default search action
ICSE 2020: Seoul, South Korea
- Gregg Rothermel, Doo-Hwan Bae:
ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June - 19 July, 2020. ACM 2020, ISBN 978-1-4503-7121-6
Continuous integration
- Antonia Bertolino, Antonio Guerriero, Breno Miranda, Roberto Pietrantuono, Stefano Russo:
Learning-to-rank vs ranking-to-learn: strategies for regression testing in continuous integration. 1-12 - Xianhao Jin, Francisco Servant:
A cost-efficient approach to building in continuous integration. 13-25 - Thodoris Sotiropoulos, Dimitris Mitropoulos, Diomidis Spinellis:
Practical fault detection in puppet programs. 26-37 - Jordan Henkel, Christian Bird, Shuvendu K. Lahiri, Thomas W. Reps:
Learning from, understanding, and supporting DevOps artifacts for docker. 38-49
Cyber-physical systems
- Dalal Alrajeh, Antoine Cailliau, Axel van Lamsweerde:
Adapting requirements models to varying environments. 50-61 - Alessio Ferrari, Franco Mazzanti, Davide Basile, Maurice H. ter Beek, Alessandro Fantechi:
Comparing formal tools for system design: a judgment study. 62-74
Debugging 1
- Lukas Kirschner, Ezekiel O. Soremekun, Andreas Zeller:
Debugging inputs. 75-86 - Brittany Johnson, Yuriy Brun, Alexandra Meliou:
Causal testing: understanding defects' root causes. 87-99
Ecosystems and evolution
- Wanwangying Ma, Lin Chen, Xiangyu Zhang, Yang Feng, Zhaogui Xu, Zhifei Chen, Yuming Zhou, Baowen Xu:
Impact analysis of cross-project bugs on software ecosystems. 100-111 - Lingchao Chen, Foyzul Hassan, Xiaoyin Wang, Lingming Zhang:
Taming behavioral backward incompatibilities via cross-project testing and analysis. 112-124 - Ying Wang, Ming Wen, Yepang Liu, Yibo Wang, Zhenming Li, Chao Wang, Hai Yu, Shing-Chi Cheung, Chang Xu, Zhiliang Zhu:
Watchman: monitoring dependency conflicts for Python library ecosystem. 125-135
Empirical studies for security
- Anastasia Danilova, Alena Naiakshina, Matthew Smith:
One size does not fit all: a grounded theory and online survey study of developer preferences for security warning types. 136-148 - Dirk van der Linden, Pauline Anthonysamy, Bashar Nuseibeh, Thein Than Tun, Marian Petre, Mark Levine, John N. Towse, Awais Rashid:
Schrödinger's security: opening the box on app developers' security rationale. 149-160
Human practice
- Claire Ingram, Anders Drachen:
How software practitioners use informal local meetups to share software engineering knowledge. 161-173 - Carolyn D. Egelman, Emerson R. Murphy-Hill, Elizabeth Kammer, Margaret Morrow Hodges, Collin Green, Ciera Jaspan, James Lin:
Predicting developers' negative feelings about code review. 174-185
Web testing
- Rahulkrishna Yandrapally, Andrea Stocco, Ali Mesbah:
Near-duplicate detection in web app model inference. 186-197 - Cristian-Alexandru Staicu, Martin Toldam Torp, Max Schäfer, Anders Møller, Michael Pradel:
Extracting taint specifications for JavaScript libraries. 198-209 - George Mathew, Chris Parnin, Kathryn T. Stolee:
SLACC: simion-based language agnostic code clones. 210-221 - I Luk Kim, Yunhui Zheng, Hogun Park, Weihang Wang, Wei You, Yousra Aafer, Xiangyu Zhang:
Finding client-side business flow tampering vulnerabilities. 222-233
Analysis for security
- Peiming Liu, Gang Zhao, Jeff Huang:
Securing unsafe rust programs with XRust. 234-245 - Ana Nora Evans, Bradford Campbell, Mary Lou Soffa:
Is rust used safely by software developers? 246-257 - Changwei Zou, Jingling Xue:
Burn after reading: a shadow stack with microsecond-level runtime rerandomization for protecting return addresses. 258-270 - Seongjoon Hong, Junhee Lee, Jeongsoo Lee, Hakjoo Oh:
SAVER: scalable, precise, and safe memory-error repair. 271-283
Android and web application testing
- Katherine Hough, Gebrehiwet B. Welearegai, Christian Hammer, Jonathan Bell:
Revealing injection vulnerabilities by leveraging existing tests. 284-296 - Ju Qian, Zhengyu Shang, Shuoyan Yan, Yan Wang, Lin Chen:
RoScript: a visual script driven truly non-intrusive robotic testing system for touch screen applications. 297-308 - Carlos Bernal-Cárdenas, Nathan Cooper, Kevin Moran, Oscar Chaparro, Andrian Marcus, Denys Poshyvanyk:
Translating video recordings of mobile app usages into replayable scenarios. 309-321 - Jieshan Chen, Chunyang Chen, Zhenchang Xing, Xiwei Xu, Liming Zhu, Guoqiang Li, Jinshui Wang:
Unblind your apps: predicting natural-language labels for mobile GUI components by deep learning. 322-334
Autonomous driven system
- Shafiul Azam Chowdhury, Sohil Lal Shrestha, Taylor T. Johnson, Christoph Csallner:
SLEMI: equivalence modulo input (EMI) based mutation of CPS models for finding compiler bugs in Simulink. 335-346 - Husheng Zhou, Wei Li, Zelun Kong, Junfeng Guo, Yuqun Zhang, Bei Yu, Lingming Zhang, Cong Liu:
DeepBillboard: systematic physical-world testing of autonomous driving systems. 347-358 - Andrea Stocco, Michael Weiss, Marco Calzana, Paolo Tonella:
Misbehaviour prediction for autonomous driving systems. 359-371 - Claudio Menghi, Shiva Nejati, Lionel C. Briand, Yago Isasi Parache:
Approximation-refinement testing of compute-intensive cyber-physical models: an approach based on system identification. 372-384 - Joshua Garcia, Yang Feng, Junjie Shen, Sumaya Almanee, Yuan Xia, Qi Alfred Chen:
A comprehensive study of autonomous vehicle bugs. 385-396
Debugging 2
- Boyuan Chen, Zhen Ming (Jack) Jiang:
Studying the use of Java logging utilities in the wild. 397-408
Human aspects of software engineering 1
- Harsha Perera, Waqar Hussain, Jon Whittle, Arif Nurwidyantoro, Davoud Mougouei, Rifat Ara Shams, Gillian C. Oliver:
A study on the prevalence of human values in software engineering publications, 2015 - 2018. 409-420 - Franz Zieris, Lutz Prechelt:
Explaining pair programming session dynamics from knowledge gaps. 421-432 - Claudia Hilderbrand, Christopher Perdriau, Lara Letaw, Jillian Emard, Zoe Steine-Hanson, Margaret Burnett, Anita Sarma:
Engineering gender-inclusivity into software: ten teams' tales from the trenches. 433-444
Version control and programming practice
- Shurui Zhou, Bogdan Vasilescu, Christian Kästner:
How has forking changed in the last 20 years?: a study of hard forks on GitHub. 445-456
Android application testing
- Jiwei Yan, Hao Liu, Linjie Pan, Jun Yan, Jian Zhang, Bin Liang:
Multiple-entry testing of Android applications by constructing activity launching contexts. 457-468 - Jue Wang, Yanyan Jiang, Chang Xu, Chun Cao, Xiaoxing Ma, Jian Lu:
ComboDroid: generating high-quality test inputs for Android apps via use case combinations. 469-480 - Zhen Dong, Marcel Böhme, Lucia Cojocaru, Abhik Roychoudhury:
Time-travel testing of Android apps. 481-492
Clones and changes
- Jason Lau, Aishwarya Sivaraman, Qian Zhang, Muhammad Ali Gulzar, Jason Cong, Miryung Kim:
HeteroRefactor: refactoring for heterogeneous computing with FPGA. 493-505 - Weijie Zhou, Yue Zhao, Guoqiang Zhang, Xipeng Shen:
HARP: holistic analysis for refactoring Python-based analytics programs. 506-517 - Thong Hoang, Hong Jin Kang, David Lo, Julia Lawall:
CC2Vec: distributed representations of code changes. 518-529
Contracts
- Thomas Durieux, João F. Ferreira, Rui Abreu, Pedro Cruz:
Empirical review of automated analysis tools on 47, 587 Ethereum smart contracts. 530-541 - Sungjae Hwang, Sukyoung Ryu:
Gap between theory and practice: an empirical study of security patches in solidity. 542-553
Defect prediction
- Sadia Tabassum, Leandro L. Minku, Danyi Feng, George G. Cabral, Liyan Song:
An investigation of cross-project learning in online just-in-time software defect prediction. 554-565 - Ke Li, Zilin Xiang, Tao Chen, Shuo Wang, Kay Chen Tan:
Understanding the automated parameter optimization on transfer learning for cross-project defect prediction: an empirical study. 566-577 - Jinyin Chen, Keke Hu, Yue Yu, Zhuangzhi Chen, Qi Xuan, Yi Liu, Vladimir Filkov:
Software visualization and deep transfer learning for effective software defect prediction. 578-589
Human aspects of software engineering 2
- Emad Aghajani, Csaba Nagy, Mario Linares-Vásquez, Laura Moreno, Gabriele Bavota, Michele Lanza, David C. Shepherd:
Software documentation: the practitioners' perspective. 590-601
Program repair
- Yi Li, Shaohua Wang, Tien N. Nguyen:
DLFix: context-based code transformation learning for automated program repair. 602-614 - Kui Liu, Shangwen Wang, Anil Koyuncu, Kisub Kim, Tegawendé F. Bissyandé, Dongsun Kim, Peng Wu, Jacques Klein, Xiaoguang Mao, Yves Le Traon:
On the efficiency of test suite based program repair: A Systematic Assessment of 16 Automated Repair Systems for Java Programs. 615-627
Requirement discovery
- Hui Guo, Munindar P. Singh:
Caspar: extracting and synthesizing user stories of problems from app reviews. 628-640 - Lin Shi, Mingzhe Xing, Mingyang Li, Yawen Wang, Shoubin Li, Qing Wang:
Detection of hidden feature requests from massive chat messages via deep siamese network. 641-653
Cognition
- Souti Chattopadhyay, Nicholas Nelson, Audrey Au, Natalia Morales, Christopher A. Sanchez, Rahul Pandita, Anita Sarma:
A tale from the trenches: cognitive biases and software development. 654-665 - Daniela Girardi, Nicole Novielli, Davide Fucci, Filippo Lanubile:
Recognizing developers' emotions while programming. 666-677 - Ryan Krueger, Yu Huang, Xinyu Liu, Tyler Santander, Westley Weimer, Kevin Leach:
Neurological divide: an fMRI study of prose and code writing. 678-690 - Nischal Shrestha, Colton Botta, Titus Barik, Chris Parnin:
Here we go again: why is it difficult for developers to learn another programming language? 691-701
Deep learning testing and debugging 1
- Simos Gerasimou, Hasan Ferit Eniser, Alper Sen, Alper Çakan:
Importance-driven deep learning system testing. 702-713 - Brandon Paulsen, Jingbo Wang, Chao Wang:
ReluDiff: differential verification of deep neural networks. 714-726 - Huiyan Wang, Jingwei Xu, Chang Xu, Xiaoxing Ma, Jian Lu:
Dissector: input validation for deep learning applications by crossing-layer dissection. 727-738 - Xiyue Zhang, Xiaofei Xie, Lei Ma, Xiaoning Du, Qiang Hu, Yang Liu, Jianjun Zhao, Meng Sun:
Towards characterizing adversarial defects of deep learning software from the lens of uncertainty. 739-751
Fuzzing 1
- Akond Rahman, Effat Farhana, Chris Parnin, Laurie A. Williams:
Gang of eight: a defect taxonomy for infrastructure as code scripts. 752-764 - Cheng Wen, Haijun Wang, Yuekang Li, Shengchao Qin, Yang Liu, Zhiwu Xu, Hongxu Chen, Xiaofei Xie, Geguang Pu, Ting Liu:
MemLock: memory usage guided fuzzing. 765-777 - Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Quang Tran Minh:
sFuzz: an efficient adaptive fuzzer for solidity smart contracts. 778-788 - Valentin Wüstholz, Maria Christakis:
Targeted greybox fuzzing with static lookahead analysis. 789-800 - Caius Brindescu, Iftekhar Ahmed, Rafael Leano, Anita Sarma:
Planning for untangling: predicting the difficulty of merge conflicts. 801-811
Static analysis 1
- Qingkai Shi, Rongxin Wu, Gang Fan, Charles Zhang:
Conquering the extensional scalability problem for value-flow analysis frameworks. 812-823 - Rijnard van Tonder, Claire Le Goues:
Tailoring programs for static analysis via program transformation. 824-834 - Qingkai Shi, Charles Zhang:
Pipelining bottom-up data flow analysis. 835-847
Traceability
- Mounifah Alenazi, Nan Niu, Juha Savolainen:
A novel approach to tracing safety requirements and state-based design models. 848-860 - Robert White, Jens Krinke, Raymond Tan:
Establishing multilevel test-to-code traceability links. 861-872 - Kevin Moran, David N. Palacio, Carlos Bernal-Cárdenas, Daniel McCrystal, Denys Poshyvanyk, Chris Shenefiel, Jeff Johnson:
Improving the effectiveness of traceability link recovery using hierarchical bayesian networks. 873-885
API
- Hao Xia, Yuan Zhang, Yingtian Zhou, Xiaoting Chen, Yang Wang, Xiangyu Zhang, Shuaishuai Cui, Geng Hong, Xiaohan Zhang, Min Yang, Zhemin Yang:
How Android developers handle evolution-induced API compatibility issues: a large-scale study. 886-898 - Hao Zhong, Na Meng, Zexuan Li, Li Jia:
An empirical study on API parameter rules. 899-911 - Maxime Lamothe, Weiyi Shang:
When APIs are intentionally bypassed: an exploratory study of API workarounds. 912-924 - Xiaoxue Ren, Jiamou Sun, Zhenchang Xing, Xin Xia, Jianling Sun:
Demystify official API usage directives with crowdsourced API misuse scenarios, erroneous code examples and patches. 925-936
Bug analysis
- Mingyuan Wu, Yicheng Ouyang, Husheng Zhou, Lingming Zhang, Cong Liu, Yuqun Zhang:
Simulee: detecting CUDA synchronization bugs via memory-access modeling. 937-948
Deep learning testing and debugging 2
- Peixin Zhang, Jingyi Wang, Jun Sun, Guoliang Dong, Xinyu Wang, Xingen Wang, Jin Song Dong, Ting Dai:
White-box fairness testing through adversarial sampling. 949-960 - Pinjia He, Clara Meister, Zhendong Su:
Structure-invariant testing for machine translation. 961-973 - Zeyu Sun, Jie M. Zhang, Mark Harman, Mike Papadakis, Lu Zhang:
Automatic testing and improvement of machine translation. 974-985 - Guanhong Tao, Shiqing Ma, Yingqi Liu, Qiuling Xu, Xiangyu Zhang:
TRADER: trace divergence analysis and embedding regulation for debugging recurrent neural networks. 986-998
Fuzzing 2
- Haijun Wang, Xiaofei Xie, Yi Li, Cheng Wen, Yuekang Li, Yang Liu, Shengchao Qin, Hongxu Chen, Yulei Sui:
Typestate-guided fuzzer for discovering use-after-free vulnerabilities. 999-1010 - Tegan Brennan, Seemanta Saha, Tevfik Bultan:
JVM fuzzing for JIT-induced side-channel detection. 1011-1023 - Valentin J. M. Manès, Soomin Kim, Sang Kil Cha:
Ankou: guiding grey-box fuzzing towards combinatorial difference. 1024-1036
Static analysis 2
- Ramanathan Ramu, Ganesha B. Upadhyaya, Hoan Anh Nguyen, Hridesh Rajan:
BCFA: bespoke control flow analysis for CFA at scale. 1037-1048 - Li Sui, Jens Dietrich, Amjed Tahir, George Fourtounis:
On the recall of static call graph construction in practice. 1049-1060 - Manuel Benz, Erik Krogh Kristensen, Linghui Luo, Nataniel P. Borges, Eric Bodden, Andreas Zeller:
Heaps'n leaks: how heap snapshots improve Android taint analysis. 1061-1072
Big data
- Rafael-Michael Karampatsis, Hlib Babii, Romain Robbes, Charles Sutton, Andrea Janes:
Big code != big vocabulary: open-vocabulary models for source code. 1073-1085 - Jingmei Hu, Jiwon Joung, Maia L. Jacobs, Krzysztof Z. Gajos, Margo I. Seltzer:
Improving data scientist efficiency with provenance. 1086-1097 - Junwen Yang, Utsav Sethi, Cong Yan, Alvin Cheung, Shan Lu:
Managing data constraints in database-backed web applications. 1098-1109
Deep learning testing and debugging 3
- Nargiz Humbatova, Gunel Jahangirova, Gabriele Bavota, Vincenzo Riccio, Andrea Stocco, Paolo Tonella:
Taxonomy of real faults in deep learning systems. 1110-1121 - Yuchi Tian, Ziyuan Zhong, Vicente Ordonez, Gail E. Kaiser, Baishakhi Ray:
Testing DNN image classifiers for confusion & bias errors. 1122-1134 - Md Johirul Islam, Rangeet Pan, Giang Nguyen, Hridesh Rajan:
Repairing deep neural networks: fix patterns and challenges. 1135-1146 - Xiang Gao, Ripon K. Saha, Mukul R. Prasad, Abhik Roychoudhury:
Fuzz testing based data augmentation to improve robustness of deep neural networks. 1147-1158 - Ru Zhang, Wencong Xiao, Hongyu Zhang, Yu Liu, Haoxiang Lin, Mao Yang:
An empirical study on program failures of deep learning jobs. 1159-1170
Natural language artifacts in software
- Davide Spadini, Gül Çalikli, Alberto Bacchelli:
Primers or reminders?: the effects of existing review comments on code review. 1171-1182 - Ehsan Mirsaeedi, Peter C. Rigby:
Mitigating turnover with code review recommendation: balancing expertise, workload, and knowledge distribution. 1183-1195
Open source software
- Yuxia Zhang, Minghui Zhou, Klaas-Jan Stol, Jianyu Wu, Zhi Jin:
How do companies collaborate in open source ecosystems?: an empirical study of OpenStack. 1196-1208 - Cassandra Overney, Jens Meinicke, Christian Kästner, Bogdan Vasilescu:
How to not get rich: an empirical study of donations in open source. 1209-1221 - Xin Tan, Minghui Zhou, Brian Fitzgerald:
Scaling open source communities: an empirical study of the Linux kernel. 1222-1234
Symbolic execution
- Shengjian Guo, Yueqi Chen, Peng Li, Yueqiang Cheng, Huibo Wang, Meng Wu, Zhiqiang Zuo:
SpecuSym: speculative symbolic execution for cache timing leak detection. 1235-1247 - Hengbiao Yu, Zhenbang Chen, Xianjin Fu, Ji Wang, Zhendong Su, Jun Sun, Chun Huang, Wei Dong:
Symbolic verification of message passing interface programs. 1248-1260 - Hui Guo, Cindy Rubio-González:
Efficient generation of error-inducing floating-point inputs via symbolic execution. 1261-1272 - Yannic Noller, Corina S. Pasareanu, Marcel Böhme, Youcheng Sun, Hoang Lam Nguyen, Lars Grunske:
HyDiff: hybrid differential software analysis. 1273-1285
Testing 1
- Dehai Zhao, Zhenchang Xing, Chunyang Chen, Xiwei Xu, Liming Zhu, Guoqiang Li, Jinshui Wang:
Seenomaly: vision-based linting of GUI animation effects against design-don't guidelines. 1286-1297 - Yan Cai, Ruijie Meng, Jens Palsberg:
Low-overhead deadlock prediction. 1298-1309
Android
- Sen Chen, Lingling Fan, Guozhu Meng, Ting Su, Minhui Xue, Yinxing Xue, Yang Liu, Lihua Xu:
An empirical assessment of security risks of global Android banking apps. 1310-1322 - Abdulaziz Alshayban, Iftekhar Ahmed, Sam Malek:
Accessibility issues in Android apps: state of affairs, sentiments, and ways forward. 1323-1334 - Shin Hwei Tan, Ziqiang Li:
Collaborative bug finding for Android apps. 1335-1347
Code summarization and analysis
- Profir-Petru Pârtachi, Santanu Kumar Dash, Christoph Treude, Earl T. Barr:
POSIT: simultaneously tagging natural and programming languages. 1348-1358 - Juan Zhai, Xiangzhe Xu, Yu Shi, Guanhong Tao, Minxue Pan, Shiqing Ma, Lei Xu, Weifeng Zhang, Lin Tan, Xiangyu Zhang:
CPC: automatically classifying and propagating natural language comments via program analysis. 1359-1371 - Son Nguyen, Hung Phan, Trinh Le, Tien N. Nguyen:
Suggesting natural method names to check name consistencies. 1372-1384 - Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Xudong Liu:
Retrieval-based neural source code summarization. 1385-1397
Machine learning and models
- Cody Watson, Michele Tufano, Kevin Moran, Gabriele Bavota, Denys Poshyvanyk:
On learning meaningful assert statements for unit test cases. 1398-1409 - Sameer Reddy, Caroline Lemieux, Rohan Padhye, Koushik Sen:
Quickly generating diverse valid test inputs with reinforcement learning. 1410-1421
Meta studies
- He Zhang, Xin Zhou, Xin Huang, Huang Huang, Muhammad Ali Babar:
An evidence-based inquiry into the use of grey literature in software engineering. 1422-1434
Performance
- Zishuo Ding, Jinfu Chen, Weiyi Shang:
Towards the use of the readily available tests from the release pipeline as performance tests: are we there yet? 1435-1446
Software verification
- Martin Kellogg, Manli Ran, Manu Sridharan, Martin Schäf, Michael D. Ernst:
Verifying object construction. 1447-1458 - Alexandra Bugariu, Peter Müller:
Automatically testing string solvers. 1459-1470
Testing 2
- Wing Lam, Kivanç Muslu, Hitesh Sajnani, Suresh Thummalapenta:
A study on the lifecycle of flaky tests. 1471-1482 - Dongjie Chen, Yanyan Jiang, Chang Xu, Xiaoxing Ma, Jian Lu:
Testing file system implementations on layered models. 1483-1495
Code generation
- Djamel Eddine Khelladi, Benoît Combemale, Mathieu Acher, Olivier Barais, Jean-Marc Jézéquel:
Co-evolving code with evolving metamodels. 1496-1508
Dependencies and configuration
- Michael Lienhardt, Ferruccio Damiani, Einar Broch Johnsen, Jacopo Mauro:
Lazy product discovery in huge configuration spaces. 1509-1521 - Clay Stevens, Hamid Bagheri:
Reducing run-time adaptation space via analysis of possible utility bounds. 1522-1534
Recommendations
- Junjie Wang, Ye Yang, Song Wang, Yuanzhe Hu, Dandan Wang, Qing Wang:
Context-aware in-process crowdworker recommendation. 1535-1546
Security
- Bingchang Liu, Guozhu Meng, Wei Zou, Qi Gong, Feng Li, Min Lin, Dandan Sun, Wei Huo, Chao Zhang:
A large-scale empirical study on vulnerability distribution within projects and the lessons learned. 1547-1559 - Yude Bai, Zhenchang Xing, Xiaohong Li, Zhiyong Feng, Duoyuan Ma:
Unsuccessful story about few shot malware family classification and siamese network to the rescue. 1560-1571 - Xueling Zhang, Xiaoyin Wang, Rocky Slavin, Travis D. Breaux, Jianwei Niu:
How does misconfiguration of analytic services compromise mobile privacy? 1572-1583
Stack overflow
- Alex Cummaudo, Rajesh Vasa, Scott Barnett, John C. Grundy, Mohamed Abdelrazek:
Interpreting cloud computer vision pain-points: a mining study of stack overflow. 1584-1596
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.