Short Papers and Posters Track SANER 2026
This program is tentative and subject to change.
Wed 18 MarDisplayed time zone: Athens change
09:00 - 09:30 | |||
11:00 - 12:30 | Session 1B - LLMs for Testing and Automated RepairResearch Track / Reproducibility Studies and Negative Results (RENE) Track / Short Papers and Posters Track / Early Research Achievement (ERA) Track / Tool Demo Track at Megaron Beta | ||
11:00 15mTalk | HieraTest: Hierarchical Dependency–Driven Framework with Multi-Strategy Repair for LLM-based Unit Test Generation Research Track Weichang Liu Zhejiang University, Junwei Zhang Zhejiang University, Xiaochun Zhu Insigma Hengtian Software LTD, Bo Zhou Northeastern University | ||
11:15 15mTalk | TestForge: A Benchmarking Framework for LLM-Based Test Case Generation Research Track Marco Vieira University of North Carolina at Charlotte, Bhavain Shah University of North Carolina at Charlotte, Priyam Ashish Shah University of North Carolina at Charlotte, Vineet Khadloya Salesforce | ||
11:30 15mTalk | RM -RF: Reward Model for Run-Free Unit Test Evaluation Research Track Elena Bruches Siberian Neuronets LLC, Daniil Grebenkin Siberian Neuronets LLC, Mikhail Klementev Siberian Neuronets LLC, Vadim Alperovich T-Technologies, Roman Derunets Siberian Neuronets LLC, Dari Baturova Siberian Neuronets LLC, Georgiy Mkrtchyan T-Technologies, Oleg Sedukhin Siberian Neuronets LLC, Ivan Bondarenko Novosibirsk State University, Nikolay Bushkov T-Technologies, Stanislav Moiseev T-Technologies Pre-print | ||
11:45 15mTalk | Can We Classify Flaky Tests Using Only Test Code? An LLM-Based Empirical Study Reproducibility Studies and Negative Results (RENE) Track Alexander Berndt , Vekil Bekmyradov SAP, Rainer Gemulla University of Mannheim, Marcus Kessel University of Mannheim, Thomas Bach SAP, Sebastian Baltes Heidelberg University | ||
12:00 7mTalk | Integrating A Large Language Model Into Search-based Automated Program Repair Short Papers and Posters Track | ||
12:07 7mTalk | RisConFix: LLM-based Automated Repair of Risk-Prone Drone Configurations Short Papers and Posters Track Liping Han Nanjing University of Posts and Telecommunications, Tingting Nie Nanjing University of Posts and Telecommunications, Le Yu Nanjing University of Posts and Telecommunications, Mingzhe Hu Nanjing University of Posts and Telecommunications, Tao Yue Beihang University | ||
12:14 7mTalk | Leveraging Mutation Analysis for LLM-based Repair of Quantum Programs Early Research Achievement (ERA) Track Chihiro Yoshida The University of Osaka, Yuta Ishimoto Kyushu University, Olivier Nourry The University of Osaka, Masanari Kondo Kyushu University, Makoto Matsushita The University of Osaka, Yasutaka Kamei Kyushu University, Yoshiki Higo Osaka University | ||
12:21 7mTalk | AI-Assisted Semantic Modeling of Languages for Symbolic Execution Driven Unit Test Generation Tool Demo Track Mokshith Reddy Tanguturi , Atul Kumar IBM Research India, Nandakishore S Menon IBM Research India, Sridhar Chimalakonda Indian Institute of Technology Tirupati | ||
14:00 - 15:30 | Session 2B - Security, Vulnerabilities, and MisusesResearch Track / Industrial Track at Megaron Beta | ||
14:00 15mTalk | What You Trust Is Insecure: Demystifying How Developers (Mis)Use Trusted Execution Environments in Practice Research Track Yuqing Niu , Jieke Shi Singapore Management University, Ruidong Han Singapore Management University, Ye Liu Singapore Management University, Chengyan Ma Singapore Management University, Yunbo Lyu Singapore Management University, David Lo Singapore Management University Pre-print | ||
14:15 15mTalk | From Patterns to Precision: LLM-Guided Detection of Signature Verification Flaws in Smart Contracts Research Track | ||
14:30 15mTalk | SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports Research Track Sogol Masoumzadeh Mcgill University, Yufei Li McGill University, Shane McIntosh University of Waterloo, Daniel Varro Linköping University / McGill University, Lili Wei McGill University | ||
14:45 15mTalk | MLmisFinder: A Specification and Detection Approach of Machine Learning Service Misuses Research Track Hadil Ben Amor Ecole de Technologie Supérieure, Niruthiha Selvanayagam Ecole de Technologie Supérieure, Manel Abdellatif École de Technologie Supérieure, Taher A. Ghaleb Trent University, Naouel Moha École de Technologie Supérieure (ETS) | ||
15:00 15mTalk | VulTerminator: Bringing Back Template-Based Automated Repair for Fixing Java Vulnerabilities Research Track Quang-Cuong Bui Hamburg University of Technology, Emanuele Iannone Hamburg University of Technology, Riccardo Scandariato Hamburg University of Technology Pre-print | ||
15:15 15mTalk | From Legacy Designs to Vulnerability Fixes: Understanding SAST Adoption in Non-Technological Companies Industrial Track Luis Henrique Vieira Amaral University of Brasília, Brazil, Michael Schlichtig Heinz Nixdorf Institut, Paderborn University, Wagner Emanuel , Joilton Almeida de Jesus , Carine Ferreira , Jérôme Kempf , Rodrigo Bonifácio Informatics Center - CIn/UFPE and Computer Science Department / University of Brasília, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM, Laerte Peotta University of Brasília, Brazil, Gustavo Pinto Zup Innovation & UFPA, Márcio Ribeiro Federal University of Alagoas, Brazil | ||
14:00 - 15:30 | Session 2A - Refactoring, Code Smells, and Software MaintenanceResearch Track / Early Research Achievement (ERA) Track / Journal First Track / Industrial Track / Short Papers and Posters Track at Panorama | ||
14:00 15mTalk | An Empirical Analysis of Code Clones in GitHub Actions Workflows Research Track Guillaume Cardoen University of Mons, Tom Mens University of Mons, Alexandre Decan University of Mons; F.R.S.-FNRS | ||
14:15 15mTalk | Reusing Legacy Code in Wasm: Key Challenges of Compilation and Code Semantics Preservation Research Track Sara Baradaran University of Southern California, Liyan Huang University of Southern California, Mukund Raghothaman University of Southern California, Weihang Wang University of Southern California Pre-print | ||
14:30 15mTalk | Cold-Start Anti-Patterns and Refactorings in Serverless Systems: An Empirical Study Research Track SYED SALAUDDIN MOHAMMAD TARIQ University of Michigan - Dearborn, Foyzul Hassan University of Michigan at Dearborn, Amiangshu Bosu Wayne State University, Probir Roy University of Michigan at Dearborn | ||
14:45 15mTalk | Prescriptive procedure for manual code smell annotation Journal First Track Simona Prokić Faculty of Technical Sciences, University of Novi Sad, Nikola Luburić Faculty of Technical Sciences, University of Novi Sad, Jelena Slivka Faculty of Technical Sciences, University of Novi Sad, Aleksandar Kovačević Faculty of Technical Sciences, University of Novi Sad | ||
15:00 15mTalk | Transpilation using Recursive Rewrite Rules: From Legacy to Maintainable Code Industrial Track Tristan Albers , Jos Hegge , Pierre van de Laar TNO-ESI, Niels Brouwers , Paul Nelissen , Wilbert Alberts , George Azis , Theo Baan , Danny Handoko , Quint van der Linden | ||
15:15 7mTalk | Evaluating Cross-Language Transfer for Refactoring Detection with Large Language Models Early Research Achievement (ERA) Track Siyuan Liu Nara Institute of Science and Technology, Nabhan Suwanachote Nara Institute of Science and Technology, Yutaro Kashiwa Nara Institute of Science and Technology, Brittany Reid Nara Institute of Science and Technology, Hajimu Iida Nara Institute of Science and Technology | ||
15:22 7mTalk | Design Pattern-based Code Refactoring with LLMs Short Papers and Posters Track Bartolomeo Zisa Università di Pisa, Lucia Passaro University of Pisa, Jacopo Soldani University of Pisa, Italy | ||
16:00 - 17:30 | Session 3B - Evolution and Security of Mobile SystemsResearch Track / Short Papers and Posters Track at Megaron Beta | ||
16:00 15mTalk | Relocate and Emulate: Re-Hosting Android’s Application Layer Research Track Thomas Sutter University of Bern, Timo Kehrer University of Bern, Marc Rennhard Zurich University of Applied Sciences, Bernhard Tellenbach Armasuisse Cyber-Defence Campus | ||
16:15 15mTalk | Scratching the Iceberg: Unveiling the Outdated Third-Party Native Libraries in Android Apps Research Track Shiyang Zhang Tianjin University, Chengwei Liu Nanyang Technological University, Sen Chen Nankai University, Lyuye Zhang Nanyang Technological University, Yang Liu Nanyang Technological University | ||
16:30 15mTalk | Dialing Danger: Large-Scale Mining and Risk Assessment of Android Secret Codes in OEM Firmware Research Track Ruoyan Lin Shandong University, Shishuai Yang Zhengzhou University of Aeronautics, Fenghao Xu Southeast University, Wenrui Diao Shandong University | ||
16:45 15mTalk | InstruMate: A Systematic Framework for Assessing Android App Repackaging Resilience Research Track Leandro de Souza Oliveira , Rodrigo Bonifácio Informatics Center - CIn/UFPE and Computer Science Department / University of Brasília, Joanna C. S. Santos University of Notre Dame, Rui Rua New York University Abu Dhabi | ||
17:00 15mTalk | An Empirical Study of Privacy Leakage Vulnerability in Third-Party Android Logs Libraries Research Track Yixi Zhao University of Waterloo, Kundi Yao Ontario Tech University, Yiming Tang Rochester Institute of Technology, Weiyi Shang University of Waterloo | ||
17:15 7mTalk | AMF-GR: Adaptive Matrix Factorization and Graph Fusion for Android Library Recommendation Short Papers and Posters Track Abhinav Jamwal Dept. of Computer Science & Engineering, Indian Institute of Technology, Roorkee, India, Sandeep Kumar Dept. of Computer Science & Engineering, Indian Institute of Technology, Roorkee, India | ||
17:22 7mTalk | BUPLinker: Bridging Users and Developers in Mobile Application Evolution Short Papers and Posters Track Ayana Uematsu Waseda University, Hironori Washizaki Waseda University, Naoyasu Ubayashi Waseda University, Masanari Kondo Kyushu University, Juichi Takahashi AGEST, Inc, Yohei Takagi AGEST Inc. | ||
Thu 19 MarDisplayed time zone: Athens change
11:00 - 12:30 | Session 4B - Vulnerability Detection and LocalizationEarly Research Achievement (ERA) Track / Research Track / Short Papers and Posters Track / Industrial Track at Megaron Beta | ||
11:00 15mTalk | InterGNN: Using Context for Detecting Inter-procedural Vulnerabilities Industrial Track Sebastian Sierra Bosch Research, Jochen Quante Bosch Research, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM | ||
11:15 15mTalk | VFLAGENT: A Chain-of-Thought-Guided Multi-Agent Collaboration Framework for Vulnerable Function Localization Research Track Minghe Bai Nanjing University of Posts and Telecommunications, Wei Chen Institute of Software at Chinese Academy of Sciences, Shuo Li Nankai University, China;Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences;, Jiaxin Zhu Institute of Software at Chinese Academy of Sciences | ||
11:30 15mTalk | VulCMS: A Vulnerability Detection System Based on Centrality Analysis and Multi-Scale Attention Research Track Wenjing Cai School of Cybersecurity, Northwestern Polytechnical University, Jianfei Wang School of Software, Northwestern Polytechnical University, Jianfei Wang School of Software, Northwestern Polytechnical University, Lipeng Gao School of Software, Northwestern Polytechnical University | ||
11:45 15mTalk | Towards Secure Oracle Usage: Understanding and Detecting Oracle Vulnerabilities in Smart Contracts Research Track Ziming Chen Peking University, Yue Li Peking University, Jiashuo Zhang Peking University, China, Jianbo Gao Peking University, Che Wang Peking University, China, Jiakun Hao Peking University, Anming Xie Peking University, Zhi Guan Peking University, Zhong Chen | ||
12:00 7mTalk | Synergizing LLM-Driven Semantic Reasoning with Assertion-Guided Analysis for Enhanced Vulnerability Detection Early Research Achievement (ERA) Track Ying Wang Xidian University, Jie Su Xidian University, Cheng Wen Xidian University, rong wang , Cong Tian Xidian University, Zhenhua Duan Xidian University, Shengchao Qin Xidian University Media Attached | ||
12:07 7mTalk | Toward Reliable Detection of Malicious eBPF: Construction and Validation of a Large-Scale Bytecode Dataset Short Papers and Posters Track Yujin Kwon Duksung Women’s University, Yujeong Choi Duksung Women’s University, Dohwan Ji Hanbat National University, Jinyoung Kim Sungkyunkwan University | ||
12:14 7mTalk | Towards Online Malware Detection using Process Resource Utilization Metrics Short Papers and Posters Track Themistoklis Diamantopoulos Electrical and Computer Engineering Dept, Aristotle University of Thessaloniki, Dimosthenis Natsos Aristotle University of Thessaloniki, Andreas Symeonidis Electrical and Computer Engineering Dept., Aristotle University of Thessaloniki Pre-print | ||
12:21 8mTalk | From Data Leak to Secret Misses: The Impact of Data Leakage on Secret Detection Models Short Papers and Posters Track | ||
11:00 - 12:30 | |||
11:00 15mTalk | GDPO: Dual Learning for Self-Supervised Code Summarization in the Era of Large Language Models Research Track Chen Xiao , Wang Shuwei Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences, Zhang Weize Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences, Jiang Zhengwei Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences, Wang Qiuyun Institute of Information Engineering, Chinese Academy of Sciences;and University of Chinese Academy of Sciences | ||
11:15 15mTalk | Mind the Merge: Evaluating the Effects of Token Merging on Pre-trained Models for Code Research Track Mootez Saad Dalhousie University, Hao Li Queen's University, Tushar Sharma Dalhousie University, Ahmed E. Hassan Queen’s University | ||
11:30 15mTalk | CONCORD: A DSL for Generating Simplified and Scalable Graph-Based Code Representations Research Track Pre-print | ||
11:45 15mTalk | Combining Static Code Analysis and Large Language Models Improves Correctness and Performance of Algorithm Recognition Research Track Denis Neumüller Ulm University, Sebastian Boll Ulm University, David Schüler Ulm University, Matthias Tichy Ulm University | ||
12:00 15mTalk | A Multi-Modal Retrieval-Augmented Framework for Compiler Backend Generation with LLMs Research Track Ming Zhong SKLP, Institute of Computing Technology, CAS, Fang Lv Institute of Computing Technology, Chinese Academy of Sciences, Hongna Geng , Xin Sun , Lulin Wang , Lulin Wang , Huimin Cui Institute of Computing Technology, Chinese Academy of Sciences, Xiaobing Feng ICT CAS | ||
12:15 7mTalk | Static Analysis assisted Knowledge Graph based Automatic Functionality Discovery for Mainframe Applications Tool Demo Track Sasaank Janapati , Atul Kumar IBM Research India, Nandakishore S Menon IBM Research India, Sridhar Chimalakonda Indian Institute of Technology Tirupati | ||
14:00 - 15:30 | Session 5B - Techniques and Tools for Testing and VerificationJournal First Track / Research Track / Tool Demo Track / Early Research Achievement (ERA) Track at Megaron Beta | ||
14:00 15mTalk | STELLAR: A Search-Based Testing Framework for Large Language Model Applications Research Track Lev Sorokin BMW Group, Technical University of Munich, Ivan Vasilev BMW Group, Technische Universität München, Germany, Ken Friedl BMW Group, Andrea Stocco Technical University of Munich, fortiss Pre-print File Attached | ||
14:15 15mTalk | Assessing Large Language Models in Verifying Concurrent Programs Research Track Ridhi Jain Technology Innovation Institute (TII), Abu Dhabi, UAE, Rahul Purandare University of Nebraska-Lincoln | ||
14:30 15mTalk | Understanding the Effectiveness of Mutators in Mutation-based Protocol Fuzzing Research Track Xiyuan Zhang East China Normal University, Jiayi Jiang East China Normal University, Yiutak Choi East China Normal University, Ting Su East China Normal University, Haiying Sun East China Normal University, Chengcheng Wan East China Normal University, Geguang Pu East China Normal University, China | ||
14:45 15mTalk | Test Amplification for REST APIs Using "Out-of-the-box" Large Language Models Journal First Track Tolgahan Bardakci University of Antwerp and Flanders Make, Serge Demeyer University of Antwerp and Flanders Make vzw, Mutlu Beyazıt University of Antwerp and Flanders Make vzw | ||
15:00 7mTalk | Preserving Concurrency-Revealing Seeds in Fuzzing of Concurrent Programs via Tuple-Based Coverage Evaluation Early Research Achievement (ERA) Track Junjie Huang Xidian University, Cheng Wen Xidian University, Jie Su Xidian University, Zhiwu Xu Shenzhen University, Bin Yu Xidian University, Shengchao Qin Xidian University, Cong Tian Xidian University Media Attached | ||
15:07 7mTalk | CV: Interactive Visualization of Verification Results Tool Demo Track Pre-print Media Attached | ||
15:14 7mTalk | MuSe: a Mutation Testing Plugin for the Remix IDE Tool Demo Track Gerardo Iuliano University of Salerno, Daniele Carangelo , Carmine Calabrese , Dario Di Nucci University of Salerno | ||
14:00 - 15:30 | Session 5C - Specification-Driven Code and Model DevelopmentIndustrial Track / Early Research Achievement (ERA) Track / Short Papers and Posters Track / Research Track / Registered Report Track at Megaron Gamma | ||
14:00 15mTalk | Requirement Formalization using Large Language Models Research Track Zhiyuan Hu National University of Defense Technology, Wei Ma Singapore Management University, Qiang Wang Academy of Military Sciences, Lingxiao Jiang Singapore Management University, Dongsheng Li National University of Defense Technology | ||
14:15 15mTalk | Understanding Specification-Driven Code Generation with LLMs: An Empirical Study Design Registered Report Track Giovanni Rosa Universidad Rey Juan Carlos, David Moreno-Lumbreras Universidad Rey Juan Carlos, Gregorio Robles Universidad Rey Juan Carlos, Jesus M. Gonzalez-Barahona Universidad Rey Juan Carlos | ||
14:30 15mTalk | AI-Assisted Requirements Traceability for Large-Scale Optical Network Systems: An Industrial Experience Report Industrial Track | ||
14:45 15mTalk | From Textual Descriptions to Code: A Filtering Approach for Locating Business Rules Industrial Track Nour Ayachi Univ. Lille, Inria, CNRS, Centrale Lille, UMR 9189 CRIStAL F-59000 Lille, France, Benoit Verhaeghe Berger-Levrault, Christopher Fuhrman École de technologie supérieure, Nicolas Anquetil University of Lille, Lille, France | ||
15:00 7mTalk | Generating User Clones from Questionnaires: A Lightweight Approach to Requirements Elicitation Short Papers and Posters Track Mai Hirabayashi Waseda University, Hironori Washizaki Waseda University, Naoyasu Ubayashi Waseda University, Juichi Takahashi AGEST, Inc, Yohei Takagi AGEST Inc. | ||
15:07 7mTalk | How Well Does Knowledge Injection Enhance LLM-aided Formal Protocol Modeling? Early Research Achievement (ERA) Track Yajia Lin Xidian University, Jie Su Xidian University, Cheng Wen Xidian University, rong wang , Cong Tian Xidian University, Zhenhua Duan Xidian University, Shengchao Qin Xidian University Media Attached | ||
15:14 7mTalk | LLM Driven Business Rule Extraction from Enterprise Applications Early Research Achievement (ERA) Track Shrishti Pradhan TCS Research, Aishwarya Malvade TCS Research, Raveendra Kumar Medicherla TCS Research, Tata Consultancy Services, Manasi Patwardhan TCS Research | ||
15:21 7mTalk | SQL3M: Token Efficient Text-to-SQL Generation Short Papers and Posters Track Ibrahim Ücelehan Johannes Gutenberg University Mainz, Alina Geiger Johannes Gutenberg University Mainz, Dominik Sobania University of Duisburg-Essen, Germany | ||
14:00 - 15:30 | Session 5A - Robustness and Reliability of LLM Code GenerationShort Papers and Posters Track / Research Track / Tool Demo Track / Early Research Achievement (ERA) Track at Panorama | ||
14:00 7mTalk | Failure-Aware Enhancements for Large Language Model (LLM) Code Generation: An Empirical study on Decision Framework Short Papers and Posters Track Jianru Shen University of Montana, Zedong Peng University of Montana, Lucy Owen University of Montana | ||
14:07 15mTalk | Progressively Mitigating API Hallucination in LLM-Generated Code via Knowledge Graph Reasoning Research Track Yuxuan Li Peking University, Zexiong Ma Peking University, Yanzhen Zou Peking University, Yue Wang Peking University, Lihan Yang Peking University, Bing Xie Peking University | ||
14:22 15mTalk | Programming Language Confusion: When Code LLMs Can't Keep their Languages Straight Research Track Micheline Bénédicte MOUMOULA University of Luxembourg, NIKIEMA Beninwende Serge Lionel University of Luxembourg, Abdoul Kader Kaboré University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg | ||
14:37 15mTalk | Can LLMs Keep Up with Library Changes? An Exploratory Study on LLM-Generated Code Research Track Xiangrong Lin Zhejiang University, Jiakun Liu Harbin Institute of Technology, Lingfeng Bao Zhejiang University | ||
14:52 15mTalk | Leveraging Enhanced Test-Driven Development for Accurate Code Generation in LLMs Research Track Rui Zhang School of Artificial Intelligence, China University of Geosciences (Beijing), Weijie Shan School of Artificial Intelligence, China University of Geosciences (Beijing), Teng Long School of Artificial Intelligence, China University of Geosciences (Beijing), Ce Fu School of Artificial Intelligence, China University of Geosciences(Beijing) | ||
15:07 7mTalk | When RAG Lies: Link-Injection Knowledge-Base Poisoning in Code Generation Short Papers and Posters Track Nguyen Trung Hieu Hanoi University of Science and Technology, Trung-Hieu Nguyen Hanoi University of Science and Technology, Hanoi, Vietnam, Trong-Nghia Be University of Engineering and Technology, Bao-Huy Hoang Hanoi University of Science and Technology,, Anh M. T. Bui Hanoi University of Science and Technology | ||
15:14 7mTalk | Grounding Generative AI in Software Engineering: Are We There Yet? Early Research Achievement (ERA) Track Mootez Saad Dalhousie University, José Antonio Hernández López Department of Computer Science and Systems, University of Murcia, Boqi Chen McGill University, Neil Ernst University of Victoria, Daniel Varro Linköping University / McGill University, Tushar Sharma Dalhousie University Pre-print | ||
15:21 7mTalk | MutEval: NL-PL Prompt Mutation Framework for Robustness Evaluation of Code LLMs Tool Demo Track Pre-print Media Attached | ||
Fri 20 MarDisplayed time zone: Athens change
11:00 - 12:30 | Session 6B - Program Analysis Symbolic Execution and Root Cause AnalysisResearch Track / Reproducibility Studies and Negative Results (RENE) Track / Journal First Track / Early Research Achievement (ERA) Track at Megaron Beta | ||
11:00 15mTalk | ProfRCA: LLM-Enabled Fine-grained Root Cause Analysis with Continuous Profiling Data Research Track Siyuan Ye School of Computer Science and Engineering, Sun Yat-sen University, Gou Tan School of Systems Science and Engineering, Sun Yat-sen University, Guangzhou, China, Wanqi Yang Sun Yat-Sen University, Pengfei Chen Sun Yat-sen University | ||
11:15 15mTalk | Path-Optimal Symbolic Execution of Heap-Manipulating Programs Research Track Pietro Braione University of Milano-Bicocca, Giovanni Denaro University of Milano - Bicocca, Luca Guglielmo Università degli Studi di Milano-Bicocca | ||
11:30 15mTalk | Symbolic Analysis for Repairing Bugs in Concurrent Persistent-Memory Programs Research Track Tooba Khan University of Southern California, Srivatsan Ravi University of Southern California, Chao Wang University of Southern California | ||
11:45 15mTalk | Modular unification of unilingual pointer analyses to multilingual FFI-based programs Journal First Track Jyoti Prakash University of Southern Denmark, Abhishek Tiwari University of Southern Denmark, Christian Hammer University of Passau | ||
12:00 15mTalk | Static Analysis Traces can help Dynamic Symbolic Execution: a Replication Study Reproducibility Studies and Negative Results (RENE) Track Sriteja Kummita Paderborn University, Fabian Schiebel Heinz Nixdorf Institute, Paderborn University, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM, Miao Miao The University of Texas at Dallas, Shiyi Wei University of Texas at Dallas | ||
12:15 7mTalk | Towards Analyzing N-language Polyglot Programs Early Research Achievement (ERA) Track Jyoti Prakash University of Southern Denmark, Abhishek Tiwari University of Southern Denmark, Mikkel Baun Kjærgaard University of Southern Denmark | ||
11:00 - 12:30 | Session 6A - Tools and Techniques for Effective Software DevelopmentIndustrial Track / Journal First Track / Tool Demo Track / Research Track at Panorama | ||
11:00 15mTalk | How Natural Language Proficiency Shapes GenAI Code for Software Engineering Tasks Journal First Track Ruksit Rojpaisarnkit Nara Institute of Science and Technology, Youmei Fan Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology, Raula Gaikovina Kula The University of Osaka | ||
11:15 15mTalk | Data Catalog Tools: A Systematic Multivocal Literature Review Journal First Track Marco Tonnarelli JADS - TU/e, Indika Kumara Tilburg University, Stefan Driessen JADS, Tilburg University, Damian Andrew Tamburri University of Sannio - JADS/NXP Semiconductors, Willem-Jan van den Heuvel JADS, Tilburg University, Patrick Oor NXP Semiconductors | ||
11:30 15mTalk | On the Practical Adoption of a Static Performance Anti-Pattern Detector: An Industrial Case Study Industrial Track Lizhi Liao University of Guelph, Weiyi Shang University of Waterloo, Catalin Sporea ERA Environmental Management Solutions, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions | ||
11:45 15mTalk | Multi-CoLoR: Context-Aware Localization and Reasoning across Multi-Language Codebases Industrial Track Indira Vats University of Toronto; Advanced Micro Devices (AMD), Sanjukta De Advanced Micro Devices, Subhayan Roy , Saurabh Bodhe , Lejin Varghese , Max Kiehn , Yonas Bedasso Advanced Micro Devices, Marsha Chechik University of Toronto Pre-print | ||
12:00 15mTalk | Diagram-Aware Automatic Review of Software Design Documents Using Multimodal Large Language Models Industrial Track | ||
12:15 7mTalk | Source Code-Driven GDPR Documentation: Supporting RoPA with Assessor View Tool Demo Track Mugdha Khedkar Heinz Nixdorf Institute, Paderborn University, Michael Schlichtig Heinz Nixdorf Institut, Paderborn University, Eric Bodden Heinz Nixdorf Institute at Paderborn University & Fraunhofer IEM Pre-print Media Attached | ||
12:22 7mTalk | RefineID: A Developer-Centric IDE Assistant for Better Identifiers Tool Demo Track | ||
14:00 - 15:30 | Session 7B - Software Architecture, Dependencies, and Industry InnovationJournal First Track / Research Track at Megaron Beta | ||
14:00 15mTalk | Detecting and removing bloated dependencies in CommonJS packages Journal First Track Yuxin Liu KTH Royal Institute of Technology, Deepika Tiwari KTH Royal Institute of Technology, Cristian Bogdan KTH Royal Institute of Technology, Benoit Baudry Université de Montréal | ||
14:15 15mTalk | Beyond Lexical: Functional Semantics and Fusion for Precise Architecture Recovery Research Track Chunguang Zhang Southeast University, Bixin Li Southeast University, Yan Xiao Sun Yat-sen University | ||
14:45 15mTalk | Innovating Industry With Research: eknows and Sysparency Journal First Track Verena Geist Software Competence Center Hagenberg GmbH, Michael Moser Software Competence Center Hagenberg GmbH, Josef Pichler University of Applied Sciences Upper Austria, Florian Schnitzhofer Sysparency GmbH | ||
15:00 15mTalk | Industry 4.0/IIoT Platforms for manufacturing systems - A systematic review contrasting the scientific and the industrial side Journal First Track Holger Eichelberger University of Hildesheim, Christian Sauer University of Hildesheim, Amir Shayan Ahmadian University of Koblenz, Christian Kröher University of Hildesheim | ||
16:00 - 17:30 | |||
17:30 - 17:40 | |||
Accepted Papers
Call for Papers
The Short Papers and Posters Track of the 33rd edition of the IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2026) invites high-quality submissions of short papers and posters describing original and unpublished research results. We encourage submissions describing various types of research, e.g., empirical, theoretical, and tool-oriented.
The topics of interest for the Short Papers and Posters track are the same as the main research track and concern all the topics in the research and practice of software analysis, evolution, and reengineering.
Submission Instructions
Papers must not exceed six pages (including all text, figures, references, and appendices) for Short Papers and two pages for extended abstracts of Posters.
Papers must be submitted electronically in PDF format via the SANER 2026 EasyChair submission site. Submitted papers must have been neither previously accepted for publication nor concurrently submitted for review in another journal, book, conference, or workshop.
The 2-page extended abstract of each accepted poster may, at the authors’ discretion, be published in the SANER 2026 Proceedings (Companion proceedings). Abstracts must be submitted electronically at the submission site by the submission deadline.
All submissions must come in PDF format and conform, at the time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt font, LaTEX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option. Also, papers must comply with the IEEE Policy on Authorship. All submissions must be in English. Submissions should be uploaded electronically in PDF format via EasyChair. Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
The EasyChair link for all SANER 2026 tracks is https://easychair.org/my/conference?conf=saner2026
To submit your paper, please use the submission link above. After clicking on “Make a New Submission,” you will be presented with a list of all available tracks. Be sure to select the correct track, i.e., Short Papers and Posters Track.
Important note: the SANER 2026 Short Papers and Posters Track follows a double-anonymous review process. Submissions that do not comply with the double-anonymous policy, will be desk-rejected. In order to be compliant with the double-anonymous policy, submitted papers must adhere to the following rules (largely reused from ASE 2017 double-anonymous instructions):
● Author names and affiliations must be omitted
● References to authors’ own related work must be in the third person. (For example, not We build on our previous work… but rather We build on the work of…)
● There may be cases in which the current submission is a clear follow-up of one of your previous works, and despite what was recommended in the previous point, reviewers will clearly associate authorship of such a previous work with the current submission. In this case, you may decide to anonymize the reference itself at submission time. For example: based on previous results [10] .. where the reference is reported as [10] Anonymous Authors. Omitted per double-blind reviewing. In doing so, however, please make sure that the SANER 2026 submission is self-contained and its content can be reviewed and understood without accessing the previous paper
● Do not include acknowledgments of people, grants, organizations, etc. that would give away your identity. You may, of course, add these acknowledgments in the camera-ready version
● If you use an identifiable naming convention for your work, such as a project name, use a different name for your submission, which you may indicate has been changed for the purposes of double-blind reviewing. This includes names that may unblind individual authors and their institutions. For example, if your project is called GoogleDeveloperHelper, which makes it clear the work was done at Google, for the submission version, use the name DeveloperHelper or BigCompanyDeveloperHelper instead
● Avoid revealing the institution affiliations of authors or at which the work was performed. For example, if the evaluation includes a user study conducted with undergraduates from the CS 101 class that you teach, you might say “The study participants consist of 200 students in an introductory CS course”. You can of course add the institutional information to the camera-ready. Similar suggestions apply to work conducted in specific organizations (e.g., industrial studies). In such cases, avoid mentioning the organization’s name. Instead, you may just refer to the organization as Org or Company, etc. When appropriate and when this does not help too much in revealing the company’s name, you might mention the context (e.g., financial organization, videogame development company, etc.)
● Avoid linking directly to code repositories or tool deployments which can reveal your identity. Whenever possible, please use the EasyChair additional material field to submit a .zip or .tgz file including additional material. This is of course possible for small attachments. In other cases, you may post anonymized links (with a warning that the following link may reveal authors’ identities), including links to anonymized code or deployments. When creating such repositories, a good practice can be asking somebody in your team to test the anonymization of the repository and of its content. In case anonymization is difficult to achieve and you still want to provide the availability of data/tools, you can simply state that you will link to the code or deployment in the camera-ready version. Program committee members are asked to keep into account the double-blind policy when reviewing papers, and therefore not require full availability of artifacts at submission time.
● SANER 2026 believes in open science and that open science aids reproducibility and replicability. To improve these factors we encourage authors to consider disclosing the source code and datasets used within their paper, including extractors, survey data, etc. By sharing this information your contribution will be more impactful because others can follow up on your work and of course, cite it. Please consider using Zenodo, Figshare, or other services that provide DOIs and allow anonymous and semi-anonymous methods of archiving software and datasets. Archive.org is recommended for the dissemination of larger datasets. These datasets, anonymized through Zenodo and other services, should be linked within the paper itself. Instructions for double-blind friendly uploading of datasets are available here: https://ineed.coffee/post/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance.html.
Evaluation Criteria
Submissions will be reviewed by at least two members of the Program Committee of the Short Papers and Posters track, and they will be evaluated on the basis of originality and novelty, soundness, evaluation, and presentation (please refer to the criteria of the Research Track Papers).
Accepted Papers
At least one author of each accepted paper must register (full registration, not student registration) to and attend the conference in order to present their paper.