default search action
28th EASE 2024: Salerno, Italy
- Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, EASE 2024, Salerno, Italy, June 18-21, 2024. ACM 2024
Keynote
- Gabriele Bavota:
AI-based Code Generation: Achievements and Open Problems. 1 - Valeria Pontillo:
Insights Into Test Code Quality Prediction: Managing Machine Learning Techniques. 2 - Muhammad Ali Babar:
Evidence-Based Research for Supporting Software Security in Software Development: Methodological Challenges & Strategies. 3 - Mark Harman:
The Role of Software Measurement in Assured LLM-Based Software Engineering. 4 - Massimiliano Di Penta:
Why Large Language Models will (not) Kill Software Engineering Research. 5 - Nicole Novielli:
Surfing the AI Wave in Software Engineering: Opportunities and Challenges. 6
Research Track
- Manoel Aranda III, Naelson Oliveira, Elvys Soares, Márcio Ribeiro, Davi Romão, Ullyanne Patriota, Rohit Gheyi, Emerson Souza, Ivan Machado:
A Catalog of Transformations to Remove Smells From Natural Language Tests. 7-16 - Xi Ding, Yuan Huang, Xiangping Chen, Jing Bian:
Adversarial Attack and Robustness Improvement on Code Summarization. 17-27 - Bruno Kreyssig, Alexandre Bartel:
Analyzing Prerequistes of known Deserializtion Vulnerabilities on Java Applications. 28-37 - Nguyen Khoi Tran, Samodha Pallewatta, Muhammad Ali Babar:
An Empirically Grounded Reference Architecture for Software Supply Chain Metadata Management. 38-47 - Muhammad Imran, Vittorio Cortellessa, Davide Di Ruscio, Riccardo Rubei, Luca Traini:
An Empirical Study on Code Coverage of Performance Testing. 48-57 - Felix Nahrstedt, Mehdi Karmouche, Karolina Bargiel, Pouyeh Banijamali, Apoorva Nalini Pradeep Kumar, Ivano Malavolta:
An Empirical Study on the Energy Usage and Performance of Pandas and Polars Data Analysis Python Libraries. 58-68 - Matteo Esposito, Valentina Falaschi, Davide Falessi:
An Extensive Comparison of Static Application Security Testing Tools. 69-78 - Tristan Coignion, Clément Quinton, Romain Rouvoy:
A Performance Study of LLM-Generated Code on Leetcode. 79-89 - Hirohisa Aman, Sousuke Amasaki, Tomoyuki Yokogawa, Minoru Kawahara:
A Quantitative Investigation of Trends in Confusing Variable Pairs Through Commits: Do Confusing Variable Pairs Survive? 90-99 - Jahnavi Kumar, Sridhar Chimalakonda:
Code Summarization without Direct Access to Code - Towards Exploring Federated LLMs for Software Engineering. 100-109 - Ferenc Horváth, Roland Aszmann, Péter Attila Soha, Árpád Beszédes, Tibor Gyimóthy:
Context Switch Sensitive Fault Localization. 110-119 - Ipek Ustunboyacioglu, Indika Kumara, Dario Di Nucci, Damian Andrew Tamburri, Willem-Jan van den Heuvel:
Data Quality Assessment in the Wild: Findings from GitHub. 120-129 - André Palheiros Da Silva, Winnie Mbaka, Johann Mayer, Jan-Willem Bullee, Katja Tuma:
Does trainer gender make a difference when delivering phishing training? A new experimental design to capture bias. 130-139 - Mohamed Amine Batoun, Mohammed Sayagh, Ali Ouni:
How Much Logs Does My Source Code File Need? Learning to Predict the Density of Logs. 140-149 - Antonio Mastropaolo, Vittoria Nardone, Gabriele Bavota, Massimiliano Di Penta:
How the Training Procedure Impacts the Performance of Deep Learning-based Vulnerability Patching. 150-159 - Yuchen Guo, Martin J. Shepperd, Ning Li:
Improving classifier-based effort-aware software defect prediction by reducing ranking errors. 160-169 - Muhammad Waseem, Teerath Das, Aakash Ahmad, Peng Liang, Tommi Mikkonen:
Issues and Their Causes in WebAssembly Applications: An Empirical Study. 170-180 - Yen-Trang Dang, Thanh Le-Cong, Phuc-Thanh Nguyen, Anh M. T. Bui, Phuong T. Nguyen, Bach Le, Quyet-Thang Huynh:
LEGION: Harnessing Pre-trained Language Models for GitHub Topic Recommendations with Distribution-Balance Loss. 181-190 - Hung Phan, Ali Jannesari:
Leveraging Statistical Machine Translation for Code Search. 191-200 - Samuel Abedu, Ahmad Abdellatif, Emad Shihab:
LLM-Based Chatbots for Mining Software Repositories: Challenges and Opportunities. 201-210 - Daniel Coutinho, Luisa Cito, Maria Vitória Lima, Beatriz Arantes, Juliana Alves Pereira, Johny Arriel, João Godinho, Vinicius Martins, Paulo Vítor C. F. Libório, Leonardo Pedrosa Leite, Alessandro Garcia, Wesley K. G. Assunção, Igor Steinmacher, Augusto Baffa, Baldoino Fonseca:
"Looks Good To Me ;-)": Assessing Sentiment Analysis Tools for Pull Request Discussions. 211-221 - Idan Amit, Dror G. Feitelson:
Motivation Research Using Labeling Functions. 222-231 - Pablo Gómez-Abajo, Sara Pérez-Soler, Pablo C. Cañizares, Esther Guerra, Juan de Lara:
Mutation Testing for Task-Oriented Chatbots. 232-241 - Daniele Bifolco, Sabato Nocera, Simone Romano, Massimiliano Di Penta, Rita Francese, Giuseppe Scanniello:
On the Accuracy of GitHub's Dependency Graph. 242-251 - Zoltán Ságodi, Gábor Antal, Bence Bogenfürst, Martin Isztin, Péter Hegedüs, Rudolf Ferenc:
Reality Check: Assessing GPT-4 in Fixing Real-World Software Vulnerabilities. 252-261 - Aleksi Huotala, Miikka Kuutila, Paul Ralph, Mika Mäntylä:
The Promise and Challenges of Using LLMs to Accelerate the Screening Process of Systematic Reviews. 262-271 - Hemasri Sai Lella, Rajrupa Chattaraj, Sridhar Chimalakonda, Kurra Manasa:
Towards Comprehending Energy Consumption of Database Management Systems - A Tool and Empirical Study. 272-281 - Alexander Boll, Yael Van Dok, Manuel Ohrndorf, Alexander Schultheiß, Timo Kehrer:
Towards Semi-Automated Merge Conflict Resolution: Is It Easier Than We Expected? 282-292 - Maria Teresa Baldassarre, Domenico Gigante, Marcos Kalinowski, Azzurra Ragone, Sara Tibidò:
Trustworthy AI in practice: an analysis of practitioners' needs and challenges. 293-302 - Aviad Baron, Ilai Granot, Ron Yosef, Dror G. Feitelson:
Understanding Logical Expressions with Negations: Its Complicated. 303-312 - Mohammed Latif Siddiq, Joanna Cecilia da Silva Santos, Ridwanul Hasan Tanvir, Noshin Ulfat, Fahmid Al Rifat, Vinicius Carvalho Lopes:
Using Large Language Models to Generate JUnit Tests: An Empirical Study. 313-322 - Jingzheng Wu, Xiang Ling, Xu Duan, Tianyue Luo, Mutian Yang:
VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization. 323-332
Short Papers, Vision and Emerging Results Track
- Simone Romano, Giovanni Toriello, Pietro Cassieri, Rita Francese, Giuseppe Scanniello:
A Folklore Confirmation on the Removal of Dead Code. 333-338 - Maurizio Leotta, Hafiz Zeeshan Yousaf, Filippo Ricca, Boni García:
AI-Generated Test Scripts for Web E2E Testing with ChatGPT and Copilot: A Preliminary Study. 339-344 - Alexandros Tsakpinis, Alexander Pretschner:
Analyzing the Accessibility of GitHub Repositories for PyPI and NPM Libraries. 345-350 - Claudio Di Sipio, Riccardo Rubei, Juri Di Rocco, Davide Di Ruscio, Phuong T. Nguyen:
Automated categorization of pre-trained models in software engineering: A case study with a Hugging Face dataset. 351-356 - Kevin Maggi, Roberto Verdecchia, Leonardo Scommegna, Enrico Vicario:
CLAIM: a Lightweight Approach to Identify Microservices in Dockerized Environments. 357-362 - Tajmilur Rahman, Imran Shalabi, Tushar Sharma:
Exploring Influence of Feature Toggles on Code Complexity. 363-368 - Arash Mazidi, Davide Corradini, Mohammad Ghafari:
Mining REST APIs for Potential Mass Assignment Vulnerabilities. 369-374 - Miku Watanabe, Yutaro Kashiwa, Bin Lin, Toshiki Hirao, Ken-ichi Yamaguchi, Hajimu Iida:
On the Use of ChatGPT for Code Review: Do Developers Like Reviews By ChatGPT? 375-380 - Matteo Vaccargiu, Sabrina Aufiero, Silvia Bartolucci, Rumyana Neykova, Roberto Tonelli, Giuseppe Destefanis:
Sustainability in Blockchain Development: A BERT-Based Analysis of Ethereum Developer Discussions. 381-386 - Sergio Di Meglio, Luigi Libero Lucio Starace:
Towards Predicting Fragility in End-to-End Web Tests. 387-392 - Sien Reeve Ordonez Peralta, Hironori Washizaki, Yoshiaki Fukazawa, Yuki Noyori, Shuhei Nojiri, Hideyuki Kanuka:
Unraveling the Influences on Bug Fixing Time: A Comparative Analysis of Causal Inference Model. 393-398 - Zhipeng Xu, Ming Liu, Zhushou Tang, Yijun Wang:
Unveiling iOS Scamwares through Crowdturfing Reviews. 399-404 - Michael Neumann, Klaus Schmid, Lars Baumann:
What You Use is What You Get: Unforced Errors in Studying Cultural Aspects in Agile Software Development. 405-410 - Michael Dubem Igbomezie, Phuong T. Nguyen, Davide Di Ruscio:
When simplicity meets effectiveness: Detecting code comments coherence with word embeddings and LSTM. 411-416
Industry Track
- Mario Veniero, Davide Varriale:
AI-enabled efficient PVM performance monitoring. 417-420 - Ciprian Paduraru, Marina Cernat, Alin Stefanescu:
Automated evaluation of game content display using deep learning. 421-424 - Raffaele Chianese, Leopoldo Beneduce, Francesco Gargiulo, Stefano Marrone, Laura Verde:
Dealing with clinical outcome and fair cost: the FIDCARE platform. 425-428 - Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri:
Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers. 429-432 - Fabiano Izzo, Damiano D'Amici:
Harnessing No-Code Blockchain for DeFi: A Microcredit Case Study on AstraKode Blockchain. 433-436 - Diego Gosmar, Elena Peretto, Oita Coleman:
Insight AI Risk Detection Model - Vulnerable People Emotional Situation Support. 437-441 - Matteo Esposito, Francesco Palagiano:
Leveraging Large Language Models for Preliminary Security Risk Analysis: A Mission-Critical Case Study. 442-445 - Rocío Cabrera Lozoya, Antonino Sabetta, Tommaso Aiello:
Negative Complement of a Set of Vulnerability-Fixing Commits: Method and Dataset. 446-449 - Julian Harty, Arosha K. Bandara:
Taming App Reliability: Mobile Analytics "in the wild". 450-453
Poster Track
- Rabaya Sultana Mim, Toukir Ahammed, Kazi Sakib:
Automated Software Vulnerability Detection in Statement Level using Vulnerability Reports. 454-455 - Aneta Poniszewska-Maranda, Wiktoria Sarniak:
Automatic detection and correction of code errors applying machine learning - current research state. 456-457 - Winnie Bahati Mbaka:
New experimental design to capture bias using LLM to validate security threats. 458-459
Doctoral Symposium Track
- Antonio Curci:
A Comprehensive Framework Proposal to Design Symbiotic AI Systems. 460-465 - Giusy Annunziata:
Adapting to Change: Software Project Management in the Era of Security in Cloud Computing. 466-469 - Fernando Vallecillos Ruiz:
Agent-Driven Automatic Software Improvement. 470-475 - Gabriele De Vito:
Assessing healthcare software built using IoT and LLM technologies. 476-481 - Stefano Lambiase:
Cultural and Socio-Technical Aspects in Software Development. 482-487 - Miriana Calvano:
Design and Evaluation of High-Quality Symbiotic AI Systems through a Human-Centered Approach. 488-493 - Claudia Maria Cutrupi:
Human-Centered Interventions to Empower Gender Diversity in Software Engineering. 494-499 - Daniela Grassi:
Supporting Developers' Emotional Awareness: from Self-reported Emotions to Biometrics. 500-504 - Berenice Fernandez Nieto:
Toward a Human-Centered Framework for Trustworthy, Safe and Ethical Generative Artificial Intelligence: A Multi-Level Analysis of Large Language Models Social Impact. 505-509 - Refat Tahseen Othman:
Vulnerability Detection for software-intensive system. 510-515
DEVOPS-QM Workshop
- Saima Rafi, Muhammad Azeem Akbar, Sajjad Mahmood:
Aligning Academic with Industrial Needs: Investigating DevOps. 516-519 - Nasreen Azad, Sami Hyrynsalmi:
Multivocal Literature Review on DevOps Critical Success Factors. 520-527 - Muhammad Azeem Akbar, Saima Rafi, Sami Hyrynsalmi, Arif Ali Khan:
Towards People Maturity for Secure Development and Operations: A vision. 528-533 - Muhammad Zohaib, Fahad S. Altuwaijri, Muhammad Awais:
Towards the successful execution of DevOps outsource software development process. 534-537
E-QSE Workshop
- Vita Santa Barletta, Danilo Caivano, Anibrata Pal:
Integrating Security and Privacy in Quantum Software Engineering. 538-547 - Vita Santa Barletta, Danilo Caivano, Christian Catalano, Mirko De Vincentiis:
Quantum-based Automotive Threat Intelligence and Countermeasures. 548-554
Learner Workshop
- Simone Mezzaro, Alessio Gambi, Gordon Fraser:
An Empirical Study on How Large Language Models Impact Software Testing Learning. 555-564 - Marco De Luca, Sergio Di Meglio, Anna Rita Fasolino, Luigi Libero Lucio Starace, Porfirio Tramontana:
Automatic Assessment of Architectural Anti-patterns and Code Smells in Student Software Projects. 565-569 - Felix Cammaerts, Porfirio Tramontana, Ana C. R. Paiva, Nuno Flores, Fernando Pastor Ricós, Monique Snoeck:
Exploring students' opinion on software testing courses. 570-579 - Giacomo Garaccione, Riccardo Coppola, Luca Ardito:
Gamifying Business Process Modeling Education: A Longitudinal Study. 580-589 - Nicolò Pollini, Kevin Maggi, Roberto Verdecchia, Enrico Vicario:
Learning Programming without Teachers: An Ongoing Ethnographic Study at 42. 590-594 - Marco Torchiano, Antonio Vetrò, Riccardo Coppola:
Teaching Scrum with a focus on efficiency and inclusiveness. 595-599
SECUTE Workshop
- Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari:
LLM Security Guard for Code. 600-603 - Giusy Annunziata, Alexandra Sheykina, Fabio Palomba, Andrea De Lucia, Gemma Catolino, Filomena Ferrucci:
Security Risk Assessment on Cloud: A Systematic Mapping Study. 604-613 - Gareth Bennett, Tracy Hall, Emily Winter, Steve Counsell:
Semgrep*: Improving the Limited Performance of Static Application Security Testing (SAST) Tools. 614-623 - Davide La Gamba, Gerardo Iuliano, Gilberto Recupito, Giammaria Giordano, Filomena Ferrucci, Dario Di Nucci, Fabio Palomba:
Toward a Search-Based Approach to Support the Design of Security Tests for Malicious Network Traffic. 624-628
SECURESOFTWARE Workshop
- Muhammad Ovais Ahmad:
5G Secure Solution Development and Security Master Role. 629-633 - Haifa Abdullah Al-Shammare, Nehal Al-Otaiby, Muradi Al-Otabi, Mohammad R. Alshayeb:
An Empirical Investigation of the Security Weaknesses in Open-Source Projects. 634-642 - Jameleddine Hassine:
An LLM-based Approach to Recover Traceability Links between Security Requirements and Goal Models. 643-651 - Tazeem Ahmad, Mohd Adnan, Saima Rafi, Muhammad Azeem Akbar, Ayesha Anwar:
MLOps-Enabled Security Strategies for Next-Generation Operational Technologies. 662-667 - Arpit Thool, Chris Brown:
Securing Agile: Assessing the Impact of Security Activities on Agile Development. 668-678 - Triet Huynh Minh Le, Muhammad Ali Babar, Tung Hoang Thai:
Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT. 679-685 - Shalli Rani, Ankita Sharma, Muhammad Zohaib:
Study for Integrating IoT-IDS Datasets: Machine and Deep Learning for Secure IoT Network System. 686-691 - Mona Albinali, Mahmood Niazi:
The Security Culture Readiness Model (SCRM) for Saudi Universities: A Preliminary Structure. 692-697 - Francisco Ponce, Jacopo Soldani, Carla Taramasco, Hernán Astudillo, Antonio Brogi:
Triaging Microservice Security Smells, with TriSS. 698-706
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.