


default search action
39th ASE 2024: Sacramento, CA, USA
- Vladimir Filkov, Baishakhi Ray, Minghui Zhou:

Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, ASE 2024, Sacramento, CA, USA, October 27 - November 1, 2024. ACM 2024, ISBN 979-8-4007-1248-7
Research Papers
- Ziyou Jiang

, Lin Shi
, Guowei Yang
, Qing Wang:
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code. 1-13 - Yujia Fan, Sinan Wang

, Zebang Fei
, Yao Qin
, Huaxuan Li, Yepang Liu
:
Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study. 14-26 - Rui Ren

, Jingbang Yang, Linxiao Yang
, Xinyue Gu
, Liang Sun
:
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice. 27-39 - Jaemin Hong

, Sukyoung Ryu
:
To Tag, or Not to Tag: Translating C's Unions to Rust's Tagged Unions. 40-52 - Yiheng Xiong

, Ting Su, Jue Wang
, Jingling Sun, Geguang Pu, Zhendong Su
:
General and Practical Property-based Testing for Android Apps. 53-64 - Xinyu Gao

, Yun Xiong, Deze Wang
, Zhenhan Guan
, Zejian Shi
, Haofen Wang
, Shanshan Li:
Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation. 65-77 - Markus Böck

, Michael Schröder
, Jürgen Cito:
Language-Agnostic Static Analysis of Probabilistic Programs. 78-90 - Shaoheng Cao

, Renyi Chen, Minxue Pan, Wenhua Yang, Xuandong Li:
Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents. 91-103 - Lanxin Yang

, Jinwei Xu
, He Zhang, Fanghao Wu, Jun Lyu
, Yue Li, Alberto Bacchelli
:
GPP: A Graph-Powered Prioritizer for Code Review Requests. 104-116 - Zhuo Su, Zehong Yu

, Dongyan Wang
, Wanli Chang, Bin Gu, Yu Jiang
:
Test Case Generation for Simulink Models using Model Fuzzing and State Solving. 117-128 - Tianyi Chen

, Yanjie Jiang, Fu Fan
, Bo Liu
, Hui Liu
:
A Position-Aware Approach to Decomposing God Classes. 129-140 - Jinhao Dong, Jun Sun

, Yun Lin, Yedi Zhang
, Murong Ma
, Jin Song Dong
, Dan Hao
:
Revisiting the Conflict-Resolving Problem from a Semantic Perspective. 141-152 - Yi Xiao

, Van-Hoang Le
, Hongyu Zhang
:
Demonstration-Free: Towards More Practical Log Parsing with Large Language Models. 153-165 - Florian Eder

, Stefan Winter:
Efficient Detection of Test Interference in C Projects. 166-178 - Mengdan Fan, Wei Zhang

, Haiyan Zhao, Guangtai Liang
, Zhi Jin
:
Detect Hidden Dependency to Untangle Commits. 179-190 - Jiawei Lu

, Haoye Wang
, Zhongxin Liu
, Keyu Liang
, Lingfeng Bao, Xiaohu Yang:
Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks. 191-203 - Mingyi Zhou

, Xiang Gao
, Xiao Chen
, Chunyang Chen
, John Grundy
, Li Li
:
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators. 204-215 - Cong Li

, Zhaogui Xu, Peng Di
, Dongxia Wang
, Zheng Li, Qian Zheng:
Understanding Code Changes Practically with Small-Scale Language Models. 216-228 - Zhihong Sun

, Yao Wan, Jia Li, Hongyu Zhang
, Zhi Jin
, Ge Li, Chen Lyu:
Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates. 229-241 - Quan Zhang, Chijin Zhou

, Gwihwan Go
, Binqi Zeng, Heyuan Shi
, Zichen Xu
, Yu Jiang
:
Imperceptible Content Poisoning in LLM-Powered Applications. 242-254 - Guoqing Bao

, Heng Shi, Chengyi Cui
, Yalin Zhang, Jianguo Yao:
UFront: Toward A Unified MLIR Frontend for Deep Learning. 255-267 - An Guo

, Yuan Zhou
, Haoxiang Tian
, Chunrong Fang
, Yunjian Sun, Weisong Sun
, Xinyu Gao
, Anh Tuan Luu
, Yang Liu
, Zhenyu Chen
:
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing. 268-280 - Chaozheng Wang

, Shuzheng Gao
, Cuiyun Gao, Wenxuan Wang
, Chun Yong Chong
, Shan Gao, Michael R. Lyu
:
A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How. 281-293 - Nariyoshi Chida

, Tachio Terauchi
:
Repairing Regex-Dependent String Functions. 294-305 - Chenyang Yang

, Yining Hong
, Grace A. Lewis
, Tongshuang Wu
, Christian Kästner
:
What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing. 306-318 - David Kaindlstorfer

, Anastasia Isychev
, Valentin Wüstholz
, Maria Christakis
:
Interrogation Testing of Program Analyzers for Soundness and Precision Issues. 319-330 - Jingnan Zheng, Jiahao Liu, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, Tat-Seng Chua:

MaskDroid: Robust Android Malware Detection with Masked Graph Representations. 331-343 - Markus Fleischmann

, David Kaindlstorfer
, Anastasia Isychev
, Valentin Wüstholz
, Maria Christakis
:
Constraint-Based Test Oracles for Program Analyzers. 344-355 - Yichi Zhang, Zixi Liu, Yang Feng, Baowen Xu:

Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency. 356-366 - James Yoo

, Michael D. Ernst
, René Just
:
Verifying the Option Type with Rely-Guarantee Reasoning. 367-380 - Qi Zhan

, Xing Hu
, Xin Xia
, Shanping Li:
REACT: IR-Level Patch Presence Test for Binary. 381-392 - Yulun Wu, Ming Wen, Zeliang Yu

, Xiaochen Guo, Hai Jin:
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models. 393-405 - Guangyuan Wu, Weining Cao

, Yuan Yao, Hengfeng Wei
, Taolue Chen
, Xiaoxing Ma:
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference. 406-417 - Sumit Lahiri

, Pankaj Kumar Kalita
, Akshay Kumar Chittora
, Varun Vankudre, Subhajit Roy:
Program Synthesis Meets Visual What-Comes-Next Puzzles. 418-429 - Baijun Cheng, Cen Zhang

, Kailong Wang
, Ling Shi
, Yang Liu
, Haoyu Wang, Yao Guo, Ding Li, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. 430-442 - Luca Traini

, Federico Di Menna
, Vittorio Cortellessa
:
AI-driven Java Performance Testing: Balancing Result Quality with Testing Time. 443-454 - Yi Liu

, Junzhe Yu
, Huijia Sun
, Ling Shi
, Gelei Deng
, Yuqi Chen, Yang Liu
:
Efficient Detection of Toxic Prompts in Large Language Models. 455-467 - Jiuang Zhao

, Zitian Yang
, Li Zhang
, Xiaoli Lian
, Donghao Yang
, Xin Tan
:
DRMiner: Extracting Latent Design Rationale from Jira Issue Logs. 468-480 - Xinyu She

, Yanjie Zhao
, Haoyu Wang:
WaDec: Decompiling WebAssembly Using Large Language Model. 481-492 - Zhi Chen

, Lingxiao Jiang
:
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization. 493-505 - Dharun Anandayuvaraj

, Matthew Campbell
, Arav Tewari, James C. Davis
:
FAIL: Analyzing Software Failures from the News Using LLMs. 506-518 - Kexin Sun

, Yiding Ren
, Hongyu Kuang
, Hui Gao
, Xiaoxing Ma, Guoping Rong, Dong Shao
, He Zhang:
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects. 519-530 - Yifan Liao

, Ming Xu, Yun Lin, Xiwen Teoh
, Xiaofei Xie
, Ruitao Feng
, Frank Liaw
, Hongyu Zhang
, Jin Song Dong
:
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality. 531-543 - Zhiquan Huang

, Yuan Huang, Xiangping Chen
, Xiaocong Zhou
, Changlin Yang, Zibin Zheng:
An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation. 544-556 - Congying Xu, Songqiang Chen

, Jiarong Wu
, Shing-Chi Cheung
, Valerio Terragni
, Hengcheng Zhu
, Jialun Cao
:
MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing. 557-569 - Wei Liu, Ailun Yu

, Daoguang Zan
, Bo Shen, Wei Zhang
, Haiyan Zhao, Zhi Jin
, Qianxiang Wang:
GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph. 570-581 - Cong Wu, Jing Chen, Ziwei Wang

, Ruichao Liang
, Ruiying Du:
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models. 582-593 - Gichan Lee

, Hansae Ju
, Scott Uk-Jin Lee
:
NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers. 594-605 - Sicong Cao

, Xiaobing Sun
, Xiaoxue Wu, David Lo
, Lili Bo, Bin Li, Xiaolei Liu
, Xingwei Lin
, Wei Liu
:
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection. 606-618 - Vittoriano Muttillo

, Claudio Di Sipio
, Riccardo Rubei
, Luca Berardinelli, MohammadHadi Dehghani
:
Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach. 619-630 - Wenzhang Yang

, Cuifeng Gao
, Xiaoyuan Liu
, Yuekang Li
, Yinxing Xue:
Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation. 631-642 - Zhibo Zhang

, Wuxia Bai
, Yuxi Li
, Mark Huasong Meng
, Kailong Wang
, Ling Shi
, Li Li
, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. 643-655 - Xiao Yu

, Zexian Zhang, Feifei Niu
, Xing Hu
, Xin Xia
, John Grundy
:
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners' Perspective. 656-668 - Fang Liu, Zhenwei Liu, Qianhui Zhao

, Jing Jiang
, Li Zhang
, Zian Sun
, Ge Li, Zhongqi Li, Yuchi Ma:
FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments. 669-680 - Xinran Yu

, Chun Li
, Minxue Pan, Xuandong Li:
DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation. 681-693 - Yifan Xie

, Zhouyang Jia
, Shanshan Li, Ying Wang, Jun Ma, Xiaoling Li, Haoran Liu, Ying Fu
, Xiangke Liao:
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera. 694-705 - Luan Pham

, Huong Ha
, Hongyu Zhang
:
Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We? 706-715 - Guochang Li

, Chen Zhi
, Jialiang Chen, Junxiao Han
, Shuiguang Deng:
Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair. 719-731 - Mohammad Hossein Amini

, Shiva Nejati:
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems. 732-744 - Di Cui

, Jiaqi Wang, Qiangqiang Wang
, Peng Ji
, Minglang Qiao, Yutong Zhao
, Jingzhao Hu, Luqiao Wang, Qingshan Li:
Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network. 745-757 - Yihui Xu

, Yanhui Li, Jun Wang
, Xiaofang Zhang
:
Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing. 758-769 - Weilong Li

, Jintian Lu
, Ruizhi Xiao
, Pengfei Shao, Shuyuan Jin:
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection. 770-782 - Yue Li

, He Zhang, Yuzhe Jin
, Zhong Ren
, Liming Dong
, Jun Lyu
, Lanxin Yang
, David Lo
, Dong Shao
:
An Explainable Automated Model for Measuring Software Engineer Contribution. 783-794 - Chao Hu, Yitian Chai, Hao Zhou, Fandong Meng

, Jie Zhou, Xiaodong Gu:
How Effectively Do Code Language Models Understand Poor-Readability Code? 795-806 - Dohyun Ryu

, Giyeol Kim
, Daeun Lee
, Seongjin Kim
, Seungjin Bae
, Junghwan Rhee
, Taegyu Kim
:
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration. 807-818 - Yujie Liu

, Mingxuan Zhu
, Jinhao Dong, Junzhe Yu
, Dan Hao
:
Compiler Bug Isolation via Enhanced Test Program Mutation. 819-830 - Benedikt Schesch

, Ryan Featherman
, Kenneth J. Yang
, Ben R. Roberts
, Michael D. Ernst
:
Evaluation of Version Control Merge Tools. 831-83 - Jian Wang

, Shangqing Liu, Xiaofei Xie
, Yi Li
:
An Empirical Study to Evaluate AIGC Detectors on Code Content. 844-856 - Jialiang Wei

, Anne-Lise Courbis, Thomas Lambolais, Binbin Xu
, Pierre-Louis Bernard, Gérard Dray
, Walid Maalej:
Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach. 857-869 - Jialun Cao

, Zhiyong Chen
, Jiarong Wu
, Shing-Chi Cheung
, Chang Xu
:
JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models. 870-882 - Zhilin Li

, Xutong Ma
, Mengze Hu, Jun Yan
:
Detecting Element Accessing Bugs in C++ Sequence Containers. 883-894 - Jialuo Chen

, Jingyi Wang
, Xiyue Zhang
, Youcheng Sun
, Marta Kwiatkowska
, Jiming Chen, Peng Cheng
:
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection. 895-906 - Steven (Jiaxun) Tang

, Mingcan Xiang
, Yang Wang
, Bo Wu, Jianjun Chen, Tongping Liu:
Scaler: Efficient and Effective Cross Flow Analysis. 907-918 - Siyu Yu

, Yifan Wu
, Ying Li, Pinjia He:
Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing. 919-930 - Yongqi Han

, Qingfeng Du, Ying Huang
, Jiaqi Wu, Fulong Tian, Cheng He:
The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier. 931-943 - Yuanhong Lan

, Yifei Lu
, Minxue Pan, Xuandong Li:
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics. 944-956 - Yilun Wang

, Pengfei Chen
, Hui Dou
, Yiwen Zhang
, Guangba Yu
, Zilong He
, Haiyu Huang
:
FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows. 957-969 - Yinglong Zou

, Juan Zhai
, Chunrong Fang
, Jiawei Liu
, Tao Zheng, Zhenyu Chen
:
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment. 970-981 - Xihao Zhang, Yi Song, Xiaoyuan Xie, Qi Xin, Chenliang Xing

:
Do not neglect what's on your hands: localizing software faults with exception trigger stream. 982-994 - Jiachi Chen

, Qingyuan Zhong
, Yanlin Wang
, Kaiwen Ning, Yongkun Liu, Zenan Xu, Zhe Zhao, Ting Chen, Zibin Zheng:
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code. 995-1006 - Zhenjiang Zhao

, Takahisa Toda, Takashi Kitamura:
Approximation-guided Fairness Testing through Discriminatory Space Analysis. 1007-1018 - Yin Wu

, Xiaofei Xie
, Chenyang Peng, Dijun Liu
, Hao Wu
, Ming Fan, Ting Liu
, Haijun Wang:
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. 1019-1031 - Guilherme Cavalcanti

, Paulo Borba
, Leonardo dos Anjos
, Jônatas Clementino:
Semistructured Merge with Language-Specific Syntactic Separators. 1032-1043 - Myungho Lee, Jiseong Bak

, Seokhyeon Moon, Yoonchan Jhi, Hakjoo Oh:
Effective Unit Test Generation for Java Null Pointer Exceptions. 1044-1056 - Yidan Wang

, Zhouruixing Zhu
, Qiuai Fu
, Yuchi Ma, Pinjia He:
MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data. 1057-1068 - Junwei Chen, Yueling Zhang, Lingfeng Zhang

, Min Zhang
, Chengcheng Wan
, Ting Su, Geguang Pu:
FIPSER: Improving Fairness Testing of DNN by Seed Prioritization. 1069-1081 - Zhongyi Wang

, Linyu Yang
, Mingshuai Chen
, Yixuan Bu
, Zhiyang Li
, Qiuye Wang
, Shengchao Qin
, Xiao Yi, Jianwei Yin:
Parf: Adaptive Parameter Refining for Abstract Interpretation. 1082-1093 - Zifan Xie

, Ming Wen, Zichao Wei
, Hai Jin:
Unveiling the Characteristics and Impact of Security Patch Evolution. 1094-1106 - Lei Tao

, Shenglin Zhang, Zedong Jia, Jinrui Sun
, Minghua Ma
, Zhengdan Li, Yongqian Sun
, Canqun Yang, Yuzhi Zhang, Dan Pei:
Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization. 1107-1119 - Kallistos Weis

, Leopoldo Teixeira, Clemens Dubslaff
, Sven Apel
:
Blackbox Observability of Features and Feature Interactions. 1120-1132 - Yifan Zhao

, Yizhou Chen
, Zeyu Sun
, Qingyuan Liang
, Guoqing Wang
, Dan Hao
:
Spotting Code Mutation for Predictive Mutation Testing. 1133-1145 - Yiheng Huang

, Ruisi Wang
, Wen Zheng
, Zhuotong Zhou
, Susheng Wu, Shulin Ke, Bihuan Chen, Shan Gao, Xin Peng
:
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching. 1146-1158 - Xiaobing Sun

, Xingan Gao
, Sicong Cao
, Lili Bo, Xiaoxue Wu, Kaifeng Huang
:
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection. 1159-1170 - Feifei Li

, Xiao Chen
, Xi Xiao
, Xiaoyu Sun
, Chuan Chen
, Shaohua Wang, Jitao Han:
Incremental Context-free Grammar Inference in Black Box Settings. 1171-1182 - Yongqian Sun

, Binpeng Shi
, Mingyu Mao
, Minghua Ma
, Sibo Xia
, Shenglin Zhang, Dan Pei:
ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems. 1183-1194 - Tobias Roth

, Julius Näumann, Dominik Helm
, Sven Keidel
, Mira Mezini
:
AXA: Cross-Language Analysis through Integration of Single-Language Analyses. 1195-1205 - Kisub Kim

, Jounghoon Kim
, Byeongjo Park
, Dongsun Kim
, Chun Yong Chong
, Yuan Wang, Tiezhu Sun
, Daniel Tang
, Jacques Klein
, Tegawendé F. Bissyandé
:
DataRecipe - How to Cook the Data for CodeLLM? 1206-1218 - Jian Shen

, Zhong Li, Minxue Pan, Xuandong Li:
Prioritizing Test Inputs for DNNs Using Training Dynamics. 1219-1231 - Narges Khakpour

, Charilaos Skandylas
:
Compositional Security Analysis of Dynamic Component-based Systems. 1232-1244 - Zhong Li, Chong Zhang, Minxue Pan, Tian Zhang

, Xuandong Li:
AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models. 1245-1257 - Zejun Wang, Kaibo Liu

, Ge Li, Zhi Jin
:
HITS: High-coverage LLM-based Unit Test Generation via Method Slicing. 1258-1268 - Zirui Song

, Yutong Zhou, Shuaike Dong, Ke Zhang
, Kehuan Zhang:
TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning. 1269-1281 - Junjie Huang

, Daya Guo
, Chenglong Wang
, Jiazhen Gu
, Shuai Lu
, Jeevana Priya Inala
, Cong Yan
, Jianfeng Gao
, Nan Duan
, Michael R. Lyu
:
Contextualized Data-Wrangling Code Generation in Computational Notebooks. 1282-1294 - Yingying Wang

, Sarah Bornais
, Julia Rubin
:
Microservice Decomposition Techniques: An Independent Tool Comparison. 1295-1307 - Muzi Qu

, Jie Liu
, Liangyi Kang, Shuai Wang, Dan Ye, Tao Huang:
Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code. 1308-1318 - Huan Zhang

, Wei Cheng
, Yuhan Wu
, Wei Hu
:
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven Refinement. 1319-1331 - Chico Sundermann

, Jacob Loth, Thomas Thüm
:
Efficient Slicing of Feature Models via Projected d-DNNF Compilation. 1332-1344 - Di Wu

, Fangwen Mu
, Lin Shi
, Zhaoqiang Guo
, Kui Liu
, Weiguang Zhuang, Yuqi Zhong
, Li Zhang
:
iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring. 1345-1357 - Wenkai Li, Xiaoqi Li

, Zongwei Li
, Yuqing Zhang
:
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts. 1358-1369 - Chuan Yan

, Ruomai Ren
, Mark Huasong Meng
, Liuhuo Wan
, Tian Yang Ooi
, Guangdong Bai
:
Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security. 1370-1382 - Davide Corradini

, Zeno Montolli, Michele Pasqua, Mariano Ceccato
:
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning. 1383-1394 - Muhammad A. A. Pirzada

, Giles Reger
, Ahmed Bhayat
, Lucas C. Cordeiro
:
LLM-Generated Invariants for Bounded Model Checking Without Loop Unrolling. 1395-1407 - Zongze Jiang

, Ming Wen, Jialun Cao
, Xuanhua Shi, Hai Jin:
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation. 1408-1420 - Mahtab Nejati

, Mahmoud Alfadel
, Shane McIntosh:
Understanding the Implications of Changes to Build Systems. 1421-1433 - Igor Wodiany

, Antoniu Pop, Mikel Luján:
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries. 1434-1446 - Susheng Wu, Ruisi Wang

, Kaifeng Huang
, Yiheng Cao
, Wenyan Song, Zhuotong Zhou
, Yiheng Huang
, Bihuan Chen, Xin Peng
:
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities. 1447-1459 - Xueyang Li

, Guozhu Meng, Shangqing Liu, Lu Xiang, Kun Sun, Kai Chen, Xiapu Luo
, Yang Liu
:
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models. 1460-1471 - Lili Bo, Wangjie Ji, Xiaobing Sun

, Ting Zhang
, Xiaoxue Wu, Ying Wei:
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT. 1472-1483 - Yangsen Wang

, Yizhou Chen
, Yifan Zhao
, Zhihao Gong, Junjie Chen, Dan Hao
:
Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training. 1484-1496 - Shuncheng Tang, Zhenya Zhang

, Jixiang Zhou, Lei Lei, Yuan Zhou
, Yinxing Xue:
LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language Models. 1497-1508 - Minghai Lu

, Benjamin Delaware
, Tianyi Zhang:
Proof Automation with Large Language Models. 1509-1520 - Nick Feng, Lina Marsso

, Marsha Chechik
:
Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects. 1521-1532 - Yanzhou Mu

, Juan Zhai
, Chunrong Fang
, Xiang Chen
, Zhixiang Cao, Peiran Yang
, Yinglong Zou
, Tao Zheng, Zhenyu Chen
:
DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation. 1533-1544 - Ming Zhu, Mohimenul Karim

, Ismini Lourentzou
, Daphne Yao
:
Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data. 1545-1556 - Guofeng Zhang

, Luyao Liu, Zhenbang Chen
, Ji Wang:
Hybrid Regression Test Selection by Integrating File and Method Dependences. 1557-1569 - Haijun Wang, Yurui Hu, Hao Wu

, Dijun Liu
, Chenyang Peng, Yin Wu
, Ming Fan, Ting Liu
:
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. 1570-1582 - Noble Saji Mathews

, Meiyappan Nagappan
:
Test-Driven Development and LLM-based Code Generation. 1583-1594 - Ming Fan, Jifei Shi

, Yin Wang
, Le Yu
, Xicheng Zhang, Haijun Wang, Wuxia Jin
, Ting Liu
:
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps. 1595-1606 - Lin Yang

, Chen Yang
, Shutao Gao, Weijing Wang
, Bo Wang
, Qihao Zhu, Xiao Chu, Jianyi Zhou
, Guangtai Liang
, Qianxiang Wang, Junjie Chen:
On the Evaluation of Large Language Models in Unit Test Generation. 1607-1619 - Shiwei Feng

, Yapeng Ye
, Qingkai Shi, Zhiyuan Cheng
, Xiangzhe Xu
, Siyuan Cheng
, Hongjun Choi, Xiangyu Zhang:
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation. 1620-1632 - Zhuotong Zhou

, Yongzhuo Yang
, Susheng Wu, Yiheng Huang
, Bihuan Chen, Xin Peng
:
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing. 1633-1644 - Sunny Shree

, Krishna Khadka
, Yu Lei
, Raghu N. Kacker, D. Richard Kuhn:
Constructing Surrogate Models in Machine Learning Using Combinatorial Testing and Active Learning. 1645-1654 - Mingyang Yin, Yutaro Kashiwa, Keheliya Gallaba

, Mahmoud Alfadel
, Yasutaka Kamei, Shane McIntosh:
Developer-Applied Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns. 1655-1666 - Yin Wang

, Ming Fan, Hao Zhou
, Haijun Wang, Wuxia Jin
, Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang
, Deqiang Han, Ting Liu:
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs. 1667-1679 - Shenglin Zhang, Yuhe Ji

, Jiaqi Luan
, Xiaohui Nie
, Ziang Chen
, Minghua Ma
, Yongqian Sun
, Dan Pei:
End-to-End AutoML for Unsupervised Log Anomaly Detection. 1680-1692 - Mouxiang Chen

, Zhongxin Liu
, He Tao, Yusu Hong, David Lo
, Xin Xia
, Jianling Sun:
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests. 1693-1705 - Jiuang Zhao

, Donghao Yang
, Li Zhang
, Xiaoli Lian
, Zitian Yang
, Fang Liu:
Enhancing Automated Program Repair with Solution Design. 1706-1718 - Youngjae Kim, Yechan Park, Seungheon Han

, Jooyong Yi:
Enhancing the Efficiency of Automated Program Repair via Greybox Analysis. 1719-1731 - Yu Zhao

, Lina Gong
, Zhiqiu Huang, Yongwei Wang
, Mingqiang Wei, Fei Wu:
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection? 1732-1744 - Elvan Kula

, Arie van Deursen
, Georgios Gousios
:
Context-Aware Automated Sprint Plan Generation for Agile Software Development. 1745-1756 - Chengpeng Li

, Abdelrahman Baz
, August Shi:
Reducing Test Runtime by Transforming Test Fixtures. 1757-1769 - Huan Xie

, Yan Lei, Maojin Li, Meng Yan
, Sheng Zhang:
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection. 1770-1782 - Md Shafiuzzaman, Achintya Desai, Laboni Sarker

, Tevfik Bultan
:
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation. 1783-1794 - Zunchen Huang

, Srivatsan Ravi
, Chao Wang
:
Discovering Likely Program Invariants for Persistent Memory. 1795-1807 - Wonseok Oh

, Hakjoo Oh:
Towards Effective Static Type-Error Detection for Python. 1808-1820 - Syeda Mashal Abbas Zaidi, Shahpar Khan, Parjanya Vyas, Yousra Aafer:

A Longitudinal Analysis Of Replicas in the Wild Wild Android. 1821-1833 - Damien Jaime

, Pascal Poizat, Joyce El Haddad
, Thomas Degueule
:
Balancing the Quality and Cost of Updating Dependencies. 1834-1845 - Fengjuan Gao, Hongyu Chen

, Yuewei Zhou, Ke Wang:
Shoot Yourself in the Foot - Efficient Code Causes Inefficiency in Compiler Optimizations. 1846-1857 - Dominic Troppmann

, Aurore Fass
, Cristian-Alexandru Staicu
:
Typed and Confused: Studying the Unexpected Dangers of Gradual Typing. 1858-1870 - Jingtao Xia, Junrui Liu

, Nicholas Brown
, Yanju Chen
, Yu Feng
:
Refinement Types for Visualization. 1871-1881 - Jiale Amber Wang, Kaiyuan Wang, Pengyu Nie

:
Efficient Incremental Code Coverage Analysis for Regression Test Suites. 1882-1894 - Jia Feng, Jiachen Liu, Cuiyun Gao, Chun Yong Chong

, Chaozheng Wang
, Shan Gao, Xin Xia
:
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code. 1895-1906 - Yali Du

, Hui Sun
, Ming Li:
A Joint Learning Model with Variational Interaction for Multilingual Program Translation. 1907-1918 - Zifan Xie

, Ming Wen, Tinghan Li
, Yiding Zhu, Qinsheng Hou
, Hai Jin:
How Does Code Optimization Impact Third-party Library Detection for Android Applications? 1919-1931 - Jian Zhang, Chong Wang, Anran Li, Wenhan Wang, Tianlin Li, Yang Liu:

VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair. 1932-1944
Industry Showcase
- Martin Schäf

, Berk Çirisci
, Linghui Luo
, Muhammad Numair Mansur, Omer Tripp, Daniel Sanchez, Qiang Zhou
, Muhammad Bilal Zafar:
Understanding Developer-Analyzer Interactions in Code Reviews. 1945-1955 - Arthur Vitui

, Tse-Hsun Chen
:
MLOLET - Machine Learning Optimized Load and Endurance Testing: An industrial experience report. 1956-1966 - Lei Liao

, Junjie Wang
, Zhensheng Xu
, Fangwen Mu
, Yukun Yang:
Vehicle Domain-Specific Language: Unifying Modeling and Code Generation for Low-Code Automotive Development. 1967-1972 - Sidong Feng

, Haochuan Lu
, Jianqin Jiang, Ting Xiong, Likun Huang
, Yinglin Liang
, Xiaoqin Li, Yuetang Deng, Aldeida Aleti
:
Enabling Cost-Effective UI Automation Testing with Retrieval-Based LLMs: A Case Study in WeChat. 1973-1978 - Guillaume Haben

, Sarra Habchi
, John Micco
, Mark Harman
, Mike Papadakis
, Maxime Cordy, Yves Le Traon
:
The Importance of Accounting for Execution Failures when Predicting Test Flakiness. 1979-1989 - Xinyi Zheng

, Chen Wei
, Shenao Wang
, Yanjie Zhao
, Peiming Gao
, Yuanchao Zhang
, Kailong Wang
, Haoyu Wang
:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. 1990-2001 - Shinobu Saito

, Yukako Iimura, Emad Aghayi, Thomas D. LaToza
:
How many pomodoros do professional engineers need to complete a microtask of programming? 2002-2012 - Yifan Wang

, Pierre Bourhis, Romain Rouvoy
, Patrick Royer
:
Challenges & Opportunities in Automating DBMS: A Qualitative Study. 2013-2023 - Man Zhang, Andrea Arcuri

, Piyun Teng, Kaiming Xue, Wenhao Wang:
Seeding and Mocking in White-Box Fuzzing Enterprise RPC APIs: An Industrial Case Study. 2024-2034 - Shiyan Peng

, Yuan Zhang
, Jiarun Dai
, Yue Gu
, Zhuoxiang Shen
, Jingcheng Liu, Lin Wang
, Yong Chen, Yu Qin, Lei Ai, Xianfeng Lu, Min Yang:
Applying Fuzz Driver Generation to Native C/C++ Libraries of OEM Android Framework: Obstacles and Solutions. 2035-2040 - Lei Liu

, So Hasegawa
, Shailaja Keyur Sampat
, Maria Xenochristou, Wei-Peng Chen
, Takashi Kato
, Taisei Kakibuchi, Tatsuya Asai:
AutoDW: Automatic Data Wrangling Leveraging Large Language Models. 2041-2052 - Haoyu Liao

, Jianmei Guo
, Bo Huang
, Yujie Han, Dingyu Yang
, Kai Shi, Jonathan Ding, Guoyao Xu, Guodong Yang, Liping Zhang
:
DeployFix: Dynamic Repair of Software Deployment Failures via Constraint Solving. 2053-2064 - Haonan Zhang

, Lizhi Liao
, Zishuo Ding, Weiyi Shang, Nidhi Narula, Catalin Sporea, Andrei Toma
, Sarah Sajedi
:
Towards a Robust Waiting Strategy for Web GUI Testing for an Industrial Software System. 2065-2076 - Shivali Agarwal

, Hiroaki Nakamura, Rami Katan:
Experience Report on Applying Program Analysis Techniques for Mainframe Application Understanding. 2077-2086 - Jian Zhao

, Shenao Wang
, Yanjie Zhao
, Xinyi Hou, Kailong Wang
, Peiming Gao
, Yuanchao Zhang, Chen Wei
, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. 2087-2098 - Zikan Dong

, Yanjie Zhao
, Tianming Liu
, Chao Wang
, Guosheng Xu, Guoai Xu, Lin Zhang, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. 2099-2109 - Stefan Alexander van Heijningen

, Theo Wiik, Francisco Gomes de Oliveira Neto
, Gregory Gay
, Kim Viggedal, David Friberg
:
Integrating Mutation Testing Into Developer Workflow: An Industrial Case Study. 2110-2120 - Dino Distefano

, Matteo Marescotti, Cons Åhs
, Sopot Cela
, Gabriela Cunha Sampaio, Radu Grigore, Ákos Hajdu, Timotej Kapus, Ke Mao, Thibault Suzanne
:
Enhancing Compositional Static Analysis with Dynamic Analysis. 2121-2129 - Asmar Muqeet

, Shaukat Ali
, Paolo Arcaini
:
Quantum Program Testing Through Commuting Pauli Strings on IBM's Quantum Computers. 2130-2141 - Christian Gilbertson

, Reed Milewicz
, Eric Berquist
, Aaron Brundage
, John Engelmann, Brian Evans, Nicholas Francis, Ernest Friedman-Hill
, Samuel Grayson
, Evan Harvey
, Eric Ho, Edward Hoffman, Kevin Irick, Anagha Krishna, Aaron Moreno, Joshua B. Teves:
Towards Long-Term Scientific Model Sustainment at Sandia National Laboratories. 2142-2147 - Priyam Sahoo

, Saurabh Pujar
, Ganesh Nalawade, Richard Genhardt, Louis Mandel
, Luca Buratti
:
Ansible Lightspeed: A Code Generation Service for IT Automation. 2148-2158 - Heyuan Shi

, Shijun Chen, Runzhe Wang, Yuhan Chen, Weibo Zhang
, Qiang Zhang, Yuheng Shen, Xiaohai Shi, Chao Hu
, Yu Jiang
:
Industry Practice of Directed Kernel Fuzzing for Open-source Linux Distribution. 2159-2169 - Zhixing Xu

, Shengjian Guo
, Oksana Tkachuk, Saeed Nejati
, Niloofar Razavi, George Argyros:
Cloud Resource Protection via Automated Security Property Reasoning. 2170-2175 - Liu Wang

, Haoyu Wang, Tao Zhang
, Haitao Xu
, Guozhu Meng, Peiming Gao
, Chen Wei
, Yi Wang
:
Android Malware Family Labeling: Perspectives from the Industry. 2176-2186 - Dmytro Humeniuk

, Houssem Ben Braiek, Thomas Reid, Foutse Khomh:
In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators. 2187-2198
New Ideas and Emerging Results (NIER)
- Sriteja Kummita

, Zenong Zhang
, Eric Bodden
, Shiyi Wei:
Visualizing and Understanding the Internals of Fuzzing. 2199-2204 - Sébastien Gios

, Charles-Henry Bertrand Van Ouytsel
, Mark Diamantino Caribé
, Axel Legay:
A vision on a methodology for the application of an Intrusion Detection System for satellites. 2205-2209 - Elijah Kayode Adejumo

, Brittany Johnson:
Towards Leveraging LLMs for Reducing Open Source Onboarding Information Overload. 2210-2214 - Omar I. Al-Bataineh:

Automated Repair of Multi-fault Programs: Obstacles, Approaches, and Prospects. 2215-2219 - Omar I. Al-Bataineh:

A Formal Treatment of Performance Bugs. 2220-2224 - Yuanlin Li

, Zhiwei Xu
, Min Zhou
, Hai Wan, Xibin Zhao:
Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network. 2225-2229 - Beiqi Zhang, Peng Liang, Qiong Feng

, Yujia Fu
, Zengyang Li:
Copilot-in-the-Loop: Fixing Code Smells in Copilot-Generated Python Code using Copilot. 2230-2234 - Luqiao Wang, Yangtao Zhou

, Huiying Zhuang
, Qingshan Li, Di Cui
, Yutong Zhao
, Lu Wang
:
Unity Is Strength: Collaborative LLM-Based Agents for Code Reviewer Recommendation. 2235-2239 - Mojtaba Eshghie

, Cyrille Artho:
Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs. 2240-2248 - Zheng Zhao, Hongxiang Jiang, Ran Zhao, Bing He:

Emergence of A Novel Domain Expert: A Generative AI-based Framework for Software Function Point Analysis. 2245-2250 - Aakash Sorathiya

, Gouri Ginde
:
Towards Extracting Ethical Concerns-related Software Requirements from App Reviews. 2251-2255 - Jobayer Ahmmed

, Myra B. Cohen
, Paul Gazzillo
:
Towards Automated Configuration Documentation. 2256-2261 - Usman Gohar

, Michael C. Hunter
, Robyn R. Lutz
, Myra B. Cohen
:
CoDefeater: Using LLMs To Find Defeaters in Assurance Cases. 2262-2267 - Chi Zhang

, Zifan Wang, Ruoshi Zhao
, Ravi Mangal, Matt Fredrikson
, Limin Jia
, Corina S. Pasareanu:
Attacks and Defenses for Large Language Models on Coding Tasks. 2268-2272 - Abdelrahman Baz

, Minchao Huang
, August Shi:
Prioritizing Tests for Improved Runtime. 2273-2278 - Chao Peng

, Qinyun Wu
, Jiangchao Liu
, Jierui Liu, Bo Jiang, Mengqian Xu
, Yinghao Wang, Xia Liu, Ping Yang
:
RepoSim: Evaluating Prompt Strategies for Code Completion via User Behavior Simulation. 2279-2283 - Takashi Kitamura, Sousuke Amasaki, Jun Inoue, Yoshinao Isobe, Takahisa Toda:

Toward Individual Fairness Testing with Data Validity. 2284-2288 - Hala Abdelkader, Jean-Guy Schneider

, Mohamed Abdelrazek, Priya Rani, Rajesh Vasa
:
Towards Robust ML-enabled Software Systems: Detecting Out-of-Distribution data using Gini Coefficients. 2289-2293 - Mohamad Fazelnia

, Mehdi Mirakhorli
, Hamid Bagheri:
Translation Titans, Reasoning Challenges: Satisfiability-Aided Language Models for Detecting Conflicting Requirements. 2294-2298 - Diganta Mukhopadhyay, Sanaa Siddiqui

, Hrishikesh Karmarkar
, Kumar Madhukar
, Guy Katz
:
Learning DNN Abstractions using Gradient Descent. 2299-2303 - Sunzhou Huang

, Xiaoyin Wang
:
Build Issue Resolution from the Perspective of Non-Contributors. 2304-2308 - Quentin Capdepon

, Nicolas Hlad, Benoît Verhaeghe
, Abdelhak-Djamel Seriai:
Assessing the feasibility of Micro frontend architecture in native mobile app development. 2309-2313 - Luciano Baresi

, Matteo Camilli
, Tommaso Dolci
, Giovanni Quattrocchi:
A Conceptual Framework for Quality Assurance of LLM-based Socio-critical Systems. 2314-2318 - Yueming Wu

, Chengwei Liu
, Zhengzi Xu, Lyuye Zhang, Yiran Zhang
, Zhiling Zhu
, Yang Liu
:
The Software Genome Project: Unraveling Software Through Genetic Principles. 2319-2323 - Ilya Kosorukov

, Daniel Blackwell
, David Clark
, Myra B. Cohen
, Justyna Petke
:
Mining for Mutation Operators for Reduction of Information Flow Control Violations. 2324-2328 - Xinyi Hou, Yanjie Zhao

, Shenao Wang
, Haoyu Wang:
GPTZoo: A Large-scale Dataset of GPTs for the Research Community. 2329-2333
DEMONSTRATION SESSION: Tool Demonstrations
- Bonan Ruan

, Jiahao Liu
, Weibo Zhao
, Zhenkai Liang:
VulZoo: A Comprehensive Vulnerability Intelligence Dataset. 2334-2337 - Mahja Sarschar, Gefei Zhang

, Annika Nowak:
PACGBI: A Pipeline for Automated Code Generation from Backlog Items. 2338-2341 - Marius Smytzek

, Martin Eberlein
, Kai Werk, Lars Grunske
, Andreas Zeller
:
FixKit: A Program Repair Collection for Python. 2342-2345 - Moritz Mock

, Jorge Melegati
, Max Kretschmann
, Nicolás E. Díaz Ferreyra
, Barbara Russo
:
MADE-WIC: Multiple Annotated Datasets for Exploring Weaknesses In Code. 2346-2349 - Che Wang

, Jiashuo Zhang, Jianbo Gao
, Libin Xia
, Zhi Guan, Zhong Chen:
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts. 2350-2353 - Kristian Kolthoff

, Christian Bartelt
, Simone Paolo Ponzetto, Kurt Schneider
:
Self-Elicitation of Requirements with Automated GUI Prototyping. 2354-2357 - Bohan Zhang

, Ankit Agrawal
:
DroneWiS: Automated Simulation Testing of small Unmanned Aerial System in Realistic Windy Conditions. 2358-2361 - Jana Chadt, Christoph Hochrainer

, Valentin Wüstholz, Maria Christakis
:
Olympia: Fuzzer Benchmarking for Solidity. 2362-2365 - Orlando Amaral Cejas

, Sallam Abualhaija
, Lionel C. Briand
:
CompAi: A Tool for GDPR Completeness Checking of Privacy Policies using Artificial Intelligence. 2366-2369 - Qiong Feng

, Xiaotian Ma
, Huan Ji
, Wei Song
, Peng Liang:
Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor. 2370-2373 - Mengzhen Li

, Mattia Fazzini
:
ARUS: A Tool for Automatically Removing Unnecessary Stubbings from Test Suites. 2374-2377 - Mojtaba Eshghie

, Cyrille Artho, Hans Stammler
, Wolfgang Ahrendt
, Thomas T. Hildebrandt
, Gerardo Schneider
:
HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts. 2378-2381 - Andrei Kozyrev

, Gleb Solovev
, Nikita Khramov
, Anton Podkopaev
:
CoqPilot, a plugin for LLM-based generation of proofs. 2382-2385 - Dirk Beyer

, Po-Chun Chien
, Marek Jankola
:
BenchCloud: A Platform for Scalable Performance Benchmarking. 2386-2389 - Florian Sihler

, Matthias Tichy
:
flowR: A Static Program Slicer for R. 2390-2393 - Jia Xu

, Weilin Du, Xiao Liu
, Xuejun Li
:
LLM4Workflow: An LLM-based Automated Workflow Model Generation Tool. 2394-2398 - Zhiyang Chen

, Ye Liu
, Sidi Mohamed Beillahi, Yi Li
, Fan Long
:
OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond. 2399-2402 - Runlin Liu

, Yuhang Lin, Yunge Hu
, Zhe Zhang, Xiang Gao
:
LLM-Based Java Concurrent Program to ArkTS Converter. 2403-2406 - Sahar Badihi

, Sami Nourji
, Julia Rubin
:
Slicer4D: A Slicing-based Debugger for Java. 2407-2410 - Yige Chen

, Sinan Wang
, Yida Tao, Yepang Liu
:
Model-based GUI Testing For HarmonyOS Apps. 2411-2414 - Atul Kumar, Diptikalyan Saha, Toshiaki Yasue

, Kohichi Ono, Saravanan Krishnan
, Sandeep Hans, Fumiko Satoh, Gerald Mitchell
, Sachin Kumar:
Automated Validation of COBOL to Java Transformation. 2415-2418 - Thomas Lemberger

, Henrik Wachowitz
:
CoVeriTeam GUI: A No-Code Approach to Cooperative Software Verification. 2419-2422
Student Research Competition
- Chenhao Cui

:
Finding Performance Issues in Rust Projects. 2423-2425 - Hongyu Chen

:
Efficient Code Causes Inefficiency in Compiler Optimizations. 2426-2428 - Atish Kumar Dipongkor

:
Can Large Language Models Comprehend Code Stylometry? 2429-2431 - Ramsha Ali:

Mining and Recommending Mobile App Features using Data-driven Analytics. 2432-2434 - Zihao Rao:

Semi-Automated Verification of Interior Unsafe Code Encapsulation in Real-World Rust Systems. 2435-2437
POSTER SESSION: Posters
- Yoli Shavit

, Kathy Razmadze, Gary Mataev, Hanan Shteingart
, Eitan Zahavi, Zachi Binshtock:
SemantiLog: Log-based Anomaly Detection with Semantic Similarity. 2438-2439 - Andrea Lops

, Fedelucio Narducci
, Azzurra Ragone
, Michelantonio Trizio:
AgoneTest: Automated creation and assessment of Unit tests leveraging Large Language Models. 2440-2441 - Tao Wang

, Wei Chen
, Liwei Liu
, Guoquan Wu, Jun Wei
, Tao Huang:
Match Word with Deed: Maintaining Consistency for IoT Systems with Behavior Models. 2442-2443 - Haitao Zhang, Jing Wang

, Ziyue Wang, Ziyi Zhao, Zhuo Cheng
:
A Pixel-Level Explainable Approach of Convolutional Neural Networks and Its Application. 2444-2445 - Uwe Gropengießer

, Julian Liphardt
, Michael Matthé
, Max Mühlhäuser
:
Feature Model Slicing for Real-time Selection of Mission-critical Edge Applicaiton. 2446-2447 - Yang Luo, Richard Yu, Fajun Zhang, Ling Liang, Yongqiang Xiong:

Bridging Gaps in LLM Code Translation: Reducing Errors with Call Graphs and Bridged Debuggers. 2448-2449 - Yonghao Long

, Yuanyuan Chen
, Xiangping Chen
:
GUI Test Repair Based on Test-Extension. 2450-2451 - Laboni Sarker

, Tevfik Bultan
:
Quantitative Symbolic Non-Equivalence Analysis. 2452-2453 - Ruixue Li, Bin Yu

, Xu Lu
, Lei Ke
, Jiawei Chen, Zixuan Yuan
, Jingxian Wang
, Cong Tian, Yansong Dong:
Detecting Atomicity Violations for Interrupt-driven Programs via Systematic Scheduling and Prefix-directed Feedback. 2454-2455 - Yiyun Chen, Fuxiang Chen, Mijung Kim, Fatemeh H. Fard

:
Studying Versioning in Stack Overflow. 2456-2457 - Xiaofan Liu

, Xunjin Zheng, Cai Fu, Xiaoheng Xie
, Peng Di
:
GrayDuck: The Sword of Damocles for Duck Typing in Dynamic Language Deserialization. 2458-2459 - Björn Karthein

, Cristian-Alexandru Staicu
, Andreas Zeller
:
A Generalized Approach for Solving Web Form Constraints. 2460-2461 - Yanchun Sun

, Jiawei Wu, Xiaohan Zhao
, Haizhou Xu, Sihan Wang, Jiaqi Zhang, Ye Zhu, Gang Huang:
Automatically Deriving Developers' Technical Expertise from the GitHub Social Network. 2462-2463 - Wendkûuni C. Ouédraogo

, Abdoul Kader Kaboré
, Haoye Tian
, Yewei Song
, Anil Koyuncu, Jacques Klein
, David Lo
, Tegawendé F. Bissyandé
:
LLMs and Prompting for Unit Test Generation: A Large-Scale Evaluation. 2464-2465 - Ming Liang

, Xiaoheng Xie
, Gehao Zhang, Xunjin Zheng, Peng Di
, Wei Jiang, Hongwei Chen, Chengpeng Wang
, Gang Fan:
RepoGenix: Dual Context-Aided Repository-Level Code Completion with Language Models. 2466-2467 - Mashal Afzal Memon

, Marco Autili
, Gianluca Filippone
, Gian Luca Scoccia
, Paola Inverardi
:
A High-level Architecture of an Automated Context-aware Ethics-based Negotiation Approach. 2468-2469 - Sohee Park

, Ryeonggu Kwon
, Gihwon Kwon:
Assessing Open Source Software Survivability using Kaplan-Meier Survival Function and Polynomial Regression. 2470-2471 - Mojtaba Mostafavi Ghahfarokhi, Hamed Jahantigh, Sepehr Kianiangolafshani, Ashkan Khademian, Alireza Asadi

, Abbas Heydarnoori
:
Can Code Metrics Enhance Documentation Generation for Computational Notebooks? 2472-2473 - Micheline Bénédicte Moumoula

, Abdoul Kader Kaboré
, Jacques Klein
, Tegawendé F. Bissyandé
:
Cross-lingual Code Clone Detection: When LLMs Fail Short Against Embedding-based Classifier. 2474-2475 - Konrad Cinkusz

, Jaroslaw A. Chudziak
:
Towards LLM-augmented multiagent systems for agile software engineering. 2476-2477 - Yang Yue

, Yi Wang
, David F. Redmiles
:
IdeoRate: Towards a Semi-automated Assessment Methodology for OSS Ideologies. 2478-2479 - Daniel Ogenrwot

, John Businge
:
PatchTrack: Analyzing ChatGPT's Impact on Software Patch Decision-Making in Pull Requests. 2480-2481 - Wenkai Li, Zhijie Liu, Xiaoqi Li

, Sen Nie:
Detecting Malicious Accounts in Web3 through Transaction Graph. 2482-2483 - Zhiyuan Chen

, Soham Sanjay Deo, Poorna Chander Reddy Puttaparthi
, Yiming Tang
, Xueling Zhang
, Weiyi Shang:
From Logging to Leakage: A Study of Privacy Leakage in Android App Logs. 2484-2485 - Hieu Huynh

, Quoc-Tri Le, Tien N. Nguyen, Vu Nguyen
:
Using LLM for Mining and Testing Constraints in API Testing. 2486-2487 - Khubaib Amjad Alam

, Ramsha Ali, Zyena Kamran
, Sabeen Fatima, Irum Inayat:
A Data-driven Approach for Mining Software Features based on Similar App Descriptions and User Reviews Analysis. 2488-2489
Doctoral Symposium
- Florian Sihler

:
Improving the Comprehension of R Programs by Hybrid Dataflow Analysis. 2490-2493 - Yangruibo Ding

:
Semantic-aware Source Code Modeling. 2494-2497 - Simin Sun:

Enhancing Software Design and Developer Experience Via LLMs. 2498-2501 - Bachir Bendrissou

:
Syntactic Resilience in Greybox Fuzzing: Automated Error Recovery. 2502-2505 - Alexis Butler

:
Software Supply Chain Risk: Characterization, Measurement & Attenuation. 2506-2509 - Zhiyuan Chen

:
A Comprehensive Study of Privacy Leakage Vulnerability in Android App Logs. 2510-2513 - Vikram Nitin

:
Using AI to Automate the Modernization of Legacy Software Applications. 2514-2517

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














