


default search action
37th ASE 2022: Rochester, MI, USA
- 37th IEEE/ACM International Conference on Automated Software Engineering, ASE 2022, Rochester, MI, USA, October 10-14, 2022. ACM 2022, ISBN 978-1-4503-9475-8
Research Papers
- Jiwei Yan
, Shixin Zhang
, Yepang Liu
, Xi Deng, Jun Yan, Jian Zhang:
A Comprehensive Evaluation of Android ICC Resolution Techniques. 1:1-1:13 - Hoan Anh Nguyen, Hung Dang Phan, Syeda Khairunnesa Samantha, Son Nguyen, Aashish Yadavally, Shaohua Wang, Hridesh Rajan, Tien N. Nguyen:
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications. 2:1-2:13 - Jaehyung Lee
, Kisun Han
, Hwanjo Yu
:
A Light Bug Triage Framework for Applying Large Pre-trained Language Model. 3:1-3:11 - Tao Huang
, Pengfei Chen, Jingrun Zhang, Ruipeng Li, Rui Wang:
A Transferable Time Series Forecasting Service Using Deep Transformer Model for Online Systems. 4:1-4:12 - Rongxin Wu, Minglei Chen, Chengpeng Wang
, Gang Fan
, Jiguang Qiu, Charles Zhang:
Accelerating Build Dependency Error Detection via Virtual Build. 5:1-5:12 - Ju Qian
, Yingwei Ma, Chenghao Lin, Lin Chen
:
Accelerating OCR-Based Widget Localization for Test Automation of GUI Applications. 6:1-6:13 - Nesara Dissanayake
, Asangi Jayatilaka
, Mansooreh Zahedi
, Muhammad Ali Babar
:
An Empirical Study of Automation in Software Security Patch Management. 7:1-7:13 - Chengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang
, Zhou Yang, Xin Zhou, Jieke Shi
, Junda He, DongGyun Han
, David Lo
:
Answer Summarization for Technical Queries: Benchmark and New Approach. 8:1-8:13 - Cedric Richter
, Jan Haltermann
, Marie-Christine Jakobs
, Felix Pauck
, Stefan Schott
, Heike Wehrheim
:
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? 9:1-9:12 - Yuxi Ling
, Kailong Wang
, Guangdong Bai
, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. 10:1-10:12 - José Antonio Hernández López
, Martin Weyssow, Jesús Sánchez Cuadrado
, Houari A. Sahraoui
:
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models. 11:1-11:11 - Tomasz Kuchta
, Bartosz Zator
:
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems. 12:1-12:12 - Jialu Zhang, De Li, John Charles Kolesar
, Hanyuan Shi, Ruzica Piskac:
Automated Feedback Generation for Competition-Level Code. 13:1-13:13 - Fangwen Mu
, Xiao Chen, Lin Shi
, Song Wang, Qing Wang:
Automatic Comment Generation via Multi-Pass Deliberation. 14:1-14:12 - Finlay Macklon
, Mohammad Reza Taesiri, Markos Viggiato, Stefan Antoszko, Natalia Romanova, Dale Paas, Cor-Paul Bezemer
:
Automatically Detecting Visual Bugs in HTML5 Canvas Games. 15:1-15:11 - Hamed Barzamini
, Mona Rahimi:
B-AIS: An Automated Process for Black-box Evaluation of Visual Perception in AI-enabled Software against Domain Semantics. 16:1-16:13 - Xiaoyuan Xie
, Pengbo Yin
, Songqiang Chen
:
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided Method. 17:1-17:13 - Chen Zhang, Bihuan Chen, Junhao Hu, Xin Peng, Wenyun Zhao:
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds. 18:1-18:13 - Arianna Blasi
, Alessandra Gorla
, Michael D. Ernst
, Mauro Pezzè
:
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints. 19:1-19:11 - Vikram Nitin, Shubhi Asthana, Baishakhi Ray
, Rahul Krishna
:
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture. 20:1-20:12 - Weilin Luo
, Hai Wan
, Delong Zhang, Jianfeng Du
, Hengdi Su:
Checking LTL Satisfiability via End-to-end Learning. 21:1-21:13 - Jiyang Zhang
, Sheena Panthaplackel, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
CoditT5: Pretraining for Source Code and Natural Language Editing. 22:1-22:12 - Zhiqiang Zang
, Nathan Wiatrek, Milos Gligoric, August Shi:
Compiler Testing using Template Java Programs. 23:1-23:13 - Jieke Shi
, Zhou Yang, Bowen Xu, Hong Jin Kang
, David Lo
:
Compressing Pre-trained Models of Code into 3 MB. 24:1-24:12 - Boqi Chen
, Kristóf Marussy
, Sebastian Pilarski
, Oszkár Semeráth
, Dániel Varró
:
Consistent Scene Graph Generation by Constraint Optimization. 25:1-25:13 - Yanqi Su
, Zheming Han
, Zhenchang Xing
, Xin Xia
, Xiwei Xu
, Liming Zhu
, Qinghua Lu
:
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing. 26:1-26:13 - Vidush Singhal
, Akul Abhilash Pillai
, Charitha Saumya
, Milind Kulkarni
, Aravind Machiry
:
Cornucopia : A Framework for Feedback Guided Generation of Binaries. 27:1-27:13 - Aryaz Eghbali
, Michael Pradel
:
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of Code. 28:1-28:12 - Mia Mohammad Imran
, Yashasvi Jain, Preetha Chatterjee
, Kostadin Damevski
:
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication. 29:1-29:13 - Chenyang Yang
, Rachel A. Brower-Sinning, Grace A. Lewis
, Christian Kästner
:
Data Leakage in Notebooks: Static Detection and Better Processes. 30:1-30:12 - Simin Chen, Mirazul Haque, Cong Liu, Wei Yang
:
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks. 31:1-31:13 - Oskar Haarklou Veileborg, Georgian-Vlad Saioc, Anders Møller
:
Detecting Blocking Errors in Go Programs using Localized Abstract Interpretation. 32:1-32:12 - Sheikh Shadab Towqir
, Bowen Shen
, Muhammad Ali Gulzar
, Na Meng
:
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis. 33:1-33:13 - Yueming Wu
, Siyue Feng, Deqing Zou, Hai Jin:
Detecting Semantic Code Clones by Building AST-based Markov Chains Model. 34:1-34:13 - Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song
, Wei Wang, Jun Wei, Dan Ye:
Differentially Testing Database Transactions for Fun and Profit. 35:1-35:12 - Jianzhong Su
, Hong-Ning Dai
, Lingjun Zhao
, Zibin Zheng, Xiapu Luo
:
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing. 36:1-36:12 - Jinsheng Ba
, Gregory J. Duck
, Abhik Roychoudhury
:
Efficient Greybox Fuzzing to Detect Memory Errors. 37:1-37:12 - Yunfan Zhang
, Ruidong Zhu
, Yingfei Xiong
, Tao Xie
:
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded Verification. 38:1-38:12 - Zijing Yin
, Yiwen Xu, Chijin Zhou
, Yu Jiang:
Empirical Study of System Resources Abused by IoT Attackers. 39:1-39:13 - Hao Zhong
:
Enriching Compiler Testing with Real Program from Bug Report. 40:1-40:12 - Yi Song
, Xiaoyuan Xie
, Xihao Zhang
, Quanming Liu
, Ruizhi Gao
:
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault Isolation. 41:1-41:13 - Rishabh Ranjan, Ishita Agrawal, Subodh Sharma
:
Exploiting Epochs and Symmetries in Analysing MPI Programs. 42:1-42:12 - Mauro Bringolf, Dominik Winterer
, Zhendong Su
:
Finding and Understanding Incompleteness Bugs in SMT Solvers. 43:1-43:10 - Ashwin Kallingal Joshy
, Wei Le
:
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures. 44:1-44:12 - Haeun Lee
, Soomin Kim
, Sang Kil Cha
:
Fuzzle: Making a Puzzle for Fuzzers. 45:1-45:12 - Haoxiang Tian, Guoquan Wu
, Jiren Yan, Yan Jiang, Jun Wei, Wei Chen, Shuo Li, Dan Ye:
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior Patterns. 46:1-46:12 - Nuno Saavedra
, João F. Ferreira
:
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code. 47:1-47:12 - Zilong He, Pengfei Chen, Yu Luo, Qiuyu Yan, Hongyang Chen, Guangba Yu, Fangyuan Li:
Graph based Incident Extraction and Diagnosis in Large-Scale Online Systems. 48:1-48:13 - Jingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, Yu Jiang:
Griffin : Grammar-Free DBMS Fuzzing. 49:1-49:12 - Navid Salehnamadi
, Forough Mehralian
, Sam Malek
:
Groundhog: An Automated Accessibility Crawler for Mobile Apps. 50:1-50:12 - Lyuye Zhang
, Chengwei Liu
, Zhengzi Xu
, Sen Chen
, Lingling Fan
, Bihuan Chen
, Yang Liu
:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. 51:1-51:12 - An Ran Chen
, Tse-Hsun (Peter) Chen
, Junjie Chen
:
How Useful is Code Change Information for Fault Localization in Continuous Integration? 52:1-52:12 - Yuanping Yu
, Xiangkun Jia
, Yuwei Liu
, Yanhao Wang
, Qian Sang
, Chao Zhang, Purui Su
:
HTFuzz: Heap Operation Sequence Sensitive Fuzzing. 53:1-53:13 - Quentin Le Dilavrec
, Djamel Eddine Khelladi
, Arnaud Blouin
, Jean-Marc Jézéquel
:
HyperAST: Enabling Efficient Analysis of Software Histories at Scale. 54:1-54:12 - Simón Gutiérrez Brida
, Germán Regis
, Guolong Zheng
, Hamid Bagheri
, ThanhVu Nguyen
, Nazareno Aguirre
, Marcelo F. Frias
:
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications. 55:1-55:13 - Chenguang Zhu
, Ye Liu
, Xiuheng Wu
, Yi Li
:
Identifying Solidity Smart Contract API Documentation Errors. 56:1-56:13 - Yu Liu
, Pengyu Nie
, Owolabi Legunsen
, Milos Gligoric:
Inline Tests. 57:1-57:13 - Meiqiu Xu, Ying Wang
, Shing-Chi Cheung
, Hai Yu, Zhiliang Zhu:
Insight: Exploring Cross-Ecosystem Vulnerability Impacts. 58:1-58:13 - Haoye Tian
, Xunzhu Tang, Andrew Habib
, Shangwen Wang, Kui Liu
, Xin Xia, Jacques Klein
, Tegawendé F. Bissyandé
:
Is this Change the Answer to that Problem?: Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. 59:1-59:13 - Miao Chen
, Tengfei Tu
, Hua Zhang
, Qiaoyan Wen
, Weihang Wang
:
Jasmine: A Static Analysis Framework for Spring Core Technologies. 60:1-60:13 - Ibrahim Mesecan
, Daniel Blackwell
, David Clark
, Myra B. Cohen
, Justyna Petke
:
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage. 61:1-61:12 - Yang Sun
, Christopher M. Poskitt
, Jun Sun, Yuqi Chen, Zijiang Yang:
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles. 62:1-62:12 - Junrui Liu
, Yanju Chen
, Bryan Tan
, Isil Dillig
, Yu Feng
:
Learning Contract Invariants Using Reinforcement Learning. 63:1-63:11 - Zhao Tian
, Junjie Chen
, Qihao Zhu
, Junjie Yang
, Lingming Zhang
:
Learning to Construct Better Mutation Faults. 64:1-64:13 - Jingbo Wang
, Chao Wang:
Learning to Synthesize Relational Invariants. 65:1-65:12 - Sofia Reis
, Rui Abreu
, Marcelo d'Amorim
, Daniel Fortunato
:
Leveraging Practitioners' Feedback to Improve a Security Linter. 66:1-66:12 - Juan Manuel Copia
, Pablo Ponzio, Nazareno Aguirre
, Alessandra Gorla, Marcelo F. Frias
:
LISSA: Lazy Initialization with Specialized Solver Aid. 67:1-67:12 - Rui Xie
, Tianxiang Hu, Wei Ye, Shikun Zhang
:
Low-Resources Project-Specific Code Summarization. 68:1-68:12 - Liu Wang, Haoyu Wang, Xiapu Luo
, Yulei Sui
:
MalWhiteout: Reducing Label Errors in Android Malware Detection. 69:1-69:13 - Xiaoyu Sun
, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li
:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. 70:1-70:13 - Qingchao Shen
, Junjie Chen
, Jie M. Zhang
, Haoyu Wang
, Shuang Liu
, Menghan Tian
:
Natural Test Generation for Precise Testing of Question Answering Software. 71:1-71:12 - Patric Feldmeier
, Gordon Fraser
:
Neuroevolution-Based Generation of Tests and Oracles for Games. 72:1-72:13 - Jasmine Latendresse, Suhaib Mujahid, Diego Elias Costa
, Emad Shihab:
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM. 73:1-73:12 - Binhang Qi
, Hailong Sun
, Xiang Gao
, Hongyu Zhang
:
Patching Weak Convolutional Neural Network Models through Modularization and Composition. 74:1-74:12 - Xianchang Luo, Yinxing Xue, Zhenchang Xing, Jiamou Sun:
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language Models. 75:1-75:13 - Youkun Shi, Yuan Zhang
, Tianhan Luo, Xiangyu Mao, Min Yang:
Precise (Un)Affected Version Analysis for Web Vulnerabilities. 76:1-76:13 - Tahmid Rafi
, Xueling Zhang
, Xiaoyin Wang
:
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing. 77:1-77:13 - Jie Su
, Cong Tian
, Zuchao Yang
, Jiyu Yang
, Bin Yu
, Zhenhua Duan
:
Prioritized Constraint-Aided Dynamic Partial-Order Reduction. 78:1-78:13 - Qing Huang
, Zhiqiang Yuan
, Zhenchang Xing
, Xiwei Xu, Liming Zhu
, Qinghua Lu
:
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial Code. 79:1-79:13 - Zhaodi Zhang
, Yiting Wu
, Si Liu
, Jing Liu
, Min Zhang
:
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks. 80:1-80:13 - Zixi Liu, Yang Feng, Yining Yin, Jingyu Sun, Zhenyu Chen
, Baowen Xu:
QATest: A Uniform Fuzzing Framework for Question Answering Systems. 81:1-81:12 - Yedi Zhang, Zhe Zhao, Guangke Chen
, Fu Song, Min Zhang
, Taolue Chen
, Jun Sun:
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks. 82:1-82:13 - Zhuo Zhang, Yan Lei
, Meng Yan
, Yue Yu, Jiachi Chen
, Shangwen Wang, Xiaoguang Mao
:
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach. 83:1-83:13 - Alexi Turcotte
, Mark W. Aldrich
, Frank Tip
:
reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications. 84:1-84:12 - Yan Xiao
, Yun Lin, Ivan Beschastnikh
, Changsheng Sun, David S. Rosenblum
, Jin Song Dong:
Repairing Failure-inducing Inputs with Input Reflection. 85:1-85:13 - Zhong Li
, Minxue Pan
, Yu Pei
, Tian Zhang, Linzhang Wang
, Xuandong Li
:
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering Datasets. 86:1-86:13 - Max Taylor, Johnathon Aurand, Feng Qin, Xiaorui Wang, Brandon Henry, Xiangyu Zhang:
SA4U: Practical Static Analysis for Unit Type Error Detection. 87:1-87:11 - Jie Zhu
, Leye Wang
, Xiao Han
:
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment. 88:1-88:13 - David Fernández-Amorós
, Ruben Heradio
, Christoph Mayr-Dorn
, Alexander Egyed
:
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel. 89:1-89:12 - Fuman Xie
, Yanjun Zhang
, Chuan Yan, Suwan Li, Lei Bu
, Kai Chen, Zi Huang
, Guangdong Bai
:
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. 90:1-90:13 - Zhichao Zhou
, Yuming Zhou, Chunrong Fang
, Zhenyu Chen
, Yutian Tang
:
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test Generation. 91:1-91:12 - He Ye, Matias Martinez, Xiapu Luo
, Tao Zhang
, Martin Monperrus:
SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics. 92:1-92:13 - Chao Wang, Rongxin Wu, Haohao Song, Jiwu Shu, Guoqing Li:
smartPip: A Smart Approach to Resolving Python Dependency Conflict Issues. 93:1-93:12 - Houssem Ben Braiek, Ali Tfaily, Foutse Khomh, Thomas Reid, Ciro Guida:
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft Design. 94:1-94:13 - Clement Poncelet
, Konstantinos Sagonas
, Nicolas Tsiftes
:
So Many Fuzzers, So Little Time✱: Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)Stack. 95:1-95:12 - Emanuela Guglielmi
, Giovanni Rosa
, Simone Scalabrino
, Gabriele Bavota
, Rocco Oliveto
:
Sorry, I don't Understand: Improving Voice User Interface Testing. 96:1-96:12 - Wenkang Zhong
, Hongliang Ge, Hongfei Ai, Chuanyi Li, Kui Liu
, Jidong Ge, Bin Luo:
StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair Systems. 97:1-97:13 - Ke Sun
, Yifan Zhao
, Dan Hao
, Lu Zhang
:
Static Type Recommendation for Python. 98:1-98:13 - Qi Xin, Qirun Zhang
, Alessandro Orso
:
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software Debloating. 99:1-99:13 - Emilio Coppa
, Heng Yin
, Camil Demetrescu
:
SymFusion: Hybrid Instrumentation for Concolic Execution. 100:1-100:12 - Yuhui Su
, Chunyang Chen
, Junjie Wang, Zhe Liu
, Dandan Wang, Shoubin Li, Qing Wang:
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile Apps. 101:1-101:12 - Andrea Stocco
, Paulo J. Nunes
, Marcelo d'Amorim
, Paolo Tonella
:
ThirdEye: Attention Maps for Safe Autonomous Driving Systems. 102:1-102:12 - Forough Mehralian
, Navid Salehnamadi
, Syed Fatiul Huq
, Sam Malek
:
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps. 103:1-103:13 - Yingyi Zhang, Zan Wang, Jiajun Jiang, Hanmo You, Junjie Chen:
Toward Improving the Robustness of Deep Learning Models via Model Transformation. 104:1-104:13 - Lili Quan
, Qianyu Guo, Xiaofei Xie
, Sen Chen
, Xiaohong Li, Yang Liu
:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. 105:1-105:13 - Wei Tang
, Zhengzi Xu
, Chengwei Liu
, Jiahui Wu
, Shouguo Yang, Yi Li
, Ping Luo, Yang Liu
:
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem. 106:1-106:12 - Deheng Yang
, Xiaoguang Mao
, Liqian Chen, Xuezheng Xu, Yan Lei, David Lo
, Jiayu He
:
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program Repair. 107:1-107:13 - Xueyang Li
, Shangqing Liu, Ruitao Feng
, Guozhu Meng
, Xiaofei Xie
, Kai Chen, Yang Liu
:
TransRepair: Context-aware Program Repair for Compilation Errors. 108:1-108:13 - Yutao Hu, Deqing Zou, Junru Peng, Yueming Wu
, Junjie Shan, Hai Jin:
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection. 109:1-109:12 - Elias Kuiter
, Sebastian Krieter, Chico Sundermann, Thomas Thüm
, Gunter Saake:
Tseitin or not Tseitin? The Impact of CNF Transformations on Feature-Model Analyses. 110:1-110:13 - Yiwen Wu, Yang Zhang, Kele Xu
, Tao Wang, Huaimin Wang:
Understanding and Predicting Docker Build Duration: An Empirical Study of Containerized Workflow of OSS Projects. 111:1-111:13 - Fahimeh Ebrahimi
, Anas Mahmoud
:
Unsupervised Summarization of Privacy Concerns in Mobile Application Reviews. 112:1-112:12 - Yuanyuan Yuan
, Qi Pang
, Shuai Wang
:
Unveiling Hidden DNN Defects with Decision-Based Metamorphic Testing. 113:1-113:13 - Hui Gao
, Hongyu Kuang
, Kexin Sun
, Xiaoxing Ma, Alexander Egyed, Patrick Mäder, Guoping Rong, Dong Shao, He Zhang:
Using Consensual Biterms from Text Structures of Requirements and Code to Improve IR-Based Traceability Recovery. 114:1 - Suwan Li
, Lei Bu
, Guangdong Bai
, Zhixiu Guo
, Kai Chen
, Hanlin Wei:
VITAS : Guided Model-based VUI Testing of VPA Apps. 115:1-115:12 - Hao Zhong
:
Which Exception Shall We Throw? 116:1-116:12
Doctoral Symposium
- Michael C. Gerten
:
A Framework for Testing Chemical Reaction Networks. 117:1-117:5 - Cícero A. G. Araújo
:
A model for automatic generating reusable code from multiple GUIs. 118:1-118:3 - Aurora Papotti
:
Assessment of Automated (Intelligent) Toolchains. 119:1-119:3 - Animesh Chaturvedi
:
Call Graph Evolution Analytics over a Version Series of an Evolving Software System. 120:1-120:5 - Haibo Chen
, Jinfu Chen
:
Coverage-based Greybox Fuzzing with Pointer Monitoring for C Programs. 121:1-121:4 - Mouna Dhaouadi:
Extraction and Management of Rationale. 122:1-122:3 - Sayma Sultana:
Identification and Mitigation of Gender Biases to Promote Diversity and Inclusion among Open Source Communities. 123:1-123:5 - Jaydeb Sarker
:
Identification and Mitigation of Toxic Communications Among Open Source Software Developers. 124:1-124:5 - Yifan Zhang
:
Leveraging Artificial Intelligence on Binary Code Comprehension. 125:1-125:3 - Sara Fernandes
:
Towards a Live Environment for Code Refactoring. 126:1-126:5 - Asem Ghaleb
:
Towards Effective Static Analysis Approaches for Security Vulnerabilities in Smart Contracts. 127:1-127:5 - Asif Kamal Turzo:
Towards Improving Code Review Effectiveness Through Task Automation. 128:1-128:5
Industry Showcase
- Firas Bayram
, Bestoun S. Ahmed
, Erik Hallin, Anton Engman:
A Drift Handling Approach for Self-Adaptive ML Software in Scalable Industrial Processes. 129:1-129:5 - Frank Bagehorn, Jesus Rios, Saurabh Jha, Robert Filepp, Larisa Shwartz, Naoki Abe, Xi Yang:
A fault injection platform for learning AIOps models. 130:1-130:5 - Patrick Stöckle
, Theresa Wasserer
, Bernd Grobauer
, Alexander Pretschner
:
Automated Identification of Security-Relevant Configuration Settings Using NLP. 131:1-131:5 - Lei Liu
, Wei-Peng Chen, Mehdi Bahrami, Mukul R. Prasad:
Automatic Generation of Visualizations for Machine Learning Pipelines. 132:1-132:5 - Yeonhee Ryou
, Sangwoo Joh
, Joonmo Yang
, Sujin Kim
, Youil Kim:
Code Understanding Linter to Detect Variable Misuse. 133:1-133:5 - Ate Penders
, Ana Lucia Varbanescu
, Gregor Pavlin
, Henk J. Sips
:
Design-Space Exploration for Decision-Support Software. 134:1-134:6 - Zhengwei Lv, Chao Peng
, Zhao Zhang, Ting Su
, Kai Liu, Ping Yang:
Fastbot2: Reusable Automated Model-based GUI Testing for Android Enhanced by Reinforcement Learning. 135:1-135:5 - Meriel von Stein
, Sebastian G. Elbaum
:
Finding Property Violations through Network Falsification: Challenges, Adaptations and Lessons Learned from OpenPilot. 136:1-136:5 - Manish Ahuja
, Sukhavasi Narendranath, Swapnajeet Gon Choudhury, Kaushik Amar Das, Kapil Singi, Kuntal Dey, Vikrant Kaulgud:
MCDA Framework for Edge-Aware Multi-Cloud Hybrid Architecture Recommendation. 137:1-137:2 - Yi Liu, Yuekang Li
, Yang Liu
, Ruiyuan Wan, Runchao Wu, Qingkun Liu:
Morest: Industry Practice of Automatic RESTful API Testing. 138:1-138:5 - Ge Fan
, Chaoyun Zhang, Kai Wang, Junyang Chen
:
MV-HAN: A Hybrid Attentive Networks based Multi-View Learning Model for Large-scale Contents Recommendation. 139:1-139:5 - Yuchen Zhang
, Yunhang Zhang, Georgios Portokalidis
, Jun Xu:
Towards Understanding the Runtime Performance of Rust. 140:1-140:6
Late Breaking Results
- Lucas Marcondes Pavelski
, Rodrigo de Souza Braga
:
A real-world case study for automated ticket team assignment using natural language processing and explainable models. 141:1-141:3 - Priyavanshi Pathania, Rohit Mehra, Vibhu Saujanya Sharma
, Vikrant Kaulgud, Sanjay Podder
, Adam P. Burden:
ESAVE: Estimating Server and Virtual Machine Energy. 142:1-142:3 - Tim Sonnekalb
, Bernd Gruner
, Clemens-Alexander Brust
, Patrick Mäder
:
Generalizability of Code Clone Detection on CodeBERT. 143:1-143:3 - Gustavo Rodrigues dos Reis
, Adrian Mos
, Mario Cortes Cornax
, Cyril Labbé:
Prototyping Deep Learning Applications with Non-Experts: An Assistant Proposition. 144:1-144:3 - Bo Li
, Dehui Du
, Sicong Chen
, Minjun Wei
, Chenghang Zheng
, Xinyuan Zhang
:
SML4ADS: An Open DSML for Autonomous Driving Scenario Representation and Generation. 145:1-145:3 - Sung-Shik Jongmans:
Towards Gradual Multiparty Session Typing. 146:1-146:3 - Nghi D. Q. Bui
, Yijun Yu
:
Towards Robust Models of Code via Energy-Based Learning on Auxiliary Datasets. 147:1-147:3 - Anh T. V. Dau
, Nghi D. Q. Bui
, Thang Nguyen-Duc
, Hoang Thanh-Tung
:
Towards Using Data-Influence Methods to Detect Noisy Samples in Source Code Corpora. 148:1-148:3
Tool Demonstrations
- Cláudia Mamede
, Eduard Pinconschi
, Rui Abreu
:
A transformer-based IDE plugin for vulnerability detection. 149:1-149:4 - Sen Wang, Zhuheng Sheng, Jingwei Xu, Taolue Chen
, Junjun Zhu, Shuhui Zhang, Yuan Yao, Xiaoxing Ma:
ADEPT: A Testing Platform for Simulated Autonomous Driving. 150:1-150:4 - Guanjie Qiu
, Diwei Chen
, Shuai Zhang
, Yitian Chai
, Xiaodong Gu
, Beijun Shen
:
Answering Software Deployment Questions via Neural Machine Reading at Scale. 151:1-151:4 - Eman Abdullah AlOmar
, Anton Ivanov, Zarina Kurbatova, Yaroslav Golubev
, Mohamed Wiem Mkaouer
, Ali Ouni
, Timofey Bryksin
, Le Nguyen, Amit Dilip Kini, Aditya Thakur:
AntiCopyPaster: Extracting Code Duplicates As Soon As They Are Introduced in the IDE. 152:1-152:4 - Mark W. Aldrich
, Alexi Turcotte
, Matthew Blanco, Frank Tip
:
Augur: Dynamic Taint Analysis for Asynchronous JavaScript. 153:1-153:4 - Sen Chen
, Yuxin Zhang, Lingling Fan
, Jiaming Li, Yang Liu
:
AUSERA: Automated Security Vulnerability Detection for Android Apps. 154:1-154:5 - Lissette Almonte
, Esther Guerra
, Iván Cantador
, Juan de Lara
:
Building recommenders for modelling languages with Droid. 155:1-155:4 - Bernd Fischer
, Salvatore La Torre
, Gennaro Parlato
, Peter Schrammel
:
CBMC-SSM: Bounded Model Checking of C Programs with Symbolic Shadow Memory. 156:1-156:5 - Olivier Le Goaër
, Julien Hertout:
ecoCode: a SonarQube Plugin to Remove Energy Smells from Android Projects. 157:1-157:4 - Jiawei He, Zhida Bao, Quanjun Zhang
, Weisong Sun, Jiawei Liu, Chunrong Fang, Yun Lin:
ElecDaug: Electromagnetic Data Augmentation for Model Repair based on Metamorphic Relation. 158:1-158:5 - Sivani Voruganti
, Kevin Jesse
, Premkumar T. Devanbu
:
FlexType: A Plug-and-Play Framework for Type Inference Models. 159:1-159:5 - Ye Liu
, Yi Li
:
InvCon: A Dynamic Invariant Detector for Ethereum Smart Contracts. 160:1-160:4 - Sara Fernandes
, Ademar Aguiar
, André Restivo
:
LiveRef: a Tool for Live Refactoring Java Code. 161:1-161:4 - Amr Moussa
, John-Paul Ore
:
Maktub: Lightweight Robot System Test Creation and Automation. 162:1-162:4 - William Eiers
, Ganesh Sankaran
, Albert Li
, Emily O'Mahony, Benjamin Prince, Tevfik Bultan:
Quacky: Quantitative Access Control Permissiveness Analyzer✱. 163:1-163:5 - Dehui Du
, Ana Cavalcanti, Jihui Nie
:
RoboSimVer: A Tool for RoboSim Modeling and Analysis. 164:1-164:4 - Alberto D. Rodriguez, Timothy Newman, Katherine R. Dearstyne, Jane Cleland-Huang
:
SAFA: A Tool for Supporting Safety Analysis in Evolving Software Systems. 165:1-165:4 - Ali Ghanbari
, Andrian Marcus
:
Shibboleth: Hybrid Patch Correctness Assessment in Automated Program Repair. 166:1-166:4 - Nicholas M. Synovic
, Matt Hyatt
, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang
, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer
, Nicholas J. Hayward, Neil Klingensmith, James C. Davis
, George K. Thiruvathukal
:
Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics. 167:1-167:4 - Aatira Anum Ahmad
, Mubashir Anwar
, Hashim Sharif
, Ashish Gehani
, Fareed Zaffar:
Trimmer: Context-Specific Code Reduction. 168:1-168:5 - Vipawan Jarukitpipat, Klinton Chhun, Wachirayana Wanprasert, Chaiyong Ragkhitwetsagul
, Morakot Choetkiertikul
, Thanwadee Sunetnanta, Raula Gaikovina Kula
, Bodin Chinthanet
, Takashi Ishio
, Kenichi Matsumoto:
V-Achilles: An Interactive Visualization of Transitive Security Vulnerabilities. 169:1-169:4 - Ennio Visconti
, Christos Tsigkanos
, Laura Nenzi
:
WebMonitor: Verification of Web User Interfaces. 170:1-170:4 - Jiashuo Zhang, Jianbo Gao, Yue Li, Ziming Chen, Zhi Guan, Zhong Chen:
Xscope: Hunting for Cross-Chain Bridge Attacks. 171:1-171:4
New Ideas and Emerging Results (NIER) Track
- Jinfu Chen
, Shengran Wang, Saihua Cai, Chi Zhang, Haibo Chen, Jingyi Chen, Jianming Zhang:
A Novel Coverage-guided Greybox Fuzzing based on Power Schedule Optimization with Time Complexity. 172:1-172:5 - Gan Wang, Zan Wang, Junjie Chen, Xiang Chen
, Ming Yan
:
An Empirical Study on Numerical Bugs in Deep Learning Programs. 173:1-173:5 - Junaed Younus Khan
, Gias Uddin
:
Automatic Code Documentation Generation Using GPT-3. 174:1-174:6 - Adil Mukhtar
, Birgit Hofer
, Dietmar Jannach
, Franz Wotawa
, Konstantin Schekotihin
:
Boosting Spectrum-Based Fault Localization for Spreadsheets with Product Metrics in a Learning Approach. 175:1-175:5 - Mouna Dhaouadi, Bentley James Oakes, Michalis Famelis
:
End-to-End Rationale Reconstruction. 176:1-176:5 - Toufique Ahmed
, Premkumar T. Devanbu
:
Few-shot training LLMs for project-specific code-summarization. 177:1-177:5 - Jörg Kienzle
, Benoît Combemale
, Gunter Mussbacher, Omar Alam, Francis Bordeleau, Lola Burgueño
, Gregor Engels, Jessie Galasso
, Jean-Marc Jézéquel
, Bettina Kemme, Sébastien Mosser, Houari A. Sahraoui
, Maximilian Schiedermeier, Eugene Syriani
:
Global Decision Making Over Deep Variability in Feedback-Driven Software Development. 178:1-178:6 - Misoo Kim
, Youngkyoung Kim
, Kicheol Kim
, Eunseok Lee
:
Multi-objective Optimization-based Bug-fixing Template Mining for Automated Program Repair. 179:1-179:5 - Anh Tuan Nguyen, Aashish Yadavally, Tien N. Nguyen:
Next Syntactic-Unit Code Completion and Applications. 180:1-180:5 - Yoon-Ho Choi
, Jaechang Nam
:
On the Naturalness of Bytecode Instructions. 181:1-181:5 - Anh Duc Vu
, Timo Kehrer
, Christos Tsigkanos
:
Outcome-Preserving Input Reduction for Scientific Data Analysis Workflows. 182:1-182:5 - Giacomo Priamo
, Daniele Cono D'Elia
, Leonardo Querzoni
:
Principled Composition of Function Variants for Dynamic Software Diversity and Program Protection. 183:1-183:5 - Palina Tolmach
, Yi Li
, Shang-Wei Lin
:
Property-Based Automated Repair of DeFi Protocols. 184:1-184:5 - Dharun Anandayuvaraj
, James C. Davis
:
Reflecting on Recurring Failures in IoT Development. 185:1-185:5 - Vikas Kumar Malviya
, Chee Wei Leow, Ashok Kasthuri, Yan Naing Tun, Lwin Khin Shar
, Lingxiao Jiang
:
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps. 186:1-186:6 - Christoph Treude
:
Taming Multi-Output Recommenders for Software Engineering. 187:1-187:5 - Xin Wang
, Xiao Liu
, Pingyi Zhou
, Qixia Liu
, Jin Liu
, Hao Wu
, Xiaohui Cui
:
Test-Driven Multi-Task Learning with Functionally Equivalent Code Transformation for Neural Code Generation. 188:1-188:6 - Matteo Camilli
, Raffaela Mirandola
, Patrizia Scandurra
:
XSA: eXplainable Self-Adaptation. 189:1-189:5
Student Research Competition
- Ye Liu
:
A Unified Specification Mining Framework for Smart Contracts. 190:1-190:3 - Rajshakhar Paul
:
ASTOR: An Approach to Identify Security Code Reviews. 191:1-191:3 - Prabuddha Chakraborty
:
Automatic Software Timing Attack Evaluation & Mitigation on Clear Hardware Assumption. 192:1-192:3 - Hailie Mitchell:
Automatically Fixing Breaking Changes of Data Science Libraries. 193:1-193:3 - Chenhao Wei
, Lu Xiao, Tingting Yu, Xinyu Chen, Xiao Wang, Sunny Wong, Abigail Clune:
Automatically Tagging the "AAA" Pattern in Unit Test Cases Using Machine Learning Models. 194:1-194:3 - Islem Bouzenia
:
Detecting Inconsistencies in If-Condition-Raise Statements. 195:1-195:3 - Frank Dixon Whitworth
:
Execution Path Detection through Dynamic Analysis in Black-Box Testing Environments. 196:1-196:3 - Sayma Sultana:
Identifying Sexism and Misogyny in Pull Request Comments. 197:1-197:3 - Yi Liu
:
RESTCluster: Automated Crash Clustering for RESTful API. 198:1-198:3 - Xiuheng Wu
:
Software Evolution Management with Differential Facts. 199:1-199:3 - Jaydeb Sarker
:
'Who built this crap?' Developing a Software Engineering Domain Specific Toxicity Detector. 200:1-200:3
Workshops: A-Mobile
- Pei Liu, Xiaoyu Sun
, Yanjie Zhao, Yonghui Liu
, John Grundy, Li Li:
A First Look at CI/CD Adoptions in Open-Source Android Apps. 201:1-201:6 - Rui Rua, João Saraiva
:
E-MANAFA: Energy Monitoring and ANAlysis tool For Android. 202:1-202:4 - Zikan Dong, Liu Wang, Hao Xie, Guoai Xu, Haoyu Wang:
Privacy Analysis of Period Tracking Mobile Apps in the Post-Roe v. Wade Era. 203:1-203:6 - Felix Pauck
:
Scaling Arbitrary Android App Analyses. 204:1-204:7
Workshops: AeSIR
- Naser Al Madi
:
How Readable is Model-generated Code? Examining Readability and Visual Inspection of GitHub Copilot. 205:1-205:5 - Qing Mi
, Xiaoke Wang, Bingnuo Chen:
How students choose names: A replication study. 206:1-206:5 - Naser Al Madi
:
Namesake: A Checker of Lexical Similarity in Identifier Names. 207:1-207:5 - Qing Mi
:
Rank Learning-Based Code Readability Assessment with Siamese Neural Networks. 208:1-208:2
Workshops: ASE4Games
- Ciprian Paduraru, Rares Cristea
, Alin Stefanescu:
Enhancing the security of gaming transactions using blockchain technology. 209:1-209:8 - Ezequiel Castellano
, Xiao-Yi Zhang
, Paolo Arcaini
, Toru Takisaka
, Fuyuki Ishikawa
, Nozomu Ikehata, Kosuke Iwakura:
Explaining the Behaviour of Game Agents Using Differential Comparison. 210:1-210:8 - Raihana Ferdous
, Fitsum Meshesha Kifetew
, Davide Prandi
, Angelo Susi
:
Towards Agent-Based Testing of 3D Games using Reinforcement Learning. 211:1-211:8 - Ciprian Paduraru, Miruna Gabriela Paduraru, Andrei Blahovici:
Transfer learning of cars behaviors from reality to simulation applications. 212:1-212:8 - Kazuki Wayama
, Tomoyuki Yokogawa
, Sousuke Amasaki
, Hirohisa Aman
, Kazutami Arimoto
:
Verifying Game Logic in Unreal Engine 5 Blueprint Visual Scripting System Using Model Checking. 213:1-213:8
Workshops: AUST
- Phuoc Pham
, Vu Nguyen
, Tien N. Nguyen:
A Review of AI-augmented End-to-End Test Automation Tools. 214:1-214:4 - Qunying Song
, Per Runeson
, Stefan Persson
:
A Scenario Distribution Model for Effective and Efficient Testing of Autonomous Driving Systems. 215:1-215:8 - Khang Pham
, Vu Nguyen
, Tien N. Nguyen:
Application of Natural Language Processing Towards Autonomous Software Testing. 216:1-216:4 - Ilia Zlatkin
, Grigory Fedyukovich
:
Horntinuum: Autonomous Testing using Constrained Horn Clauses. 217:1 - Kiet Ngo
, Vu Nguyen
, Tien N. Nguyen:
Research on Test Flakiness: from Unit to System Testing. 218:1-218:4
Workshops: HCSE&CS
- Debi Ashenden, Gail Ollis, Iain Reid
:
Dancing, not Wrestling: Moving from Compliance to Concordance for Secure Software Development. 219:1-219:9 - Xinyao Ma
, Zaiqiao Ye
, Sameer Patil
:
Do Regional Variations Affect the CAPTCHA User Experience? A Comparison of CAPTCHAs in China and the United States. 220:1-220:9 - Ishan Aryendu
, Ying Wang, Farah Elkourdi
, Eman Abdullah AlOmar:
Intelligent Code Review Assignment for Large Scale Open Source Software Stacks. 221:1-221:6 - Adam Tonkin
, William Kosasih
, Marthie Grobler
, Mehwish Nasim
:
Simulating cyber security management: A gamified approach to executive decision making. 222:1-222:8 - Malyun Muhudin Hilowle
, William Yeoh
, Marthie Grobler
, Graeme Pye
, Frank Jiang:
Towards Improving the Adoption and Usage of National Digital Identity Systems. 223:1-223:6 - Jason Jaskolka
, Brahim Hamid
:
Towards the Integration of Human Factors in Collaborative Decision Making for Secure Architecture Design. 224:1-224:8
Workshops: VARSE
- Sai Anirudh Karre
, Vivek Pareek, Raghav Mittal, Raghu Reddy:
A Role Based Model Template for Specifying Virtual Reality Software. 225:1-225:5 - Xiaoyi Yang, Xueling Zhang:
A Study of User Privacy in Android Mobile AR Apps. 226:1-226:5 - Xue Qin
, Foyzul Hassan
:
DyTRec: A Dynamic Testing Recommendation tool for Unity-based Virtual Reality Software. 227:1-227:5 - David Heidrich
, Andreas Schreiber
, Sebastian Oberdörfer
:
Towards Generating Labeled Property Graphs for Comprehending C#-based Software Projects. 228:1-228:4

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.