default search action
22nd ESEC / 31st SIGSOFT FSE 2023: San Francisco, CA, USA
- Satish Chandra, Kelly Blincoe, Paolo Tonella:
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC/FSE 2023, San Francisco, CA, USA, December 3-9, 2023. ACM 2023
Keynotes
- Eran Yahav:
Towards AI-Driven Software Development: Challenges and Lessons from the Field (Keynote). 1 - Margaret Burnett:
Getting Outside the Bug Boxes (Keynote). 2
Human Aspects I
- Zihan Fang, Madeline Endres, Thomas Zimmermann, Denae Ford, Westley Weimer, Kevin Leach, Yu Huang:
A Four-Year Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention. 3-15 - Felipe Fronchetti, David C. Shepherd, Igor Wiese, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher:
Do CONTRIBUTING Files Provide Information about OSS Newcomers' Onboarding Barriers? 16-28 - Wenxin Xiao, Hao He, Weiwei Xu, Yuxia Zhang, Minghui Zhou:
How Early Participation Determines Long-Term Sustained Activity in GitHub Projects? 29-41 - Hongbo Fang, James D. Herbsleb, Bogdan Vasilescu:
Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract Contributors. 42-54
Testing I
- Emad Fallahzadeh, Amir Hossein Bavand, Peter C. Rigby:
Accelerating Continuous Integration with Parallel Batch Testing. 55-67 - Longtian Wang, Xiaofei Xie, Xiaoning Du, Meng Tian, Qing Guo, Zheng Yang, Chao Shen:
DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning Systems. 68-80 - Qiyuan Zhao, Chuan Luo, Shaowei Cai, Wei Wu, Jinkun Lin, Hongyu Zhang, Chunming Hu:
CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays. 81-93
Machine Learning I
- Shibbir Ahmed, Sayem Mohammad Imtiaz, Syeda Khairunnesa Samantha, Breno Dantas Cruz, Hridesh Rajan:
Design by Contract for Deep Learning APIs. 94-106 - Jialun Cao, Yaojie Lu, Ming Wen, Shing-Chi Cheung:
Testing Coreference Resolution Systems without Labeled Test Sets. 107-119 - Soneya Binta Hossain, Antonio Filieri, Matthew B. Dwyer, Sebastian G. Elbaum, Willem Visser:
Neural-Based Test Oracle Generation: A Large-Scale Evaluation and Lessons Learned. 120-132 - Maria-Irina Nicolae, Max Eisele, Andreas Zeller:
Revisiting Neural Program Smoothing for Fuzzing. 133-145
Automated Repair I
- Weishi Wang, Yue Wang, Shafiq Joty, Steven C. H. Hoi:
RAP-Gen: Retrieval-Augmented Patch Generation with CodeT5 for Automatic Program Repair. 146-158 - Akshay Utture, Jens Palsberg:
From Leaks to Fixes: Automated Repairs for Resource Leak Warnings. 159-171 - Yuxiang Wei, Chunqiu Steven Xia, Lingming Zhang:
Copiloting the Copilots: Fusing Large Language Models with Completion Engines for Automated Program Repair. 172-184 - Sunbeom So, Hakjoo Oh:
SmartFix: Fixing Vulnerable Smart Contracts by Accelerating Generate-and-Verify Repair using Statistical Models. 185-197 - Huiyan Wang, Shuguan Liu, Lingyu Zhang, Chang Xu:
Automatically Resolving Dependency-Conflict Building Failures via Behavior-Consistent Loosening of Library Version Constraints. 198-210
Empirical Studies I
- Kobi Feldman, Martin Kellogg, Oscar Chaparro:
On the Relationship between Code Verifiability and Understandability. 211-223 - Xiaokai Wei, Sujan Kumar Gonugondla, Shiqi Wang, Wasi Uddin Ahmad, Baishakhi Ray, Haifeng Qian, Xiaopeng Li, Varun Kumar, Zijian Wang, Yuchen Tian, Qing Sun, Ben Athiwaratkun, Mingyue Shang, Murali Krishna Ramanathan, Parminder Bhatia, Bing Xiang:
Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study. 224-236
Testing II
- Huaien Zhang, Yu Pei, Junjie Chen, Shin Hwei Tan:
Statfier: Automated Testing of Static Analyzers via Semantic-Preserving Program Transformations. 237-249 - Kush Jain, Uri Alon, Alex Groce, Claire Le Goues:
Contextual Predictive Mutation Testing. 250-261 - Mohsen Moradi-Moghadam, Mehdi Bagherzadeh, Raffi Khatchadourian, Hamid Bagheri:
µAkka: Mutation Testing for Actor Concurrency in Akka using Real-World Bugs. 262-274
Software Evolution I
- Lanxin Yang, Jinwei Xu, Yifan Zhang, He Zhang, Alberto Bacchelli:
EvaCRC: Evaluating Code Review Comments. 275-287 - Quentin Le Dilavrec, Djamel Eddine Khelladi, Arnaud Blouin, Jean-Marc Jézéquel:
HyperDiff: Computing Source Code Diffs at Scale. 288-299 - Lantian Li, Yejian Liang, Zhihao Liu, Zhongxing Yu:
Understanding Solidity Event Logging Practices in the Wild. 300-312
Program Analysis I
- Xiaye Chi, Hui Liu, Guangjie Li, Weixiao Wang, Yunni Xia, Yanjie Jiang, Yuxia Zhang, Weixing Ji:
An Automated Approach to Extracting Local Variables. 313-325 - Seongmin Lee, Marcel Böhme:
Statistical Reachability Analysis. 326-337 - Mengxiao Zhang, Zhenyang Xu, Yongqiang Tian, Yu Jiang, Chengnian Sun:
PPR: Pairwise Program Reduction. 338-349 - Alan Romano, Weihang Wang:
When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime Performance. 350-362
Code Search and Text to Code
- Yuetian Mao, Chengcheng Wan, Yuze Jiang, Xiaodong Gu:
Self-Supervised Query Reformulation for Code Search. 363-374 - Shangwen Wang, Mingyang Geng, Bo Lin, Zhensu Sun, Ming Wen, Yepang Liu, Li Li, Tegawendé F. Bissyandé, Xiaoguang Mao:
Natural Language to Code: How Far Are We? 375-387 - Akhilesh Deepak Gotmare, Junnan Li, Shafiq Joty, Steven C. H. Hoi:
Efficient Text-to-Code Retrieval with Cascaded Fast and Slow Transformer Models. 388-400 - Xiangzhe Xu, Zhou Xuan, Shiwei Feng, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao, Le Yu, Zhuo Zhang, Xiangyu Zhang:
PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution Model. 401-412
Log Analysis and Debugging
- Junjielong Xu, Qiuai Fu, Zhouruixing Zhu, Yutong Cheng, Zhijing Li, Yuchi Ma, Pinjia He:
Hue: A User-Adaptive Parser for Hybrid Logs. 413-424 - Siyu Yu, Yifan Wu, Zhijing Li, Pinjia He, Ningjiang Chen, Changjian Liu:
Log Parsing with Generalization Ability under New Log Types. 425-437 - Martin Eberlein, Marius Smytzek, Dominic Steinhöfel, Lars Grunske, Andreas Zeller:
Semantic Debugging. 438-449 - Kaifeng Huang, Bihuan Chen, Susheng Wu, Junming Cao, Lei Ma, Xin Peng:
Demystifying Dependency Bugs in Deep Learning Stack. 450-462
Machine Learning II
- Yibo Wang, Ying Wang, Tingwei Zhang, Yue Yu, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Can Machine Learning Pipelines Be Better Configured? 463-475 - Jun Wang, Guanping Xiao, Shuai Zhang, Huashan Lei, Yepang Liu, Yulei Sui:
Compatibility Issues in Deep Learning Systems: Problems and Opportunities. 476-488 - Xiaohu Du, Ming Wen, Zichao Wei, Shangwen Wang, Hai Jin:
An Extensive Study on Adversarial Attack against Pre-trained Models of Code. 489-501 - Giang Nguyen, Sumon Biswas, Hridesh Rajan:
Fix Fairness, Don't Ruin Accuracy: Performance Aware Fairness Repair using AutoML. 502-514 - Yuxuan Wan, Wenxuan Wang, Pinjia He, Jiazhen Gu, Haonan Bai, Michael R. Lyu:
BiasAsker: Measuring the Bias in Conversational AI System. 515-527 - Sira Vegas, Sebastian G. Elbaum:
Pitfalls in Experiments with DNN4SE: An Analysis of the State of the Practice. 528-540 - Boyue Caroline Hu, Lina Marsso, Nikita Dvornik, Huakun Shen, Marsha Chechik:
DecompoVision: Reliability Analysis of Machine Vision Components through Decomposition and Reuse. 541-552
Fault Diagnosis and Root Cause Analysis I
- Guangba Yu, Pengfei Chen, Yufeng Li, Hongyang Chen, Xiaoyun Li, Zibin Zheng:
Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-modal Observability Data. 553-565 - Zhiming Chen, Pengfei Chen, Peipei Wang, Guangba Yu, Zilong He, Genting Mai:
DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems. 566-578 - Yali Du, Zhongxing Yu:
Pre-training Code Representation with Semantic Flow Graph for Effective Bug Localization. 579-591 - Enze Ma, Shan Huang, Weigang He, Ting Su, Jue Wang, Huiyu Liu, Geguang Pu, Zhendong Su:
Automata-Based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android. 592-604 - Liyan Song, Leandro L. Minku, Cong Teng, Xin Yao:
A Practical Human Labeling Method for Online Just-in-Time Software Defect Prediction. 605-617
Human Aspects II
- Saima Ritonummi, Valtteri Siitonen, Markus Salo, Henri Pirkkalainen, Anu Sivunen:
Flow Experience in Software Engineering. 618-630 - Ella Dagan, Anita Sarma, Alison Chang, Sarah D'Angelo, Jill Dicker, Emerson R. Murphy-Hill:
Building and Sustaining Ethnically, Racially, and Gender Diverse Software Engineering Teams: A Study at Google. 631-643 - Hsu Myat Win, Haibo Wang, Shin Hwei Tan:
Towards Automated Detection of Unethical Behavior in Open-Source Software Projects. 644-656
Testing III
- Jiawei Liu, Jinjun Peng, Yuyao Wang, Lingming Zhang:
NeuRI: Diversifying DNN Generation via Inductive Rule Inference. 657-669 - Yibiao Yang, Maolin Sun, Yang Wang, Qingyang Li, Ming Wen, Yuming Zhou:
Heterogeneous Testing for Coverage Profilers Empowered with Debugging Support. 670-681 - Shubham Agarwal, Sarthak Chakraborty, Shaddy Garg, Sumit Bisht, Chahat Jain, Ashritha Gonuguntla, Shiv Kumar Saini:
Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer. 682-694
Software Evolution II
- Jiyang Zhang, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
Multilingual Code Co-evolution using Large Language Models. 695-707 - Zhongkai Zhao, Bonan Kou, Mohamed Yilmaz Ibrahim, Muhao Chen, Tianyi Zhang:
Knowledge-Based Version Incompatibility Detection for Deep Learning. 708-719
Program Analysis II
- Yaohui Peng, Jing Xie, Qiongling Yang, Hanwen Guo, Qingan Li, Jingling Xue, Mengting Yuan:
Statistical Type Inference for Incomplete Programs. 720-732 - Chengjun Chen, Zhicong Zhang, Hongliang Tian, Shoumeng Yan, Hui Xu:
OOM-Guard: Towards Improving the Ergonomics of Rust OOM Handling via a Reservation-Based Approach. 733-744 - Kunsong Zhao, Zihao Li, Jianfeng Li, He Ye, Xiapu Luo, Ting Chen:
DeepInfer: Deep Type Inference from Smart Contract Bytecode. 745-757 - Yi Li, Aashish Yadavally, Jiaxing Zhang, Shaohua Wang, Tien N. Nguyen:
DeMinify: Neural Variable Name Recovery and Type Inference. 758-770
Clone and Similarity Detection
- Deqing Zou, Siyue Feng, Yueming Wu, Wenqi Suo, Hai Jin:
Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model. 771-783 - Junjie Shan, Shihan Dou, Yueming Wu, Hairu Wu, Yang Liu:
Gitor: Scalable Code Clone Detection by Building Global Sample Graph. 784-795 - Kairan Sun, Zhengzi Xu, Chengwei Liu, Kaixuan Li, Yang Liu:
Demystifying the Composition and Code Reuse in Solidity Smart Contracts. 796-807 - Tristan Benoit, Jean-Yves Marion, Sébastien Bardin:
Scalable Program Clone Search through Spectral Analysis. 808-820
Performance
- Min-Yih Hsu, Felicitas Hetzelt, David Gens, Michael Maitland, Michael Franz:
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing. 821-831 - Siwei Wei, Guyang Song, Senlin Zhu, Ruoyi Ruan, Shihao Zhu, Yan Cai:
Discovering Parallelisms in Python Programs. 832-844 - Jinfu Chen, Zishuo Ding, Yiming Tang, Mohammed Sayagh, Heng Li, Bram Adams, Weiyi Shang:
IoPV: On Inconsistent Option Performance Variations. 845-857 - Jingzhi Gong, Tao Chen:
Predicting Software Performance with Divide-and-Learn. 858-870
Machine Learning III
- Xinyu Gao, Zhijie Wang, Yang Feng, Lei Ma, Zhenyu Chen, Baowen Xu:
Benchmarking Robustness of AI-Enabled Multi-sensor Fusion Systems: Challenges and Opportunities. 871-882 - Boxi Yu, Yiyan Hu, Qiuyang Mang, Wenhan Hu, Pinjia He:
Automated Testing and Improvement of Named Entity Recognition Systems. 883-894 - Anastasiia Grishina, Max Hort, Leon Moonen:
The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code Classification. 895-907 - Bo Liu, Hui Liu, Guangjie Li, Nan Niu, Zimao Xu, Yifan Wang, Yunni Xia, Yuxia Zhang, Yanjie Jiang:
Deep Learning Based Feature Envy Detection Boosted by Real-World Examples. 908-920
Security I
- Kaixuan Li, Sen Chen, Lingling Fan, Ruitao Feng, Han Liu, Chengwei Liu, Yang Liu, Yixiang Chen:
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java. 921-933 - Xiaoke Wang, Tao Hui, Lei Zhao, Yueqiang Cheng:
Input-Driven Dynamic Program Debloating for Code-Reuse Attack Mitigation. 934-946 - Chenyang Ma, Wei Song, Jeff Huang:
TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts. 947-959 - Lida Zhao, Sen Chen, Zhengzi Xu, Chengwei Liu, Lyuye Zhang, Jiahui Wu, Jun Sun, Yang Liu:
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects. 960-972
Fault Diagnosis and Root Cause Analysis II
- Xianglin Yang, Yun Lin, Yifan Zhang, Linpeng Huang, Jin Song Dong, Hong Mei:
DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers. 973-985 - Chong Wang, Yiling Lou, Xin Peng, Jianan Liu, Baihan Zou:
Mining Resource-Operation Knowledge to Support Resource Leak Detection. 986-998 - Bo Wang, Ruishi Li, Mingkai Li, Prateek Saxena:
TransMap: Pinpointing Mistakes in Neural Code Translation. 999-1011 - Elvan Kula, Eric Greuter, Arie van Deursen, Georgios Gousios:
Dynamic Prediction of Delays in Software Projects using Delay Patterns and Bayesian Modeling. 1012-1023 - Yi Li, Aashish Yadavally, Jiaxing Zhang, Shaohua Wang, Tien N. Nguyen:
Commit-Level, Neural Vulnerability Detection and Assessment. 1024-1036
Fuzzing
- Mingyuan Wu, Kunqiu Chen, Qi Luo, Jiahong Xiang, Ji Qi, Junjie Chen, Heming Cui, Yuqun Zhang:
Enhancing Coverage-Guided Fuzzing via Phantom Program. 1037-1049 - Ahmad Humayun, Miryung Kim, Muhammad Ali Gulzar:
Co-dependence Aware Fuzzing for Dataflow-Based Big Data Analytics. 1050-1061 - Mingyuan Wu, Yicheng Ouyang, Minghai Lu, Junjie Chen, Yingquan Zhao, Heming Cui, Guowei Yang, Yuqun Zhang:
SJFuzz: Seed and Mutator Scheduling for JVM Fuzzing. 1062-1074 - Suhwan Song, Byoungyoung Lee:
Metamong: Detecting Render-Update Bugs in Web Browsers through Fuzzing. 1075-1087 - Jingling Sun, Ting Su, Jiayi Jiang, Jue Wang, Geguang Pu, Zhendong Su:
Property-Based Fuzzing for Finding Data Manipulation Errors in Android Apps. 1088-1100 - Jiyuan Wang, Qian Zhang, Hongbo Rong, Guoqing Harry Xu, Miryung Kim:
Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications. 1101-1113 - Matthew C. Davis, Sangheon Choi, Sam Estep, Brad A. Myers, Joshua Sunshine:
NaNofuzz: A Usable Tool for Automatic Test Generation. 1114-1126 - Guixin Ye, Tianmin Hu, Zhanyong Tang, Zhenye Fan, Shin Hwei Tan, Bo Zhang, Wenxiang Qian, Zheng Wang:
A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler Fuzzing. 1127-1139
Formal Verification
- David Trabish, Noam Rinetzky, Sharon Shoham, Vaibhav Sharma:
State Merging with Quantifiers in Symbolic Execution. 1140-1152 - Bin Yu, Cong Tian, Hengrui Xing, Zuchao Yang, Jie Su, Xu Lu, Jiyu Yang, Liang Zhao, Xiaofeng Li, Zhenhua Duan:
Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering. 1153-1164 - Arthur Correnson, Dominic Steinhöfel:
Engineering a Formally Verified Automated Bug Finder. 1165-1176 - Benjamin Mikek, Qirun Zhang:
Speeding up SMT Solving via Compiler Optimization. 1177-1189
Automated Repair II
- Xiaofang Qi, Xiang Qian, Yanhui Li:
Semantic Test Repair for Web Applications. 1190-1202 - Jun Yang, Yuehan Wang, Yiling Lou, Ming Wen, Lingming Zhang:
A Large-Scale Empirical Review of Patch Correctness Checking Approaches. 1203-1215 - Yu Liu, Sergey Mechtaev, Pavle Subotic, Abhik Roychoudhury:
Program Repair Guided by Datalog-Defined Static Analysis. 1216-1228 - Emily First, Markus N. Rabe, Talia Ringer, Yuriy Brun:
Baldur: Whole-Proof Generation and Repair with Large Language Models. 1229-1241 - Xueying Du, Yiling Lou, Mingwei Liu, Xin Peng, Tianyong Yang:
KG4CraSolver: Recommending Crash Solutions via Knowledge Graph. 1242-1254 - Yuxin Zhang, Sen Chen, Lingling Fan, Chunyang Chen, Xiaohong Li:
Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps. 1255-1267
Human Aspects III
- Sumit Asthana, Hitesh Sajnani, Elena Voyloshnikova, Birendra Acharya, Kim Herzig:
A Case Study of Developer Bots: Motivations, Perceptions, and Challenges. 1268-1280 - Courtney Miller, Christian Kästner, Bogdan Vasilescu:
"We Feel Like We're Winging It: " A Study on Navigating Open-Source Dependency Abandonment. 1281-1293 - Chaozheng Wang, Junhao Hu, Cuiyun Gao, Yu Jin, Tao Xie, Hailiang Huang, Zhenyu Lei, Yuetang Deng:
How Practitioners Expect Code Completion? 1294-1306
Testing IV
- Mohammad Ganji, Saba Alimadadi, Frank Tip:
Code Coverage Criteria for Asynchronous Programs. 1307-1319 - Xiaoxue Ren, Xinyuan Ye, Yun Lin, Zhenchang Xing, Shuqing Li, Michael R. Lyu:
API-Knowledge Aware Search-Based Software Testing: Where, What, and How. 1320-1332 - Shinhae Kim, Sungjae Hwang:
EtherDiffer: Differential Testing on RPC Services of Ethereum Nodes. 1333-1344
Machine Learning IV
- Yining Yin, Yang Feng, Shihao Weng, Zixi Liu, Yuan Yao, Yichi Zhang, Zhihong Zhao, Zhenyu Chen:
Dynamic Data Fault Localization for Deep Neural Networks. 1345-1357 - Xiaohu Du, Xiao Chen, Jialun Cao, Ming Wen, Shing-Chi Cheung, Hai Jin:
Understanding the Bug Characteristics and Fix Strategies of Federated Learning Systems. 1358-1370 - Bozhi Wu, Shangqing Liu, Yang Xiao, Zhiming Li, Jun Sun, Shang-Wei Lin:
Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural Slicing. 1371-1383 - Fuyuan Zhang, Xinwen Hu, Lei Ma, Jianjun Zhao:
DeepRover: A Query-Efficient Blackbox Attack for Deep Neural Networks. 1384-1394
Program Analysis III
- Nima Karimipour, Justin Pham, Lazaro Clapp, Manu Sridharan:
Practical Inference of Nullability Types. 1395-1406 - Daniel Domínguez-Álvarez, Alejandro de la Cruz, Alessandra Gorla, Juan Caballero:
LibKit: Detecting Third-Party Libraries in iOS Apps. 1407-1418 - Soomin Kim, Hyungseok Kim, Sang Kil Cha:
FunProbe: Probing Functions from Binary Code through Probabilistic Analysis. 1419-1430 - Zewen Sun, Duanchen Xu, Yiyu Zhang, Yun Qi, Yueyang Wang, Zhiqiang Zuo, Zhaokang Wang, Yue Li, Xuandong Li, Qingda Lu, Wenwen Peng, Shengjian Guo:
BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework. 1431-1443
Empirical Studies II
- Wenhua Yang, Chong Zhang, Minxue Pan:
Understanding the Topics and Challenges of GPU Programming by Classifying and Analyzing Stack Overflow Posts. 1444-1456 - Zhiyuan Wan, Yun Zhang, Xin Xia, Yi Jiang, David Lo:
Software Architecture in Practice: Challenges and Opportunities. 1457-1469
Models of Code and Documentation
- Martin Weyssow, Xin Zhou, Kisub Kim, David Lo, Houari A. Sahraoui:
On the Usage of Continual Learning for Out-of-Distribution Generalization in Pre-trained Language Models of Code. 1470-1482 - Priyanshu Gupta, Avishree Khare, Yasharth Bajpai, Saikat Chakraborty, Sumit Gulwani, Aditya Kanade, Arjun Radhakrishna, Gustavo Soares, Ashish Tiwari:
Grace: Language Models Meet Code Edits. 1483-1495 - Mingwei Liu, Yanjun Yang, Yiling Lou, Xin Peng, Zhong Zhou, Xueying Du, Tianyong Yang:
Recommending Analogical APIs via Knowledge Graph Embedding. 1496-1508 - Bo Lin, Shangwen Wang, Zhongxin Liu, Yepang Liu, Xin Xia, Xiaoguang Mao:
CCT5: A Code-Change-Oriented Pre-trained Model. 1509-1521
Machine Learning V
- Beatriz Souza, Michael Pradel:
LExecutor: Learning-Guided Execution. 1522-1534 - Yiran Zhang, Zhengzi Xu, Chengwei Liu, Hongxu Chen, Jianwen Sun, Dong Qiu, Yang Liu:
Software Architecture Recovery with Information Fusion. 1535-1547 - Haoyu Gao, Christoph Treude, Mansooreh Zahedi:
Evaluating Transfer Learning for Simplifying GitHub READMEs. 1548-1560 - Zhensu Sun, Xiaoning Du, Fu Song, Li Li:
CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models. 1561-1572
Security II
- Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. 1573-1585 - Prashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier, Antonio Bianchi, Mathias Payer:
Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization Vulnerabilities. 1586-1597 - Khaled Ahmed, Yingying Wang, Mieszko Lis, Julia Rubin:
ViaLin: Path-Aware Dynamic Taint Analysis for Android. 1598-1610 - Chao Ni, Xin Yin, Kaiwen Yang, Dehai Zhao, Zhenchang Xing, Xin Xia:
Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation. 1611-1622
Industry Papers
- Chaozheng Wang, Haochuan Lu, Cuiyun Gao, Zongjie Li, Ting Xiong, Yuetang Deng:
A Unified Framework for Mini-game Testing: Experience on WeChat. 1623-1634 - Haotian Si, Changhua Pei, Zhihan Li, Yadong Zhao, Jingjing Li, Haiming Zhang, Zulong Diao, Jianhui Li, Gaogang Xie, Dan Pei:
Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection. 1635-1645 - Matthew Jin, Syed Shahriar, Michele Tufano, Xin Shi, Shuai Lu, Neel Sundaresan, Alexey Svyatkovskiy:
InferFix: End-to-End Program Repair with LLMs. 1646-1656 - Pengxiang Jin, Shenglin Zhang, Minghua Ma, Haozhe Li, Yu Kang, Liqun Li, Yudong Liu, Bo Qiao, Chaoyun Zhang, Pu Zhao, Shilin He, Federica Sarro, Yingnong Dang, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
Assess and Summarize: Improve Outage Understanding with Large Language Models. 1657-1668 - Andreas Happe, Jürgen Cito:
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners. 1669-1680 - Sidong Feng, Haochuan Lu, Ting Xiong, Yuetang Deng, Chunyang Chen:
Towards Efficient Record and Replay: A Case Study in WeChat. 1681-1692 - Yuxin Wang, Adam Welc, Lazaro Clapp, Lingchao Chen:
Last Diff Analyzer: Multi-language Automated Approver for Behavior-Preserving Code Revisions. 1693-1704 - Will Shackleton, Katriel Cohn-Gordon, Peter C. Rigby, Rui Abreu, James Gill, Nachiappan Nagappan, Karim Nakad, Ioannis Papagiannis, Luke Petre, Giorgi Megreli, Patrick Riggs, James Saindon:
Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data. 1705-1715 - Tamás Szabó:
Incrementalizing Production CodeQL Analyses. 1716-1726 - Zhiwei Xu, Min Zhou, Xibin Zhao, Yang Chen, Xi Cheng, Hongyu Zhang:
xASTNN: Improved Code Representations for Industrial Practice. 1727-1738 - Zhe Xie, Changhua Pei, Wanxue Li, Huai Jiang, Liangfei Su, Jianhui Li, Gaogang Xie, Dan Pei:
From Point-wise to Group-wise: A Fast and Accurate Microservice Trace Anomaly Detection Approach. 1739-1749 - Shilin He, Botao Feng, Liqun Li, Xu Zhang, Yu Kang, Qingwei Lin, Saravan Rajmohan, Dongmei Zhang:
STEAM: Observability-Preserving Trace Sampling. 1750-1761 - Ruomeng Ding, Chaoyun Zhang, Lu Wang, Yong Xu, Minghua Ma, Xiaomin Wu, Meng Zhang, Qingjun Chen, Xin Gao, Xuedong Gao, Hao Fan, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice Systems. 1762-1773 - Tung Dao, Na Meng, ThanhVu Nguyen:
Triggering Modes in Spectrum-Based Multi-location Fault Localization. 1774-1785 - Yongxiang Hu, Jiazhen Gu, Shuqing Hu, Yu Zhang, Wenjie Tian, Shiyu Guo, Chaoyi Chen, Yangfan Zhou:
Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget Perception. 1786-1797 - Zimin Chen, Malgorzata Salawa, Manushree Vijayvergiya, Goran Petrovic, Marko Ivankovic, René Just:
MuRS: Mutant Ranking and Suppression using Identifier Templates. 1798-1808 - Audris Mockus, Peter C. Rigby, Rui Abreu, Parth Suresh, Yifen Chen, Nachiappan Nagappan:
Modeling the Centrality of Developer Output with Software Supply Chains. 1809-1819 - Anes Bendimerad, Youcef Remil, Romain Mathonat, Mehdi Kaytoue:
On-Premise AIOps Infrastructure for a Software Editor SME: An Experience Report. 1820-1831 - Yanming Yang, Ying Zou, Xing Hu, David Lo, Chao Ni, John C. Grundy, Xin Xia:
C³: Code Clone-Based Identification of Duplicated Components. 1832-1843 - Xiaoyu Liu, Jinu Jang, Neel Sundaresan, Miltiadis Allamanis, Alexey Svyatkovskiy:
AdaptivePaste: Intelligent Copy-Paste in IDE. 1844-1854 - Lizhi Liao, Heng Li, Weiyi Shang, Catalin Sporea, Andrei Toma, Sarah Sajedi:
Adapting Performance Analytic Techniques in a Real-World Database-Centric System: An Industrial Experience Report. 1855-1866 - Qinghua Xu, Shaukat Ali, Tao Yue, Zaimovic Nedim, Inderjeet Singh:
KDDT: Knowledge Distillation-Empowered Digital Twin for Anomaly Detection. 1867-1878 - Xiaoyun Liang, Jiayi Qi, Yongqiang Gao, Chao Peng, Ping Yang:
AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision. 1879-1890 - Vaibhav Ganatra, Anjaly Parayil, Supriyo Ghosh, Yu Kang, Minghua Ma, Chetan Bansal, Suman Nath, Jonathan Mace:
Detection Is Better Than Cure: A Cloud Incidents Perspective. 1891-1902 - Yoshiki Takashima:
PropProof: Free Model-Checking Harnesses from PBT. 1903-1913 - Yibo Dong, Xiaoyu Zhang, Yicong Xu, Chang Cai, Yu Chen, Weikai Miao, Jianwen Li, Geguang Pu:
LightF3: A Lightweight Fully-Process Formal Framework for Automated Verifying Railway Interlocking Systems. 1914-1925 - Vahid Haratian, Mikhail Evtikhiev, Pouria Derakhshanfar, Eray Tüzün, Vladimir Kovalenko:
BFSig: Leveraging File Significance in Bus Factor Estimation. 1926-1936 - Christoph Laaber, Tao Yue, Shaukat Ali, Thomas Schwitalla, Jan Nygård:
Automated Test Generation for Medical Rules Web Services: A Case Study at the Cancer Registry of Norway. 1937-1948 - Federico Formica, Nicholas Petrunti, Lucas Bruck, Vera Pantelic, Mark Lawford, Claudio Menghi:
Test Case Generation for Drivability Requirements of an Automotive Cruise Controller: An Experience with an Industrial Simulator. 1949-1960 - Markos Viggiato, Dale Paas, Cor-Paul Bezemer:
Prioritizing Natural Language Test Cases Based on Highly-Used Game Features. 1961-1972 - Chengjie Lu, Qinghua Xu, Tao Yue, Shaukat Ali, Thomas Schwitalla, Jan Nygård:
EvoCLINICAL: Evolving Cyber-Cyber Digital Twin with Active Transfer Learning for Automated Cancer Registry System. 1973-1984 - Subarno Banerjee, Siwei Cui, Michael Emmi, Antonio Filieri, Liana Hadarean, Peixuan Li, Linghui Luo, Goran Piskachev, Nicolás Rosner, Aritra Sengupta, Omer Tripp, Jingbo Wang:
Compositional Taint Analysis for Enforcing Security Policies at Scale. 1985-1996 - Julian Reck, Thomas Bach, Jan Stoess:
A Multidimensional Analysis of Bug Density in SAP HANA. 1997-2007 - Umme Ayman Koana, Francis Chew, Chris Carlson, Maleknaz Nayebi:
Ownership in the Hands of Accountability at Brightsquid: A Case Study and a Developer Survey. 2008-2019
Industry Short Papers
- Paul Robinson:
Rotten Green Tests in Google Test. 2020-2025 - Ethem Utku Aktas, Ebru Cakmak, Mete Inan, Cemal Yilmaz:
Issue Report Validation in an Industrial Context. 2026-2031 - Yuchen Zhang, Ashish Kundu, Georgios Portokalidis, Jun Xu:
On the Dual Nature of Necessity in Use of Rust Unsafe Code. 2032-2037 - Jacopo Bufalino, Mario Di Francesco, Tuomas Aura:
Analyzing Microservice Connectivity with Kubesonde. 2038-2043 - Hassan Sartaj, Shaukat Ali, Tao Yue, Kjetil Moberg:
Testing Real-World Healthcare IoT Application: Experiences and Lessons Learned. 2044-2049 - Fangkai Yang, Wenjie Yin, Lu Wang, Tianci Li, Pu Zhao, Bo Liu, Paul Wang, Bo Qiao, Yudong Liu, Mårten Björkman, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang:
Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365. 2050-2055 - Zheng Li, Austen Rainer:
The Most Agile Teams Are the Most Disciplined: On Scaling out Agile Development. 2056-2061
Ideas, Visions, and Reflections
- Vincenzo Orrei, Marco Raglianti, Csaba Nagy, Michele Lanza:
Contribution-Based Firing of Developers? 2062-2066 - Milos Ojdanic, Mike Papadakis, Mark Harman:
Keeping Mutation Test Suites Consistent and Relevant with Long-Standing Mutants. 2067-2071 - Jian Gu, Harald C. Gall:
Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to Executables. 2072-2076 - Supatsara Wattanakriengkrai, Raula Gaikovina Kula, Christoph Treude, Kenichi Matsumoto:
Lessons from the Long Tail: Analysing Unsafe Dependency Updates across Software Ecosystems. 2077-2081 - Andreas Happe, Jürgen Cito:
Getting pwn'd by AI: Penetration Testing with Large Language Models. 2082-2086 - Boyue Caroline Hu, Marsha Chechik:
Towards Feature-Based Analysis of the Machine Learning Development Lifecycle. 2087-2091 - Ramtin Ehsani, Rezvaneh Rezapour, Preetha Chatterjee:
Exploring Moral Principles Exhibited in OSS: A Case Study on GitHub Heated Issues. 2092-2096 - Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee:
Towards Understanding Emotions in Informal Developer Interactions: A Gitter Chat Study. 2097-2101 - Maxime Cordy, Sami Lazreg, Axel Legay, Pierre-Yves Schobbens:
Towards Strengthening Formal Specifications with Mutation Model Checking. 2102-2106 - Haonan Li, Yu Hao, Yizhuo Zhai, Zhiyun Qian:
Assisting Static Analysis with Large Language Models: A ChatGPT Experiment. 2107-2111 - Kelechi G. Kalu, Taylor R. Schorlemmer, Sophie Chen, Kyle A. Robinson, Erik Kocinare, James C. Davis:
Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software Engineering. 2112-2116 - Jacob Krüger, Yi Li, Chenguang Zhu, Marsha Chechik, Thorsten Berger, Julia Rubin:
A Vision on Intentions in Software Engineering. 2117-2121 - Felipe Toledo, David Shriver, Sebastian G. Elbaum, Matthew B. Dwyer:
Deeper Notions of Correctness in Image-Based DNNs: Lifting Properties from Pixel to Entities. 2122-2126
Demonstrations
- Xiaoyu Sun, Xiao Chen, Yonghui Liu, John C. Grundy, Li Li:
LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation. 2127-2131 - Donald Pinckney, Federico Cassano, Arjun Guha, Jonathan Bell:
npm-follower: A Complete Dataset Tracking the NPM Ecosystem. 2132-2136 - Jia Le Tian, Mengxiao Zhang, Zhenyang Xu, Yongqiang Tian, Yiwen Dong, Chengnian Sun:
Ad Hoc Syntax-Guided Program Reduction. 2137-2141 - Laura Cabra-Acela, Anamaria Mojica-Hanke, Mario Linares-Vásquez, Steffen Herbold:
On Using Information Retrieval to Recommend Machine Learning Good Practices for Software Engineers. 2142-2146 - Prianka Mandal, Sunil Manandhar, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
Helion: Enabling Natural Testing of Smart Homes. 2147-2151 - Chia-Yi Su, Aakash Bansal, Vijayanta Jain, Sepideh Ghanavati, Collin McMillan:
A Language Model of Java Methods with Train/Test Deduplication. 2152-2156 - Shriram Shanbhag, Sridhar Chimalakonda, Vibhu Saujanya Sharma, Vikrant Kaulgud:
DENT: A Tool for Tagging Stack Overflow Posts with Deep Learning Energy Patterns. 2157-2161 - Amit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni:
MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse Detectors. 2162-2166 - Ruiling Chen, Jiaxiang Liu, Xiaomu Shi, Ming-Hsien Tsai, Bow-Yaw Wang, Bo-Yin Yang:
llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs. 2167-2171 - Chong Ye, Fei He:
P4b: A Translator from P4 Programs to Boogie. 2172-2176 - Soumik Mohian, Tony Tang, Tuan Trinh, Don Dang, Christoph Csallner:
D2S2: Drag 'n' Drop Mobile App Screen Search. 2177-2181 - Alejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, Mario Linares-Vásquez, Gabriele Bavota:
CONAN: Statically Detecting Connectivity Issues in Android Applications. 2182-2186
Student Research Competition
- Mouna Dhaouadi:
A Data Set of Extracted Rationale from Linux Kernel Commit Messages. 2187-2188 - Niklas Risse:
Detecting Overfitting of Machine Learning Techniques for Automatic Vulnerability Detection. 2189-2191 - Yi Zhang:
Detection of Optimizations Missed by the Compiler. 2192-2194 - Emily Nguyen:
Do All Software Projects Die When Not Maintained? Analyzing Developer Maintenance to Predict OSS Usage. 2195-2197 - Didier Ishimwe:
Inferring Complexity Bounds from Recurrence Relations. 2198-2200 - Qiuhan Gu:
LLM-Based Code Generation Method for Golang Compiler Testing. 2201-2203 - Issam Sedki:
Privacy-Centric Log Parsing for Timely, Proactive Personal Data Protection. 2204-2206 - Claudio Spiess:
STraceBERT: Source Code Retrieval using Semantic Application Traces. 2207-2209 - Masudul Hasan Masud Bhuiyan:
The Call Graph Chronicles: Unleashing the Power Within. 2210-2212 - Zixuan Feng:
The State of Survival in OSS: The Impact of Diversity. 2213-2215
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.