default search action
37th ASE 2022: Rochester, MI, USA
- 37th IEEE/ACM International Conference on Automated Software Engineering, ASE 2022, Rochester, MI, USA, October 10-14, 2022. ACM 2022, ISBN 978-1-4503-9475-8
Research Papers
- Jiwei Yan, Shixin Zhang, Yepang Liu, Xi Deng, Jun Yan, Jian Zhang:
A Comprehensive Evaluation of Android ICC Resolution Techniques. 1:1-1:13 - Hoan Anh Nguyen, Hung Dang Phan, Syeda Khairunnesa Samantha, Son Nguyen, Aashish Yadavally, Shaohua Wang, Hridesh Rajan, Tien N. Nguyen:
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications. 2:1-2:13 - Jaehyung Lee, Kisun Han, Hwanjo Yu:
A Light Bug Triage Framework for Applying Large Pre-trained Language Model. 3:1-3:11 - Tao Huang, Pengfei Chen, Jingrun Zhang, Ruipeng Li, Rui Wang:
A Transferable Time Series Forecasting Service Using Deep Transformer Model for Online Systems. 4:1-4:12 - Rongxin Wu, Minglei Chen, Chengpeng Wang, Gang Fan, Jiguang Qiu, Charles Zhang:
Accelerating Build Dependency Error Detection via Virtual Build. 5:1-5:12 - Ju Qian, Yingwei Ma, Chenghao Lin, Lin Chen:
Accelerating OCR-Based Widget Localization for Test Automation of GUI Applications. 6:1-6:13 - Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. 7:1-7:13 - Chengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang, Zhou Yang, Xin Zhou, Jieke Shi, Junda He, DongGyun Han, David Lo:
Answer Summarization for Technical Queries: Benchmark and New Approach. 8:1-8:13 - Cedric Richter, Jan Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, Heike Wehrheim:
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? 9:1-9:12 - Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. 10:1-10:12 - José Antonio Hernández López, Martin Weyssow, Jesús Sánchez Cuadrado, Houari A. Sahraoui:
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models. 11:1-11:11 - Tomasz Kuchta, Bartosz Zator:
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems. 12:1-12:12 - Jialu Zhang, De Li, John Charles Kolesar, Hanyuan Shi, Ruzica Piskac:
Automated Feedback Generation for Competition-Level Code. 13:1-13:13 - Fangwen Mu, Xiao Chen, Lin Shi, Song Wang, Qing Wang:
Automatic Comment Generation via Multi-Pass Deliberation. 14:1-14:12 - Finlay Macklon, Mohammad Reza Taesiri, Markos Viggiato, Stefan Antoszko, Natalia Romanova, Dale Paas, Cor-Paul Bezemer:
Automatically Detecting Visual Bugs in HTML5 Canvas Games. 15:1-15:11 - Hamed Barzamini, Mona Rahimi:
B-AIS: An Automated Process for Black-box Evaluation of Visual Perception in AI-enabled Software against Domain Semantics. 16:1-16:13 - Xiaoyuan Xie, Pengbo Yin, Songqiang Chen:
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided Method. 17:1-17:13 - Chen Zhang, Bihuan Chen, Junhao Hu, Xin Peng, Wenyun Zhao:
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds. 18:1-18:13 - Arianna Blasi, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè:
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints. 19:1-19:11 - Vikram Nitin, Shubhi Asthana, Baishakhi Ray, Rahul Krishna:
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture. 20:1-20:12 - Weilin Luo, Hai Wan, Delong Zhang, Jianfeng Du, Hengdi Su:
Checking LTL Satisfiability via End-to-end Learning. 21:1-21:13 - Jiyang Zhang, Sheena Panthaplackel, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
CoditT5: Pretraining for Source Code and Natural Language Editing. 22:1-22:12 - Zhiqiang Zang, Nathan Wiatrek, Milos Gligoric, August Shi:
Compiler Testing using Template Java Programs. 23:1-23:13 - Jieke Shi, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo:
Compressing Pre-trained Models of Code into 3 MB. 24:1-24:12 - Boqi Chen, Kristóf Marussy, Sebastian Pilarski, Oszkár Semeráth, Dániel Varró:
Consistent Scene Graph Generation by Constraint Optimization. 25:1-25:13 - Yanqi Su, Zheming Han, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu, Qinghua Lu:
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing. 26:1-26:13 - Vidush Singhal, Akul Abhilash Pillai, Charitha Saumya, Milind Kulkarni, Aravind Machiry:
Cornucopia : A Framework for Feedback Guided Generation of Binaries. 27:1-27:13 - Aryaz Eghbali, Michael Pradel:
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of Code. 28:1-28:12 - Mia Mohammad Imran, Yashasvi Jain, Preetha Chatterjee, Kostadin Damevski:
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication. 29:1-29:13 - Chenyang Yang, Rachel A. Brower-Sinning, Grace A. Lewis, Christian Kästner:
Data Leakage in Notebooks: Static Detection and Better Processes. 30:1-30:12 - Simin Chen, Mirazul Haque, Cong Liu, Wei Yang:
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks. 31:1-31:13 - Oskar Haarklou Veileborg, Georgian-Vlad Saioc, Anders Møller:
Detecting Blocking Errors in Go Programs using Localized Abstract Interpretation. 32:1-32:12 - Sheikh Shadab Towqir, Bowen Shen, Muhammad Ali Gulzar, Na Meng:
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis. 33:1-33:13 - Yueming Wu, Siyue Feng, Deqing Zou, Hai Jin:
Detecting Semantic Code Clones by Building AST-based Markov Chains Model. 34:1-34:13 - Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, Dan Ye:
Differentially Testing Database Transactions for Fun and Profit. 35:1-35:12 - Jianzhong Su, Hong-Ning Dai, Lingjun Zhao, Zibin Zheng, Xiapu Luo:
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing. 36:1-36:12 - Jinsheng Ba, Gregory J. Duck, Abhik Roychoudhury:
Efficient Greybox Fuzzing to Detect Memory Errors. 37:1-37:12 - Yunfan Zhang, Ruidong Zhu, Yingfei Xiong, Tao Xie:
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded Verification. 38:1-38:12 - Zijing Yin, Yiwen Xu, Chijin Zhou, Yu Jiang:
Empirical Study of System Resources Abused by IoT Attackers. 39:1-39:13 - Hao Zhong:
Enriching Compiler Testing with Real Program from Bug Report. 40:1-40:12 - Yi Song, Xiaoyuan Xie, Xihao Zhang, Quanming Liu, Ruizhi Gao:
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault Isolation. 41:1-41:13 - Rishabh Ranjan, Ishita Agrawal, Subodh Sharma:
Exploiting Epochs and Symmetries in Analysing MPI Programs. 42:1-42:12 - Mauro Bringolf, Dominik Winterer, Zhendong Su:
Finding and Understanding Incompleteness Bugs in SMT Solvers. 43:1-43:10 - Ashwin Kallingal Joshy, Wei Le:
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures. 44:1-44:12 - Haeun Lee, Soomin Kim, Sang Kil Cha:
Fuzzle: Making a Puzzle for Fuzzers. 45:1-45:12 - Haoxiang Tian, Guoquan Wu, Jiren Yan, Yan Jiang, Jun Wei, Wei Chen, Shuo Li, Dan Ye:
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior Patterns. 46:1-46:12 - Nuno Saavedra, João F. Ferreira:
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code. 47:1-47:12 - Zilong He, Pengfei Chen, Yu Luo, Qiuyu Yan, Hongyang Chen, Guangba Yu, Fangyuan Li:
Graph based Incident Extraction and Diagnosis in Large-Scale Online Systems. 48:1-48:13 - Jingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, Yu Jiang:
Griffin : Grammar-Free DBMS Fuzzing. 49:1-49:12 - Navid Salehnamadi, Forough Mehralian, Sam Malek:
Groundhog: An Automated Accessibility Crawler for Mobile Apps. 50:1-50:12 - Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. 51:1-51:12 - An Ran Chen, Tse-Hsun (Peter) Chen, Junjie Chen:
How Useful is Code Change Information for Fault Localization in Continuous Integration? 52:1-52:12 - Yuanping Yu, Xiangkun Jia, Yuwei Liu, Yanhao Wang, Qian Sang, Chao Zhang, Purui Su:
HTFuzz: Heap Operation Sequence Sensitive Fuzzing. 53:1-53:13 - Quentin Le Dilavrec, Djamel Eddine Khelladi, Arnaud Blouin, Jean-Marc Jézéquel:
HyperAST: Enabling Efficient Analysis of Software Histories at Scale. 54:1-54:12 - Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications. 55:1-55:13 - Chenguang Zhu, Ye Liu, Xiuheng Wu, Yi Li:
Identifying Solidity Smart Contract API Documentation Errors. 56:1-56:13 - Yu Liu, Pengyu Nie, Owolabi Legunsen, Milos Gligoric:
Inline Tests. 57:1-57:13 - Meiqiu Xu, Ying Wang, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Insight: Exploring Cross-Ecosystem Vulnerability Impacts. 58:1-58:13 - Haoye Tian, Xunzhu Tang, Andrew Habib, Shangwen Wang, Kui Liu, Xin Xia, Jacques Klein, Tegawendé F. Bissyandé:
Is this Change the Answer to that Problem?: Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. 59:1-59:13 - Miao Chen, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Weihang Wang:
Jasmine: A Static Analysis Framework for Spring Core Technologies. 60:1-60:13 - Ibrahim Mesecan, Daniel Blackwell, David Clark, Myra B. Cohen, Justyna Petke:
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage. 61:1-61:12 - Yang Sun, Christopher M. Poskitt, Jun Sun, Yuqi Chen, Zijiang Yang:
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles. 62:1-62:12 - Junrui Liu, Yanju Chen, Bryan Tan, Isil Dillig, Yu Feng:
Learning Contract Invariants Using Reinforcement Learning. 63:1-63:11 - Zhao Tian, Junjie Chen, Qihao Zhu, Junjie Yang, Lingming Zhang:
Learning to Construct Better Mutation Faults. 64:1-64:13 - Jingbo Wang, Chao Wang:
Learning to Synthesize Relational Invariants. 65:1-65:12 - Sofia Reis, Rui Abreu, Marcelo d'Amorim, Daniel Fortunato:
Leveraging Practitioners' Feedback to Improve a Security Linter. 66:1-66:12 - Juan Manuel Copia, Pablo Ponzio, Nazareno Aguirre, Alessandra Gorla, Marcelo F. Frias:
LISSA: Lazy Initialization with Specialized Solver Aid. 67:1-67:12 - Rui Xie, Tianxiang Hu, Wei Ye, Shikun Zhang:
Low-Resources Project-Specific Code Summarization. 68:1-68:12 - Liu Wang, Haoyu Wang, Xiapu Luo, Yulei Sui:
MalWhiteout: Reducing Label Errors in Android Malware Detection. 69:1-69:13 - Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. 70:1-70:13 - Qingchao Shen, Junjie Chen, Jie M. Zhang, Haoyu Wang, Shuang Liu, Menghan Tian:
Natural Test Generation for Precise Testing of Question Answering Software. 71:1-71:12 - Patric Feldmeier, Gordon Fraser:
Neuroevolution-Based Generation of Tests and Oracles for Games. 72:1-72:13 - Jasmine Latendresse, Suhaib Mujahid, Diego Elias Costa, Emad Shihab:
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM. 73:1-73:12 - Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang:
Patching Weak Convolutional Neural Network Models through Modularization and Composition. 74:1-74:12 - Xianchang Luo, Yinxing Xue, Zhenchang Xing, Jiamou Sun:
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language Models. 75:1-75:13 - Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Min Yang:
Precise (Un)Affected Version Analysis for Web Vulnerabilities. 76:1-76:13 - Tahmid Rafi, Xueling Zhang, Xiaoyin Wang:
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing. 77:1-77:13 - Jie Su, Cong Tian, Zuchao Yang, Jiyu Yang, Bin Yu, Zhenhua Duan:
Prioritized Constraint-Aided Dynamic Partial-Order Reduction. 78:1-78:13 - Qing Huang, Zhiqiang Yuan, Zhenchang Xing, Xiwei Xu, Liming Zhu, Qinghua Lu:
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial Code. 79:1-79:13 - Zhaodi Zhang, Yiting Wu, Si Liu, Jing Liu, Min Zhang:
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks. 80:1-80:13 - Zixi Liu, Yang Feng, Yining Yin, Jingyu Sun, Zhenyu Chen, Baowen Xu:
QATest: A Uniform Fuzzing Framework for Question Answering Systems. 81:1-81:12 - Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Min Zhang, Taolue Chen, Jun Sun:
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks. 82:1-82:13 - Zhuo Zhang, Yan Lei, Meng Yan, Yue Yu, Jiachi Chen, Shangwen Wang, Xiaoguang Mao:
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach. 83:1-83:13 - Alexi Turcotte, Mark W. Aldrich, Frank Tip:
reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications. 84:1-84:12 - Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong:
Repairing Failure-inducing Inputs with Input Reflection. 85:1-85:13 - Zhong Li, Minxue Pan, Yu Pei, Tian Zhang, Linzhang Wang, Xuandong Li:
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering Datasets. 86:1-86:13 - Max Taylor, Johnathon Aurand, Feng Qin, Xiaorui Wang, Brandon Henry, Xiangyu Zhang:
SA4U: Practical Static Analysis for Unit Type Error Detection. 87:1-87:11 - Jie Zhu, Leye Wang, Xiao Han:
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment. 88:1-88:13 - David Fernández-Amorós, Ruben Heradio, Christoph Mayr-Dorn, Alexander Egyed:
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel. 89:1-89:12 - Fuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, Guangdong Bai:
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. 90:1-90:13 - Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Yutian Tang:
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test Generation. 91:1-91:12 - He Ye, Matias Martinez, Xiapu Luo, Tao Zhang, Martin Monperrus:
SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics. 92:1-92:13 - Chao Wang, Rongxin Wu, Haohao Song, Jiwu Shu, Guoqing Li:
smartPip: A Smart Approach to Resolving Python Dependency Conflict Issues. 93:1-93:12 - Houssem Ben Braiek, Ali Tfaily, Foutse Khomh, Thomas Reid, Ciro Guida:
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft Design. 94:1-94:13 - Clement Poncelet, Konstantinos Sagonas, Nicolas Tsiftes:
So Many Fuzzers, So Little Time✱: Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)Stack. 95:1-95:12 - Emanuela Guglielmi, Giovanni Rosa, Simone Scalabrino, Gabriele Bavota, Rocco Oliveto:
Sorry, I don't Understand: Improving Voice User Interface Testing. 96:1-96:12 - Wenkang Zhong, Hongliang Ge, Hongfei Ai, Chuanyi Li, Kui Liu, Jidong Ge, Bin Luo:
StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair Systems. 97:1-97:13 - Ke Sun, Yifan Zhao, Dan Hao, Lu Zhang:
Static Type Recommendation for Python. 98:1-98:13 - Qi Xin, Qirun Zhang, Alessandro Orso:
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software Debloating. 99:1-99:13 - Emilio Coppa, Heng Yin, Camil Demetrescu:
SymFusion: Hybrid Instrumentation for Concolic Execution. 100:1-100:12 - Yuhui Su, Chunyang Chen, Junjie Wang, Zhe Liu, Dandan Wang, Shoubin Li, Qing Wang:
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile Apps. 101:1-101:12 - Andrea Stocco, Paulo J. Nunes, Marcelo d'Amorim, Paolo Tonella:
ThirdEye: Attention Maps for Safe Autonomous Driving Systems. 102:1-102:12 - Forough Mehralian, Navid Salehnamadi, Syed Fatiul Huq, Sam Malek:
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps. 103:1-103:13 - Yingyi Zhang, Zan Wang, Jiajun Jiang, Hanmo You, Junjie Chen:
Toward Improving the Robustness of Deep Learning Models via Model Transformation. 104:1-104:13 - Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. 105:1-105:13 - Wei Tang, Zhengzi Xu, Chengwei Liu, Jiahui Wu, Shouguo Yang, Yi Li, Ping Luo, Yang Liu:
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem. 106:1-106:12 - Deheng Yang, Xiaoguang Mao, Liqian Chen, Xuezheng Xu, Yan Lei, David Lo, Jiayu He:
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program Repair. 107:1-107:13 - Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu:
TransRepair: Context-aware Program Repair for Compilation Errors. 108:1-108:13 - Yutao Hu, Deqing Zou, Junru Peng, Yueming Wu, Junjie Shan, Hai Jin:
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection. 109:1-109:12 - Elias Kuiter, Sebastian Krieter, Chico Sundermann, Thomas Thüm, Gunter Saake:
Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses. 110:1-110:13 - Yiwen Wu, Yang Zhang, Kele Xu, Tao Wang, Huaimin Wang:
Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS Projects. 111:1-111:13 - Fahimeh Ebrahimi, Anas Mahmoud:
Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews. 112:1-112:12 - Yuanyuan Yuan, Qi Pang, Shuai Wang:
Unveiling Hidden DNN Defects with Decision-Based Metamorphic Testing. 113:1-113:13 - Hui Gao, Hongyu Kuang, Kexin Sun, Xiaoxing Ma, Alexander Egyed, Patrick Mäder, Guoping Rong, Dong Shao, He Zhang:
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability Recovery. 114:1 - Suwan Li, Lei Bu, Guangdong Bai, Zhixiu Guo, Kai Chen, Hanlin Wei:
VITAS : Guided Model-based VUI Testing of VPA Apps. 115:1-115:12 - Hao Zhong:
Which Exception Shall We Throw? 116:1-116:12
Doctoral Symposium
- Michael C. Gerten:
A Framework for Testing Chemical Reaction Networks. 117:1-117:5 - Cícero A. G. Araújo:
A model for automatic generating reusable code from multiple GUIs. 118:1-118:3 - Aurora Papotti:
Assessment of Automated (Intelligent) Toolchains. 119:1-119:3 - Animesh Chaturvedi:
Call Graph Evolution Analytics over a Version Series of an Evolving Software System. 120:1-120:5 - Haibo Chen, Jinfu Chen:
Coverage-based Greybox Fuzzing with Pointer Monitoring for C Programs. 121:1-121:4 - Mouna Dhaouadi:
Extraction and Management of Rationale. 122:1-122:3 - Sayma Sultana:
Identification and Mitigation of Gender Biases to Promote Diversity and Inclusion among Open Source Communities. 123:1-123:5 - Jaydeb Sarker:
Identification and Mitigation of Toxic Communications Among Open Source Software Developers. 124:1-124:5 - Yifan Zhang:
Leveraging Artificial Intelligence on Binary Code Comprehension. 125:1-125:3 - Sara Fernandes:
Towards a Live Environment for Code Refactoring. 126:1-126:5 - Asem Ghaleb:
Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart Contracts. 127:1-127:5 - Asif Kamal Turzo:
Towards Improving Code Review Effectiveness Through Task Automation. 128:1-128:5
Industry Showcase
- Firas Bayram, Bestoun S. Ahmed, Erik Hallin, Anton Engman:
A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial Processes. 129:1-129:5 - Frank Bagehorn, Jesus Rios, Saurabh Jha, Robert Filepp, Larisa Shwartz, Naoki Abe, Xi Yang:
A fault injection platform for learning AIOps models. 130:1-130:5 - Patrick Stöckle, Theresa Wasserer, Bernd Grobauer, Alexander Pretschner:
Automated Identification of Security-Relevant Configuration Settings Using NLP. 131:1-131:5 - Lei Liu, Wei-Peng Chen, Mehdi Bahrami, Mukul R. Prasad:
Automatic Generation of Visualizations for Machine Learning Pipelines. 132:1-132:5 - Yeonhee Ryou, Sangwoo Joh, Joonmo Yang, Sujin Kim, Youil Kim:
Code Understanding Linter to Detect Variable Misuse. 133:1-133:5 - Ate Penders, Ana Lucia Varbanescu, Gregor Pavlin, Henk J. Sips:
Design-Space Exploration for Decision-Support Software. 134:1-134:6 - Zhengwei Lv, Chao Peng, Zhao Zhang, Ting Su, Kai Liu, Ping Yang:
Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement Learning. 135:1-135:5 - Meriel von Stein, Sebastian G. Elbaum:
Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot. 136:1-136:5 - Manish Ahuja, Sukhavasi Narendranath, Swapnajeet Gon Choudhury, Kaushik Amar Das, Kapil Singi, Kuntal Dey, Vikrant Kaulgud:
MCDA Framework for Edge-Aware Multi-Cloud Hybrid Architecture Recommendation. 137:1-137:2 - Yi Liu, Yuekang Li, Yang Liu, Ruiyuan Wan, Runchao Wu, Qingkun Liu:
Morest: Industry Practice of Automatic RESTful API Testing. 138:1-138:5 - Ge Fan, Chaoyun Zhang, Kai Wang, Junyang Chen:
MV-HAN: A Hybrid Attentive Networks based Multi-View Learning Model for Large-scale Contents Recommendation. 139:1-139:5 - Yuchen Zhang, Yunhang Zhang, Georgios Portokalidis, Jun Xu:
Towards Understanding the Runtime Performance of Rust. 140:1-140:6
Late Breaking Results
- Lucas Marcondes Pavelski, Rodrigo de Souza Braga:
A real-world case study for automated ticket team assignment using natural language processing and explainable models. 141:1-141:3 - Priyavanshi Pathania, Rohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden:
ESAVE: Estimating Server and Virtual Machine Energy. 142:1-142:3 - Tim Sonnekalb, Bernd Gruner, Clemens-Alexander Brust, Patrick Mäder:
Generalizability of Code Clone Detection on CodeBERT. 143:1-143:3 - Gustavo Rodrigues dos Reis, Adrian Mos, Mario Cortes Cornax, Cyril Labbé:
Prototyping Deep Learning Applications with Non-Experts: An Assistant Proposition. 144:1-144:3 - Bo Li, Dehui Du, Sicong Chen, Minjun Wei, Chenghang Zheng, Xinyuan Zhang:
SML4ADS: An Open DSML for Autonomous Driving Scenario Representation and Generation. 145:1-145:3 - Sung-Shik Jongmans:
Towards Gradual Multiparty Session Typing. 146:1-146:3 - Nghi D. Q. Bui, Yijun Yu:
Towards Robust Models of Code via Energy-Based Learning on Auxiliary Datasets. 147:1-147:3 - Anh T. V. Dau, Nghi D. Q. Bui, Thang Nguyen-Duc, Hoang Thanh-Tung:
Towards Using Data-Influence Methods to Detect Noisy Samples in Source Code Corpora. 148:1-148:3
Tool Demonstrations
- Cláudia Mamede, Eduard Pinconschi, Rui Abreu:
A transformer-based IDE plugin for vulnerability detection. 149:1-149:4 - Sen Wang, Zhuheng Sheng, Jingwei Xu, Taolue Chen, Junjun Zhu, Shuhui Zhang, Yuan Yao, Xiaoxing Ma:
ADEPT: A Testing Platform for Simulated Autonomous Driving. 150:1-150:4 - Guanjie Qiu, Diwei Chen, Shuai Zhang, Yitian Chai, Xiaodong Gu, Beijun Shen:
Answering Software Deployment Questions via Neural Machine Reading at Scale. 151:1-151:4 - Eman Abdullah AlOmar, Anton Ivanov, Zarina Kurbatova, Yaroslav Golubev, Mohamed Wiem Mkaouer, Ali Ouni, Timofey Bryksin, Le Nguyen, Amit Kini, Aditya Thakur:
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE. 152:1-152:4 - Mark W. Aldrich, Alexi Turcotte, Matthew Blanco, Frank Tip:
Augur: Dynamic Taint Analysis for Asynchronous JavaScript. 153:1-153:4 - Sen Chen, Yuxin Zhang, Lingling Fan, Jiaming Li, Yang Liu:
AUSERA: Automated Security Vulnerability Detection for Android Apps. 154:1-154:5 - Lissette Almonte, Esther Guerra, Iván Cantador, Juan de Lara:
Building recommenders for modelling languages with Droid. 155:1-155:4 - Bernd Fischer, Salvatore La Torre, Gennaro Parlato, Peter Schrammel:
CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow Memory. 156:1-156:5 - Olivier Le Goaër, Julien Hertout:
ecoCode: a SonarQube Plugin to Remove Energy Smells from Android Projects. 157:1-157:4 - Jiawei He, Zhida Bao, Quanjun Zhang, Weisong Sun, Jiawei Liu, Chunrong Fang, Yun Lin:
ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic Relation. 158:1-158:5 - Sivani Voruganti, Kevin Jesse, Premkumar T. Devanbu:
FlexType: A Plug-and-Play Framework for Type Inference Models. 159:1-159:5 - Ye Liu, Yi Li:
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts. 160:1-160:4 - Sara Fernandes, Ademar Aguiar, André Restivo:
LiveRef: a Tool for Live Refactoring Java Code. 161:1-161:4 - Amr Moussa, John-Paul Ore:
Maktub: Lightweight Robot System Test Creation and Automation. 162:1-162:4 - William Eiers, Ganesh Sankaran, Albert Li, Emily O'Mahony, Benjamin Prince, Tevfik Bultan:
Quacky: Quantitative Access Control Permissiveness Analyzer✱. 163:1-163:5 - Dehui Du, Ana Cavalcanti, Jihui Nie:
RoboSimVer: A Tool for RoboSim Modeling and Analysis. 164:1-164:4 - Alberto D. Rodriguez, Timothy Newman, Katherine R. Dearstyne, Jane Cleland-Huang:
SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems. 165:1-165:4 - Ali Ghanbari, Andrian Marcus:
Shibboleth: Hybrid Patch Correctness Assessment in Automated Program Repair. 166:1-166:4 - Nicholas M. Synovic, Matt Hyatt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal:
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics. 167:1-167:4 - Aatira Anum Ahmad, Mubashir Anwar, Hashim Sharif, Ashish Gehani, Fareed Zaffar:
Trimmer: Context-Specific Code Reduction. 168:1-168:5 - Vipawan Jarukitpipat, Klinton Chhun, Wachirayana Wanprasert, Chaiyong Ragkhitwetsagul, Morakot Choetkiertikul, Thanwadee Sunetnanta, Raula Gaikovina Kula, Bodin Chinthanet, Takashi Ishio, Kenichi Matsumoto:
V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities. 169:1-169:4 - Ennio Visconti, Christos Tsigkanos, Laura Nenzi:
WebMonitor: Verification of Web User Interfaces. 170:1-170:4 - Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. 171:1-171:4
New Ideas and Emerging Results (NIER) Track
- Jinfu Chen, Shengran Wang, Saihua Cai, Chi Zhang, Haibo Chen, Jingyi Chen, Jianming Zhang:
A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity. 172:1-172:5 - Gan Wang, Zan Wang, Junjie Chen, Xiang Chen, Ming Yan:
An Empirical Study on Numerical Bugs in Deep Learning Programs. 173:1-173:5 - Junaed Younus Khan, Gias Uddin:
Automatic Code Documentation Generation Using GPT-3. 174:1-174:6 - Adil Mukhtar, Birgit Hofer, Dietmar Jannach, Franz Wotawa, Konstantin Schekotihin:
Boosting Spectrum-Based Fault Localization for Spreadsheets with Product Metrics in a Learning Approach. 175:1-175:5 - Mouna Dhaouadi, Bentley James Oakes, Michalis Famelis:
End-to-End Rationale Reconstruction. 176:1-176:5 - Toufique Ahmed, Premkumar T. Devanbu:
Few-shot training LLMs for project-specific code-summarization. 177:1-177:5 - Jörg Kienzle, Benoît Combemale, Gunter Mussbacher, Omar Alam, Francis Bordeleau, Lola Burgueño, Gregor Engels, Jessie Galasso, Jean-Marc Jézéquel, Bettina Kemme, Sébastien Mosser, Houari A. Sahraoui, Maximilian Schiedermeier, Eugene Syriani:
Global Decision Making Over Deep Variability in Feedback-Driven Software Development. 178:1-178:6 - Misoo Kim, Youngkyoung Kim, Kicheol Kim, Eunseok Lee:
Multi-objective Optimization-based Bug-fixing Template Mining for Automated Program Repair. 179:1-179:5 - Anh Tuan Nguyen, Aashish Yadavally, Tien N. Nguyen:
Next Syntactic-Unit Code Completion and Applications. 180:1-180:5 - Yoon-Ho Choi, Jaechang Nam:
On the Naturalness of Bytecode Instructions. 181:1-181:5 - Anh Duc Vu, Timo Kehrer, Christos Tsigkanos:
Outcome-Preserving Input Reduction for Scientific Data Analysis Workflows. 182:1-182:5 - Giacomo Priamo, Daniele Cono D'Elia, Leonardo Querzoni:
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection. 183:1-183:5 - Palina Tolmach, Yi Li, Shang-Wei Lin:
Property-Based Automated Repair of DeFi Protocols. 184:1-184:5 - Dharun Anandayuvaraj, James C. Davis:
Reflecting on Recurring Failures in IoT Development. 185:1-185:5 - Vikas Kumar Malviya, Chee Wei Leow, Ashok Kasthuri, Yan Naing Tun, Lwin Khin Shar, Lingxiao Jiang:
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps. 186:1-186:6 - Christoph Treude:
Taming Multi-Output Recommenders for Software Engineering. 187:1-187:5 - Xin Wang, Xiao Liu, Pingyi Zhou, Qixia Liu, Jin Liu, Hao Wu, Xiaohui Cui:
Test-Driven Multi-Task Learning with Functionally Equivalent Code Transformation for Neural Code Generation. 188:1-188:6 - Matteo Camilli, Raffaela Mirandola, Patrizia Scandurra:
XSA: eXplainable Self-Adaptation. 189:1-189:5
Student Research Competition
- Ye Liu:
A Unified Specification Mining Framework for Smart Contracts. 190:1-190:3 - Rajshakhar Paul:
ASTOR: An Approach to Identify Security Code Reviews. 191:1-191:3 - Prabuddha Chakraborty:
Automatic Software Timing Attack Evaluation & Mitigation on Clear Hardware Assumption. 192:1-192:3 - Hailie Mitchell:
Automatically Fixing Breaking Changes of Data Science Libraries. 193:1-193:3 - Chenhao Wei, Lu Xiao, Tingting Yu, Xinyu Chen, Xiao Wang, Sunny Wong, Abigail Clune:
Automatically Tagging the "AAA" Pattern in Unit Test Cases Using Machine Learning Models. 194:1-194:3 - Islem Bouzenia:
Detecting Inconsistencies in If-Condition-Raise Statements. 195:1-195:3 - Frank Dixon Whitworth:
Execution Path Detection through Dynamic Analysis in Black-Box Testing Environments. 196:1-196:3 - Sayma Sultana:
Identifying Sexism and Misogyny in Pull Request Comments. 197:1-197:3 - Yi Liu:
RESTCluster: Automated Crash Clustering for RESTful API. 198:1-198:3 - Xiuheng Wu:
Software Evolution Management with Differential Facts. 199:1-199:3 - Jaydeb Sarker:
'Who built this crap?' Developing a Software Engineering Domain Specific Toxicity Detector. 200:1-200:3
Workshops: A-Mobile
- Pei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John Grundy, Li Li:
A First Look at CI/CD Adoptions in Open-Source Android Apps. 201:1-201:6 - Rui Rua, João Saraiva:
E-MANAFA: Energy Monitoring and ANAlysis tool For Android. 202:1-202:4 - Zikan Dong, Liu Wang, Hao Xie, Guoai Xu, Haoyu Wang:
Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era. 203:1-203:6 - Felix Pauck:
Scaling Arbitrary Android App Analyses. 204:1-204:7
Workshops: AeSIR
- Naser Al Madi:
How Readable is Model-generated Code? Examining Readability and Visual Inspection of GitHub Copilot. 205:1-205:5 - Qing Mi, Xiaoke Wang, Bingnuo Chen:
How students choose names: A replication study. 206:1-206:5 - Naser Al Madi:
Namesake: A Checker of Lexical Similarity in Identifier Names. 207:1-207:5 - Qing Mi:
Rank Learning-Based Code Readability Assessment with Siamese Neural Networks. 208:1-208:2
Workshops: ASE4Games
- Ciprian Paduraru, Rares Cristea, Alin Stefanescu:
Enhancing the security of gaming transactions using blockchain technology. 209:1-209:8 - Ezequiel Castellano, Xiao-Yi Zhang, Paolo Arcaini, Toru Takisaka, Fuyuki Ishikawa, Nozomu Ikehata, Kosuke Iwakura:
Explaining the Behaviour of Game Agents Using Differential Comparison. 210:1-210:8 - Raihana Ferdous, Fitsum Meshesha Kifetew, Davide Prandi, Angelo Susi:
Towards Agent-Based Testing of 3D Games using Reinforcement Learning. 211:1-211:8 - Ciprian Paduraru, Miruna Gabriela Paduraru, Andrei Blahovici:
Transfer learning of cars behaviors from reality to simulation applications. 212:1-212:8 - Kazuki Wayama, Tomoyuki Yokogawa, Sousuke Amasaki, Hirohisa Aman, Kazutami Arimoto:
Verifying Game Logic in Unreal Engine 5 Blueprint Visual Scripting System Using Model Checking. 213:1-213:8
Workshops: AUST
- Phuoc Pham, Vu Nguyen, Tien N. Nguyen:
A Review of AI-augmented End-to-End Test Automation Tools. 214:1-214:4 - Qunying Song, Per Runeson, Stefan Persson:
A Scenario Distribution Model for Effective and Efficient Testing of Autonomous Driving Systems. 215:1-215:8 - Khang Pham, Vu Nguyen, Tien N. Nguyen:
Application of Natural Language Processing Towards Autonomous Software Testing. 216:1-216:4 - Ilia Zlatkin, Grigory Fedyukovich:
Horntinuum: Autonomous Testing using Constrained Horn Clauses. 217:1 - Kiet Ngo, Vu Nguyen, Tien N. Nguyen:
Research on Test Flakiness: from Unit to System Testing. 218:1-218:4
Workshops: HCSE&CS
- Debi Ashenden, Gail Ollis, Iain Reid:
Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development. 219:1-219:9 - Xinyao Ma, Zaiqiao Ye, Sameer Patil:
Do Regional Variations Affect the CAPTCHA User Experience? A Comparison of CAPTCHAs in China and the United States. 220:1-220:9 - Ishan Aryendu, Ying Wang, Farah Elkourdi, Eman Abdullah AlOmar:
Intelligent Code Review Assignment for Large Scale Open Source Software Stacks. 221:1-221:6 - Adam Tonkin, William Kosasih, Marthie Grobler, Mehwish Nasim:
Simulating cyber security management: A gamified approach to executive decision making. 222:1-222:8 - Malyun Muhudin Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang:
Towards Improving the Adoption and Usage of National Digital Identity Systems. 223:1-223:6 - Jason Jaskolka, Brahim Hamid:
Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture Design. 224:1-224:8
Workshops: VARSE
- Sai Anirudh Karre, Vivek Pareek, Raghav Mittal, Raghu Reddy:
A Role Based Model Template for Specifying Virtual Reality Software. 225:1-225:5 - Xiaoyi Yang, Xueling Zhang:
A Study of User Privacy in Android Mobile AR Apps. 226:1-226:5 - Xue Qin, Foyzul Hassan:
DyTRec: A Dynamic Testing Recommendation tool for Unity-based Virtual Reality Software. 227:1-227:5 - David Heidrich, Andreas Schreiber, Sebastian Oberdörfer:
Towards Generating Labeled Property Graphs for Comprehending C#-based Software Projects. 228:1-228:4
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.