Decision Framework Short Papers and Posters Track Jianru Shen University of Montana, Zedong Peng University of Montana, Lucy Owen University of Montana | ||
14:07 15mTalk | Progressively Mitigating API Hallucination in LLM-Generated Code via Knowledge Graph Reasoning Research Track Yuxuan Li Peking University, Zexiong Ma Peking University, Yanzhen Zou Peking University, Yue Wang Peking University, Lihan Yang Peking University, Bing Xie Peking University | ||
14:22 15mTalk | Programming Language Confusion: When Code LLMs Can't Keep their Languages Straight Research Track Micheline Bénédicte MOUMOULA University of Luxembourg, NIKIEMA Beninwende Serge Lionel University of Luxembourg, Abdoul Kader Kaboré University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg | ||
14:37 15mTalk | Can LLMs Keep Up with Library Changes? An Exploratory Study on LLM-Generated Code Research Track Xiangrong Lin Zhejiang University, Jiakun Liu Harbin Institute of Technology, Lingfeng Bao Zhejiang University | ||
14:52 15mTalk | Leveraging Enhanced Test-Driven Development for Accurate Code Generation in LLMs Research Track Rui Zhang School of Artificial Intelligence, China University of Geosciences (Beijing), Weijie Shan School of Artificial Intelligence, China University of Geosciences (Beijing), Teng Long School of Artificial Intelligence, China University of Geosciences (Beijing), Ce Fu School of Artificial Intelligence, China University of Geosciences(Beijing) | ||
15:07 7mTalk | When RAG Lies: Link-Injection Knowledge-Base Poisoning in Code Generation Short Papers and Posters Track Nguyen Trung Hieu Hanoi University of Science and Technology, Trung-Hieu Nguyen Hanoi University of Science and Technology, Hanoi, Vietnam, Trong-Nghia Be University of Engineering and Technology, Bao-Huy Hoang Hanoi University of Science and Technology,, Anh M. T. Bui Hanoi University of Science and Technology | ||
15:14 7mTalk | Grounding Generative AI in Software Engineering: Are We There Yet? Early Research Achievement (ERA) Track Mootez Saad Dalhousie University, José Antonio Hernández López Department of Computer Science and Systems, University of Murcia, Boqi Chen McGill University, Neil Ernst University of Victoria, Daniel Varro Linköping University / McGill University, Tushar Sharma Dalhousie University Pre-print | ||
15:21 7mTalk | MutEval: NL-PL Prompt Mutation Framework for Robustness Evaluation of Code LLMs Tool Demo Track Pre-print Media Attached | ||
Fri 20 MarDisplayed time zone: Athens change
11:00 - 12:30 | Session 6B - Program Analysis Symbolic Execution and Root Cause AnalysisResearch Track / Reproducibility Studies and Negative Results (RENE) Track / Journal First Track / Early Research Achievement (ERA) Track at Megaron Beta | ||
11:00 15mTalk | ProfRCA: LLM-Enabled Fine-grained Root Cause Analysis with Continuous Profiling Data Research Track Siyuan Ye School of Computer Science and Engineering, Sun Yat-sen University, Gou Tan School of Systems Science and Engineering, Sun Yat-sen University, Guangzhou, China, Wanqi Yang Sun Yat-Sen University, Pengfei Chen Sun Yat-sen University | ||
11:15 15mTalk | Path-Optimal Symbolic Execution of Heap-Manipulating Programs Research Track Pietro Braione University of Milano-Bicocca, Giovanni Denaro University of Milano - Bicocca, Luca Guglielmo Università degli Studi di Milano-Bicocca | ||
11:30 15mTalk | Symbolic Analysis for Repairing Bugs in Concurrent Persistent-Memory Programs Research Track Tooba Khan University of Southern California, Srivatsan Ravi University of Southern California, Chao Wang University of Southern California | ||
11:45 15mTalk | Modular unification of unilingual pointer analyses to multilingual FFI-based programs Journal First Track Jyoti Prakash University of Southern Denmark, Abhishek Tiwari University of Southern Denmark, Christian Hammer University of Passau | ||
12:00 15mTalk | Static Analysis Traces can help Dynamic Symbolic Execution: a Replication Study Reproducibility Studies and Negative Results (RENE) Track Sriteja Kummita Paderborn University, Fabian Schiebel Heinz Nixdorf Institute, Paderborn University, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM, Miao Miao The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas | ||
12:15 7mTalk | Towards Analyzing N-language Polyglot Programs Early Research Achievement (ERA) Track Jyoti Prakash University of Southern Denmark, Abhishek Tiwari University of Southern Denmark, Mikkel Baun Kjærgaard University of Southern Denmark | ||
11:00 - 12:30 | Session 6A - Tools and Techniques for Effective Software DevelopmentIndustrial Track / Journal First Track / Tool Demo Track / Research Track at Panorama | ||
11:00 15mTalk | How Natural Language Proficiency Shapes GenAI Code for Software Engineering Tasks Journal First Track Ruksit Rojpaisarnkit Nara Institute of Science and Technology, Youmei Fan Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology, Raula Gaikovina Kula The University of Osaka | ||
11:15 15mTalk | Data Catalog Tools: A Systematic Multivocal Literature Review Journal First Track Marco Tonnarelli JADS - TU/e, Indika Kumara Tilburg University, Stefan Driessen JADS, Tilburg University, Damian Andrew Tamburri University of Sannio - JADS/NXP Semiconductors, Willem-Jan van den Heuvel JADS, Tilburg University, Patrick Oor NXP Semiconductors | ||
11:30 15mTalk | On the Practical Adoption of a Static Performance Anti-Pattern Detector: An Industrial Case Study Industrial Track Lizhi Liao University of Guelph, Weiyi Shang University of Waterloo, Catalin Sporea ERA Environmental Management Solutions, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions | ||
11:45 15mTalk | Multi-CoLoR: Context-Aware Localization and Reasoning across Multi-Language Codebases Industrial Track Indira Vats University of Toronto; Advanced Micro Devices (AMD), Sanjukta De Advanced Micro Devices, Subhayan Roy , Saurabh Bodhe , Lejin Varghese , Max Kiehn , Yonas Bedasso Advanced Micro Devices, Marsha Chechik University of Toronto Pre-print | ||
12:00 15mTalk | Diagram-Aware Automatic Review of Software Design Documents Using Multimodal Large Language Models Industrial Track | ||
12:15 7mTalk | Source Code-Driven GDPR Documentation: Supporting RoPA with Assessor View Tool Demo Track Mugdha Khedkar Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institut, Paderborn University, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM Pre-print Media Attached | ||
12:22 7mTalk | RefineID: A Developer-Centric IDE Assistant for Better Identifiers Tool Demo Track | ||
14:00 - 15:30 | Session 7B - Software Architecture, Dependencies, and Industry InnovationJournal First Track / Research Track at Megaron Beta | ||
14:00 15mTalk | Detecting and removing bloated dependencies in CommonJS packages Journal First Track Yuxin Liu KTH Royal Institute of Technology, Deepika Tiwari KTH Royal Institute of Technology, Cristian Bogdan KTH Royal Institute of Technology, Benoit Baudry Université de Montréal | ||
14:15 15mTalk | Beyond Lexical: Functional Semantics and Fusion for Precise Architecture Recovery Research Track Chunguang Zhang Southeast University, Bixin Li Southeast University, Yan Xiao Sun Yat-sen University | ||
14:45 15mTalk | Innovating Industry With Research: eknows and Sysparency Journal First Track Verena Geist Software Competence Center Hagenberg GmbH, Michael Moser Software Competence Center Hagenberg GmbH, Josef Pichler University of Applied Sciences Upper Austria, Florian Schnitzhofer Sysparency GmbH | ||
15:00 15mTalk | Industry 4.0/IIoT Platforms for manufacturing systems - A systematic review contrasting the scientific and the industrial side Journal First Track Holger Eichelberger University of Hildesheim, Christian Sauer University of Hildesheim, Amir Shayan Ahmadian University of Koblenz, Christian Kröher University of Hildesheim | ||
15:30 - 16:00 | |||
16:00 - 16:10 | |||
Accepted Papers
| Title | |
|---|---|
| A Bug is Being Born: How Close Are We? A Time Sensitive Forecasting Approach Registered Report Track | |
| Empirical Characterization of Logging Smells in Machine Learning Code. Registered Report Track | |
| The Invisible Hand of AI Libraries Shaping Open Source Projects and Communities Registered Report Track | |
| Understanding Specification-Driven Code Generation with LLMs: An Empirical Study Design Registered Report Track Pre-print | |
| Using Small Language Models to Reverse-Engineer Machine Learning Pipelines Structures Registered Report Track |
Authors Guide
Please, contact the SANER 2026 RR track chairs with any questions, feedback, or requests for clarification. Specific analysis approaches mentioned below are intended as examples, not mandatory components.
- Title (required)
Provide the working title of your study. It may be the same title that you submit for publication of your final manuscript, but it is not mandatory
Example: Should your family travel with you on the enterprise? Subtitle (optional): Effect of accompanying families on the work habits of crew members
- Authors (required)
At this stage, we believe that a single anonymous review is most productive
III. Structured Abstract (required) The abstract should describe the following in 200 words or so:
-Background/Context: What is your research about? Why are you doing this research, why is it interesting?
Example: “The enterprise is the flag ship of the federation, and it allows families to travel onboard. However, there are no studies that evaluate how this affects the crew members.”
-Objective/Aim: What exactly are you studying/investigating/evaluating? What are the objects of the study? We welcome both confirmatory and exploratory types of studies.
Example (Confirmatory): We evaluate whether the frequency of sick days, the work effectiveness and efficiency differ between science officers who bring their family with them, compared to science officers who are serving without their family.
Example (Exploratory): We investigate the problem of frequent Holodeck use on interpersonal relationships with an ethnographic study using participant observation, in order to derive specific hypotheses about Holodeck usage.
-Method: How are you addressing your objective? What data sources are you using?
Example: We conduct an observational study and use a between subject design. To analyze the data, we use a t-test or Wilcoxon test, depending on the underlying distribution. Our data comes from computer monitoring of Enterprise crew members.
- Introduction
Give more details on the bigger picture of your study and how it contributes to this bigger picture. An important component of phase 1 review is assessing the importance and relevance of the study questions, so be sure to explain this.
- Hypotheses (required for confirmatory study) or research questions
Clearly state the research hypotheses that you want to test with your study, and a rationalization for the hypotheses.
Example:
-Hypothesis: Science officers with their family on board have more sick days than science officers without their family.
-Rationale: Since toddlers are often sick, we can expect that crew members with their family onboard need to take sick days more often.
- Variables (required for confirmatory study)
-Independent Variable(s) and their operationalization
-Dependent Variable(s) and their operationalization (e.g., time to solve a specified task)
-Confounding Variable(s) and how their effect will be controlled (e.g., species type (Vulcan, Human, Tribble) might be a confounding factor; we control for it by separating our sample additionally into Human/Non-Human and using an ANOVA (normal distribution) or Friedman (non-normal distribution) to distill its effect).
For each variable, you should give: – name (e.g., presence of family) – abbreviation (if you intend to use one) – description (whether the family of the crew members travels on board) – scale type (nominal: either the family is present or not) – operationalization (crew members without family on board vs. crew members with family onboard)
VII. Participants/Subjects/Datasets (required)
Describe how and why you select the sample. When you conduct a meta-analysis, describe the primary studies / work on which you base your meta-analysis.
Example: We recruit crew members from the science department on a voluntary basis. They are our targeted population.
VIII. Execution Plan (required)
Describe the experimental setting and procedure. This includes the methods/tools that you plan to use (be specific on whether you developed it (and how) or whether it is already defined), and the concrete steps that you plan to take to support/reject the hypotheses or answer the research questions.
Example: Each crew member needs to sign the informed consent and agreement to process their data according to GDPR. Then, we conduct the interviews. Afterwards, participants need to complete the simulated task.
Examples:
Confirmatory: https://osf.io/5fptj/ – Do Explicit Review Strategies Improve Code Review Performance?
Exploratory: https://osf.io/kfu9t – The Impact of Dynamics of Collaborative Software Engineering on Introverts: A Study Protocol https://osf.io/acnwk – Large-Scale Manual Validation of Bugfixing Changes
Further reading: Ernst, N.A., Baldassarre, M.T. Registered reports in software engineering. Empir Software Eng 28, 55 (2023). https://doi.org/10.1007/s10664-022-10277-5
Call for Papers
In 2024, SANER started the Registered Reports (RR) Track in conjunction with the Empirical Software Engineering journal (EMSE). The 33rd edition of the International Conference on Software Analysis, Evolution, and Reengineering (SANER 2026) will again feature a Registered Reports Track. RR for SANER is directed towards studies that target topics related to the conference (check the Research Track for details on topics).
The RR track of SANER 2026 has two goals:
- to prevent HARKing (hypothesizing after the results are known) for empirical studies,
- to provide early feedback to authors on their initial study design
For papers submitted to the RR track, methods and proposed analyses are reviewed prior to execution. Pre-registered studies follow a two-step process:
- Stage 1:A report is submitted that describes the planned study. The submitted report is evaluated by the reviewers of the RR track of SANER 2026. Authors of accepted pre-registered studies will be given the opportunity to present and discuss their work at SANER.
- Stage 2:Once a report has passed Stage 1, the study will be conducted, and actual data collection and analysis will take place. The results may also be negative! The full paper is submitted for review to EMSE, by the fixed deadline.
See the associated Author’s Guide.
Paper Types, Evaluation Criteria, and Acceptance Types
The RR track of SANER 2026 supports two types of papers:
- Confirmatory:The researcher has a fixed hypothesis (or several fixed hypotheses) and the objective of the study is to find out whether the hypothesis is supported by the facts/data. An example of a completed confirmatory study:
Inozemtseva, L., & Holmes, R. (2014, May). Coverage is not strongly correlated with test suite effectiveness. In Proceedings of the 36th international conference on software engineering (pp. 435-445).
- Exploratory:The researcher does not have a hypothesis (or has one that may change during the study). Often, the objective of such a study is to understand what is observed and answer questions such as WHY, HOW, WHAT, WHO, or WHEN. We include in this category registrations for which the researcher has an initial proposed solution for an automated approach (e.g., a new deep-learning-based defect prediction approach) that serves as a starting point for his/her exploration to reach an effective solution. Examples of completed exploratory studies:
Gousios, G., Pinzger, M., & Deursen, A. V. (2014, May). An exploratory study of the pull-based software development model. In Proceedings of the 36th International Conference on Software Engineering (pp. 345-355). Rodrigues, I. M., Aloise, D., Fernandes, E. R., & Dagenais, M. (2020, June). A Soft Alignment Model for Bug Deduplication. In Proceedings of the 17th International Conference on Mining Software Repositories (pp. 43-53).
The reviewers will evaluate RR track submissions based on the following criteria:
- The importance of the research question(s)
- The logic, rationale, and plausibility of the proposed hypotheses
- The soundness and feasibility of the methodology and analysis pipeline (including statistical power analysis where appropriate)
- (For confirmatory study) Whether the clarity and degree of methodological detail is sufficient to exactly replicate the proposed experimental procedures and analysis pipeline
- (For confirmatory study) Whether the authors have pre-specified sufficient outcome-neutral tests for ensuring that the results obtained can test the stated hypotheses, including positive controls and quality checks
- (For exploratory study, if applicable) The description of the data set that is the base for exploration.
The outcome of the RR report review is one of the following:
- In-Principle Acceptance (IPA):The reviewers agree that the study is relevant, the outcome of the study (whether confirmation / rejection of hypothesis) is of interest to the community, the protocol for data collection is sound, and that the analysis methods are adequate. The authors can engage in the actual study for Stage 2.
- Continuity Acceptance (CA):The reviewers agree that the study is relevant, that the (initial) methods appear to be appropriate. However, for exploratory studies, implementation details and post-experiment analyses or discussion (e.g., why the proposed automated approach does not work) may require follow-up checks
- Rejection:The reviewers do not agree on the relevance of the study or are not convinced that the study design is sufficiently mature. Comments are provided to the authors to improve the study design before starting it
For the review process, we’ll try our best to get the original reviewers for both stages. All PC members will be invited on the condition that they agree to review papers in Stage 1 and Stage 2. Ideally, four (4) PC members will review the Stage 1 submission, and three (3) will review the Stage 2 submission. In Stage 2, being a journal submission, a revision of the submitted manuscript will be necessary, and publication is not guaranteed by default. Reviewers will especially evaluate how precisely the protocol of the accepted pre-registered report is followed, or whether deviations are justified.
Note: While both confirmatory and exploratory approaches are accepted in principle, the authors must be aware that the RR model is more challenging to apply to exploratory studies since predetermining the analysis is more difficult. As such, for SANER 2026 we will only offer IPA to confirmatory studies. The reason is that Exploratory studies in software engineering often cannot be adequately assessed until after the study has been completed and the findings are elaborated and discussed in a full paper. For example, consider a study in an RR proposing defect prediction using a new deep learning architecture. This work falls under the exploratory category. It is difficult to offer IPA, as we do not know whether it is any better than a traditional approach based on e.g., decision trees. Negative results are welcome; however, it is important that the negative results paper goes beyond presenting “we tried and failed”, but rather provides interesting insights to readers, e.g., why the results are negative or what that means for further studies on this topic (following criteria of REplication and Negative Results (RENE) track). Furthermore, it is important to note that authors are required to document all deviations (if any) in a section of the paper.
Submission Process and Instructions
To submit your paper, please use the same submission link. After clicking on “Make a New Submission,” you will be presented with a list of all available tracks. Be sure to select the correct track (e.g., Registered Reports Track).
Accepted Papers
At least one author of each accepted paper must register (full registration, not student registration) to and attend the conference in order to present their paper.The timeline for SANER 2026 RR track will be as follows:
- November 7, 2025 : Authors submit their initial report. Submissions must not exceed 6 pages (plus 1 additional page of references). The page limit is strict. Submissions must conform to the IEEE conference proceedings template, specified in the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf options).
- December 5, 2025: Authors receive PC members’ reviews.
- December 12, 2025: Authors submit a rebuttal letter and their revised report in a single PDF. The response letter should address reviewer comments and questions. The response letter + revised report must not exceed 12 pages (plus 1 additional page of references). The response letter does not need to follow IEEE formatting instructions but the font must be 10pt minimum.
- December 22, 2025: Final notification of Stage 1. Possible outcomes are: in-principle acceptance, continuity acceptance, or rejection.
- January 10, 2026: Authors submit their accepted RR report to arXiv.
Note: Due to the timeline, RR reports will not be published in the SANER 2026 proceedings. Authors will present their Stage 1 RR during the conference.
Before December 2026 (exact date to be confirmed): Authors submit a full paper to EMSE (Stage 2). Instructions will be provided later. However, the following constraints will be enforced:
- Justifications need to be given to any change of authors. If the authors are added/removed or the author order is changed between the original Stage 1 and the EMSE submission, all authors will need to complete and sign a “Change of authorship request form”. The Editors in Chief of EMSE and chairs of the RR track reserve the right to deny author changes. If you anticipate any authorship changes please reach out to the chairs of the RR track chairs and to the EMSE RR chairs as early as possible.
- PC members who reviewed an RR report in Stage 1 and their directly supervised students cannot be added as authors of the corresponding submission in Stage 2.
Submissions can be made via https://easychair.org/my/conference?conf=saner2026 by the submission deadline. Any submission that does not comply with the aforementioned instructions and the mandatory information specified in the Author Guide is likely to be desk rejected. In addition, by submitting, the authors acknowledge that they are aware of and agree to be bound by the following policies:
The IEEE Plagiarism FAQ and ACM Policy and Procedures on Plagiarism. In particular, papers submitted to SANER 2026 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for SANER 2026. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases (including immediate rejection and reporting of the incident to IEEE). To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the IEEE, to detect violations of these policies.