Research PapersESEC/FSE 2023
Tue 5 DecDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 11:00 | |||
11:00 - 12:30 | Human Aspects IResearch Papers / Journal First / Ideas, Visions and Reflections at Golden Gate A Chair(s): Preetha Chatterjee Drexel University, USA | ||
11:00 15mTalk | A Longitudinal Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention Research Papers Zihan Fang Vanderbilt University, Madeline Endres University of Michigan, Thomas Zimmermann Microsoft Research, Denae Ford Microsoft Research, Westley Weimer University of Michigan, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University Pre-print Media Attached | ||
11:15 15mTalk | Do CONTRIBUTING files provide information about OSS newcomers' onboarding barriers? Research Papers Felipe Fronchetti Virginia Commonwealth University, David C. Shepherd Louisiana State University, Igor Scaliante Wiese Federal University of Technology – Paraná - UTFPR, Christoph Treude University of Melbourne, Marco Gerosa Northern Arizona University, Igor Steinmacher Northern Arizona University Pre-print Media Attached | ||
11:30 15mTalk | Off to a Good Start: Dynamic Contribution Patterns and Technical Success in an OSS Newcomer’s Early Career Journal First Yang Yue University of California, Irvine, Yi Wang Beijing University of Posts and Telecommunications, David Redmiles University of California, Irvine Link to publication DOI Media Attached | ||
11:45 15mTalk | How Early Participation Determines Long-Term Sustained Activity in GitHub Projects? Research Papers Wenxin Xiao School of Computer Science, Peking University, Hao He Carnegie Mellon University, Weiwei Xu Peking University, Yuxia Zhang Beijing Institute of Technology, Minghui Zhou Peking University Pre-print Media Attached | ||
12:00 15mTalk | Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract Contributors Research Papers Hongbo Fang Carnegie Mellon University, James Herbsleb Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University Media Attached | ||
12:15 15mTalk | Contribution-based Firing of Developers? Ideas, Visions and Reflections Vincenzo Orrei Software Institute - USI, Lugano, Switzerland, Marco Raglianti Software Institute - USI, Lugano, Csaba Nagy Software Institute - USI, Lugano, Michele Lanza Software Institute - USI, Lugano Media Attached |
11:00 - 12:30 | Testing IIdeas, Visions and Reflections / Research Papers / Journal First / Industry Papers at Golden Gate C1 Chair(s): Marcelo d'Amorim North Carolina State University | ||
11:00 15mTalk | [Remote] CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays Research Papers Qiyuan Zhao Beihang University, Chuan Luo Beihang University, Shaowei Cai Institute of Software, Chinese Academy of Sciences, Wei Wu L3S Research Center, Leibniz University Hannover, Germany, Jinkun Lin Seed Math Technology Limited, Hongyu Zhang Chongqing University, Chunming Hu Beihang University DOI Pre-print Media Attached | ||
11:15 15mTalk | Accelerating Continuous Integration with Parallel Batch Testing Research Papers Emad Fallahzadeh Concordia University, Amir Hossein Bavand Concordia University, Peter Rigby Concordia University; Meta Pre-print Media Attached | ||
11:30 15mTalk | Keeping Mutation Test Suites Consistent and Relevant with Long-Standing Mutants Ideas, Visions and Reflections Milos Ojdanic University of Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Mark Harman Meta Platforms Inc. and UCL Media Attached | ||
11:45 15mTalk | DistXplore: Distribution-guided Testing for Evaluating and Enhancing Deep Learning Systems Research Papers Longtian Wang Xi'an Jiaotong University, Xiaofei Xie Singapore Management University, Xiaoning Du Monash University, Australia, Meng Tian Singapore Management University, Qing Guo IHPC and CFAR at A*STAR, Singapore, Yang Zheng TTE Lab, Huawei, Chao Shen Xi’an Jiaotong University Media Attached | ||
12:00 15mTalk | Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing Journal First Swaroopa Dola University of Virginia, Matthew B Dwyer University of Virginia, Mary Lou Soffa University of Virginia Media Attached | ||
12:15 15mTalk | A Unified Framework for Mini-game Testing: Experience on WeChat Industry Papers Chaozheng Wang The Chinese University of Hong Kong, Haochuan Lu Tencent, Cuiyun Gao The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Ting Xiong Tencent Inc., Yuetang Deng Tencent Inc. DOI Media Attached |
11:00 - 12:30 | Machine Learning IIdeas, Visions and Reflections / Industry Papers / Research Papers at Golden Gate C2 Chair(s): Michael Pradel University of Stuttgart | ||
11:00 15mTalk | [Remote] Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection Industry Papers Haotian Si Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Zhihan Li Kuaishou Technology, Yadong Zhao Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingjing Li Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haiming Zhang Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zulong Diao Institute of Computing Technology at Chinese Academy of Sciences, Jianhui Li Computer Network Information Center at Chinese Academy of Sciences, Gaogang Xie Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University DOI Media Attached | ||
11:15 15mTalk | Design by Contract for Deep Learning APIs Research Papers Shibbir Ahmed Dept. of Computer Science, Iowa State University, Sayem Mohammad Imtiaz Iowa State University, Samantha Syeda Khairunnesa Bradley University, Breno Dantas Cruz Dept. of Computer Science, Iowa State University, Hridesh Rajan Dept. of Computer Science, Iowa State University DOI Media Attached | ||
11:30 15mTalk | Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to Executables Ideas, Visions and Reflections Media Attached | ||
11:45 15mTalk | Testing Coreference Resolution Systems without Labeled Test Sets Research Papers Jialun Cao Hong Kong University of Science and Technology, Yaojie Lu Chinese Information Processing Laboratory Institute of Software, Chinese Academy of Sciences, Ming Wen Huazhong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology Media Attached | ||
12:00 15mTalk | Neural-Based Test Oracle Generation: A Large-scale Evaluation and Lessons Learned Research Papers Soneya Binta Hossain University of Virginia, USA, Antonio Filieri Amazon Web Services, Matthew B Dwyer University of Virginia, Sebastian Elbaum University of Virginia, Willem Visser Amazon Web Services Pre-print Media Attached | ||
12:15 15mTalk | Revisiting Neural Program Smoothing for Fuzzing Research Papers Maria Irina Nicolae Robert Bosch GmbH, Max Eisele Robert Bosch; Saarland University, Andreas Zeller CISPA Helmholtz Center for Information Security Media Attached |
12:30 - 14:00 | |||
14:00 - 15:30 | Empirical Studies IIdeas, Visions and Reflections / Research Papers / Industry Papers / Journal First at Golden Gate A Chair(s): Cristian Cadar Imperial College London | ||
14:00 15mTalk | [Remote] Assess and Summarize: Improve Outage Understanding with Large Language Models Industry Papers Pengxiang Jin Nankai University, Shenglin Zhang Nankai University, Minghua Ma Microsoft Research, Haozhe Li Peking University, Yu Kang Microsoft Research, Liqun Li Microsoft Research, Yudong Liu Microsoft Research, Bo Qiao Microsoft Research, Chaoyun Zhang Microsoft, Pu Zhao Microsoft Research, Shilin He Microsoft Research, Federica Sarro University College London, Yingnong Dang Microsoft Azure, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research DOI Media Attached | ||
14:15 15mTalk | Open Source License Inconsistencies on GitHub Journal First Thomas Wolter Friedrich-Alexander University Erlangen-Nuernberg, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Dirk Riehle U of Erlangen, Nikolay Harutyunyan Friedrich-Alexander University Erlangen-Nuremberg, Germany Media Attached | ||
14:30 15mTalk | On the Relationship Between Code Verifiability and Understandability Research Papers Kobi Feldman College of William & Mary, Martin Kellogg New Jersey Institute of Technology, Oscar Chaparro William & Mary Media Attached | ||
14:45 15mTalk | Lessons from the Long Tail: Analysing Unsafe Dependency Updates across Software Ecosystems Ideas, Visions and Reflections Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne, Kenichi Matsumoto Nara Institute of Science and Technology Media Attached | ||
15:00 15mTalk | Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study Research Papers Xiaokai Wei AWS AI Labs, Sujan Kumar Gonugondla AWS AI Labs, Shiqi Wang AWS AI Labs, Wasi Ahmad AWS AI Labs, Baishakhi Ray Columbia University, Haifeng Qian AWS AI Labs, Xiaopeng LI AWS AI Labs, Varun Kumar AWS AI Labs, Zijian Wang AWS AI Labs, Yuchen Tian AWS, Qing Sun AWS AI Labs, Ben Athiwaratkun AWS AI Labs, Mingyue Shang AWS AI Labs, Murali Krishna Ramanathan AWS AI Labs, Parminder Bhatia AWS AI Labs, Bing Xiang AWS AI Labs Media Attached | ||
15:15 15mTalk | Understanding Hackers’ Work: An Empirical Study of Offensive Security Practitioners Industry Papers DOI Media Attached |
14:00 - 15:30 | Program Analysis IResearch Papers / Demonstrations / Industry Papers at Golden Gate C3 Chair(s): Michael Pradel University of Stuttgart | ||
14:00 15mTalk | An Automated Approach to Extracting Local Variables Research Papers Xiaye Chi Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Weixiao Wang Beijing Institute of Technology, Yunni Xia Chongqing University, Yanjie Jiang Peking University, Yuxia Zhang Beijing Institute of Technology, Weixing Ji Beijing Institute of Technology Media Attached | ||
14:15 15mTalk | Incrementalizing Production CodeQL Analyses Industry Papers Tamás Szabó GitHub Next DOI Media Attached | ||
14:30 15mTalk | Statistical Reachability Analysis Research Papers Seongmin Lee Max Planck Institute for Security and Privacy (MPI-SP), Marcel Böhme Max Planck Institute for Security and Privacy Media Attached | ||
14:45 15mTalk | PPR: Pairwise Program Reduction Research Papers Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo Media Attached | ||
15:00 15mTalk | When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime Performance Research Papers Pre-print Media Attached | ||
15:15 7mTalk | Ad Hoc Syntax-Guided Program Reduction Demonstrations Jia Le Tian University of Waterloo, Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yiwen Dong , Chengnian Sun University of Waterloo Media Attached |
15:30 - 16:00 | |||
16:00 - 18:00 | Code Search and Text to CodeResearch Papers / Industry Papers / Journal First / Demonstrations at Golden Gate A Chair(s): Miryung Kim University of California at Los Angeles, USA | ||
16:00 15mTalk | [Remote] Self-Supervised Query Reformulation for Code Search Research Papers Yuetian Mao Shanghai Jiao Tong University, Chengcheng Wan East China Normal University, Yuze Jiang Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University Media Attached | ||
16:15 15mTalk | [Remote] Natural Language to Code: How Far are We? Research Papers Shangwen Wang National University of Defense Technology, Mingyang Geng National University of Defense Technology, Bo Lin National University of Defense Technology, Zhensu Sun Singapore Management University, Ming Wen Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Li Li Beihang University, Tegawendé F. Bissyandé University of Luxembourg, Xiaoguang Mao National University of Defense Technology DOI Pre-print Media Attached | ||
16:30 15mTalk | [Remote] xASTNN: Improved Code Representations for Industrial Practice Industry Papers Zhiwei Xu Tsinghua University, Min Zhou Tsinghua University, Xibin Zhao Tsinghua University, Yang Chen Huazhong University of Science and Technology, Xi Cheng VMware, Hongyu Zhang Chongqing University DOI Media Attached | ||
16:45 7mTalk | [Remote] On the Dual Nature of Necessity in Use of Rust Unsafe Code Industry Papers Yuchen Zhang New York University, USA, Ashish Kundu Cisco Research, Georgios Portokalidis Stevens Institute of Technology, Jun Xu The University of Utah DOI Media Attached | ||
16:53 7mTalk | On Using Information Retrieval to Recommend Machine Learning Good Practices for Software Engineers Demonstrations Laura Cabra-Acela Universidad de Los Andes, Anamaria Mojica-Hanke University of Passau, Universidad de Los Andes, Mario Linares-Vásquez Universidad de los Andes, Steffen Herbold University of Passau Media Attached | ||
17:00 15mTalk | MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation Journal First Federico Cassano Northeastern University, John Gouwar Northeastern University, Daniel Nguyen Hannover High School, Sydney Nguyen Wellesley College, Luna Phipps-Costin Northeastern University, Donald Pinckney Northeastern University, Ming-Ho Yee Northeastern University, Yangtian Zi Northeastern University, Carolyn Jane Anderson Wellesley College, Molly Q Feldman Oberlin College, Arjun Guha Northeastern University and Roblox, Michael Greenberg Stevens Institute of Technology, Abhinav Jangda Microsoft Research Link to publication Media Attached | ||
17:15 15mTalk | NCQ: Code reuse support for Node.js developers Journal First Brittany Reid The University of Adelaide, Marcelo d'Amorim North Carolina State University, Markus Wagner Monash University, Australia, Christoph Treude University of Melbourne Link to publication DOI Pre-print Media Attached | ||
17:30 15mTalk | Efficient Text-to-Code Retrieval with Cascaded Fast and Slow Transformer Models Research Papers Akhilesh Deepak Gotmare Salesforce Research, Junnan Li Salesforce Research, Shafiq Joty Salesforce Research, Steven C.H. Hoi Salesforce Research Asia Media Attached | ||
17:45 15mTalk | PEM: Representing Binary Program Semantics for Similarity Analysis via A Probabilistic Execution Model Research Papers Xiangzhe Xu Purdue University, Zhou Xuan , Shiwei Feng Purdue University, Siyuan Cheng Purdue University, Yapeng Ye Purdue University, Qingkai Shi The Hong Kong University of Science and Technology, Guanhong Tao Purdue University, Le Yu , Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University Media Attached |
16:00 - 18:00 | Log Analysis and DebuggingIndustry Papers / Research Papers at Golden Gate C1 Chair(s): Yiming Tang Rochester Institute of Technology | ||
16:00 15mTalk | [Remote] STEAM: Observability-Preserving Trace Sampling Industry Papers Shilin He Microsoft Research, Botao Feng Microsoft, Liqun Li Microsoft Research, Xu Zhang Microsoft Research, Yu Kang Microsoft Research, Qingwei Lin Microsoft, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research DOI Media Attached | ||
16:15 15mTalk | [Remote] Demystifying Dependency Bugs in Deep Learning Stack Research Papers Kaifeng Huang Fudan University, Bihuan Chen Fudan University, Susheng Wu Fudan University, Junming Cao Fudan University, Lei Ma The University of Tokyo / University of Alberta, Xin Peng Fudan University Media Attached | ||
16:30 15mTalk | From Point-wise to Group-wise: A Fast and Accurate Microservice Trace Anomaly Detection Approach Industry Papers Zhe Xie Tsinghua University, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Wanxue Li eBay, USA, Huai Jiang eBay, USA, Liangfei Su eBay, USA, Jianhui Li Computer Network Information Center at Chinese Academy of Sciences, Gaogang Xie Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University DOI Media Attached | ||
16:45 15mTalk | Semantic Debugging Research Papers Martin Eberlein Humboldt University of Berlin, Marius Smytzek CISPA Helmholtz Center for Information Security, Dominic Steinhöfel CISPA Helmholtz Center for Information Security, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security Media Attached | ||
17:00 7mTalk | Analyzing Microservice Connectivity with Kubesonde Industry Papers Jacopo Bufalino Aalto University, Mario Di Francesco Eficode; Aalto University, Tuomas Aura Aalto University DOI Media Attached | ||
17:08 15mTalk | [Remote] Hue: A User-Adaptive Parser for Hybrid Logs Research Papers Junjielong Xu Chinese University of Hong Kong, Shenzhen, Qiuai Fu Huawei Cloud Computing Technologies CO., LTD., Zhouruixing Zhu Chinese University of Hong Kong, Shenzhen, Yutong Cheng Chinese University of Hong Kong, Shenzhen, zhijing li , Yuchi Ma Huawei Cloud Computing Technologies CO., LTD., Pinjia He The Chinese University of Hong Kong, Shenzhen Media Attached | ||
17:23 15mTalk | [Remote] Log Parsing with Generalization Ability under New Log Types Research Papers Siyu Yu Guangxi University, Yifan Wu Peking University, Zhijing Li The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen, Ningjiang Chen Guangxi University, Changjian Liu Guangxi University Media Attached |
16:00 - 18:00 | Machine Learning IIResearch Papers / Ideas, Visions and Reflections at Golden Gate C2 Chair(s): Iftekhar Ahmed University of California at Irvine | ||
16:00 15mTalk | [Remote] Compatibility Issues in Deep Learning Systems: Problems and Opportunities Research Papers Jun Wang Nanjing University of Aeronautics and Astronautics, Nanjing, China, Guanping Xiao Nanjing University of Aeronautics and Astronautics, China, Shuai Zhang Nanjing University of Aeronautics and Astronautics, China, Huashan Lei Nanjing University of Aeronautics and Astronautics, China, Yepang Liu Southern University of Science and Technology, Yulei Sui University of New South Wales, Australia DOI Pre-print Media Attached | ||
16:15 15mTalk | [Remote] An Extensive Study on Adversarial Attack against Pre-trained Models of Code Research Papers Xiaohu Du Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zichao Wei Huazhong University of Science and Technology, Shangwen Wang National University of Defense Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
16:30 15mTalk | Can Machine Learning Pipelines Be Better Configured? Research Papers Yibo Wang Northeastern University, Ying Wang Northeastern University, Tingwei Zhang Northeastern University, Yue Yu National University of Defense Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hai Yu Software College, Northeastern University, Zhiliang Zhu Software College, Northeastern University Media Attached | ||
16:45 15mTalk | Towards Feature-Based Analysis of the Machine Learning Development Lifecycle Ideas, Visions and Reflections Media Attached | ||
17:00 15mTalk | Fix Fairness, Don’t Ruin Accuracy: Performance Aware Fairness Repair using AutoML Research Papers Giang Nguyen Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Hridesh Rajan Dept. of Computer Science, Iowa State University Pre-print Media Attached | ||
17:15 15mTalk | BiasAsker: Measuring the Bias in Conversational AI System Research Papers Yuxuan Wan The Chinese University of Hong Kong, Wenxuan Wang Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Jiazhen Gu Chinese University of Hong Kong, Haonan Bai The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong Media Attached | ||
17:30 15mTalk | Pitfalls in Experiments with DNN4SE: An Analysis of the State of the Practice Research Papers Media Attached | ||
17:45 15mTalk | DecompoVision: Reliability Analysis of Machine Vision Components Through Decomposition and Reuse Research Papers Boyue Caroline Hu University of Toronto, Lina Marsso University of Toronto, Nikita Dvornik Waabi, Huakun Shen University of Toronto, Marsha Chechik University of Toronto Media Attached |
16:00 - 18:00 | Fault Diagnosis and Root Cause Analysis IResearch Papers / Journal First / Industry Papers at Golden Gate C3 Chair(s): Akond Rahman Auburn University | ||
16:00 15mTalk | [Remote] Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-Modal Observability Data Research Papers Guangba Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yufeng Li Sun Yat-sen University, Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Xiaoyun Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University Pre-print | ||
16:15 15mFull-paper | [Remote] DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems Research Papers Zhiming Chen Sun Yat-sen University, Pengfei Chen Sun Yat-Sen University, Guangba Yu Sun Yat-Sen University, Zilong He Sun Yat-Sen University, Genting Mai Sun Yat-sen University, Peipei Wang ByteDance Infrastructure System Lab Pre-print Media Attached | ||
16:30 15mTalk | [Remote] Pre-training Code Representation with Semantic Flow Graph for Effective Bug Localization Research Papers Media Attached | ||
16:45 15mTalk | [Remote] A Practical Human Labeling Method for Online Just-in-Time Software Defect Prediction Research Papers Liyan Song Southern University of Science and Technology, China, Leandro Minku University of Birmingham, Cong Teng Southern University of Science and Technology, Xin Yao Southern University of Science and Technology Pre-print Media Attached | ||
17:00 15mTalk | Trace Diagnostics for Signal-Based Temporal Properties Journal First Chaima Boufaied University of Ottawa, Claudio Menghi University of Bergamo; McMaster University, Domenico Bianculli University of Luxembourg, Lionel Briand University of Ottawa, Canada / University of Luxembourg, Luxembourg Media Attached | ||
17:15 15mTalk | TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice Systems Industry Papers Ruomeng Ding Microsoft, Chaoyun Zhang Microsoft, Lu Wang Microsoft Research, Yong Xu Microsoft Research, Minghua Ma Microsoft Research, Xiaomin Wu Microsoft, Meng Zhang , Qingjun Chen Microsoft 365, Xin Gao Microsoft 365, Xuedong Gao Microsoft 365, Hao Fan , Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research DOI Media Attached | ||
17:30 15mTalk | Triggering Modes in Spectrum-Based Multi-location Fault Localization Industry Papers DOI Media Attached | ||
17:45 15mTalk | Automata-based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android Research Papers Enze Ma East China Normal University, Shan Huang East China Normal University, weigang he East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Huiyu Liu East China Normal University, Geguang Pu East China Normal University, Zhendong Su ETH Zurich Media Attached |
Wed 6 DecDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 11:00 | |||
11:00 - 12:30 | Testing IIIIndustry Papers / Demonstrations / Research Papers at Golden Gate C1 Chair(s): Tianyi Zhang Purdue University | ||
11:00 15mTalk | [Remote] Heterogeneous Testing for Coverage Profilers Empowered with Debugging Support Research Papers Yibiao Yang State Key Laboratory for Novel Software Technology, Nanjing University, Maolin Sun Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Qingyang Li National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Yuming Zhou Nanjing University Pre-print Media Attached | ||
11:15 7mTalk | [Remote] Testing Real-World Healthcare IoT Application: Experiences and Lessons Learned Industry Papers Hassan Sartaj Simula Research Laboratory, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Kjetil Moberg Norwegian Health Authority DOI Pre-print Media Attached | ||
11:23 7mTalk | Helion: Enabling Natural Testing of Smart Homes Demonstrations Prianka Mandal William & Mary, Sunil Manandhar IBM T.J. Watson Research Center, Kaushal Kafle College of William & Mary, Kevin Moran University of Central Florida, Denys Poshyvanyk William & Mary, Adwait Nadkarni William & Mary Media Attached | ||
11:30 15mTalk | NeuRI: Diversifying DNN Generation via Inductive Rule Inference Research Papers Jiawei Liu University of Illinois at Urbana-Champaign, Jinjun Peng Columbia University, Yuyao Wang Nanjing University, Lingming Zhang University of Illinois at Urbana-Champaign Pre-print Media Attached | ||
11:45 15mTalk | Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget Perception Industry Papers Yongxiang Hu Fudan University, China, Jiazhen Gu Fudan University, China, Shuqing Hu Fudan University, Yu Zhang Meituan, Wenjie Tian Meituan, Shiyu Guo Meituan, Chaoyi Chen Meituan, Yangfan Zhou Fudan University DOI Media Attached | ||
12:00 15mTalk | MuRS: Mutant Ranking and Suppression using Identifier Templates Industry Papers Zimin Chen KTH Royal Institute of Technology, Malgorzata Salawa Google, Manushree Vijayvergiya Google, Goran Petrović Google Inc, Marko Ivanković Google; Universität Passau, René Just University of Washington DOI Media Attached | ||
12:15 15mTalk | Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer Research Papers Shubham Agarwal Adobe Research, Sarthak Chakraborty Adobe Research, Shaddy Garg Adobe Research, Sumit Bisht Amazon, Chahat Jain Traceable.ai, Ashritha Gonuguntla Cisco, Shiv Saini Adobe Research Media Attached |
11:00 - 12:30 | Program Analysis IIResearch Papers / Journal First at Golden Gate C3 Chair(s): Nico Rosner Amazon Web Services | ||
11:00 15mTalk | [Remote] OOM-Guard: Towards Improving The Ergonomics of Rust OOM Handling via A Reservation-based Approach Research Papers Chengjun Chen Fudan University; Ant Group, Zhicong Zhang Fudan University, Hongliang Tian Ant Group, Shoumeng Yan Ant Group, Hui Xu Fudan University Media Attached | ||
11:15 15mTalk | [Remote] DeepInfer: Deep Type Inference from Smart Contract Bytecode Research Papers Kunsong Zhao The Hong Kong Polytechnic University, Zihao Li The Hong Kong Polytechnic Universituy, Jianfeng Li Xi’an Jiaotong University, He Ye KTH Royal Institute of Technology, Xiapu Luo Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China Media Attached | ||
11:30 15mTalk | Statistical Type Inference for Incomplete Programs Research Papers Yaohui Peng School of Computer Science, Wuhan University, Jing Xie School of Computer Science, Wuhan University, Qiongling Yang School of Computer Science, Wuhan University, Hanwen Guo School of Computer Science, Wuhan University, Qingan Li School of Computer Science, Wuhan University, Jingling Xue School of Computer Science and Engineering, UNSW Sydney, YUAN Mengting School of Computer Science, Wuhan University, Wuhan, China Media Attached | ||
11:45 15mTalk | Demystifying Hidden Sensitive Operations in Android apps Journal First Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Li Li Beihang University, Haipeng Cai Washington State University, John Grundy Monash University, Jordan Samhi University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg Media Attached | ||
12:00 15mTalk | DeMinify: Neural Variable Name Recovery and Type Inference Research Papers Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas Media Attached |
12:30 - 14:00 | LunchSocial / Plenary Events | ||
14:00 - 15:30 | Clone and Similarity DetectionResearch Papers / Industry Papers at Golden Gate A Chair(s): Denys Poshyvanyk William & Mary | ||
14:00 15mTalk | AdaptivePaste: Intelligent Copy-Paste in IDE Industry Papers Xiaoyu Liu Microsoft Corporation, Jinu Jang Microsoft, Neel Sundaresan Microsoft, Miltiadis Allamanis Google DeepMind, Alexey Svyatkovskiy Microsoft DOI Media Attached | ||
14:15 15mTalk | Scalable Program Clone Search Through Spectral Analysis Research Papers Tristan Benoit Université de Lorraine, CNRS, LORIA, Jean-Yves Marion LORIA, Université de Lorraine, Sébastien Bardin CEA, Université Paris Saclay DOI Pre-print Media Attached | ||
14:30 15mTalk | [Remote] Tritor: Detecting Semantic Code Clones by Building Social Network-based Triads Model Research Papers Deqing Zou Huazhong University of Science and Technology, Siyue Feng Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Wenqi Suo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
14:45 15mTalk | [Remote] C³: Code Clone-Based Identification of Duplicated Components Industry Papers Yanming Yang Zhejiang University, Ying Zou Queen's University, Kingston, Ontario, Xing Hu Zhejiang University, David Lo School of Computing and Information Systems, Singapore Management University, Chao Ni School of Software Technology, Zhejiang University, John Grundy Monash University, Xin Xia Huawei Technologies DOI Media Attached | ||
15:00 15mTalk | [Remote] Demystifying the Composition and Code Reuse in Solidity Smart Contracts Research Papers Kairan Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Kaixuan Li East China Normal University, Yang Liu Nanyang Technological University Pre-print Media Attached | ||
15:15 15mTalk | [Remote] Gitor: Scalable Code Clone Detection by Building Global Sample Graph Research Papers Junjie shan Westlake University, Shihan Dou Fudan University, Yueming Wu Nanyang Technological University, Hairu wu Fudan University, Yang Liu Nanyang Technological University Media Attached |
14:00 - 15:30 | PerformanceResearch Papers / Industry Papers / Journal First at Golden Gate C1 Chair(s): Aitor Arrieta Mondragon University | ||
14:00 15mTalk | A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing Research Papers Min-Yih Hsu University of California, Irvine, Felicitas Hetzelt University of California, Irvine, David Gens University of California, Irvine, Michael Maitland SiFive, Michael Franz University of California, Irvine Media Attached | ||
14:15 15mTalk | Towards effective assessment of steady state performance in Java software: Are we there yet? Journal First Luca Traini University of L'Aquila, Vittorio Cortellessa Università dell'Aquila, Italy, Daniele Di Pompeo University of L'Aquila, Michele Tucci University of L'Aquila Link to publication DOI Media Attached | ||
14:30 15mTalk | Adapting Performance Analytic Techniques in a Real-World Database-Centric System: An Industrial Experience Report Industry Papers Lizhi Liao University of Waterloo, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo, Catalin Sporea ERA Environmental Management Solutions, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions DOI Media Attached | ||
14:45 15mTalk | IoPV: On Inconsistent Option Performance Variations Research Papers Jinfu Chen Jiangsu University, Zishuo Ding University of Waterloo, Yiming Tang Rochester Institute of Technology, Mohammed Sayagh ETS Montreal, University of Quebec, Heng Li Polytechnique Montréal, Bram Adams Queen's University, Kingston, Ontario, Weiyi Shang University of Waterloo Pre-print Media Attached | ||
15:00 15mTalk | Predicting Software Performance with Divide-and-Learn Research Papers Pre-print Media Attached | ||
15:15 15mTalk | [Remote] Discovering Parallelisms in Python Programs Research Papers Siwei Wei State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China, Guyang Song AntGroup, Senlin Zhu AntGroup, Ruoyi Ruan AntGroup, Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China Media Attached |
14:00 - 15:30 | Machine Learning IIIDemonstrations / Industry Papers / Research Papers at Golden Gate C2 Chair(s): Rangeet Pan IBM Research | ||
14:00 15mTalk | Benchmarking Robustness of AI-enabled Multi-sensor Fusion Systems: Challenges and Opportunities Research Papers Xinyu Gao , Zhijie Wang University of Alberta, Yang Feng Nanjing University, Lei Ma The University of Tokyo / University of Alberta, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University Media Attached | ||
14:15 7mTalk | A Language Model of Java Methods with Train/Test Deduplication Demonstrations Chia-Yi Su University of Notre Dame, Aakash Bansal University of Notre Dame, Vijayanta Jain University of Maine, Sepideh Ghanavati University of Maine , Collin McMillan University of Notre Dame Media Attached | ||
14:23 7mTalk | DENT - A Tool for Tagging Stack Overflow Posts With Deep Learning Energy Patterns Demonstrations Shriram Shanbhag Indian Institute of Technology Tirupati, Sridhar Chimalakonda Indian Institute of Technology Tirupati, Vibhu Saujanya Sharma Accenture Labs, India, Vikrant Kaulgud Accenture Labs, India Media Attached | ||
14:30 15mTalk | Automated Testing and Improvement of Named Entity Recognition Systems Research Papers BoXi Yu The Chinese University of Hong Kong, Shenzhen, Yiyan Hu The Chinese University of Hong Kong, Shenzhen, Qiuyang Mang The Chinese University of Hong Kong, Shenzhen, Wenhan Hu The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen Pre-print Media Attached | ||
14:45 15mTalk | KDDT: Knowledge Distillation-Empowered Digital Twin for Anomaly Detection Industry Papers Xu Qinghua Simula Research Laboratory; University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Zaimovic Nedim Alstom Rail, Inderjeet Singh Alstom DOI Media Attached | ||
15:00 15mTalk | Deep Learning Based Feature Envy Detection Boosted by Real-World Examples Research Papers Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Nan Niu University of Cincinnati, Zimao Xu Beijing Institute of Technology, Yifan Wang Huawei Cloud, Yunni Xia Chongqing University, Yuxia Zhang Beijing Institute of Technology, Yanjie Jiang Peking University DOI Pre-print Media Attached | ||
15:15 15mTalk | [Remote] The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code Classification Research Papers Anastasiia Grishina Simula Research Laboratory, Max Hort Simula Research Laboratory, Leon Moonen Simula Research Laboratory and BI Norwegian Business School Pre-print Media Attached |
14:00 - 15:30 | Security IResearch Papers / Demonstrations / Journal First at Golden Gate C3 Chair(s): Abhik Roychoudhury National University of Singapore | ||
14:00 15mTalk | Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study Journal First Goran Piskachev Amazon Web Services, Matthias Becker Fraunhofer IEM, Eric Bodden University of Paderborn Media Attached | ||
14:15 15mTalk | Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects Research Papers Lida Zhao Singapore Management University, Singapore, Sen Chen College of Intelligence and Computing, Tianjin University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Wu Jiahui Nanyang Technological University, Jun Sun Singapore Management University, Yang Liu Nanyang Technological University Media Attached | ||
14:30 15mTalk | Input-driven Dynamic Program Debloating for Code-reuse Attack Mitigation Research Papers Xiaoke Wang Wuhan University, Tao Hui Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Lei Zhao Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Yueqiang Cheng NIO DOI Pre-print Media Attached | ||
14:45 7mTalk | MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors Demonstrations Amit Seal Ami William & Mary, Syed Yusuf Ahmed University of Dhaka, Radowan Mahmud Redoy University of Dhaka, Nathan Cooper William & Mary, Kaushal Kafle College of William & Mary, Kevin Moran University of Central Florida, Denys Poshyvanyk William & Mary, Adwait Nadkarni William & Mary Media Attached | ||
14:53 7mTalk | [Remote] llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs Demonstrations Ruiling Chen Shenzhen University, Jiaxiang Liu Shenzhen University, Xiaomu Shi Institute of Software, Chinese Academy of Sciences, Ming-Hsien Tsai National Institute of Cyber Security, Bow-Yaw Wang , Bo-Yin Yang Academia Sinica Media Attached | ||
15:00 15mTalk | [Remote] Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java Research Papers Kaixuan Li East China Normal University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Ruitao Feng University of New South Wales, Han Liu East China Normal University, Chengwei Liu Nanyang Technological University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University Pre-print Media Attached | ||
15:15 15mTalk | [Remote] TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts Research Papers Chenyang Ma Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University DOI Pre-print Media Attached |
15:30 - 16:00 | |||
16:00 - 18:00 | Fault Diagnosis and Root Cause Analysis IIIndustry Papers / Research Papers at Golden Gate A Chair(s): Yun Lin Shanghai Jiao Tong University | ||
16:00 15mTalk | DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers Research Papers Xianglin Yang Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yifan Zhang National University of Singapore, Linpeng Huang Shanghai Jiao Tong University, Jin Song Dong National University of Singapore, Hong Mei Peking University Media Attached | ||
16:15 15mTalk | AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision Industry Papers Xiaoyun Liang ByteDance, Jiayi Qi ByteDance, Yongqiang Gao ByteDance, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology DOI Media Attached | ||
16:30 15mTalk | TransMap: Pinpointing Mistakes in Neural Code Translation Research Papers Bo Wang National University of Singapore, Ruishi Li National University of Singapore, Mingkai Li National University of Singapore, Prateek Saxena National University of Singapore Media Attached | ||
16:45 15mTalk | Dynamic Prediction of Delays in Software Projects Using Delay Patterns and Bayesian Modeling Research Papers Elvan Kula Delft University of Technology, Eric Greuter ING, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology Pre-print Media Attached | ||
17:00 15mTalk | Commit-level, Neural Vulnerability Detection and Assessment Research Papers Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas Media Attached | ||
17:15 15mTalk | [Remote] Mining Resource-Operation Knowledge to Support Resource Leak Detection Research Papers Chong Wang Nanyang Technological University, Yiling Lou Fudan University, Xin Peng Fudan University, Jianan Liu Fudan University, Baihan Zou Fudan University Media Attached | ||
17:30 15mTalk | [Remote] Detection Is Better Than Cure: A Cloud Incidents Perspective Industry Papers Vaibhav Ganatra Microsoft, Anjaly Parayil Microsoft, Supriyo Ghosh Microsoft, Yu Kang Microsoft Research, Minghua Ma Microsoft Research, Chetan Bansal Microsoft Research, Suman Nath Microsoft Research, Jonathan Mace Microsoft DOI Media Attached | ||
17:45 7mTalk | [Remote] Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365 Industry Papers Fangkai Yang Microsoft Research, Wenjie Yin KTH Royal Institute of Technology, Lu Wang Microsoft Research, Tianci Li Microsoft, Pu Zhao Microsoft Research, Bo Liu Beijing Institute of Technology, Paul Wang Microsoft 365, Bo Qiao Microsoft Research, Yudong Liu Microsoft Research, Mårten Björkman KTH Royal Institute of Technology, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research DOI Media Attached |
16:00 - 18:00 | FuzzingResearch Papers at Golden Gate C1 Chair(s): Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University | ||
16:00 15mTalk | Enhancing Coverage-guided Fuzzing via Phantom Program Research Papers Mingyuan Wu Southern University of Science and Technology and the University of Hong Kong, Kunqiu Chen Southern University of Science and Technology, Qi Luo Southern University of Science and Technology, Jiahong Xiang Southern University of Science and Technology, Ji Qi The University of Hong Kong, Junjie Chen Tianjin University, Heming Cui University of Hong Kong, Yuqun Zhang Southern University of Science and Technology Media Attached | ||
16:15 15mTalk | Co-Dependence Aware Fuzzing for Dataflow-based Big Data Analytics Research Papers Ahmad Humayun Virginia Tech, Miryung Kim University of California at Los Angeles, USA, Muhammad Ali Gulzar Virginia Tech Pre-print Media Attached | ||
16:30 15mTalk | SJFuzz: Seed & Mutator Scheduling for JVM Fuzzing Research Papers Mingyuan Wu Southern University of Science and Technology and the University of Hong Kong, Yicheng Ouyang University of Illinois at Urbana-Champaign, Minghai Lu Southern University of Science and Technology, Junjie Chen Tianjin University, Yingquan Zhao College of Intelligence and Computing, Tianjin University, Heming Cui University of Hong Kong, Guowei Yang University of Queensland, Yuqun Zhang Southern University of Science and Technology Media Attached | ||
16:45 15mTalk | Metamong: Detecting Render-update Bugs in Web Browsers through Fuzzing Research Papers Suhwan Song Seoul National University, South Korea, Byoungyoung Lee Seoul National University, South Korea Media Attached | ||
17:00 15mTalk | Property-based Fuzzing for Finding Data Manipulation Errors in Android Apps Research Papers Jingling Sun East China Normal University, Ting Su East China Normal University, Jiayi Jiang East China Normal University, Jue Wang Nanjing University, Geguang Pu East China Normal University, Zhendong Su ETH Zurich Media Attached | ||
17:15 15mTalk | Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications Research Papers Jiyuan Wang University of California at Los Angeles, Qian Zhang University of California, Riverside, Hongbo Rong Intel Labs, Guoqing Harry Xu University of California at Los Angeles, Miryung Kim University of California at Los Angeles, USA Pre-print Media Attached | ||
17:30 15mTalk | NaNofuzz: A Usable Tool for Automatic Test Generation Research Papers Matthew C. Davis Carnegie Mellon University, Sangheon Choi Rose-Hulman Institute of Technology, Sam Estep Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Joshua Sunshine Carnegie Mellon University Link to publication DOI Media Attached | ||
17:45 15mTalk | [Remote] A Generative and Mutational Approach for Synthesizing Bug-exposing Test Cases to Guide Compiler Fuzzing Research Papers Guixin Ye Northwest University, Tianmin Hu Northwest University, Zhanyong Tang Northwest University, Zhenye Fan Northwest University, Shin Hwei Tan Concordia University, Bo Zhang Tencent Security Platform Department, Wenxiang Qian Tencent Security Platform Department, Zheng Wang University of Leeds, UK Media Attached |
16:00 - 18:00 | Formal VerificationResearch Papers / Industry Papers / Ideas, Visions and Reflections / Demonstrations at Golden Gate C2 Chair(s): Christoph Treude University of Melbourne | ||
16:00 15mTalk | State Merging with Quantifiers in Symbolic Execution Research Papers David Trabish Tel Aviv University, Noam Rinetzky Tel Aviv University, Sharon Shoham Tel Aviv University, Vaibhav Sharma University of Minnesota DOI Pre-print Media Attached | ||
16:15 15mTalk | Towards Strengthening Formal Specifications with Mutation Model Checking Ideas, Visions and Reflections Maxime Cordy SnT, University of Luxembourg, Sami Lazreg SnT, University of Luxembourg, Axel Legay Université Catholique de Louvain, Belgium, Pierre Yves Schobbens University of Namur Media Attached | ||
16:30 15mTalk | PropProof: Free Model-Checking Harnesses from PBT Industry Papers Yoshiki Takashima Carnegie Mellon University DOI Media Attached | ||
16:45 15mTalk | Engineering a Formally Verified Automated Bug Finder Research Papers Arthur Correnson CISPA Helmholtz Center for Information Security, Dominic Steinhöfel CISPA Helmholtz Center for Information Security Media Attached | ||
17:00 15mTalk | LightF3: A Lightweight Fully-Process Formal Framework for Automated Verifying Railway Interlocking Systems Industry Papers Yibo Dong East China Normal University; Shanghai Trusted Industrial Control Platform, Xiaoyu Zhang East China Normal University, Yicong Xu East China Normal University, Chang Cai East China Normal University, Yu Chen East China Normal University, Weikai Miao East China Normal University, Jianwen Li East China Normal University, China, Geguang Pu East China Normal University DOI Media Attached | ||
17:15 15mTalk | Speeding up SMT Solving via Compiler Optimization Research Papers Media Attached | ||
17:30 15mTalk | [Remote] Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering Research Papers Bin Yu School of Computer Science and Technology, Xidian University, Cong Tian Xidian University, Hengrui Xing School of Computer Science and Technology, Xidian University, Zuchao Yang School of Computer Science and Technology, Xidian University, Jie Su School of Computer Science and Technology, Xidian University, Xu Lu School of Computer Science and Technology, Xidian University, Jiyu Yang School of Computer Science and Technology, Xidian University, Liang Zhao School of Computer Science and Technology, Xidian University, Xiaofeng Li Beijing Institute of Control Engineering, Zhenhua Duan Xidian University Media Attached | ||
17:45 7mTalk | [Remote] P4b: A Translator from P4 Programs to Boogie Demonstrations Media Attached |
16:00 - 18:00 | Automated Repair IIJournal First / Research Papers at Golden Gate C3 Chair(s): Luciano Baresi Politecnico di Milano | ||
16:00 15mTalk | A Large-scale Empirical Review of Patch Correctness Checking Approaches Research Papers Jun Yang UIUC, Yuehan Wang University of Illinois at Urbana-Champaign, Yiling Lou Fudan University, Ming Wen Huazhong University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign Media Attached | ||
16:15 15mTalk | Program Repair Guided by Datalog-Defined Static Analysis Research Papers Yu Liu Beijing University of Technology, Sergey Mechtaev University College London, Pavle Subotic Microsoft, Abhik Roychoudhury National University of Singapore Media Attached | ||
16:30 15mTalk | SynShine: Improved Fixing of Syntax Errors Journal First Toufique Ahmed University of California at Davis, Noah Rose Ledesma UC Davis, Prem Devanbu University of California at Davis Media Attached | ||
16:45 15mTalk | Baldur: Whole-Proof Generation and Repair with Large Language Models Research Papers Emily First University of California, San Diego, Markus Rabe Google, Talia Ringer University of Illinois at Urbana-Champaign, Yuriy Brun University of Massachusetts Media Attached | ||
17:00 15mTalk | KG4CraSolver: Recommending Crash Solutions via Knowledge Graph Research Papers Xueying Du Fudan University, Yiling Lou Fudan University, Mingwei Liu Fudan University, Xin Peng Fudan University, Tianyong Yang Fudan University Pre-print Media Attached | ||
17:15 15mTalk | [Remote] Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps Research Papers Yuxin Zhang Tianjin University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Chunyang Chen Monash University, Xiaohong Li Tianjin University Media Attached | ||
17:30 15mTalk | [Remote] Semantic Test Repair for Web applications Research Papers Xiaofang Qi School of Computer Science and Engineering, Southeast University, Xiang Qian School of Computer Science and Engineering, Southeast University, Yanhui Li Nanjing University Media Attached |
Thu 7 DecDisplayed time zone: Pacific Time (US & Canada) change
10:30 - 11:00 | |||
11:00 - 12:30 | Machine Learning IVResearch Papers / Ideas, Visions and Reflections / Industry Papers at Golden Gate C2 Chair(s): Diptikalyan Saha IBM Research India | ||
11:00 15mTalk | Dynamic Data Fault Localization for Deep Neural Networks Research Papers Yining Yin Nanjing University, China, Yang Feng Nanjing University, Shihao Weng Nanjing University, Zixi Liu Nanjing University, Yuan Yao Nanjing University, Yichi Zhang Nanjing University, Zhihong Zhao , Zhenyu Chen Nanjing University Media Attached | ||
11:15 15mTalk | Assisting Static Analysis with Large Language Models: A ChatGPT Experiment Ideas, Visions and Reflections Haonan Li University of California at Riverside, USA, Yu Hao University of California at Riverside, USA, Yizhuo Zhai University of California at Riverside, USA, Zhiyun Qian University of California at Riverside, USA Media Attached | ||
11:30 15mTalk | Understanding the Bug Characteristics and Fix Strategies of Federated Learning Systems Research Papers Xiaohu Du Huazhong University of Science and Technology, Xiao CHEN Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hai Jin Huazhong University of Science and Technology Media Attached | ||
11:45 15mTalk | EvoCLINICAL: Evolving Cyber-Cyber Digital Twin with Active Transfer Learning for Automated Cancer Registry System Industry Papers Chengjie Lu Simula Research Laboratory; University of Oslo, Xu Qinghua Simula Research Laboratory; University of Oslo, Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Thomas Schwitalla Cancer Registry of Norway, Jan F. Nygård Cancer Registry of Norway DOI Media Attached | ||
12:00 15mTalk | Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing Research Papers bozhi wu Singapore Management University, Shangqing Liu Nanyang Technological University, Yang Xiao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiming Li Nanyang Technological University, Singapore, Jun Sun Singapore Management University, Shang-Wei Lin Nanyang Technological University Media Attached | ||
12:15 15mTalk | [Remote] DeepRover: A Query-efficient Blackbox Attack for Deep Neural Networks Research Papers Fuyuan Zhang Kyushu University, Xinwen Hu Hunan Normal University, Lei Ma The University of Tokyo / University of Alberta, Jianjun Zhao Kyushu University Media Attached |
11:00 - 12:30 | Program Analysis IIIDemonstrations / Research Papers / Industry Papers at Golden Gate C3 Chair(s): Marsha Chechik University of Toronto | ||
11:00 15mTalk | Practical Inference of Nullability Types Research Papers Nima Karimipour University of California, Riverside, Justin Pham University of California, Riverside, Lazaro Clapp Uber Technologies Inc, Manu Sridharan University of California at Riverside Media Attached | ||
11:15 15mTalk | LibKit: Detecting Third-Party Libraries in iOS Apps Research Papers Daniel Dominguez Alvarez University of Verona and IMDEA Software Institute, Alejandro de la Cruz IMDEA Software Institute, Alessandra Gorla IMDEA Software Institute, Juan Caballero IMDEA Software Institute Media Attached | ||
11:30 15mTalk | Compositional Taint Analysis for Enforcing Security Policies at Scale Industry Papers Subarno Banerjee Amazon Web Services, Siwei Cui Texas A & M University, Michael Emmi Amazon Web Services, Antonio Filieri Amazon Web Services, Liana Hadarean Amazon Web Services, Peixuan Li Amazon Web Services, Linghui Luo Amazon Web Services, Goran Piskachev Amazon Web Services, Nico Rosner Amazon Web Services, Aritra Sengupta Amazon Web Services, Omer Tripp Amazon, Jingbo Wang University of Southern California DOI Media Attached | ||
11:45 15mTalk | FunProbe: Probing Functions from Binary Code through Probabilistic Analysis Research Papers Media Attached | ||
12:00 15mTalk | BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework Research Papers Zewen Sun Nanjing University, Duanchen Xu Nanjing University, Yiyu Zhang Nanjing University, Yun Qi Nanjing University, Yueyang Wang Nanjing University, Zhiqiang Zuo Nanjing University, Zhaokang Wang Nanjing University, Yue Li Nanjing University, Xuandong Li Nanjing University, Qingda Lu Alibaba Group, Wenwen Peng Alibaba Group, Shengjian (Daniel) Guo Baidu Security Media Attached | ||
12:15 7mTalk | CONAN: Statically Detecting Connectivity Issues in Android Applications Demonstrations Alejandro Mazuera-Rozo Universita della Svizzera italiana, Lugano, Switzerland and Universidad de los Andes, Colombia, Camilo Escobar-Velásquez Universidad de los Andes, Juan Espitia-Acero Universidad de los Andes, Colombia, Mario Linares-Vásquez Universidad de los Andes, Gabriele Bavota Software Institute, USI Università della Svizzera italiana Media Attached |
12:30 - 14:00 | LunchSocial / Plenary Events | ||
14:00 - 15:30 | Models of Code and DocumentationResearch Papers / Journal First / Ideas, Visions and Reflections at Golden Gate C1 Chair(s): Gema Rodríguez-Pérez University of British Columbia (UBC) | ||
14:00 15mTalk | On the Usage of Continual Learning for Out-of-Distribution Generalization in Pre-trained Language Models of Code Research Papers Martin Weyssow DIRO, Université de Montréal, Xin Zhou Singapore Management University, Singapore, Kisub Kim School of Computing and Information Systems, Singapore Management University, David Lo School of Computing and Information Systems, Singapore Management University, Houari Sahraoui DIRO, Université de Montréal Pre-print Media Attached | ||
14:15 15mTalk | A Vision on Intentions in Software Engineering Ideas, Visions and Reflections Jacob Krüger Eindhoven University of Technology, Yi Li Nanyang Technological University, Chenguang Zhu Meta, Marsha Chechik University of Toronto, Thorsten Berger Ruhr University Bochum, Julia Rubin University of British Columbia, Canada Media Attached | ||
14:30 15mPaper | Automated Identification of Toxic Code Reviews Using ToxiCR Journal First Jaydeb Sarker Department of Computer Science, Wayne State University, Asif Kamal Turzo Wayne State University, Amiangshu Bosu Wayne State University, Ming Dong Wayne State University Link to publication DOI Pre-print Media Attached | ||
14:45 15mTalk | GrACE: Language Models Meet Code Edits Research Papers Priyanshu Gupta Microsoft, Avishree Khare Microsoft, Yasharth Bajpai Microsoft, Saikat Chakraborty Microsoft Research , Sumit Gulwani Microsoft, Aditya Kanade Microsoft Research India, Arjun Radhakrishna Microsoft, Gustavo Soares Microsoft, Ashish Tiwari Microsoft Media Attached | ||
15:00 15mTalk | Recommending Analogical APIs via Knowledge Graph Embedding Research Papers Mingwei Liu Fudan University, Yanjun Yang Fudan University, Yiling Lou Fudan University, Xin Peng Fudan University, Zhong Zhou Fudan University, Xueying Du Fudan University, Tianyong Yang Fudan University Pre-print Media Attached | ||
15:15 15mTalk | [Remote] CCT5: A Code-Change-Oriented Pre-Trained Model Research Papers Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Zhongxin Liu Zhejiang University, Yepang Liu Southern University of Science and Technology, Xin Xia Huawei Technologies, Xiaoguang Mao National University of Defense Technology DOI Pre-print Media Attached |
14:00 - 15:30 | Machine Learning VResearch Papers / Ideas, Visions and Reflections / Journal First at Golden Gate C2 Chair(s): Prem Devanbu University of California at Davis | ||
14:00 15mTalk | LExecutor: Learning-Guided Execution Research Papers Media Attached | ||
14:15 15mTalk | Deeper Notions of Correctness in Image-based DNNs: Lifting Properties from Pixel to Entities Ideas, Visions and Reflections Felipe Toledo , David Shriver University of Virginia, Sebastian Elbaum University of Virginia, Matthew B Dwyer University of Virginia Link to publication DOI Pre-print Media Attached | ||
14:30 15mTalk | Software Architecture Recovery with Information Fusion Research Papers Yiran Zhang Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Hongxu Chen Huawei Technologies Co., Ltd., Sun Jianwen Huawei Technologies Co., Ltd, Dong Qiu Huawei Technologies Co., Ltd, Yang Liu Nanyang Technological University Media Attached | ||
14:45 15mTalk | What Kinds of Contracts Do ML APIs Need? Journal First Samantha Syeda Khairunnesa Bradley University, Shibbir Ahmed Dept. of Computer Science, Iowa State University, Sayem Mohammad Imtiaz Iowa State University, Hridesh Rajan Dept. of Computer Science, Iowa State University, Gary T. Leavens University of Central Florida Media Attached | ||
15:00 15mTalk | Evaluating Transfer Learning for Simplifying GitHub READMEs Research Papers Haoyu Gao The University of Melbourne, Christoph Treude University of Melbourne, Mansooreh Zahedi The Univeristy of Melbourne Pre-print Media Attached | ||
15:15 15mTalk | [Remote] CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models Research Papers Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Australia, Fu Song State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China, Li Li Beihang University Pre-print Media Attached |
14:00 - 15:30 | Security IIResearch Papers / Journal First at Golden Gate C3 Chair(s): Caroline Lemieux University of British Columbia | ||
14:00 15mTalk | Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors Research Papers Ruoxi Sun CSIRO's Data61, Jason Minhui Xue CSIRO’s Data61, Gareth Tyson Hong Kong University of Science and Technology, Tian Dong Shanghai Jiao Tong University, Shaofeng Li Shanghai Jiao Tong University, Shuo Wang CSIRO's Data61, Haojin Zhu Shanghai Jiao Tong University, Seyit Camtepe CSIRO Data61, Surya Nepal CSIRO’s Data61 Media Attached | ||
14:15 15mTalk | Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study Journal First Akond Rahman Auburn University, USA, Shazibul Islam Shamim Auburn University, Dibyendu Brinto Bose Virginia Tech, Rahul Pandita GitHub, Inc. Media Attached | ||
14:30 15mTalk | Crystallizer: A Hybrid Path Analysis Framework To Aid in Uncovering Deserialization Vulnerabilities Research Papers Prashast Srivastava Columbia University, USA, Flavio Toffalini EPFL, Kostyantyn Vorobyov Oracle Labs, Australia, François Gauthier Oracle Labs, Antonio Bianchi Purdue University, Mathias Payer EPFL Media Attached | ||
14:45 15mTalk | Neural Transfer Learning for Repairing Security Vulnerabilities in C Code Journal First Zimin Chen KTH Royal Institute of Technology, Steve Kommrusch Leela AI, Martin Monperrus KTH Royal Institute of Technology Media Attached | ||
15:00 15mTalk | ViaLin: Path-Aware Dynamic Taint Analysis for Android Research Papers Khaled Ahmed University of British Columbia (UBC), Yingying Wang University of British Columbia, Mieszko Lis The University of British Columbia, Canada, Julia Rubin University of British Columbia, Canada Media Attached | ||
15:15 15mTalk | [Remote] Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation Research Papers Chao Ni School of Software Technology, Zhejiang University, Xin Yin The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Kaiwen Yang College of Computer Science and Technology, Zhejiang University, Dehai Zhao Australian National University, Australia, Zhenchang Xing Data61, Xin Xia Huawei Technologies Media Attached |
15:30 - 16:00 | |||
Accepted Papers
Call for Papers
We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research.
NEW THIS YEAR: major revisions allowed! The main novelty of this year’s review process is that the initial output can be accept, reject or major revision. In case a paper is deemed publishable upon major revision, authors are granted 8 weeks to perform major revisions, which might include additional experiments or new analyses of existing results; major rewriting of algorithms and explanations; clarifications, better scoping, and improved motivations. The same reviewers who requested major revisions will then assess whether the revised submission satisfies their requests adequately.
NEW THIS YEAR: research methods declaration! This year, in addition to declaring the topics which are relevant for their submissions, authors will be asked to declare the research methods employed in their submissions. This will enable us to ensure reviewer expertise both for research methods and topics. For full definitions of the research methods, see the SIGSOFT Empirical Standards.
NEW THIS YEAR: adoption of SIGSOFT Open Science Policy! This year, ESEC/FSE has adopted the SIGSOFT Open Science Policy, and we encourage authors to provide a replication package. For authors, this means providing a supporting statement on the availability of a replication package (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section. See more details below.
Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems are also welcome, as well as replication papers. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call.
How to Submit
At the time of submission, all papers must conform to the ESEC/FSE 2023 Format and Submission Guidelines, and must not exceed 10 pages for all text and figures plus 2 pages for references. All submissions must be in English and in PDF format. Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the ESEC/FSE submission site:
https://esecfse2023.hotcrp.com/
Each submission will be reviewed by at least three members of the program committee. When the initial output of the three reviews is major revision, authors will have an opportunity to address the reviewers’ requests during an 8 week major revision period. The revised submission must be accompanied by a response letter, where the authors explain how they addressed each concern expressed by the reviewers.
Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation (if relevant), quality of presentation, and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.
Double-Anonymous Review Process
In order to ensure the fairness of the reviewing process, the ESEC/FSE 2023 Research Papers Track will employ a double-anonymous review process, where external reviewers do not know the identity of authors, and authors do not know the identity of external reviewers. The papers submitted must not reveal the authors’ identities in any way:
- Authors should leave out author names and affiliations from the body of their submission.
- Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
- Authors should not include URLs to author-revealing sites (tools, datasets). Authors are still encouraged to follow open science principles and submit replication packages, see more details on the open science policy below.
- Authors should anonymize author-revealing company names but instead provide general characteristics of the organisations involved needed to understand the context of the paper.
- Authors should ensure that paper acknowledgements do not reveal the origin of their work.
The double-anonymous process used this year is “heavy”, i.e., the paper anonymity will be maintained during all reviewing and discussion periods. In case of major revision, authors must therefore maintain anonymity in their response letter and must provide no additional information that could be author-revealing.
To facilitate double-anonymous reviewing, we recommend the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification. If the authors have uploaded to arXiv or similar, they should avoid specifying that the manuscript was submitted to ESEC/FSE 2023.
Authors with further questions on double-anonymous reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-anonymous review process will be desk-rejected.
Submission Policies
Papers submitted for consideration to ESEC/FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.
To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.
All publications are subject to the ACM Author Representations policy.
By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.
Alleged violations to any of the above policies will be reported to ACM for further investigation and may result in a full retraction of your paper, in addition to other potential penalties, as per the ACM Publications Policies.
Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process if your paper is accepted. ACM has been involved in ORCID from the start and they have recently made a commitment to collect ORCID IDs from all of published authors. The collection process has started and will roll out as a requirement throughout 2022. ACM is committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.
Important Dates
All dates are 23:59:59 AoE (UTC-12h)
- Paper registration: 26 January, 2023 (to register a paper, only the paper title, author list and some additional metadata are required)
- Full paper submission: 2 February, 2023
- Initial notification: 4 May, 2023
- Revised manuscript submissions (major revisions only): 29 June, 2023
- Final notification for major revisions: 27 July, 2023
- Camera ready: 24 August, 2023
NOTE: The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of the conference. The official publication date affects the deadline for any patent filings related to published work.
Open Science Policy
The research track of ESEC/FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.
Upon submission to the research track, authors are asked to make a replication package available to the program committee (via upload of supplemental material or a link to a private or public repository) or to comment on why this is not possible or desirable. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. We ask authors to provide a supporting statement on the availability of a replication package (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section. Be careful that such statements continue to maintain author anonymity. For more details, see the ESEC/FSE open science policy.
Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate ESEC/FSE’23 artefact evaluation committee.
Topics of Interest
Topics of interest include, but are not limited to:
- Artificial intelligence and machine learning for software engineering
- Autonomic computing
- Debugging and fault localization
- Dependability, safety, and reliability
- Distributed and collaborative software engineering
- Embedded software, safety-critical systems, and cyber-physical systems
- Empirical software engineering
- Human aspects of software engineering
- Human-computer interaction
- Mining software repositories
- Mobile development
- Model checking
- Model-driven engineering
- Parallel, distributed, and concurrent systems
- Performance engineering
- Program analysis
- Program comprehension
- Program repair
- Program synthesis
- Programming languages
- Recommendation systems
- Requirements engineering
- Search-based software engineering
- Services, components, and cloud
- Software architectures
- Software engineering education
- Software engineering for machine learning and artificial intelligence
- Software evolution
- Software processes
- Software security
- Software testing
- Software traceability
- Symbolic execution
- Tools and environments
FAQ
FAQ on Review Process: Major Revisions, Open Science Policy, Double-Anonymous Reviewing
Major Revision Process
Q: Why is ESEC/FSE allowing major revisions?
A: SE conferences are currently forced to reject papers that include valuable material, but would need major changes to become acceptable for conference presentation, because major revisions cannot be accommodated in the current review process. By supporting only a binary outcome, conferences force reviewers to decide between rejection and acceptance even in borderline cases that would be better judged after a round of major revision. This can cause additional reviewing burden for the community (the paper is resubmitted to another venue with new reviewers) and inconsistency for the authors (the new reviewers have different opinions). We hope by allowing major revisions to both increase the acceptance rate of ESEC/FSE and to help reduce these current problems with the reviewing process.
For Authors
Q: If my paper receives major revisions, what happens next?
A: The meta-review will clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. Authors of these papers are granted 8 weeks to implement the requested changes. In addition to the revised paper, authors are asked to submit a response letter that explains how each required change was implemented. If any change was not implemented, authors can explain why. The same reviewers will then review the revised paper and make their final (binary) decision. Authors can also choose to withdraw their submission if they wish.
Q: Will major revision become the default decision causing initial acceptance rates to drop?
A: This is not the intention: reviewers are instructed to accept all papers that would have been accepted when major revision was not an available outcome.
For Reviewers
Q: When shall I recommend major revision for a paper?
A: Major revision should not become the default choice for borderline papers and should be used only if without major revisions the paper would be rejected, while a properly done major revision, which addresses the reviewers’ concerns, could make the paper acceptable for publication; if the requested changes are doable in 8 weeks and are implementable within the page limit; if the requested changes are strictly necessary for paper acceptance (i.e., not just nice-to-have features); if the requested changes require recheck (i.e., reviewers cannot trust the authors to implement them directly in the camera ready).
Q: When shall I recommend rejection instead of major revision?
A: Rejection is a more appropriate outcome than major revision if the requested additions/changes are not implementable in 8 weeks; if the contribution is very narrow or not relevant to the SE audience, and it cannot be retargeted in 8 weeks; if the methodology is flawed and cannot be fixed in 8 weeks; if results are unconvincing, the paper does not seem to improve the state of the art much, and new convincing results are unlikely to be available after 8 weeks of further experiments; if the customary benchmark used in the community was ignored and cannot be adopted and compared to in 8 weeks.
Q: When shall I recommend acceptance instead of major revision?
A: We do not want major revision to become the primary pathway for acceptance. We should continue to trust the authors to make minor changes to the submissions in the camera ready version. Acceptance is preferable if the requested additions/changes are nice to have features, not mandatory for the acceptability of the work; if minor improvements of the text are needed; if minor clarifications requested by the reviewers should be incorporated; if important but not critical references should be added and discussed; if discussion of results could be improved, but the current one is already sufficient.
Q: What is the difference between major revision and shepherding?
A: Major revision is not shepherding. While shepherding typically focuses on important but minor changes, which can be specified in an operational way and can be checked quite easily and quickly by reviewers, major revisions require major changes (although doable in 8 weeks), which means the instructions for the authors cannot be completely operational and the check will need to go deeply into the new content delivered by the paper. Hence, while the expectation for shepherded papers is that most of them will be accepted once the requested changes are implemented, this is not necessarily the case with major revisions.
Q: Is there a quota of papers that can have major revision as outcome?
A: As there is no quota for the accepted papers, there is also no quota for major revisions. However, we expect that thanks to major revisions we will be able to eventually accept 10-15% more papers, while keeping the quality bar absolutely unchanged.
Q: What shall I write in the meta-review of a paper with major revision outcome?
A: With the possibility of a major revision outcome, meta-reviews become extremely important. The meta-review should clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. The meta-review should act as a contract between reviewers and authors, such that when all required changes are properly made, the paper is accepted. In this respect, the listed changes should be extremely clear, precise, and implementable.
Review Process
For Authors
Q: Can I withdraw my paper?
A: Yes, papers can be withdrawn at any time using HotCRP.
For Reviewers
Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?
A: Contact the Program Co-Chairs, who will download the material on your behalf and make it available to you.
Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?
A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Co-Chairs, especially since additional reviewers might have a different set of conflicts of interest.
Open Science Policy
Q: What is the ESEC/FSE 2023 open science policy and how can I follow it?
A: Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:
- make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
- include in the paper an explanation as to why this is not possible or desirable; and
- indicate if they intend to make their data publicly available upon acceptance. This information should be provided in the submitted papers in a section named Data Availability after the Conclusion section. For more details, see the ESEC/FSE open science policy.
Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?
A: To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site. Instructions are provided in the ESEC/FSE open science policy.
Double-Anonymous Reviewing (DAR)
Q: Why are you using double-anonymous reviewing?
A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.
Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.
A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.
For Authors
Q: What exactly do I have to do to anonymize my paper?
A: Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors.
Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?
A: On the submission site, there will be an option to submit supplementary material along with your main paper. You can also share supplementary material in a private or publicly shared repository (preferred). This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-anonymous guidelines. See instructions on the ESEC/FSE open science policy.
Q: My submission is based on code available in a public repository. How do I deal with this?
A: Making your code publicly available is not incompatible with double-anonymous reviewing. You can create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy. Authors wanting to share GitHub repositories may want to look into using https://anonymous.4open.science/ which is an open source tool that helps you to quickly double-anonymize your repository.
Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission?
A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Co-Chairs.
Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?
A: No. But we recommend you do not use the same title for your ESEC/FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.
Q: Am I allowed to post my (non-anonymized) paper on my web page or arXiv?
A: To facilitate double-anonymous reviewing, we recommend the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification. If the authors have uploaded to arXiv or similar, they should avoid specifying that the manuscript was submitted to ESEC/FSE 2023.
Q: Can I give a talk about my work while it is under review? How do I handle social media?
A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are grey areas and trade-offs; we cannot describe every possible scenario.
Things you may do:
- Put your submission on your home page.
- Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
- Present your work at professional meetings, job interviews, etc.
- Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.
Things you should not do:
- Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
- Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
- Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, ESEC/FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.
Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.
Q: Will the fact that ESEC/FSE is double-anonymous have an impact on handling conflicts of interest? A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Call for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.
For Reviewers
Q: What should I do if I learn the authors’ identity? What should I do if a prospective ESEC/FSE author contacts me and asks to visit my institution?
A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Co-Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgement.
Q: How do we handle potential conflicts of interest since I cannot see the author names?
A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.
Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?
A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.
The above guidelines are partly based on the PLDI FAQ on double-anonymous reviewing and the ICSE 2022 guidelines on double-anonymous submissions.