default search action
46th ICSE 2024: Lisbon, Portugal
- Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, ICSE 2024, Lisbon, Portugal, April 14-20, 2024. ACM 2024
Keynotes
- Rupak Majumdar:
Challenges and Opportunities in Model Checking Large-scale Distributed Systems. 1:1-1:2 - Martin C. Rinard:
Software Engineering Research in a World with Generative Artificial Intelligence. 2:1-2:5 - Carol J. Smith:
Trustworthy by Design. 3:1-3:4
AI&SE Autocoding for Program Repair and Related Concepts
- Yun Peng, Shuzheng Gao, Cuiyun Gao, Yintong Huo, Michael R. Lyu:
Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type Errors. 4:1-4:13 - Wenkang Zhong, Chuanyi Li, Kui Liu, Tongtong Xu, Jidong Ge, Tegawendé F. Bissyandé, Bin Luo, Vincent Ng:
Practical Program Repair via Preference-based Ensemble Strategy. 5:1-5:13 - Martin Tappler, Andrea Pferscher, Bernhard K. Aichernig, Bettina Könighofer:
Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing Data. 6:1-6:13 - Wai Kin Wong, Huaijin Wang, Zongjie Li, Shuai Wang:
BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input Repairing. 7:1-7:13 - Jianan Ma, Pengfei Yang, Jingyi Wang, Youcheng Sun, Cheng-Chao Huang, Zhen Wang:
VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks. 8:1-8:13 - Tianlin Li, Yue Cao, Jian Zhang, Shiqian Zhao, Yihao Huang, Aishan Liu, Qing Guo, Yang Liu:
RUNNER: Responsible UNfair NEuron Repair for Enhancing Deep Neural Network Fairness. 9:1-9:13 - He Ye, Martin Monperrus:
ITER: Iterative Neural Repair for Multi-Location Patches. 10:1-10:13
Applications of LLM and Other AI Technologies
- Liuqing Chen, Yunnong Chen, Shuhong Xiao, Yaxuan Song, Lingyun Sun, Yankun Zhen, Tingting Zhou, Yanfang Chang:
EGFE: End-to-end Grouping of Fragmented Elements in UI Designs with Multimodal Learning. 11:1-11:12 - Cuiying Gao, Gaozhun Huang, Heng Li, Bang Wu, Yueming Wu, Wei Yuan:
A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments. 12:1-12:13 - Antonio Mastropaolo, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta:
Toward Automatically Completing GitHub Workflows. 13:1-13:12 - Junjielong Xu, Ziang Cui, Yuan Zhao, Xu Zhang, Shilin He, Pinjia He, Liqun Li, Yu Kang, Qingwei Lin, Yingnong Dang, Saravan Rajmohan, Dongmei Zhang:
UniLog: Automatic Logging via LLM and In-Context Learning. 14:1-14:12 - Yutong Wang, Cindy Rubio-González:
Predicting Performance and Accuracy of Mixed-Precision Programs for Precision Tuning. 15:1-15:13 - Benjamin Steenhoek, Hongyang Gao, Wei Le:
Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection. 16:1-16:13 - Aidan Z. H. Yang, Claire Le Goues, Ruben Martins, Vincent J. Hellendoorn:
Large Language Models for Test-Free Fault Localization. 17:1-17:12
Analysis and Debugging
- Yuchao Huang, Junjie Wang, Zhe Liu, Yawen Wang, Song Wang, Chunyang Chen, Yuanzhe Hu, Qing Wang:
CrashTranslator: Automatically Reproducing Mobile Application Crashes Directly from Stack Trace. 18:1-18:13 - Yuqi Guo, Shihao Zhu, Yan Cai, Liang He, Jian Zhang:
Reorder Pointer Flow in Sound Concurrency Bug Prediction. 19:1-19:13 - Aditya Thimmaiah, Leonidas Lampropoulos, Christopher J. Rossbach, Milos Gligoric:
Object Graph Programming. 20:1-20:13 - Brent Pappas, Paul Gazzillo:
Semantic Analysis of Macro Usage for Portability. 21:1-21:12 - Adina Deiner, Gordon Fraser:
NuzzleBug: Debugging Block-Based Programs in Scratch. 22:1-22:13
Analytics
- Xiaoyun Li, Hongyu Zhang, Van-Hoang Le, Pengfei Chen:
LogShrink: Effective Log Compression by Leveraging Commonality and Variability of Log Data. 23:1-23:12 - Chenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren:
Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem. 24:1-24:13 - Islem Bouzenia, Michael Pradel:
Resource Usage and Optimization Opportunities in Workflows of GitHub Actions. 25:1-25:12 - Mingyuan Huang, Jiachi Chen, Zigui Jiang, Zibin Zheng:
Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts. 26:1-26:12 - Yue Li, Zhong Ren, Zhiqi Wang, Lanxin Yang, Liming Dong, Chenxing Zhong, He Zhang:
Fine-SE: Integrating Semantic Features and Expert Features for Software Effort Estimation. 27:1-27:12
Dependability
- Ariel Gorenstein, Shahar Maoz, Jan Oliver Ringert:
Kind Controllers and Fast Heuristics for Non-Well-Separated GR(1) Specifications. 28:1-28:12 - Felix Wallner, Bernhard K. Aichernig, Christian Burghard:
It's Not a Feature, It's a Bug: Fault-Tolerant Model Mining from Noisy Data. 29:1-29:13 - Pingchuan Ma, Zhenlan Ji, Peisen Yao, Shuai Wang, Kui Ren:
Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence Reasoning. 30:1-30:13
DNN and Language Models for Code
- Binhang Qi, Hailong Sun, Hongyu Zhang, Ruobing Zhao, Xiang Gao:
Modularizing while Training: A New Paradigm for Modularizing DNN Models. 31:1-31:12 - Lipeng Ma, Weidong Yang, Bo Xu, Sihang Jiang, Ben Fei, Jiaqing Liang, Mingjie Zhou, Yanghua Xiao:
KnowLog: Knowledge Enhanced Pre-trained Language Model for Log Understanding. 32:1-32:13 - Changan Niu, Chuanyi Li, Vincent Ng, David Lo, Bin Luo:
FAIR: Flow Type-Aware Pre-Training of Compiler Intermediate Representations. 33:1-33:12 - Qi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen, Xin Peng:
Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical Study. 34:1-34:13 - Boxi Yu, Jiayi Yao, Qiuai Fu, Zhiqing Zhong, Haotian Xie, Yaoliang Wu, Yuchi Ma, Pinjia He:
Deep Learning or Classical Machine Learning? An Empirical Study on Log-Based Anomaly Detection. 35:1-35:13 - Yangruibo Ding, Benjamin Steenhoek, Kexin Pei, Gail E. Kaiser, Wei Le, Baishakhi Ray:
TRACED: Execution-aware Pre-training for Source Code. 36:1-36:12 - Hao Yu, Bo Shen, Dezhi Ran, Jiaxin Zhang, Qi Zhang, Yuchi Ma, Guangtai Liang, Ying Li, Qianxiang Wang, Tao Xie:
CoderEval: A Benchmark of Pragmatic Code Generation with Generative Pre-trained Models. 37:1-37:12 - Shibbir Ahmed, Hongyang Gao, Hridesh Rajan:
Inferring Data Preconditions from Deep Learning Models for Trustworthy Prediction in Deployment. 38:1-38:13
Evolution
- Mingyang Geng, Shangwen Wang, Dezun Dong, Haotian Wang, Ge Li, Zhi Jin, Xiaoguang Mao, Xiangke Liao:
Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context Learning. 39:1-39:13 - Junayed Mahmud, Nadeeshan De Silva, Safwat Ali Khan, Seyed Hooman Mostafavi, S. M. Hasan Mansur, Oscar Chaparro, Andrian Marcus, Kevin Moran:
On Using GUI Interaction Data to Improve Text Retrieval-based Bug Localization. 40:1-40:13 - Pengcheng Ren, Chaoshun Zuo, Xiaofeng Liu, Wenrui Diao, Qingchuan Zhao, Shanqing Guo:
DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile Apps. 41:1-41:13 - Yang Zhang, Yiwen Wu, Tingting Chen, Tao Wang, Hui Liu, Huaimin Wang:
How do Developers Talk about GitHub Actions? Evidence from Online Software Development Community. 42:1-42:13 - Felipe Fronchetti, Nico Ritschel, Logan Schorr, Chandler Barfield, Gabriella Chang, Rodrigo O. Spínola, Reid Holmes, David C. Shepherd:
Block-based Programming for Two-Armed Robots: A Comparative Study. 43:1-43:12 - Trevor Stalnaker, Nathan Wintersgill, Oscar Chaparro, Massimiliano Di Penta, Daniel M. Germán, Denys Poshyvanyk:
BOMs Away! Inside the Minds of Stakeholders: A Comprehensive Study of Bills of Materials for Software Systems. 44:1-44:13
Fuzzing and Other Test Generation Methods
- Lianglu Pan, Shaanan Cohney, Toby Murray, Van-Thuan Pham:
EDEFuzz: A Web API Fuzzer for Excessive Data Exposures. 45:1-45:12 - Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, Manuel Rigger:
Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. 46:1-46:12 - Martin Gruber, Muhammad Firhard Roslan, Owain Parry, Fabian Scharnböck, Phil McMinn, Gordon Fraser:
Do Automatic Test Generation Tools Generate Flaky Tests? 47:1-47:12 - Junqiang Li, Senyi Li, Keyao Li, Falin Luo, Hongfang Yu, Shanshan Li, Xiang Li:
ECFuzz: Effective Configuration Fuzzing for Large-Scale Systems. 48:1-48:12 - Philipp Straubinger, Gordon Fraser:
Improving Testing Behavior by Gamifying IntelliJ. 49:1-49:13 - Jiarun Dai, Bufan Gao, Mingyuan Luo, Zongan Huang, Zhongrui Li, Yuan Zhang, Min Yang:
SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving Systems. 50:1-50:13
Human and Social Aspects, and Requirements
- Victoria Jackson, Rafael Prikladnicki, André van der Hoek:
Co-Creation in Fully Remote Software Teams. 51:1-51:12 - Jenny T. Liang, Chenyang Yang, Brad A. Myers:
A Large-Scale Survey on the Usability of AI Programming Assistants: Successes and Challenges. 52:1-52:13 - Emily Judith Arteaga Garcia, João Felipe Nicolaci Pimentel, Zixuan Feng, Marco Aurélio Gerosa, Igor Steinmacher, Anita Sarma:
How to Support ML End-User Programmers through a Conversational Agent. 53:1-53:12 - Ze Shi Li, Nowshin Nawar Arony, Kezia Devathasan, Manish Sihag, Neil A. Ernst, Daniela E. Damian:
Unveiling the Life Cycle of User Feedback: Best Practices from Software Practitioners. 54:1-54:13 - Hongbo Fang, James D. Herbsleb, Bogdan Vasilescu:
Novelty Begets Popularity, But Curbs Participation - A Macroscopic View of the Python Open-Source Ecosystem. 55:1-55:11 - Adriana Meza Soria, Taylor Lopez, Elizabeth Seero, Negin Mashhadi, Emily Evans, Janet E. Burge, André van der Hoek:
Characterizing Software Maintenance Meetings: Information Shared, Discussion Outcomes, and Information Captured. 56:1-56:13 - Jack Jamieson, Naomi Yamashita, Eureka Foong:
Predicting open source contributor turnover from value-related discussions: An analysis of GitHub issues. 57:1-57:13 - Alexander Lill, André N. Meyer, Thomas Fritz:
On the Helpfulness of Answering Developer Questions on Discord with Similar Conversations and Posts from the Past. 58:1-58:13
Security
- Jie Hu, Yue Duan, Heng Yin:
Marco: A Stochastic Asynchronous Concolic Explorer. 59:1-59:12 - Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Benjamin Livshits:
Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners? 60:1-60:13 - Marcos Tileria, Jorge Blasco, Santanu Kumar Dash:
DocFlow: Extracting Taint Specifications from Software Documentation. 61:1-61:12 - Adriana Sejfia, Satyaki Das, Saad Shafiq, Nenad Medvidovic:
Toward Improved Deep Learning-based Vulnerability Detection. 62:1-62:12 - Yongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue, Xiapu Luo, Qingchuan Zhao:
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps. 63:1-63:13 - Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu:
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG). 64:1-64:12 - Aniruddhan Murali, Noble Saji Mathews, Mahmoud Alfadel, Meiyappan Nagappan, Meng Xu:
FuzzSlice: Pruning False Positives in Static Analysis Warnings through Function-Level Fuzzing. 65:1-65:13 - Chaopeng Dong, Siyuan Li, Shouguo Yang, Yang Xiao, Yongpan Wang, Hong Li, Zhi Li, Limin Sun:
LibvDiff: Library Version Difference Guided OSS Version Identification in Binaries. 66:1-66:12
Testing with and for AI
- Sidong Feng, Chunyang Chen:
Prompting Is All You Need: Automated Android Bug Replay with Large Language Models. 67:1-67:13 - Neelofar, Aldeida Aleti:
Towards Reliable AI: Adequacy Metrics for Ensuring the Quality of System-level Testing of Autonomous Vehicles. 68:1-68:12 - Yakun Zhang, Wenjie Zhang, Dezhi Ran, Qihao Zhu, Chengfeng Dou, Dan Hao, Tao Xie, Lu Zhang:
Learning-based Widget Matching for Migrating GUI Test Cases. 69:1-69:13 - Yinlin Deng, Chunqiu Steven Xia, Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, Lingming Zhang:
Large Language Models are Edge-Case Generators: Crafting Unusual Programs for Fuzzing Deep Learning Libraries. 70:1-70:13 - Yuanhong Lan, Yifei Lu, Zhong Li, Minxue Pan, Wenhua Yang, Tian Zhang, Xuandong Li:
Deeply Reinforcing Android GUI Testing with Deep Reinforcement Learning. 71:1-71:13
AI&SE Code Models and Generated Code
- Zhou Yang, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim, DongGyun Han, David Lo:
Unveiling Memorization in Code Models. 72:1-72:13 - Junkai Chen, Xing Hu, Zhenhao Li, Cuiyun Gao, Xin Xia, David Lo:
Code Search is All You Need? Improving Code Suggestions with Code Search. 73:1-73:13 - Zongjie Li, Chaozheng Wang, Pingchuan Ma, Chaowei Liu, Shuai Wang, Daoyuan Wu, Cuiyun Gao, Yang Liu:
On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study. 74:1-74:13 - Zhensu Sun, Xiaoning Du, Fu Song, Shangwen Wang, Li Li:
When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model Inference. 75:1-75:12 - Qihao Zhu, Qingyuan Liang, Zeyu Sun, Yingfei Xiong, Lu Zhang, Shengyu Cheng:
GrammarT5: Grammar-Integrated Pretrained Encoder-Decoder Neural Model for Code. 76:1-76:13 - Zhenhao Zhou, Chaofeng Sha, Xin Peng:
On Calibration of Pre-trained Code Models. 77:1-77:13 - Ali Al-Kaswan, Maliheh Izadi, Arie van Deursen:
Traces of Memorisation in Large Language Models for Code. 78:1-78:12 - Maliheh Izadi, Jonathan Katzy, Tim van Dam, Marc Otten, Razvan Mihai Popescu, Arie van Deursen:
Language Models for Code Completion: A Practical Evaluation. 79:1-79:13 - Shuzheng Gao, Wenxin Mao, Cuiyun Gao, Li Li, Xing Hu, Xin Xia, Michael R. Lyu:
Learning in the Wild: Towards Leveraging Unlabeled Data for Effectively Tuning Pre-trained Code Models. 80:1-80:13 - Xueying Du, Mingwei Liu, Kaixin Wang, Hanlin Wang, Junwei Liu, Yixuan Chen, Jiayi Feng, Chaofeng Sha, Xin Peng, Yiling Lou:
Evaluating Large Language Models in Class-Level Code Generation. 81:1-81:13 - Rangeet Pan, Ali Reza Ibrahimzada, Rahul Krishna, Divya Sankar, Lambert Pouguem Wassi, Michele Merler, Boris Sobolev, Raju Pavuluri, Saurabh Sinha, Reyhaneh Jabbarvand:
Lost in Translation: A Study of Bugs Introduced by Large Language Models while Translating Code. 82:1-82:13
AI&SE Program Repair
- Julian Aron Prenner, Romain Robbes:
Out of Context: How important is Local Context in Neural Program Repair? 83:1-83:13 - Hadeel Eladawy, Claire Le Goues, Yuriy Brun:
Automated Program Repair, What Is It Good For? Not Absolutely Nothing! 84:1-84:13 - Wenzhang Yang, Linhai Song, Yinxing Xue:
Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior Preservation. 85:1-85:13 - Fairuz Nawer Meem, Justin Smith, Brittany Johnson:
Exploring Experiences with Automated Program Repair in Practice. 86:1-86:11 - Yiu Wai Chow, Luca Di Grazia, Michael Pradel:
PyTy: Repairing Static Type Errors in Python. 87:1-87:13 - Xin Zhou, Kisub Kim, Bowen Xu, DongGyun Han, David Lo:
Out of Sight, Out of Mind: Better Automatic Vulnerability Repair by Broadening Input Ranges and Sources. 88:1-88:13 - Changhua Luo, Wei Meng, Shuai Wang:
Strengthening Supply Chain Security with Fine-grained Safe Patch Identification. 89:1-89:12 - Shaoheng Cao, Minxue Pan, Yu Pei, Wenhua Yang, Tian Zhang, Linzhang Wang, Xuandong Li:
Comprehensive Semantic Repair of Obsolete GUI Test Scripts for Mobile Applications. 90:1-90:13 - Zunchen Huang, Chao Wang:
Constraint Based Program Repair for Persistent Memory Bugs. 91:1-91:12
AI&SE LLM and NN Applications and Other Aspects
- Yuxuan Jiang, Chaoyun Zhang, Shilin He, Zhihao Yang, Minghua Ma, Si Qin, Yu Kang, Yingnong Dang, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
Xpert: Empowering Incident Management with Query Recommendations via Large Language Models. 92:1-92:13 - Timur Babakol, Yu David Liu:
Tensor-Aware Energy Accounting. 93:1-93:12 - Yuchen Cai, Aashish Yadavally, Abhishek Mishra, Genesis Montejo, Tien N. Nguyen:
Programming Assistant for Exception Handling with CodeBERT. 94:1-94:13 - Wenhan Wang, Yanzhou Li, Anran Li, Jian Zhang, Wei Ma, Yang Liu:
An Empirical Study on Noisy Label Learning for Program Understanding. 95:1-95:12 - Yanjie Gao, Yichen He, Xinze Li, Bo Zhao, Haoxiang Lin, Yoyo Liang, Jing Zhong, Hongyu Zhang, Jingzhou Wang, Yonghua Zeng, Keli Gui, Jie Tong, Mao Yang:
An Empirical Study on Low GPU Utilization of Deep Learning Jobs. 96:1-96:13 - Daye Nam, Andrew Macvean, Vincent J. Hellendoorn, Bogdan Vasilescu, Brad A. Myers:
Using an LLM to Help With Code Understanding. 97:1-97:13 - Yanqi Su, Dianshu Liao, Zhenchang Xing, Qing Huang, Mulong Xie, Qinghua Lu, Xiwei Xu:
Enhancing Exploratory Testing by Large Language Model and Knowledge Graph. 98:1-98:12 - Zeyang Ma, An Ran Chen, Dong Jae Kim, Tse-Hsun Chen, Shaowei Wang:
LLMParser: An Exploratory Study on Using Large Language Models for Log Parsing. 99:1-99:13 - Zhe Liu, Chunyang Chen, Junjie Wang, Mengzhuo Chen, Boyu Wu, Xing Che, Dandan Wang, Qing Wang:
Make LLM a Testing Expert: Bringing Human-like Interaction to Mobile GUI Testing via Functionality-aware Decisions. 100:1-100:13
Analysis
- Raphael J. Sofaer, Yaniv David, Mingqing Kang, Jianjia Yu, Yinzhi Cao, Junfeng Yang, Jason Nieh:
RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust Domains. 101:1-101:13 - Huijia Sun, Christopher M. Poskitt, Yang Sun, Jun Sun, Yuqi Chen:
ACAV: A Framework for Automatic Causality Analysis in Autonomous Vehicle Accident Recordings. 102:1-102:13 - Xiaohu Song, Ying Wang, Xiao Cheng, Guangtai Liang, Qianxiang Wang, Zhiliang Zhu:
Efficiently Trimming the Fat: Streamlining Software Dependencies with Java Reflection and Dependency Analysis. 103:1-103:12 - Kadiray Karakaya, Eric Bodden:
Symbol-Specific Sparsification of Interprocedural Distributive Environment Problems. 104:1-104:12 - Rongxin Wu, Yuxuan He, Jiafeng Huang, Chengpeng Wang, Wensheng Tang, Qingkai Shi, Xiao Xiao, Charles Zhang:
LibAlchemy: A Two-Layer Persistent Summary Design for Taming Third-Party Libraries in Static Bug-Finding Systems. 105:1-105:13 - Mohan Cui, Shuran Sun, Hui Xu, Yangfan Zhou:
Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust Programming. 106:1-106:13 - Ruikai Huang, Manish Motwani, Idel Martinez, Alessandro Orso:
Generating REST API Specifications through Static Analysis. 107:1-107:13 - Xinyu Liu, Joy Arulraj, Alessandro Orso:
A Framework For Inferring Properties of User-Defined Functions. 108:1-108:11 - Xiao Cheng, Jiawei Wang, Yulei Sui:
Precise Sparse Abstract Execution via Cross-Domain Interaction. 109:1-109:12
Debugging
- Chenxi Zhang, Zhen Dong, Xin Peng, Bicheng Zhang, Miao Chen:
Trace-based Multi-Dimensional Root Cause Localization of Performance Issues in Microservice Systems. 110:1-110:12 - Yi Song, Xihao Zhang, Xiaoyuan Xie, Quanming Liu, Ruizhi Gao, Chenliang Xing:
ReClues: Representing and indexing failures in parallel debugging with program variables. 111:1-111:13 - Wuxia Jin, Shuo Xu, Dawei Chen, Jiajun He, Dinghong Zhong, Ming Fan, Hongxu Chen, Huijia Zhang, Ting Liu:
PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code. 112:1-112:12 - Timur Saglam, Moritz Brödel, Larissa Schmid, Sebastian Hahner:
Detecting Automatic Software Plagiarism via Token Sequence Normalization. 113:1-113:13
Testing Foundations
- Dong Jae Kim, Jinqiu Yang, Tse-Hsun Chen:
A First Look at the Inheritance-Induced Redundant Test Execution. 114:1-114:12 - Michele Pasqua, Mariano Ceccato, Paolo Tonella:
Hypertesting of Programs: Theoretical Foundation and Automated Test Generation. 115:1-115:12 - Hang Du, Vijay Krishna Palepu, James A. Jones:
Ripples of a Mutation - An Empirical Study of Propagation Effects in Mutation Testing. 116:1-116:13 - Mohammad Rifat Arefin, Suraj Shetiya, Zili Wang, Christoph Csallner:
Fast Deterministic Black-box Context-free Grammar Inference. 117:1-117:12
Testing of AI systems
- Swaroopa Dola, Rory McDaniel, Matthew B. Dwyer, Mary Lou Soffa:
CIT4DNN: Generating Diverse and Rare Inputs for Neural Networks Using Latent Space Combinatorial Testing. 118:1-118:13 - Jun Wang, Yanhui Li, Zhifei Chen, Lin Chen, Xiaofang Zhang, Yuming Zhou:
Knowledge Graph Driven Inference Testing for Question Answering Software. 119:1-119:13 - Antonio Guerriero, Roberto Pietrantuono, Stefano Russo:
DeepSample: DNN sampling-based testing for operational accuracy assessment. 120:1-120:12 - Zhaohui Wang, Min Zhang, Jingran Yang, Bojie Shao, Min Zhang:
MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient Search. 121:1-121:12
Fuzzing and Symbolic Execution
- Yue Sun, Guowei Yang, Shichao Lv, Zhi Li, Limin Sun:
Concrete Constraint Guided Symbolic Execution. 122:1-122:12 - Luiz Carvalho, Renzo Degiovanni, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis:
SpecBCFuzz: Fuzzing LTL Solvers with Boundary Conditions. 123:1-123:13 - Zhiwu Xu, Bohao Wu, Cheng Wen, Bin Zhang, Shengchao Qin, Mengda He:
RPG: Rust Library Fuzzing with Pool-based Fuzz Target Generation and Generic Support. 124:1-124:13 - Xindi Zhang, Bohan Li, Shaowei Cai:
Deep Combination of CDCL(T) and Local Search for Satisfiability Modulo Non-Linear Integer Arithmetic Theory. 125:1-125:13 - Chunqiu Steven Xia, Matteo Paltenghi, Jia Le Tian, Michael Pradel, Lingming Zhang:
Fuzz4All: Universal Fuzzing with Large Language Models. 126:1-126:13 - Shuohan Wu, Zihao Li, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou:
Are We There Yet? Unraveling the State-of-the-Art Smart Contract Fuzzers. 127:1-127:13 - Shuo Yang, Jiachi Chen, Mingyuan Huang, Zibin Zheng, Yuan Huang:
Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker Contracts. 128:1-128:12 - Katherine Hough, Jonathan Bell:
Crossover in Parametric Fuzzing. 129:1-129:12 - Shengcheng Yu, Chunrong Fang, Mingzhe Du, Yuchen Ling, Zhenyu Chen, Zhendong Su:
Practical Non-Intrusive GUI Exploration Testing with Visual-based Robotic Arms. 130:1-130:13 - Xuwei Liu, Wei You, Yapeng Ye, Zhuo Zhang, Jianjun Huang, Xiangyu Zhang:
FuzzInMem: Fuzzing Programs via In-memory Structures. 131:1-131:13 - Danushka Liyanage, Seongmin Lee, Chakkrit Tantithamthavorn, Marcel Böhme:
Extrapolating Coverage Rate in Greybox Fuzzing. 132:1-132:12
Testing: Various Bug Types
- Jinsheng Ba, Manuel Rigger:
CERT: Finding Performance Issues in Database Systems Through the Lens of Cardinality Estimation. 133:1-133:13 - Zheng Shi, Umang Mathur, Andreas Pavlogiannis:
Optimistic Prediction of Synchronization-Reversal Data Races. 134:1-134:13 - Jie Liang, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Chengnian Sun, Yu Jiang:
Mozi: Discovering DBMS Bugs via Configuration-Based Equivalent Transformation. 135:1-135:12 - Shanto Rahman, August Shi:
FlakeSync: Automatically Repairing Async Flaky Tests. 136:1-136:12 - Zhe Liu, Chunyang Chen, Junjie Wang, Mengzhuo Chen, Boyu Wu, Zhilin Tian, Yuekai Huang, Jun Hu, Qing Wang:
Testing the Limits: Unusual Text Inputs Generation for Mobile App Crash Detection with Large Language Model. 137:1-137:12 - Brian Zhang:
Towards Finding Accounting Errors in Smart Contracts. 138:1-138:13 - Xinyu Gao, Zhijie Wang, Yang Feng, Lei Ma, Zhenyu Chen, Baowen Xu:
MultiTest: Physical-Aware Object Insertion for Testing Multi-sensor Fusion Perception Systems. 139:1-139:13 - Tianyang Liu, Weixing Ji, Xiaohui Dong, Wuhuang Yao, Yizhuo Wang, Hui Liu, Haiyang Peng, Yuxuan Wang:
JLeaks: A Featured Resource Leak Repository Collected From Hundreds of Open-Source Java Projects. 140:1-140:13 - Trey Woodlief, Felipe Toledo, Sebastian G. Elbaum, Matthew B. Dwyer:
S3C: Spatial Semantic Scene Coverage for Autonomous Vehicles. 141:1-141:13 - Zhiyang Chen, Sidi Mohamed Beillahi, Fan Long:
FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven Approximation. 142:1-142:13 - Qiuyang Mang, Aoyang Fang, Boxi Yu, Hanfei Chen, Pinjia He:
Testing Graph Database Systems via Equivalent Query Rewriting. 143:1-143:12 - Tobias Dürschmid, Christopher Steven Timperley, David Garlan, Claire Le Goues:
ROSInfer: Statically Inferring Behavioral Component Models for ROS-based Robotics Systems. 144:1-144:13 - Shuxin Li, Manuel Rigger:
Finding XPath Bugs in XML Document Processors via Differential Testing. 145:1-145:12 - Jingzhou Fu, Jie Liang, Zhiyong Wu, Yu Jiang:
Sedar: Obtaining High-Quality Seeds for DBMS Fuzzing via Cross-DBMS SQL Transfer. 146:1-146:12 - Paul T. Chiou, Robert Winn, Ali S. Alotaibi, William G. J. Halfond:
Automatically Detecting Reflow Accessibility Issues in Responsive Web Pages. 147:1-147:13
AI&Security
- Shengyi Pan, Lingfeng Bao, Jiayuan Zhou, Xing Hu, Xin Xia, Shanping Li:
Towards More Practical Automation of Vulnerability Assessment. 148:1-148:13 - Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, Haipeng Cai:
VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses. 149:1-149:13 - Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang:
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty. 150:1-150:13 - Zhongxin Liu, Zhijie Tang, Junwei Zhang, Xin Xia, Xiaohu Yang:
Pre-training by Predicting Program Dependencies for Vulnerability Analysis Tasks. 151:1-151:13 - Mingyi Zhou, Xiang Gao, Jing Wu, Kui Liu, Hailong Sun, Li Li:
Investigating White-Box Attacks for On-Device Models. 152:1-152:12 - Md Mahbubur Rahman, Ira Ceka, Chengzhi Mao, Saikat Chakraborty, Baishakhi Ray, Wei Le:
Towards Causal Deep Learning for Vulnerability Detection. 153:1-153:11 - Chenyangguang Zhang, Tong Jia, Guopeng Shen, Pinyan Zhu, Ying Li:
MetaLog: Generalizable Cross-System Anomaly Detection from Logs with Meta-Learning. 154:1-154:12 - Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Wei Liu:
Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection Systems. 155:1-155:13 - Yizhou Chen, Zeyu Sun, Zhihao Gong, Dan Hao:
Improving Smart Contract Security with Contrastive Learning-based Vulnerability Detection. 156:1-156:11 - Zhen Li, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang, Hai Jin:
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities. 157:1-157:12
Security - Studies
- Owura Asare, Meiyappan Nagappan, N. Asokan:
A User-centered Security Evaluation of Copilot. 158:1-158:11 - Hanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He:
An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy Perspectives. 159:1-159:13 - Zhenpeng Chen, Jie M. Zhang, Federica Sarro, Mark Harman:
Fairness Improvement with Multiple Protected Attributes: How Far Are We? 160:1-160:13 - Yiwei Hou, Lihua Guo, Chijin Zhou, Yiwen Xu, Zijing Yin, Shanshan Li, Chengnian Sun, Yu Jiang:
An Empirical Study of Data Disruption by Ransomware Attacks. 161:1-161:12 - Susheng Wu, Wenyan Song, Kaifeng Huang, Bihuan Chen, Xin Peng:
Identifying Affected Libraries and Their Ecosystems for Open Source Software Vulnerabilities. 162:1-162:12 - Ziyu Cui, Wensheng Dou, Yu Gao, Dong Wang, Jiansen Song, Yingying Zheng, Tao Wang, Rui Yang, Kang Xu, Yixin Hu, Jun Wei, Tao Huang:
Understanding Transaction Bugs in Database Systems. 163:1-163:13 - Jiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen, Jianbo Gao, Zhong Chen:
When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIs. 164:1-164:13
Fuzzing and Vulnerability Detection
- Junda He, Zhou Yang, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo:
Curiosity-Driven Testing for Sequential Decision-Making Process. 165:1-165:14 - Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu:
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis. 166:1-166:13 - Qi Zhan, Xing Hu, Zhiyang Li, Xin Xia, David Lo, Shanping Li:
PS3: Precise Patch Presence Test based on Semantic Symbolic Signature. 167:1-167:12 - Zhijie Zhong, Zibin Zheng, Hong-Ning Dai, Qing Xue, Junjia Chen, Yuhong Nan:
PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart Contracts. 168:1-168:12 - Huanting Wang, Zhanyong Tang, Shin Hwei Tan, Jie Wang, Yuzhe Liu, Hejun Fang, Chunwei Xia, Zheng Wang:
Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction. 169:1-169:13 - Feng Luo, Ruijie Luo, Ting Chen, Ao Qiao, Zheyuan He, Shuwei Song, Yu Jiang, Sixing Li:
SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention Network. 170:1-170:13 - Xun Deng, Sidi Mohamed Beillahi, Cyrus Minwalla, Han Du, Andreas G. Veneris, Fan Long:
Safeguarding DeFi Smart Contracts against Oracle Deviations. 171:1-171:12
Static Detection Techniques
- Shuai He, Cai Fu, Hong Hu, Jiahe Chen, Jianqiang Lv, Shuai Jiang:
MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection. 172:1-172:12 - Yiming Liu, Cen Zhang, Feng Li, Yeting Li, Jianhua Zhou, Jian Wang, Lanlan Zhan, Yang Liu, Wei Huo:
Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware. 173:1-173:12 - Mingxue Zhang, Wei Meng, You Zhou, Kui Ren:
CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the Web. 174:1-174:12 - Jianjun Huang, Jianglei Nie, Yuanjun Gong, Wei You, Bin Liang, Pan Bian:
Raisin: Identifying Rare Sensitive Functions for Bug Detection. 175:1-175:12
Dependability and Formal Methods
- Yang Sun, Christopher M. Poskitt, Xiaodong Zhang, Jun Sun:
REDriver: Runtime Enforcement for Autonomous Vehicles. 176:1-176:12 - Clay Stevens, Hamid Bagheri:
Scalable Relational Analysis via Relational Bound Propagation. 177:1-177:12 - Seungwan Kwon, Jaeseong Kwon, Wooseok Kang, Juneyoung Lee, Kihong Heo:
Translation Validation for JIT Compiler in the V8 JavaScript Engine. 178:1-178:12 - Haoxian Chen, Lan Lu, Brendan Massey, Yuepeng Wang, Boon Thau Loo:
Verifying Declarative Smart Contracts. 179:1-179:12
Generative AI studies
- Minaoar Hossain Tanzil, Junaed Younus Khan, Gias Uddin:
ChatGPT Incorrectness Detection in Software Reviews. 180:1-180:12 - Raphael Serafini, Clemens Otto, Stefan Albert Horstmann, Alena Naiakshina:
ChatGPT-Resistant Screening Instrument for Identifying Non-Programmers. 181:1-181:13 - Mia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski:
Uncovering the Causes of Emotions in Software Developer Communication Using Zero-shot LLMs. 182:1-182:13 - Mateusz Dolata, Norbert Lange, Gerhard Schwabe:
Development in times of hype: How freelancers explore Generative AI? 183:1-183:13 - Rudrajit Choudhuri, Dylan Liu, Igor Steinmacher, Marco Aurélio Gerosa, Anita Sarma:
How Far Are We? The Triumphs and Trials of Generative AI in Learning Software Engineering. 184:1-184:13
Human and Social - Core
- Yimeng Ma, Yu Huang, Kevin Leach:
Breaking the Flow: A Study of Interruptions During Software Engineering Activities. 185:1-185:12 - Nick C. Bradley, Thomas Fritz, Reid Holmes:
Supporting Web-Based API Searches in the IDE Using Signatures. 186:1-186:12 - Harrison Goldstein, Joseph W. Cutler, Daniel Dickstein, Benjamin C. Pierce, Andrew Head:
Property-Based Testing in Practice. 187:1-187:13 - Hammad Ahmad, Madeline Endres, Kaia Newman, Priscila Santiesteban, Emma Shedden, Westley Weimer:
Causal Relationships and Programming Outcomes: A Transcranial Magnetic Stimulation Experiment. 188:1-188:13 - Emerson R. Murphy-Hill, Alberto Elizondo, Ambar Murillo, Marian Harbach, Bogdan Vasilescu, Delphine Carlson, Florian Dessloch:
GenderMag Improves Discoverability in the Field, Especially for Women: An Multi-Year Case Study of Suggest Edit, a Code Review Feature. 189:1-189:12 - Bianca Trinkenreich, Marco Aurélio Gerosa, Igor Steinmacher:
Unraveling the Drivers of Sense of Belonging in Software Delivery Teams: Insights from a Large-Scale Survey. 190:1-190:12 - Youmei Fan, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto:
"My GitHub Sponsors profile is live!" Investigating the Impact of Twitter/X Mentions on GitHub Sponsors. 191:1-191:12 - Elizaveta Pertseva, Melinda Chang, Ulia Zaman, Michael Coblenz:
A Theory of Scientific Programming Efficacy. 192:1-192:12 - Wenxin He, Manasvi Parikh, Westley Weimer, Madeline Endres:
High Expectations: An Observational Study of Programming and Cannabis Intoxication. 193:1-193:12 - Bohan Liu, He Zhang, Weigang Ma, Hongyu Kuang, Yi Yang, Jinwei Xu, Shan Gao, Jian Gao:
Mining Pull Requests to Detect Process Anomalies in Open Source Software Development. 194:1-194:13 - Yuxia Zhang, Mian Qin, Klaas-Jan Stol, Minghui Zhou, Hui Liu:
How Are Paid and Volunteer Open Source Developers Different? A Study of the Rust Project. 195:1-195:13 - Justin Middleton, John-Paul Ore, Kathryn T. Stolee:
Barriers for Students During Code Change Comprehension. 196:1-196:13 - Ziyao He, Syed Fatiul Huq, Sam Malek:
"I tend to view ads almost like a pestilence": On the Accessibility Implications of Mobile Ads for Blind Users. 197:1-197:13
Analytics and AI
- Youcef Remil, Anes Bendimerad, Romain Mathonat, Chedy Raïssi, Mehdi Kaytoue:
DeepLSH: Deep Locality-Sensitive Hash Learning for Fast and Efficient Near-Duplicate Crash Report Detection. 198:1-198:12 - Junjielong Xu, Ruichun Yang, Yintong Huo, Chengyu Zhang, Pinjia He:
DivLog: Log Parsing with Prompt Enhanced In-Context Learning. 199:1-199:12 - Jiamou Sun, Jieshan Chen, Zhenchang Xing, Qinghua Lu, Xiwei Xu, Liming Zhu:
Where is it? Tracing the Vulnerability-relevant Files from Vulnerability Reports. 200:1-200:13 - Moshi Wei, Nima Shiri Harzevili, Yuekai Huang, Jinqiu Yang, Junjie Wang, Song Wang:
Demystifying and Detecting Misuses of Deep Learning APIs. 201:1-201:12
Analytics - II
- Yun Peng, Ruida Hu, Ruoke Wang, Cuiyun Gao, Shuqing Li, Michael R. Lyu:
Less is More? An Empirical Study on Configuration Issues in Python PyPI Ecosystem. 202:1-202:12 - David O'Brien, Robert Dyer, Tien N. Nguyen, Hridesh Rajan:
Data-Driven Evidence-Based Syntactic Sugar Design. 203:1-203:12 - Marco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein:
Revisiting Android App Categorization. 204:1-204:12 - Fuman Xie, Chuan Yan, Mark Huasong Meng, Shao-Ming Teng, Yanjun Zhang, Guangdong Bai:
Are Your Requests Your True Needs? Checking Excessive Data Collection in VPA App. 205:1-205:12 - Jiakun Liu, Zicheng Zhang, Xing Hu, Ferdian Thung, Shahar Maoz, Debin Gao, Eran Toch, Zhipeng Zhao, David Lo:
MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based Debloating. 206:1-206:13 - Mia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski:
Shedding Light on Software Engineering-specific Metaphors and Idioms. 207:1-207:13 - Thomas Durieux:
Empirical Study of the Docker Smells Impact on the Image Size. 208:1-208:12 - Arun Krishna Vajjala, S. M. Hasan Mansur, Justin Jose, Kevin Moran:
MotorEase: Automated Detection of Motor Impairment Accessibility Issues in Mobile App UIs. 209:1-209:13
Analytics - Cross-cutting with Other Areas
- Dinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu, Yulei Sui, Pinjia He, Michael R. Lyu:
An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles. 210:1-210:13 - Ruofan Zhu, Xingyu Wang, Chengwei Liu, Zhengzi Xu, Wenbo Shen, Rui Chang, Yang Liu:
ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem. 211:1-211:12 - Jinchang Hu, Lyuye Zhang, Chengwei Liu, Sen Yang, Song Huang, Yang Liu:
Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem. 212:1-212:13
Requirements
- Carmine Ferrara, Francesco Casillo, Carmine Gravino, Andrea De Lucia, Fabio Palomba:
ReFAIR: Toward a Context-Aware Recommender for Fairness Requirements Engineering. 213:1-213:12 - Nick Feng, Lina Marsso, Sinem Getir Yaman, Yesugen Baatartogtokh, Reem Ayad, Victória Oldemburgo de Mello, Beverley A. Townsend, Isobel Standen, Ioannis Stefanakos, Calum Imrie, Genaína Nunes Rodrigues, Ana Cavalcanti, Radu Calinescu, Marsha Chechik:
Analyzing and Debugging Normative Requirements via Satisfiability Checking. 214:1-214:12 - Jan Keim, Sophie Corallo, Dominik Fuchß, Tobias Hey, Tobias Telge, Anne Koziolek:
Recovering Trace Links Between Software Documentation And Code. 215:1-215:13 - Hui Gao, Hongyu Kuang, Wesley K. G. Assunção, Christoph Mayr-Dorn, Guoping Rong, He Zhang, Xiaoxing Ma, Alexander Egyed:
TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among Artifacts. 216:1-216:13
Evolution and AI
- Haoran Li, Siqian Wang, Weihong Quan, Xiaoli Gong, Huayou Su, Jin Zhang:
Prism: Decomposing Program Semantics for Code Clone Detection through Compilation. 217:1-217:13 - Antonio Mastropaolo, Matteo Ciniselli, Massimiliano Di Penta, Gabriele Bavota:
Evaluating Code Summarization Techniques: A New Metric and an Empirical Characterization. 218:1-218:13 - David O'Brien, Sumon Biswas, Sayem Mohammad Imtiaz, Rabe Abdalkareem, Emad Shihab, Hridesh Rajan:
Are Prompt Engineering and TODO Comments Friends or Foes? An Evaluation on GitHub Copilot. 219:1-219:13 - Toufique Ahmed, Kunal Suresh Pai, Premkumar T. Devanbu, Earl T. Barr:
Automatic Semantic Augmentation of Language Model Prompts (for Code Summarization). 220:1-220:13 - Zhiwei Xu, Shaohua Qiang, Dinghong Song, Min Zhou, Hai Wan, Xibin Zhao, Ping Luo, Hongyu Zhang:
DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions. 221:1-221:12 - Siyue Feng, Wenqi Suo, Yueming Wu, Deqing Zou, Yang Liu, Hai Jin:
Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection. 222:1-222:13
Program Binaries - Evolvability
- Ang Jia, Ming Fan, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu:
Cross-Inlining Binary Function Similarity Detection. 223:1-223:13 - Ling Jiang, Junwen An, Huihui Huang, Qiyi Tang, Sen Nie, Shi Wu, Yuqun Zhang:
BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code Matching. 224:1-224:13 - Zhiyuan Pan, Xing Hu, Xin Xia, Xian Zhan, David Lo, Xiaohu Yang:
PPT4J: Patch Presence Test for Java Binaries. 225:1-225:12
Evolution - II
- Hao Zhong, Na Meng:
Compiler-directed Migrating API Callsite of Client Code. 226:1-226:12 - Zejun Zhang, Zhenchang Xing, Dehai Zhao, Qinghua Lu, Xiwei Xu, Liming Zhu:
Hard to Read and Understand Pythonic Idioms? DeIdiom and Explain Them in Non-Idiomatic Equivalent Code. 227:1-227:12 - Zirui Chen, Xing Hu, Xin Xia, Yi Gao, Tongtong Xu, David Lo, Xiaohu Yang:
Exploiting Library Vulnerability via Migration Based Automating Test Generation. 228:1-228:12 - Yi Gao, Xing Hu, Tongtong Xu, Xin Xia, David Lo, Xiaohu Yang:
MUT: Human-in-the-Loop Unit Test Migration. 229:1-229:12 - Yanming Yang, Xing Hu, Xin Xia, David Lo, Xiaohu Yang:
Streamlining Java Programming: Uncovering Well-Formed Idioms with IdioMine. 230:1-230:12 - Jean-Rémy Falleri, Matias Martinez:
Fine-grained, accurate and scalable source differencing. 231:1-231:12 - Yanfu Yan, Nathan Cooper, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk:
Semantic GUI Scene Learning and Video Alignment for Detecting Duplicate Video-based Bug Reports. 232:1-232:13 - Mahmoud Alfadel, Shane McIntosh:
The Classics Never Go Out of Style: An Empirical Study of Downgrades from the Bazel Build Technology. 233:1-233:12 - Hong Jin Kang, Kevin Wang, Miryung Kim:
Scaling Code Pattern Inference with Interactive What-If Analysis. 234:1-234:12 - Chunhao Dong, Yanjie Jiang, Nan Niu, Yuxia Zhang, Hui Liu:
Context-Aware Name Recommendation for Field Renaming. 235:1-235:13 - Yoonjong Na, Seunghoon Woo, Joomyeong Lee, Heejo Lee:
CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source Components. 236:1-236:12 - Cyrine Zid, Fiorella Zampetti, Giuliano Antoniol, Massimiliano Di Penta:
A Study on the Pythonic Functional Constructs' Understandability. 237:1-237:13
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.