Ideas, Visions and ReflectionsESEC/FSE 2023
Tue 5 DecDisplayed time zone: Pacific Time (US & Canada) change
11:00 - 12:30 | Human Aspects IResearch Papers / Journal First / Ideas, Visions and Reflections at Golden Gate A Chair(s): Preetha Chatterjee Drexel University, USA | ||
11:00 15mTalk | A Longitudinal Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention Research Papers Zihan Fang Vanderbilt University, Madeline Endres University of Michigan, Thomas Zimmermann Microsoft Research, Denae Ford Microsoft Research, Westley Weimer University of Michigan, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University Pre-print Media Attached | ||
11:15 15mTalk | Do CONTRIBUTING files provide information about OSS newcomers' onboarding barriers? Research Papers Felipe Fronchetti Virginia Commonwealth University, David C. Shepherd Louisiana State University, Igor Scaliante Wiese Federal University of Technology – Paraná - UTFPR, Christoph Treude University of Melbourne, Marco Gerosa Northern Arizona University, Igor Steinmacher Northern Arizona University Pre-print Media Attached | ||
11:30 15mTalk | Off to a Good Start: Dynamic Contribution Patterns and Technical Success in an OSS Newcomer’s Early Career Journal First Yang Yue University of California, Irvine, Yi Wang Beijing University of Posts and Telecommunications, David Redmiles University of California, Irvine Link to publication DOI Media Attached | ||
11:45 15mTalk | How Early Participation Determines Long-Term Sustained Activity in GitHub Projects? Research Papers Wenxin Xiao School of Computer Science, Peking University, Hao He Carnegie Mellon University, Weiwei Xu Peking University, Yuxia Zhang Beijing Institute of Technology, Minghui Zhou Peking University Pre-print Media Attached | ||
12:00 15mTalk | Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract Contributors Research Papers Hongbo Fang Carnegie Mellon University, James Herbsleb Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University Media Attached | ||
12:15 15mTalk | Contribution-based Firing of Developers? Ideas, Visions and Reflections Vincenzo Orrei Software Institute - USI, Lugano, Switzerland, Marco Raglianti Software Institute - USI, Lugano, Csaba Nagy Software Institute - USI, Lugano, Michele Lanza Software Institute - USI, Lugano Media Attached |
11:00 - 12:30 | Testing IIdeas, Visions and Reflections / Research Papers / Journal First / Industry Papers at Golden Gate C1 Chair(s): Marcelo d'Amorim North Carolina State University | ||
11:00 15mTalk | [Remote] CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays Research Papers Qiyuan Zhao Beihang University, Chuan Luo Beihang University, Shaowei Cai Institute of Software, Chinese Academy of Sciences, Wei Wu L3S Research Center, Leibniz University Hannover, Germany, Jinkun Lin Seed Math Technology Limited, Hongyu Zhang Chongqing University, Chunming Hu Beihang University DOI Pre-print Media Attached | ||
11:15 15mTalk | Accelerating Continuous Integration with Parallel Batch Testing Research Papers Emad Fallahzadeh Concordia University, Amir Hossein Bavand Concordia University, Peter Rigby Concordia University; Meta Pre-print Media Attached | ||
11:30 15mTalk | Keeping Mutation Test Suites Consistent and Relevant with Long-Standing Mutants Ideas, Visions and Reflections Milos Ojdanic University of Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Mark Harman Meta Platforms Inc. and UCL Media Attached | ||
11:45 15mTalk | DistXplore: Distribution-guided Testing for Evaluating and Enhancing Deep Learning Systems Research Papers Longtian Wang Xi'an Jiaotong University, Xiaofei Xie Singapore Management University, Xiaoning Du Monash University, Australia, Meng Tian Singapore Management University, Qing Guo IHPC and CFAR at A*STAR, Singapore, Yang Zheng TTE Lab, Huawei, Chao Shen Xi’an Jiaotong University Media Attached | ||
12:00 15mTalk | Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing Journal First Swaroopa Dola University of Virginia, Matthew B Dwyer University of Virginia, Mary Lou Soffa University of Virginia Media Attached | ||
12:15 15mTalk | A Unified Framework for Mini-game Testing: Experience on WeChat Industry Papers Chaozheng Wang The Chinese University of Hong Kong, Haochuan Lu Tencent, Cuiyun Gao The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Ting Xiong Tencent Inc., Yuetang Deng Tencent Inc. DOI Media Attached |
11:00 - 12:30 | Machine Learning IIdeas, Visions and Reflections / Industry Papers / Research Papers at Golden Gate C2 Chair(s): Michael Pradel University of Stuttgart | ||
11:00 15mTalk | [Remote] Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection Industry Papers Haotian Si Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Zhihan Li Kuaishou Technology, Yadong Zhao Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingjing Li Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haiming Zhang Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zulong Diao Institute of Computing Technology at Chinese Academy of Sciences, Jianhui Li Computer Network Information Center at Chinese Academy of Sciences, Gaogang Xie Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University DOI Media Attached | ||
11:15 15mTalk | Design by Contract for Deep Learning APIs Research Papers Shibbir Ahmed Dept. of Computer Science, Iowa State University, Sayem Mohammad Imtiaz Iowa State University, Samantha Syeda Khairunnesa Bradley University, Breno Dantas Cruz Dept. of Computer Science, Iowa State University, Hridesh Rajan Dept. of Computer Science, Iowa State University DOI Media Attached | ||
11:30 15mTalk | Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to Executables Ideas, Visions and Reflections Media Attached | ||
11:45 15mTalk | Testing Coreference Resolution Systems without Labeled Test Sets Research Papers Jialun Cao Hong Kong University of Science and Technology, Yaojie Lu Chinese Information Processing Laboratory Institute of Software, Chinese Academy of Sciences, Ming Wen Huazhong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology Media Attached | ||
12:00 15mTalk | Neural-Based Test Oracle Generation: A Large-scale Evaluation and Lessons Learned Research Papers Soneya Binta Hossain University of Virginia, USA, Antonio Filieri Amazon Web Services, Matthew B Dwyer University of Virginia, Sebastian Elbaum University of Virginia, Willem Visser Amazon Web Services Pre-print Media Attached | ||
12:15 15mTalk | Revisiting Neural Program Smoothing for Fuzzing Research Papers Maria Irina Nicolae Robert Bosch GmbH, Max Eisele Robert Bosch; Saarland University, Andreas Zeller CISPA Helmholtz Center for Information Security Media Attached |
14:00 - 15:30 | Empirical Studies IIdeas, Visions and Reflections / Research Papers / Industry Papers / Journal First at Golden Gate A Chair(s): Cristian Cadar Imperial College London | ||
14:00 15mTalk | [Remote] Assess and Summarize: Improve Outage Understanding with Large Language Models Industry Papers Pengxiang Jin Nankai University, Shenglin Zhang Nankai University, Minghua Ma Microsoft Research, Haozhe Li Peking University, Yu Kang Microsoft Research, Liqun Li Microsoft Research, Yudong Liu Microsoft Research, Bo Qiao Microsoft Research, Chaoyun Zhang Microsoft, Pu Zhao Microsoft Research, Shilin He Microsoft Research, Federica Sarro University College London, Yingnong Dang Microsoft Azure, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research DOI Media Attached | ||
14:15 15mTalk | Open Source License Inconsistencies on GitHub Journal First Thomas Wolter Friedrich-Alexander University Erlangen-Nuernberg, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Dirk Riehle U of Erlangen, Nikolay Harutyunyan Friedrich-Alexander University Erlangen-Nuremberg, Germany Media Attached | ||
14:30 15mTalk | On the Relationship Between Code Verifiability and Understandability Research Papers Kobi Feldman College of William & Mary, Martin Kellogg New Jersey Institute of Technology, Oscar Chaparro William & Mary Media Attached | ||
14:45 15mTalk | Lessons from the Long Tail: Analysing Unsafe Dependency Updates across Software Ecosystems Ideas, Visions and Reflections Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne, Kenichi Matsumoto Nara Institute of Science and Technology Media Attached | ||
15:00 15mTalk | Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study Research Papers Xiaokai Wei AWS AI Labs, Sujan Kumar Gonugondla AWS AI Labs, Shiqi Wang AWS AI Labs, Wasi Ahmad AWS AI Labs, Baishakhi Ray Columbia University, Haifeng Qian AWS AI Labs, Xiaopeng LI AWS AI Labs, Varun Kumar AWS AI Labs, Zijian Wang AWS AI Labs, Yuchen Tian AWS, Qing Sun AWS AI Labs, Ben Athiwaratkun AWS AI Labs, Mingyue Shang AWS AI Labs, Murali Krishna Ramanathan AWS AI Labs, Parminder Bhatia AWS AI Labs, Bing Xiang AWS AI Labs Media Attached | ||
15:15 15mTalk | Understanding Hackers’ Work: An Empirical Study of Offensive Security Practitioners Industry Papers DOI Media Attached |
14:00 - 15:30 | Program Analysis IResearch Papers / Demonstrations / Industry Papers at Golden Gate C3 Chair(s): Michael Pradel University of Stuttgart | ||
14:00 15mTalk | An Automated Approach to Extracting Local Variables Research Papers Xiaye Chi Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Weixiao Wang Beijing Institute of Technology, Yunni Xia Chongqing University, Yanjie Jiang Peking University, Yuxia Zhang Beijing Institute of Technology, Weixing Ji Beijing Institute of Technology Media Attached | ||
14:15 15mTalk | Incrementalizing Production CodeQL Analyses Industry Papers Tamás Szabó GitHub Next DOI Media Attached | ||
14:30 15mTalk | Statistical Reachability Analysis Research Papers Seongmin Lee Max Planck Institute for Security and Privacy (MPI-SP), Marcel Böhme Max Planck Institute for Security and Privacy Media Attached | ||
14:45 15mTalk | PPR: Pairwise Program Reduction Research Papers Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo Media Attached | ||
15:00 15mTalk | When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime Performance Research Papers Pre-print Media Attached | ||
15:15 7mTalk | Ad Hoc Syntax-Guided Program Reduction Demonstrations Jia Le Tian University of Waterloo, Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yiwen Dong , Chengnian Sun University of Waterloo Media Attached |
16:00 - 18:00 | Code Search and Text to CodeResearch Papers / Industry Papers / Journal First / Demonstrations at Golden Gate A Chair(s): Miryung Kim University of California at Los Angeles, USA | ||
16:00 15mTalk | [Remote] Self-Supervised Query Reformulation for Code Search Research Papers Yuetian Mao Shanghai Jiao Tong University, Chengcheng Wan East China Normal University, Yuze Jiang Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University Media Attached | ||
16:15 15mTalk | [Remote] Natural Language to Code: How Far are We? Research Papers Shangwen Wang National University of Defense Technology, Mingyang Geng National University of Defense Technology, Bo Lin National University of Defense Technology, Zhensu Sun Singapore Management University, Ming Wen Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Li Li Beihang University, Tegawendé F. Bissyandé University of Luxembourg, Xiaoguang Mao National University of Defense Technology DOI Pre-print Media Attached | ||
16:30 15mTalk | [Remote] xASTNN: Improved Code Representations for Industrial Practice Industry Papers Zhiwei Xu Tsinghua University, Min Zhou Tsinghua University, Xibin Zhao Tsinghua University, Yang Chen Huazhong University of Science and Technology, Xi Cheng VMware, Hongyu Zhang Chongqing University DOI Media Attached | ||
16:45 7mTalk | [Remote] On the Dual Nature of Necessity in Use of Rust Unsafe Code Industry Papers Yuchen Zhang New York University, USA, Ashish Kundu Cisco Research, Georgios Portokalidis Stevens Institute of Technology, Jun Xu The University of Utah DOI Media Attached | ||
16:53 7mTalk | On Using Information Retrieval to Recommend Machine Learning Good Practices for Software Engineers Demonstrations Laura Cabra-Acela Universidad de Los Andes, Anamaria Mojica-Hanke University of Passau, Universidad de Los Andes, Mario Linares-Vásquez Universidad de los Andes, Steffen Herbold University of Passau Media Attached | ||
17:00 15mTalk | MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation Journal First Federico Cassano Northeastern University, John Gouwar Northeastern University, Daniel Nguyen Hannover High School, Sydney Nguyen Wellesley College, Luna Phipps-Costin Northeastern University, Donald Pinckney Northeastern University, Ming-Ho Yee Northeastern University, Yangtian Zi Northeastern University, Carolyn Jane Anderson Wellesley College, Molly Q Feldman Oberlin College, Arjun Guha Northeastern University and Roblox, Michael Greenberg Stevens Institute of Technology, Abhinav Jangda Microsoft Research Link to publication Media Attached | ||
17:15 15mTalk | NCQ: Code reuse support for Node.js developers Journal First Brittany Reid The University of Adelaide, Marcelo d'Amorim North Carolina State University, Markus Wagner Monash University, Australia, Christoph Treude University of Melbourne Link to publication DOI Pre-print Media Attached | ||
17:30 15mTalk | Efficient Text-to-Code Retrieval with Cascaded Fast and Slow Transformer Models Research Papers Akhilesh Deepak Gotmare Salesforce Research, Junnan Li Salesforce Research, Shafiq Joty Salesforce Research, Steven C.H. Hoi Salesforce Research Asia Media Attached | ||
17:45 15mTalk | PEM: Representing Binary Program Semantics for Similarity Analysis via A Probabilistic Execution Model Research Papers Xiangzhe Xu Purdue University, Zhou Xuan , Shiwei Feng Purdue University, Siyuan Cheng Purdue University, Yapeng Ye Purdue University, Qingkai Shi The Hong Kong University of Science and Technology, Guanhong Tao Purdue University, Le Yu , Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University Media Attached |
16:00 - 18:00 | Log Analysis and DebuggingIndustry Papers / Research Papers at Golden Gate C1 Chair(s): Yiming Tang Rochester Institute of Technology | ||
16:00 15mTalk | [Remote] STEAM: Observability-Preserving Trace Sampling Industry Papers Shilin He Microsoft Research, Botao Feng Microsoft, Liqun Li Microsoft Research, Xu Zhang Microsoft Research, Yu Kang Microsoft Research, Qingwei Lin Microsoft, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research DOI Media Attached | ||
16:15 15mTalk | [Remote] Demystifying Dependency Bugs in Deep Learning Stack Research Papers Kaifeng Huang Fudan University, Bihuan Chen Fudan University, Susheng Wu Fudan University, Junming Cao Fudan University, Lei Ma The University of Tokyo / University of Alberta, Xin Peng Fudan University Media Attached | ||
16:30 15mTalk | From Point-wise to Group-wise: A Fast and Accurate Microservice Trace Anomaly Detection Approach Industry Papers Zhe Xie Tsinghua University, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Wanxue Li eBay, USA, Huai Jiang eBay, USA, Liangfei Su eBay, USA, Jianhui Li Computer Network Information Center at Chinese Academy of Sciences, Gaogang Xie Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University DOI Media Attached | ||
16:45 15mTalk | Semantic Debugging Research Papers Martin Eberlein Humboldt University of Berlin, Marius Smytzek CISPA Helmholtz Center for Information Security, Dominic Steinhöfel CISPA Helmholtz Center for Information Security, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security Media Attached | ||
17:00 7mTalk | Analyzing Microservice Connectivity with Kubesonde Industry Papers Jacopo Bufalino Aalto University, Mario Di Francesco Eficode; Aalto University, Tuomas Aura Aalto University DOI Media Attached | ||
17:08 15mTalk | [Remote] Hue: A User-Adaptive Parser for Hybrid Logs Research Papers Junjielong Xu Chinese University of Hong Kong, Shenzhen, Qiuai Fu Huawei Cloud Computing Technologies CO., LTD., Zhouruixing Zhu Chinese University of Hong Kong, Shenzhen, Yutong Cheng Chinese University of Hong Kong, Shenzhen, zhijing li , Yuchi Ma Huawei Cloud Computing Technologies CO., LTD., Pinjia He The Chinese University of Hong Kong, Shenzhen Media Attached | ||
17:23 15mTalk | [Remote] Log Parsing with Generalization Ability under New Log Types Research Papers Siyu Yu Guangxi University, Yifan Wu Peking University, Zhijing Li The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen, Ningjiang Chen Guangxi University, Changjian Liu Guangxi University Media Attached |
16:00 - 18:00 | Machine Learning IIResearch Papers / Ideas, Visions and Reflections at Golden Gate C2 Chair(s): Iftekhar Ahmed University of California at Irvine | ||
16:00 15mTalk | [Remote] Compatibility Issues in Deep Learning Systems: Problems and Opportunities Research Papers Jun Wang Nanjing University of Aeronautics and Astronautics, Nanjing, China, Guanping Xiao Nanjing University of Aeronautics and Astronautics, China, Shuai Zhang Nanjing University of Aeronautics and Astronautics, China, Huashan Lei Nanjing University of Aeronautics and Astronautics, China, Yepang Liu Southern University of Science and Technology, Yulei Sui University of New South Wales, Australia DOI Pre-print Media Attached | ||
16:15 15mTalk | [Remote] An Extensive Study on Adversarial Attack against Pre-trained Models of Code Research Papers Xiaohu Du Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zichao Wei Huazhong University of Science and Technology, Shangwen Wang National University of Defense Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
16:30 15mTalk | Can Machine Learning Pipelines Be Better Configured? Research Papers Yibo Wang Northeastern University, Ying Wang Northeastern University, Tingwei Zhang Northeastern University, Yue Yu National University of Defense Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hai Yu Software College, Northeastern University, Zhiliang Zhu Software College, Northeastern University Media Attached | ||
16:45 15mTalk | Towards Feature-Based Analysis of the Machine Learning Development Lifecycle Ideas, Visions and Reflections Media Attached | ||
17:00 15mTalk | Fix Fairness, Don’t Ruin Accuracy: Performance Aware Fairness Repair using AutoML Research Papers Giang Nguyen Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Hridesh Rajan Dept. of Computer Science, Iowa State University Pre-print Media Attached | ||
17:15 15mTalk | BiasAsker: Measuring the Bias in Conversational AI System Research Papers Yuxuan Wan The Chinese University of Hong Kong, Wenxuan Wang Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Jiazhen Gu Chinese University of Hong Kong, Haonan Bai The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong Media Attached | ||
17:30 15mTalk | Pitfalls in Experiments with DNN4SE: An Analysis of the State of the Practice Research Papers Media Attached | ||
17:45 15mTalk | DecompoVision: Reliability Analysis of Machine Vision Components Through Decomposition and Reuse Research Papers Boyue Caroline Hu University of Toronto, Lina Marsso University of Toronto, Nikita Dvornik Waabi, Huakun Shen University of Toronto, Marsha Chechik University of Toronto Media Attached |
16:00 - 18:00 | Fault Diagnosis and Root Cause Analysis IResearch Papers / Journal First / Industry Papers at Golden Gate C3 Chair(s): Akond Rahman Auburn University | ||
16:00 15mTalk | [Remote] Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-Modal Observability Data Research Papers Guangba Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yufeng Li Sun Yat-sen University, Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Xiaoyun Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University Pre-print | ||
16:15 15mFull-paper | [Remote] DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems Research Papers Zhiming Chen Sun Yat-sen University, Pengfei Chen Sun Yat-Sen University, Guangba Yu Sun Yat-Sen University, Zilong He Sun Yat-Sen University, Genting Mai Sun Yat-sen University, Peipei Wang ByteDance Infrastructure System Lab Pre-print Media Attached | ||
16:30 15mTalk | [Remote] Pre-training Code Representation with Semantic Flow Graph for Effective Bug Localization Research Papers Media Attached | ||
16:45 15mTalk | [Remote] A Practical Human Labeling Method for Online Just-in-Time Software Defect Prediction Research Papers Liyan Song Southern University of Science and Technology, China, Leandro Minku University of Birmingham, Cong Teng Southern University of Science and Technology, Xin Yao Southern University of Science and Technology Pre-print Media Attached | ||
17:00 15mTalk | Trace Diagnostics for Signal-Based Temporal Properties Journal First Chaima Boufaied University of Ottawa, Claudio Menghi University of Bergamo; McMaster University, Domenico Bianculli University of Luxembourg, Lionel Briand University of Ottawa, Canada / University of Luxembourg, Luxembourg Media Attached | ||
17:15 15mTalk | TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice Systems Industry Papers Ruomeng Ding Microsoft, Chaoyun Zhang Microsoft, Lu Wang Microsoft Research, Yong Xu Microsoft Research, Minghua Ma Microsoft Research, Xiaomin Wu Microsoft, Meng Zhang , Qingjun Chen Microsoft 365, Xin Gao Microsoft 365, Xuedong Gao Microsoft 365, Hao Fan , Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research DOI Media Attached | ||
17:30 15mTalk | Triggering Modes in Spectrum-Based Multi-location Fault Localization Industry Papers DOI Media Attached | ||
17:45 15mTalk | Automata-based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android Research Papers Enze Ma East China Normal University, Shan Huang East China Normal University, weigang he East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Huiyu Liu East China Normal University, Geguang Pu East China Normal University, Zhendong Su ETH Zurich Media Attached |
Wed 6 DecDisplayed time zone: Pacific Time (US & Canada) change
11:00 - 12:30 | Testing IIIIndustry Papers / Demonstrations / Research Papers at Golden Gate C1 Chair(s): Tianyi Zhang Purdue University | ||
11:00 15mTalk | [Remote] Heterogeneous Testing for Coverage Profilers Empowered with Debugging Support Research Papers Yibiao Yang State Key Laboratory for Novel Software Technology, Nanjing University, Maolin Sun Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Qingyang Li National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Yuming Zhou Nanjing University Pre-print Media Attached | ||
11:15 7mTalk | [Remote] Testing Real-World Healthcare IoT Application: Experiences and Lessons Learned Industry Papers Hassan Sartaj Simula Research Laboratory, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Kjetil Moberg Norwegian Health Authority DOI Pre-print Media Attached | ||
11:23 7mTalk | Helion: Enabling Natural Testing of Smart Homes Demonstrations Prianka Mandal William & Mary, Sunil Manandhar IBM T.J. Watson Research Center, Kaushal Kafle College of William & Mary, Kevin Moran University of Central Florida, Denys Poshyvanyk William & Mary, Adwait Nadkarni William & Mary Media Attached | ||
11:30 15mTalk | NeuRI: Diversifying DNN Generation via Inductive Rule Inference Research Papers Jiawei Liu University of Illinois at Urbana-Champaign, Jinjun Peng Columbia University, Yuyao Wang Nanjing University, Lingming Zhang University of Illinois at Urbana-Champaign Pre-print Media Attached | ||
11:45 15mTalk | Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget Perception Industry Papers Yongxiang Hu Fudan University, China, Jiazhen Gu Fudan University, China, Shuqing Hu Fudan University, Yu Zhang Meituan, Wenjie Tian Meituan, Shiyu Guo Meituan, Chaoyi Chen Meituan, Yangfan Zhou Fudan University DOI Media Attached | ||
12:00 15mTalk | MuRS: Mutant Ranking and Suppression using Identifier Templates Industry Papers Zimin Chen KTH Royal Institute of Technology, Malgorzata Salawa Google, Manushree Vijayvergiya Google, Goran Petrović Google Inc, Marko Ivanković Google; Universität Passau, René Just University of Washington DOI Media Attached | ||
12:15 15mTalk | Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer Research Papers Shubham Agarwal Adobe Research, Sarthak Chakraborty Adobe Research, Shaddy Garg Adobe Research, Sumit Bisht Amazon, Chahat Jain Traceable.ai, Ashritha Gonuguntla Cisco, Shiv Saini Adobe Research Media Attached |
11:00 - 12:30 | Program Analysis IIResearch Papers / Journal First at Golden Gate C3 Chair(s): Nico Rosner Amazon Web Services | ||
11:00 15mTalk | [Remote] OOM-Guard: Towards Improving The Ergonomics of Rust OOM Handling via A Reservation-based Approach Research Papers Chengjun Chen Fudan University; Ant Group, Zhicong Zhang Fudan University, Hongliang Tian Ant Group, Shoumeng Yan Ant Group, Hui Xu Fudan University Media Attached | ||
11:15 15mTalk | [Remote] DeepInfer: Deep Type Inference from Smart Contract Bytecode Research Papers Kunsong Zhao The Hong Kong Polytechnic University, Zihao Li The Hong Kong Polytechnic Universituy, Jianfeng Li Xi’an Jiaotong University, He Ye KTH Royal Institute of Technology, Xiapu Luo Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China Media Attached | ||
11:30 15mTalk | Statistical Type Inference for Incomplete Programs Research Papers Yaohui Peng School of Computer Science, Wuhan University, Jing Xie School of Computer Science, Wuhan University, Qiongling Yang School of Computer Science, Wuhan University, Hanwen Guo School of Computer Science, Wuhan University, Qingan Li School of Computer Science, Wuhan University, Jingling Xue School of Computer Science and Engineering, UNSW Sydney, YUAN Mengting School of Computer Science, Wuhan University, Wuhan, China Media Attached | ||
11:45 15mTalk | Demystifying Hidden Sensitive Operations in Android apps Journal First Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Li Li Beihang University, Haipeng Cai Washington State University, John Grundy Monash University, Jordan Samhi University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg Media Attached | ||
12:00 15mTalk | DeMinify: Neural Variable Name Recovery and Type Inference Research Papers Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas Media Attached |
14:00 - 15:30 | Clone and Similarity DetectionResearch Papers / Industry Papers at Golden Gate A Chair(s): Denys Poshyvanyk William & Mary | ||
14:00 15mTalk | AdaptivePaste: Intelligent Copy-Paste in IDE Industry Papers Xiaoyu Liu Microsoft Corporation, Jinu Jang Microsoft, Neel Sundaresan Microsoft, Miltiadis Allamanis Google DeepMind, Alexey Svyatkovskiy Microsoft DOI Media Attached | ||
14:15 15mTalk | Scalable Program Clone Search Through Spectral Analysis Research Papers Tristan Benoit Université de Lorraine, CNRS, LORIA, Jean-Yves Marion LORIA, Université de Lorraine, Sébastien Bardin CEA, Université Paris Saclay DOI Pre-print Media Attached | ||
14:30 15mTalk | [Remote] Tritor: Detecting Semantic Code Clones by Building Social Network-based Triads Model Research Papers Deqing Zou Huazhong University of Science and Technology, Siyue Feng Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Wenqi Suo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
14:45 15mTalk | [Remote] C³: Code Clone-Based Identification of Duplicated Components Industry Papers Yanming Yang Zhejiang University, Ying Zou Queen's University, Kingston, Ontario, Xing Hu Zhejiang University, David Lo School of Computing and Information Systems, Singapore Management University, Chao Ni School of Software Technology, Zhejiang University, John Grundy Monash University, Xin Xia Huawei Technologies DOI Media Attached | ||
15:00 15mTalk | [Remote] Demystifying the Composition and Code Reuse in Solidity Smart Contracts Research Papers Kairan Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Kaixuan Li East China Normal University, Yang Liu Nanyang Technological University Pre-print Media Attached | ||
15:15 15mTalk | [Remote] Gitor: Scalable Code Clone Detection by Building Global Sample Graph Research Papers Junjie shan Westlake University, Shihan Dou Fudan University, Yueming Wu Nanyang Technological University, Hairu wu Fudan University, Yang Liu Nanyang Technological University Media Attached |
14:00 - 15:30 | PerformanceResearch Papers / Industry Papers / Journal First at Golden Gate C1 Chair(s): Aitor Arrieta Mondragon University | ||
14:00 15mTalk | A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing Research Papers Min-Yih Hsu University of California, Irvine, Felicitas Hetzelt University of California, Irvine, David Gens University of California, Irvine, Michael Maitland SiFive, Michael Franz University of California, Irvine Media Attached | ||
14:15 15mTalk | Towards effective assessment of steady state performance in Java software: Are we there yet? Journal First Luca Traini University of L'Aquila, Vittorio Cortellessa Università dell'Aquila, Italy, Daniele Di Pompeo University of L'Aquila, Michele Tucci University of L'Aquila Link to publication DOI Media Attached | ||
14:30 15mTalk | Adapting Performance Analytic Techniques in a Real-World Database-Centric System: An Industrial Experience Report Industry Papers Lizhi Liao University of Waterloo, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo, Catalin Sporea ERA Environmental Management Solutions, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions DOI Media Attached | ||
14:45 15mTalk | IoPV: On Inconsistent Option Performance Variations Research Papers Jinfu Chen Jiangsu University, Zishuo Ding University of Waterloo, Yiming Tang Rochester Institute of Technology, Mohammed Sayagh ETS Montreal, University of Quebec, Heng Li Polytechnique Montréal, Bram Adams Queen's University, Kingston, Ontario, Weiyi Shang University of Waterloo Pre-print Media Attached | ||
15:00 15mTalk | Predicting Software Performance with Divide-and-Learn Research Papers Pre-print Media Attached | ||
15:15 15mTalk | [Remote] Discovering Parallelisms in Python Programs Research Papers Siwei Wei State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China, Guyang Song AntGroup, Senlin Zhu AntGroup, Ruoyi Ruan AntGroup, Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China Media Attached |
14:00 - 15:30 | Machine Learning IIIDemonstrations / Industry Papers / Research Papers at Golden Gate C2 Chair(s): Rangeet Pan IBM Research | ||
14:00 15mTalk | Benchmarking Robustness of AI-enabled Multi-sensor Fusion Systems: Challenges and Opportunities Research Papers Xinyu Gao , Zhijie Wang University of Alberta, Yang Feng Nanjing University, Lei Ma The University of Tokyo / University of Alberta, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University Media Attached | ||
14:15 7mTalk | A Language Model of Java Methods with Train/Test Deduplication Demonstrations Chia-Yi Su University of Notre Dame, Aakash Bansal University of Notre Dame, Vijayanta Jain University of Maine, Sepideh Ghanavati University of Maine , Collin McMillan University of Notre Dame Media Attached | ||
14:23 7mTalk | DENT - A Tool for Tagging Stack Overflow Posts With Deep Learning Energy Patterns Demonstrations Shriram Shanbhag Indian Institute of Technology Tirupati, Sridhar Chimalakonda Indian Institute of Technology Tirupati, Vibhu Saujanya Sharma Accenture Labs, India, Vikrant Kaulgud Accenture Labs, India Media Attached | ||
14:30 15mTalk | Automated Testing and Improvement of Named Entity Recognition Systems Research Papers BoXi Yu The Chinese University of Hong Kong, Shenzhen, Yiyan Hu The Chinese University of Hong Kong, Shenzhen, Qiuyang Mang The Chinese University of Hong Kong, Shenzhen, Wenhan Hu The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen Pre-print Media Attached | ||
14:45 15mTalk | KDDT: Knowledge Distillation-Empowered Digital Twin for Anomaly Detection Industry Papers Xu Qinghua Simula Research Laboratory; University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Zaimovic Nedim Alstom Rail, Inderjeet Singh Alstom DOI Media Attached | ||
15:00 15mTalk | Deep Learning Based Feature Envy Detection Boosted by Real-World Examples Research Papers Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Nan Niu University of Cincinnati, Zimao Xu Beijing Institute of Technology, Yifan Wang Huawei Cloud, Yunni Xia Chongqing University, Yuxia Zhang Beijing Institute of Technology, Yanjie Jiang Peking University DOI Pre-print Media Attached | ||
15:15 15mTalk | [Remote] The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code Classification Research Papers Anastasiia Grishina Simula Research Laboratory, Max Hort Simula Research Laboratory, Leon Moonen Simula Research Laboratory and BI Norwegian Business School Pre-print Media Attached |
14:00 - 15:30 | Security IResearch Papers / Demonstrations / Journal First at Golden Gate C3 Chair(s): Abhik Roychoudhury National University of Singapore | ||
14:00 15mTalk | Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study Journal First Goran Piskachev Amazon Web Services, Matthias Becker Fraunhofer IEM, Eric Bodden University of Paderborn Media Attached | ||
14:15 15mTalk | Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects Research Papers Lida Zhao Singapore Management University, Singapore, Sen Chen College of Intelligence and Computing, Tianjin University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Wu Jiahui Nanyang Technological University, Jun Sun Singapore Management University, Yang Liu Nanyang Technological University Media Attached | ||
14:30 15mTalk | Input-driven Dynamic Program Debloating for Code-reuse Attack Mitigation Research Papers Xiaoke Wang Wuhan University, Tao Hui Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Lei Zhao Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Yueqiang Cheng NIO DOI Pre-print Media Attached | ||
14:45 7mTalk | MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors Demonstrations Amit Seal Ami William & Mary, Syed Yusuf Ahmed University of Dhaka, Radowan Mahmud Redoy University of Dhaka, Nathan Cooper William & Mary, Kaushal Kafle College of William & Mary, Kevin Moran University of Central Florida, Denys Poshyvanyk William & Mary, Adwait Nadkarni William & Mary Media Attached | ||
14:53 7mTalk | [Remote] llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs Demonstrations Ruiling Chen Shenzhen University, Jiaxiang Liu Shenzhen University, Xiaomu Shi Institute of Software, Chinese Academy of Sciences, Ming-Hsien Tsai National Institute of Cyber Security, Bow-Yaw Wang , Bo-Yin Yang Academia Sinica Media Attached | ||
15:00 15mTalk | [Remote] Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java Research Papers Kaixuan Li East China Normal University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Ruitao Feng University of New South Wales, Han Liu East China Normal University, Chengwei Liu Nanyang Technological University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University Pre-print Media Attached | ||
15:15 15mTalk | [Remote] TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts Research Papers Chenyang Ma Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University DOI Pre-print Media Attached |
16:00 - 18:00 | Fault Diagnosis and Root Cause Analysis IIIndustry Papers / Research Papers at Golden Gate A Chair(s): Yun Lin Shanghai Jiao Tong University | ||
16:00 15mTalk | DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers Research Papers Xianglin Yang Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yifan Zhang National University of Singapore, Linpeng Huang Shanghai Jiao Tong University, Jin Song Dong National University of Singapore, Hong Mei Peking University Media Attached | ||
16:15 15mTalk | AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision Industry Papers Xiaoyun Liang ByteDance, Jiayi Qi ByteDance, Yongqiang Gao ByteDance, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology DOI Media Attached | ||
16:30 15mTalk | TransMap: Pinpointing Mistakes in Neural Code Translation Research Papers Bo Wang National University of Singapore, Ruishi Li National University of Singapore, Mingkai Li National University of Singapore, Prateek Saxena National University of Singapore Media Attached | ||
16:45 15mTalk | Dynamic Prediction of Delays in Software Projects Using Delay Patterns and Bayesian Modeling Research Papers Elvan Kula Delft University of Technology, Eric Greuter ING, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology Pre-print Media Attached | ||
17:00 15mTalk | Commit-level, Neural Vulnerability Detection and Assessment Research Papers Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas Media Attached | ||
17:15 15mTalk | [Remote] Mining Resource-Operation Knowledge to Support Resource Leak Detection Research Papers Chong Wang Nanyang Technological University, Yiling Lou Fudan University, Xin Peng Fudan University, Jianan Liu Fudan University, Baihan Zou Fudan University Media Attached | ||
17:30 15mTalk | [Remote] Detection Is Better Than Cure: A Cloud Incidents Perspective Industry Papers Vaibhav Ganatra Microsoft, Anjaly Parayil Microsoft, Supriyo Ghosh Microsoft, Yu Kang Microsoft Research, Minghua Ma Microsoft Research, Chetan Bansal Microsoft Research, Suman Nath Microsoft Research, Jonathan Mace Microsoft DOI Media Attached | ||
17:45 7mTalk | [Remote] Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365 Industry Papers Fangkai Yang Microsoft Research, Wenjie Yin KTH Royal Institute of Technology, Lu Wang Microsoft Research, Tianci Li Microsoft, Pu Zhao Microsoft Research, Bo Liu Beijing Institute of Technology, Paul Wang Microsoft 365, Bo Qiao Microsoft Research, Yudong Liu Microsoft Research, Mårten Björkman KTH Royal Institute of Technology, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research DOI Media Attached |
16:00 - 18:00 | FuzzingResearch Papers at Golden Gate C1 Chair(s): Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University | ||
16:00 15mTalk | Enhancing Coverage-guided Fuzzing via Phantom Program Research Papers Mingyuan Wu Southern University of Science and Technology and the University of Hong Kong, Kunqiu Chen Southern University of Science and Technology, Qi Luo Southern University of Science and Technology, Jiahong Xiang Southern University of Science and Technology, Ji Qi The University of Hong Kong, Junjie Chen Tianjin University, Heming Cui University of Hong Kong, Yuqun Zhang Southern University of Science and Technology Media Attached | ||
16:15 15mTalk | Co-Dependence Aware Fuzzing for Dataflow-based Big Data Analytics Research Papers Ahmad Humayun Virginia Tech, Miryung Kim University of California at Los Angeles, USA, Muhammad Ali Gulzar Virginia Tech Pre-print Media Attached | ||
16:30 15mTalk | SJFuzz: Seed & Mutator Scheduling for JVM Fuzzing Research Papers Mingyuan Wu Southern University of Science and Technology and the University of Hong Kong, Yicheng Ouyang University of Illinois at Urbana-Champaign, Minghai Lu Southern University of Science and Technology, Junjie Chen Tianjin University, Yingquan Zhao Tianjin University, Heming Cui University of Hong Kong, Guowei Yang University of Queensland, Yuqun Zhang Southern University of Science and Technology Media Attached | ||
16:45 15mTalk | Metamong: Detecting Render-update Bugs in Web Browsers through Fuzzing Research Papers Suhwan Song Seoul National University, South Korea, Byoungyoung Lee Seoul National University, South Korea Media Attached | ||
17:00 15mTalk | Property-based Fuzzing for Finding Data Manipulation Errors in Android Apps Research Papers Jingling Sun East China Normal University, Ting Su East China Normal University, Jiayi Jiang East China Normal University, Jue Wang Nanjing University, Geguang Pu East China Normal University, Zhendong Su ETH Zurich Media Attached | ||
17:15 15mTalk | Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications Research Papers Jiyuan Wang University of California at Los Angeles, Qian Zhang University of California, Riverside, Hongbo Rong Intel Labs, Guoqing Harry Xu University of California at Los Angeles, Miryung Kim University of California at Los Angeles, USA Pre-print Media Attached | ||
17:30 15mTalk | NaNofuzz: A Usable Tool for Automatic Test Generation Research Papers Matthew C. Davis Carnegie Mellon University, Sangheon Choi Rose-Hulman Institute of Technology, Sam Estep Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Joshua Sunshine Carnegie Mellon University Link to publication DOI Media Attached | ||
17:45 15mTalk | [Remote] A Generative and Mutational Approach for Synthesizing Bug-exposing Test Cases to Guide Compiler Fuzzing Research Papers Guixin Ye Northwest University, Tianmin Hu Northwest University, Zhanyong Tang Northwest University, Zhenye Fan Northwest University, Shin Hwei Tan Concordia University, Bo Zhang Tencent Security Platform Department, Wenxiang Qian Tencent Security Platform Department, Zheng Wang University of Leeds, UK Media Attached |
16:00 - 18:00 | Formal VerificationResearch Papers / Industry Papers / Ideas, Visions and Reflections / Demonstrations at Golden Gate C2 Chair(s): Christoph Treude University of Melbourne | ||
16:00 15mTalk | State Merging with Quantifiers in Symbolic Execution Research Papers David Trabish Tel Aviv University, Noam Rinetzky Tel Aviv University, Sharon Shoham Tel Aviv University, Vaibhav Sharma University of Minnesota DOI Pre-print Media Attached | ||
16:15 15mTalk | Towards Strengthening Formal Specifications with Mutation Model Checking Ideas, Visions and Reflections Maxime Cordy SnT, University of Luxembourg, Sami Lazreg SnT, University of Luxembourg, Axel Legay Université Catholique de Louvain, Belgium, Pierre Yves Schobbens University of Namur Media Attached | ||
16:30 15mTalk | PropProof: Free Model-Checking Harnesses from PBT Industry Papers Yoshiki Takashima Carnegie Mellon University DOI Media Attached | ||
16:45 15mTalk | Engineering a Formally Verified Automated Bug Finder Research Papers Arthur Correnson CISPA Helmholtz Center for Information Security, Dominic Steinhöfel CISPA Helmholtz Center for Information Security Media Attached | ||
17:00 15mTalk | LightF3: A Lightweight Fully-Process Formal Framework for Automated Verifying Railway Interlocking Systems Industry Papers Yibo Dong East China Normal University; Shanghai Trusted Industrial Control Platform, Xiaoyu Zhang East China Normal University, Yicong Xu East China Normal University, Chang Cai East China Normal University, Yu Chen East China Normal University, Weikai Miao East China Normal University, Jianwen Li East China Normal University, China, Geguang Pu East China Normal University DOI Media Attached | ||
17:15 15mTalk | Speeding up SMT Solving via Compiler Optimization Research Papers Media Attached | ||
17:30 15mTalk | [Remote] Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering Research Papers Bin Yu School of Computer Science and Technology, Xidian University, Cong Tian Xidian University, Hengrui Xing School of Computer Science and Technology, Xidian University, Zuchao Yang School of Computer Science and Technology, Xidian University, Jie Su School of Computer Science and Technology, Xidian University, Xu Lu School of Computer Science and Technology, Xidian University, Jiyu Yang School of Computer Science and Technology, Xidian University, Liang Zhao School of Computer Science and Technology, Xidian University, Xiaofeng Li Beijing Institute of Control Engineering, Zhenhua Duan Xidian University Media Attached | ||
17:45 7mTalk | [Remote] P4b: A Translator from P4 Programs to Boogie Demonstrations Media Attached |
16:00 - 18:00 | Automated Repair IIJournal First / Research Papers at Golden Gate C3 Chair(s): Luciano Baresi Politecnico di Milano | ||
16:00 15mTalk | A Large-scale Empirical Review of Patch Correctness Checking Approaches Research Papers Jun Yang UIUC, Yuehan Wang University of Illinois at Urbana-Champaign, Yiling Lou Fudan University, Ming Wen Huazhong University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign Media Attached | ||
16:15 15mTalk | Program Repair Guided by Datalog-Defined Static Analysis Research Papers Yu Liu Beijing University of Technology, Sergey Mechtaev University College London, Pavle Subotic Microsoft, Abhik Roychoudhury National University of Singapore Media Attached | ||
16:30 15mTalk | SynShine: Improved Fixing of Syntax Errors Journal First Toufique Ahmed University of California at Davis, Noah Rose Ledesma UC Davis, Prem Devanbu University of California at Davis Media Attached | ||
16:45 15mTalk | Baldur: Whole-Proof Generation and Repair with Large Language Models Research Papers Emily First University of California, San Diego, Markus Rabe Google, Talia Ringer University of Illinois at Urbana-Champaign, Yuriy Brun University of Massachusetts Media Attached | ||
17:00 15mTalk | KG4CraSolver: Recommending Crash Solutions via Knowledge Graph Research Papers Xueying Du Fudan University, Yiling Lou Fudan University, Mingwei Liu Fudan University, Xin Peng Fudan University, Tianyong Yang Fudan University Pre-print Media Attached | ||
17:15 15mTalk | [Remote] Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps Research Papers Yuxin Zhang Tianjin University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Chunyang Chen Monash University, Xiaohong Li Tianjin University Media Attached | ||
17:30 15mTalk | [Remote] Semantic Test Repair for Web applications Research Papers Xiaofang Qi School of Computer Science and Engineering, Southeast University, Xiang Qian School of Computer Science and Engineering, Southeast University, Yanhui Li Nanjing University Media Attached |
Thu 7 DecDisplayed time zone: Pacific Time (US & Canada) change
11:00 - 12:30 | Machine Learning IVResearch Papers / Ideas, Visions and Reflections / Industry Papers at Golden Gate C2 Chair(s): Diptikalyan Saha IBM Research India | ||
11:00 15mTalk | Dynamic Data Fault Localization for Deep Neural Networks Research Papers Yining Yin Nanjing University, China, Yang Feng Nanjing University, Shihao Weng Nanjing University, Zixi Liu Nanjing University, Yuan Yao Nanjing University, Yichi Zhang Nanjing University, Zhihong Zhao , Zhenyu Chen Nanjing University Media Attached | ||
11:15 15mTalk | Assisting Static Analysis with Large Language Models: A ChatGPT Experiment Ideas, Visions and Reflections Haonan Li University of California at Riverside, USA, Yu Hao University of California at Riverside, USA, Yizhuo Zhai University of California at Riverside, USA, Zhiyun Qian University of California at Riverside, USA Media Attached | ||
11:30 15mTalk | Understanding the Bug Characteristics and Fix Strategies of Federated Learning Systems Research Papers Xiaohu Du Huazhong University of Science and Technology, Xiao CHEN Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
11:45 15mTalk | EvoCLINICAL: Evolving Cyber-Cyber Digital Twin with Active Transfer Learning for Automated Cancer Registry System Industry Papers Chengjie Lu Simula Research Laboratory; University of Oslo, Xu Qinghua Simula Research Laboratory; University of Oslo, Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Thomas Schwitalla Cancer Registry of Norway, Jan F. Nygård Cancer Registry of Norway DOI Media Attached | ||
12:00 15mTalk | Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing Research Papers bozhi wu Singapore Management University, Shangqing Liu Nanyang Technological University, Yang Xiao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiming Li Nanyang Technological University, Singapore, Jun Sun Singapore Management University, Shang-Wei Lin Nanyang Technological University Media Attached | ||
12:15 15mTalk | [Remote] DeepRover: A Query-efficient Blackbox Attack for Deep Neural Networks Research Papers Fuyuan Zhang Kyushu University, Xinwen Hu Hunan Normal University, Lei Ma The University of Tokyo / University of Alberta, Jianjun Zhao Kyushu University Media Attached |
11:00 - 12:30 | Program Analysis IIIDemonstrations / Research Papers / Industry Papers at Golden Gate C3 Chair(s): Marsha Chechik University of Toronto | ||
11:00 15mTalk | Practical Inference of Nullability Types Research Papers Nima Karimipour University of California, Riverside, Justin Pham University of California, Riverside, Lazaro Clapp Uber Technologies Inc, Manu Sridharan University of California at Riverside Media Attached | ||
11:15 15mTalk | LibKit: Detecting Third-Party Libraries in iOS Apps Research Papers Daniel Dominguez Alvarez University of Verona and IMDEA Software Institute, Alejandro de la Cruz IMDEA Software Institute, Alessandra Gorla IMDEA Software Institute, Juan Caballero IMDEA Software Institute Media Attached | ||
11:30 15mTalk | Compositional Taint Analysis for Enforcing Security Policies at Scale Industry Papers Subarno Banerjee Amazon Web Services, Siwei Cui Texas A & M University, Michael Emmi Amazon Web Services, Antonio Filieri Amazon Web Services, Liana Hadarean Amazon Web Services, Peixuan Li Amazon Web Services, Linghui Luo Amazon Web Services, Goran Piskachev Amazon Web Services, Nico Rosner Amazon Web Services, Aritra Sengupta Amazon Web Services, Omer Tripp Amazon, Jingbo Wang University of Southern California DOI Media Attached | ||
11:45 15mTalk | FunProbe: Probing Functions from Binary Code through Probabilistic Analysis Research Papers Media Attached | ||
12:00 15mTalk | BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework Research Papers Zewen Sun Nanjing University, Duanchen Xu Nanjing University, Yiyu Zhang Nanjing University, Yun Qi Nanjing University, Yueyang Wang Nanjing University, Zhiqiang Zuo Nanjing University, Zhaokang Wang Nanjing University, Yue Li Nanjing University, Xuandong Li Nanjing University, Qingda Lu Alibaba Group, Wenwen Peng Alibaba Group, Shengjian (Daniel) Guo Baidu Security Media Attached | ||
12:15 7mTalk | CONAN: Statically Detecting Connectivity Issues in Android Applications Demonstrations Alejandro Mazuera-Rozo Universita della Svizzera italiana, Lugano, Switzerland and Universidad de los Andes, Colombia, Camilo Escobar-Velásquez Universidad de los Andes, Juan Espitia-Acero Universidad de los Andes, Colombia, Mario Linares-Vásquez Universidad de los Andes, Gabriele Bavota Software Institute, USI Università della Svizzera italiana Media Attached |
14:00 - 15:30 | Models of Code and DocumentationResearch Papers / Journal First / Ideas, Visions and Reflections at Golden Gate C1 Chair(s): Gema Rodríguez-Pérez University of British Columbia (UBC) | ||
14:00 15mTalk | On the Usage of Continual Learning for Out-of-Distribution Generalization in Pre-trained Language Models of Code Research Papers Martin Weyssow DIRO, Université de Montréal, Xin Zhou Singapore Management University, Singapore, Kisub Kim School of Computing and Information Systems, Singapore Management University, David Lo School of Computing and Information Systems, Singapore Management University, Houari Sahraoui DIRO, Université de Montréal Pre-print Media Attached | ||
14:15 15mTalk | A Vision on Intentions in Software Engineering Ideas, Visions and Reflections Jacob Krüger Eindhoven University of Technology, Yi Li Nanyang Technological University, Chenguang Zhu Meta, Marsha Chechik University of Toronto, Thorsten Berger Ruhr University Bochum, Julia Rubin University of British Columbia, Canada Media Attached | ||
14:30 15mPaper | Automated Identification of Toxic Code Reviews Using ToxiCR Journal First Jaydeb Sarker Department of Computer Science, Wayne State University, Asif Kamal Turzo Wayne State University, Amiangshu Bosu Wayne State University, Ming Dong Wayne State University Link to publication DOI Pre-print Media Attached | ||
14:45 15mTalk | GrACE: Language Models Meet Code Edits Research Papers Priyanshu Gupta Microsoft, Avishree Khare Microsoft, Yasharth Bajpai Microsoft, Saikat Chakraborty Microsoft Research , Sumit Gulwani Microsoft, Aditya Kanade Microsoft Research India, Arjun Radhakrishna Microsoft, Gustavo Soares Microsoft, Ashish Tiwari Microsoft Media Attached | ||
15:00 15mTalk | Recommending Analogical APIs via Knowledge Graph Embedding Research Papers Mingwei Liu Fudan University, Yanjun Yang Fudan University, Yiling Lou Fudan University, Xin Peng Fudan University, Zhong Zhou Fudan University, Xueying Du Fudan University, Tianyong Yang Fudan University Pre-print Media Attached | ||
15:15 15mTalk | [Remote] CCT5: A Code-Change-Oriented Pre-Trained Model Research Papers Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Zhongxin Liu Zhejiang University, Yepang Liu Southern University of Science and Technology, Xin Xia Huawei Technologies, Xiaoguang Mao National University of Defense Technology DOI Pre-print Media Attached |
14:00 - 15:30 | Machine Learning VResearch Papers / Ideas, Visions and Reflections / Journal First at Golden Gate C2 Chair(s): Prem Devanbu University of California at Davis | ||
14:00 15mTalk | LExecutor: Learning-Guided Execution Research Papers Media Attached | ||
14:15 15mTalk | Deeper Notions of Correctness in Image-based DNNs: Lifting Properties from Pixel to Entities Ideas, Visions and Reflections Felipe Toledo , David Shriver University of Virginia, Sebastian Elbaum University of Virginia, Matthew B Dwyer University of Virginia Link to publication DOI Pre-print Media Attached | ||
14:30 15mTalk | Software Architecture Recovery with Information Fusion Research Papers Yiran Zhang Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Hongxu Chen Huawei Technologies Co., Ltd., Sun Jianwen Huawei Technologies Co., Ltd, Dong Qiu Huawei Technologies Co., Ltd, Yang Liu Nanyang Technological University Media Attached | ||
14:45 15mTalk | What Kinds of Contracts Do ML APIs Need? Journal First Samantha Syeda Khairunnesa Bradley University, Shibbir Ahmed Dept. of Computer Science, Iowa State University, Sayem Mohammad Imtiaz Iowa State University, Hridesh Rajan Dept. of Computer Science, Iowa State University, Gary T. Leavens University of Central Florida Media Attached | ||
15:00 15mTalk | Evaluating Transfer Learning for Simplifying GitHub READMEs Research Papers Haoyu Gao The University of Melbourne, Christoph Treude University of Melbourne, Mansooreh Zahedi The Univeristy of Melbourne Pre-print Media Attached | ||
15:15 15mTalk | [Remote] CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models Research Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Australia, Fu Song State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China, Li Li Beihang University Pre-print Media Attached |
14:00 - 15:30 | Security IIResearch Papers / Journal First at Golden Gate C3 Chair(s): Caroline Lemieux University of British Columbia | ||
14:00 15mTalk | Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors Research Papers Ruoxi Sun CSIRO's Data61, Jason Minhui Xue CSIRO’s Data61, Gareth Tyson Hong Kong University of Science and Technology, Tian Dong Shanghai Jiao Tong University, Shaofeng Li Shanghai Jiao Tong University, Shuo Wang CSIRO's Data61, Haojin Zhu Shanghai Jiao Tong University, Seyit Camtepe CSIRO Data61, Surya Nepal CSIRO’s Data61 Media Attached | ||
14:15 15mTalk | Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study Journal First Akond Rahman Auburn University, USA, Shazibul Islam Shamim Auburn University, Dibyendu Brinto Bose Virginia Tech, Rahul Pandita GitHub, Inc. Media Attached | ||
14:30 15mTalk | Crystallizer: A Hybrid Path Analysis Framework To Aid in Uncovering Deserialization Vulnerabilities Research Papers Prashast Srivastava Columbia University, USA, Flavio Toffalini EPFL, Kostyantyn Vorobyov Oracle Labs, Australia, François Gauthier Oracle Labs, Antonio Bianchi Purdue University, Mathias Payer EPFL Media Attached | ||
14:45 15mTalk | Neural Transfer Learning for Repairing Security Vulnerabilities in C Code Journal First Zimin Chen KTH Royal Institute of Technology, Steve Kommrusch Leela AI, Martin Monperrus KTH Royal Institute of Technology Media Attached | ||
15:00 15mTalk | ViaLin: Path-Aware Dynamic Taint Analysis for Android Research Papers Khaled Ahmed University of British Columbia (UBC), Yingying Wang University of British Columbia, Mieszko Lis The University of British Columbia, Canada, Julia Rubin University of British Columbia, Canada Media Attached | ||
15:15 15mTalk | [Remote] Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation Research Papers Chao Ni School of Software Technology, Zhejiang University, Xin Yin The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Kaiwen Yang College of Computer Science and Technology, Zhejiang University, Dehai Zhao Australian National University, Australia, Zhenchang Xing Data61, Xin Xia Huawei Technologies Media Attached |
Accepted Papers
Call for Ideas, Visions and Reflections Papers
ESEC/FSE 2023 Ideas, Visions and Reflections Track (ESEC/FSE-IVR) seeks to disrupt the status quo in our discipline with radical, innovative, thought-provoking new ideas, and research directions, as well as lessons learned from the past.
We invite three types of papers:
- Innovative, groundbreaking new ideas supported by promising initial results, such as:
- Exciting new directions in early stages of research, supported by initial evidence.
- Startling new results that come in conflict with established results or beliefs, supporting a call for fundamentally new research directions.
- Visions of the future, such as:
- Bold visions of new directions that may not yet be supported by solid results but rather by a strong and well-motivated scientific intuition. Examples include unusual synergies with other disciplines, or the importance of software engineering in problems whose software engineering aspects have not been studied earlier.
- Summaries of highly innovative research ideas recently awarded as grants.
- Reflections on the past, such as:
- Bold revisits of current research directions that may be somehow misguided.
- Thoughtful observations coalescing the most important ideas since the inception of the field of software engineering, where they have led us so far, where past ideas have turned out to be right or wrong.
Submissions must clearly motivate and illustrate initial evidence (type 1) or a rationale (types 2 and 3) for changing current practice and/or research in software engineering. The writing style can be narrative to the extent where this supports the motivation for an emerging research direction.
Evaluation results are not required for ESEC/FSE-IVR papers. Preliminary results for submissions of the first type or a sketch of an evaluation plan for submissions of the second type, could help the reviewers understand the scope of the work better.
ESEC/FSE Ideas, Visions and Reflections Track is a cultural forum for encouraging trailblazers to share their vision and new research directions that connect to other fields or to share candid, critical reflections on past and present research. ESEC/FSE-IVR publications lay the foundation for strong full-paper publications later on.
Scope
ESEC/FSE-IVR provides a forum for innovative, thought-provoking research in software engineering to accelerate the exposure of the community to early, yet promising and potentially inspiring research efforts. ESEC/FSE-IVR papers are first-class contributions that provide novel, soundly motivated research directions, emerging results, and thoughtful reflections.
The track addresses the same technical topics of interest as those of the research paper track. However, authors are encouraged to combine these topics in new ways to establish connections to other fields outside of classical software engineering, as well as to argue for the importance of software engineering research in areas not explicitly listed.
Out of Scope
A submission should not be an ESEC/FSE full research submission lacking an evaluation, or a disguised advertisement for previously published results: An ESEC/FSE research track submission with slightly less evaluation or lower quality is not a good ESEC/FSE-IVR paper.
Evaluation
All papers will be evaluated according to:
- Value: the problem is worth exploring
- Impact: the potential for disruption of current practice
- Originality: the novelty of the paper insight
- Scholarship: appropriate consideration of relevant literature
- Quality: overall paper quality
Innovative, groundbreaking new ideas (type 1) papers will also be evaluated according to:
- Surprise: startling and unexpected findings
Visions of the future (type 2) and Reflections on the past (type 3) papers will also be evaluated according to:
- Validity: soundness of the rationale
How to Submit
In the submission form, authors must clearly identify their paper as one of - New Ideas and Early Results - Visions (of the future) - Reflections (on the past)
A submission must conform at the time of submission to the ESEC/FSE 2023 Format and Submission Guidelines, and must not exceed four pages (not including a one-page bibliography). Papers must be submitted electronically at the ESEC/FSE-IVR submission site by the submission deadline.
ESEC/FSE-IVR will employ the same double-blind review process as the main research track. Submissions must not reveal authors’ identities; consult the main research track CfP for more details on appropriate anonymization practices.
Submissions that do not comply with the instructions and size limits may be rejected without review.
AUTHORS TAKE NOTE: The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of ESEC/FSE 2023. The official publication date affects the deadline for any patent filings related to published work.
At least one author of each accepted paper must register and present the paper at ESEC/FSE 2023 in order for the paper to be published in the proceedings. One-day registrations do NOT satisfy the registration requirement. Please carefully read the complete list of ESEC/FSE Submission Policies and Policies for Accepted Contributions.
Important Dates
- Submission deadline: May 3, 2023 (23:59:59 AOE)
- Notification to authors: July 19, 2023
- Camera-ready deadline: August 24, 2023
If you have any questions about the suitability of a paper, please contact the co-chairs, Lionel Briand and David Lo.