Dates
Tracks
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 5 Dec

Displayed time zone: Pacific Time (US & Canada) change

10:30 - 11:00
Coffee/tea BreakSocial / Plenary Events at Golden Gate B
11:00 - 12:30
11:00
15m
Talk
A Longitudinal Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention
Research Papers
Zihan Fang Vanderbilt University, Madeline Endres University of Michigan, Thomas Zimmermann Microsoft Research, Denae Ford Microsoft Research, Westley Weimer University of Michigan, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University
Pre-print Media Attached
11:15
15m
Talk
Do CONTRIBUTING files provide information about OSS newcomers' onboarding barriers?
Research Papers
Felipe Fronchetti Virginia Commonwealth University, David C. Shepherd Louisiana State University, Igor Scaliante Wiese Federal University of Technology – Paraná - UTFPR, Christoph Treude University of Melbourne, Marco Gerosa Northern Arizona University, Igor Steinmacher Northern Arizona University
Pre-print Media Attached
11:30
15m
Talk
Off to a Good Start: Dynamic Contribution Patterns and Technical Success in an OSS Newcomer’s Early Career
Journal First
Yang Yue University of California, Irvine, Yi Wang Beijing University of Posts and Telecommunications, David Redmiles University of California, Irvine
Link to publication DOI Media Attached
11:45
15m
Talk
How Early Participation Determines Long-Term Sustained Activity in GitHub Projects?
Research Papers
Wenxin Xiao School of Computer Science, Peking University, Hao He Carnegie Mellon University, Weiwei Xu Peking University, Yuxia Zhang Beijing Institute of Technology, Minghui Zhou Peking University
Pre-print Media Attached
12:00
15m
Talk
Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract Contributors
Research Papers
Hongbo Fang Carnegie Mellon University, James Herbsleb Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
Media Attached
12:15
15m
Talk
Contribution-based Firing of Developers?
Ideas, Visions and Reflections
Vincenzo Orrei Software Institute - USI, Lugano, Switzerland, Marco Raglianti Software Institute - USI, Lugano, Csaba Nagy Software Institute - USI, Lugano, Michele Lanza Software Institute - USI, Lugano
Media Attached
11:00 - 12:30
11:00
15m
Talk
[Remote] CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays
Research Papers
Qiyuan Zhao Beihang University, Chuan Luo Beihang University, Shaowei Cai Institute of Software, Chinese Academy of Sciences, Wei Wu L3S Research Center, Leibniz University Hannover, Germany, Jinkun Lin Seed Math Technology Limited, Hongyu Zhang Chongqing University, Chunming Hu Beihang University
DOI Pre-print Media Attached
11:15
15m
Talk
Accelerating Continuous Integration with Parallel Batch Testing
Research Papers
Emad Fallahzadeh Concordia University, Amir Hossein Bavand Concordia University, Peter Rigby Concordia University; Meta
Pre-print Media Attached
11:30
15m
Talk
Keeping Mutation Test Suites Consistent and Relevant with Long-Standing Mutants
Ideas, Visions and Reflections
Milos Ojdanic University of Luxembourg, Mike Papadakis University of Luxembourg, Luxembourg, Mark Harman Meta Platforms Inc. and UCL
Media Attached
11:45
15m
Talk
DistXplore: Distribution-guided Testing for Evaluating and Enhancing Deep Learning Systems
Research Papers
Longtian Wang Xi'an Jiaotong University, Xiaofei Xie Singapore Management University, Xiaoning Du Monash University, Australia, Meng Tian Singapore Management University, Qing Guo IHPC and CFAR at A*STAR, Singapore, Yang Zheng TTE Lab, Huawei, Chao Shen Xi’an Jiaotong University
Media Attached
12:00
15m
Talk
Input Distribution Coverage: Measuring Feature Interaction Adequacy in Neural Network Testing
Journal First
Swaroopa Dola University of Virginia, Matthew B Dwyer University of Virginia, Mary Lou Soffa University of Virginia
Media Attached
12:15
15m
Talk
A Unified Framework for Mini-game Testing: Experience on WeChat
Industry Papers
Chaozheng Wang The Chinese University of Hong Kong, Haochuan Lu Tencent, Cuiyun Gao The Chinese University of Hong Kong, Li Zongjie Hong Kong University of Science and Technology, Ting Xiong Tencent Inc., Yuetang Deng Tencent Inc.
DOI Media Attached
11:00 - 12:30
Machine Learning IIdeas, Visions and Reflections / Industry Papers / Research Papers at Golden Gate C2
Chair(s): Michael Pradel University of Stuttgart
11:00
15m
Talk
[Remote] Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly Detection
Industry Papers
Haotian Si Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Zhihan Li Kuaishou Technology, Yadong Zhao Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jingjing Li Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Haiming Zhang Computer Network Information Center at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zulong Diao Institute of Computing Technology at Chinese Academy of Sciences, Jianhui Li Computer Network Information Center at Chinese Academy of Sciences, Gaogang Xie Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University
DOI Media Attached
11:15
15m
Talk
Design by Contract for Deep Learning APIs
Research Papers
Shibbir Ahmed Dept. of Computer Science, Iowa State University, Sayem Mohammad Imtiaz Iowa State University, Samantha Syeda Khairunnesa Bradley University, Breno Dantas Cruz Dept. of Computer Science, Iowa State University, Hridesh Rajan Dept. of Computer Science, Iowa State University
DOI Media Attached
11:30
15m
Talk
Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to Executables
Ideas, Visions and Reflections
Jian Gu Monash University, Harald Gall University of Zurich
Media Attached
11:45
15m
Talk
Testing Coreference Resolution Systems without Labeled Test Sets
Research Papers
Jialun Cao Hong Kong University of Science and Technology, Yaojie Lu Chinese Information Processing Laboratory Institute of Software, Chinese Academy of Sciences, Ming Wen Huazhong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
Media Attached
12:00
15m
Talk
Neural-Based Test Oracle Generation: A Large-scale Evaluation and Lessons Learned
Research Papers
Soneya Binta Hossain University of Virginia, USA, Antonio Filieri Amazon Web Services, Matthew B Dwyer University of Virginia, Sebastian Elbaum University of Virginia, Willem Visser Amazon Web Services
Pre-print Media Attached
12:15
15m
Talk
Revisiting Neural Program Smoothing for Fuzzing
Research Papers
Maria Irina Nicolae Robert Bosch GmbH, Max Eisele Robert Bosch; Saarland University, Andreas Zeller CISPA Helmholtz Center for Information Security
Media Attached
11:00 - 12:30
Automated Repair IResearch Papers / Industry Papers at Golden Gate C3
Chair(s): Shin Hwei Tan Concordia University
11:00
15m
Talk
RAP-Gen: Retrieval-Augmented Patch Generation with CodeT5 for Automatic Program Repair
Research Papers
Weishi Wang Nanyang Technological University, Yue Wang Salesforce Research, Shafiq Joty Salesforce Research, Steven C.H. Hoi Salesforce Research Asia
Media Attached
11:15
15m
Talk
From Leaks to Fixes: Automated Repairs for Resource Leak Warnings
Research Papers
Akshay Utture Uber Technologies Inc., Jens Palsberg University of California, Los Angeles (UCLA)
Pre-print Media Attached
11:30
15m
Talk
InferFix: End-to-End Program Repair with LLMs
Industry Papers
Matthew Jin , Syed Shahriar University of California at Los Angeles, Michele Tufano Microsoft, Xin Shi Microsoft Corporation, Shuai Lu Microsoft Research, Neel Sundaresan Microsoft, Alexey Svyatkovskiy Microsoft
DOI
11:45
15m
Research paper
Copiloting the Copilots: Fusing Large Language Models with Completion Engines for Automated Program Repair
Research Papers
Yuxiang Wei University of Illinois at Urbana-Champaign, Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print Media Attached
12:00
15m
Talk
SmartFix: Fixing Vulnerable Smart Contracts by Accelerating Generate-and-Verify Repair using Statistical Models
Research Papers
Sunbeom So Korea University, Hakjoo Oh Korea University
Media Attached
12:15
15m
Talk
Automatically Resolving Dependency-Conflict Building Failures via Behavior-Consistent Loosening of Library Version Constraints
Research Papers
Huiyan Wang Nanjing University, Shuguan Liu Nanjing University, Lingyu Zhang Nanjing University, Chang Xu Nanjing University
Media Attached
12:30 - 14:00
14:00 - 15:30
Empirical Studies IIdeas, Visions and Reflections / Research Papers / Industry Papers / Journal First at Golden Gate A
Chair(s): Cristian Cadar Imperial College London
14:00
15m
Talk
[Remote] Assess and Summarize: Improve Outage Understanding with Large Language Models
Industry Papers
Pengxiang Jin Nankai University, Shenglin Zhang Nankai University, Minghua Ma Microsoft Research, Haozhe Li Peking University, Yu Kang Microsoft Research, Liqun Li Microsoft Research, Yudong Liu Microsoft Research, Bo Qiao Microsoft Research, Chaoyun Zhang Microsoft, Pu Zhao Microsoft Research, Shilin He Microsoft Research, Federica Sarro University College London, Yingnong Dang Microsoft Azure, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research
DOI Media Attached
14:15
15m
Talk
Open Source License Inconsistencies on GitHub
Journal First
Thomas Wolter Friedrich-Alexander University Erlangen-Nuernberg, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Dirk Riehle U of Erlangen, Nikolay Harutyunyan Friedrich-Alexander University Erlangen-Nuremberg, Germany
Media Attached
14:30
15m
Talk
On the Relationship Between Code Verifiability and Understandability
Research Papers
Kobi Feldman College of William & Mary, Martin Kellogg New Jersey Institute of Technology, Oscar Chaparro William & Mary
Media Attached
14:45
15m
Talk
Lessons from the Long Tail: Analysing Unsafe Dependency Updates across Software Ecosystems
Ideas, Visions and Reflections
Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne, Kenichi Matsumoto Nara Institute of Science and Technology
Media Attached
15:00
15m
Talk
Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study
Research Papers
Xiaokai Wei AWS AI Labs, Sujan Kumar Gonugondla AWS AI Labs, Shiqi Wang AWS AI Labs, Wasi Ahmad AWS AI Labs, Baishakhi Ray Columbia University, Haifeng Qian AWS AI Labs, Xiaopeng LI AWS AI Labs, Varun Kumar AWS AI Labs, Zijian Wang AWS AI Labs, Yuchen Tian AWS, Qing Sun AWS AI Labs, Ben Athiwaratkun AWS AI Labs, Mingyue Shang AWS AI Labs, Murali Krishna Ramanathan AWS AI Labs, Parminder Bhatia AWS AI Labs, Bing Xiang AWS AI Labs
Media Attached
15:15
15m
Talk
Understanding Hackers’ Work: An Empirical Study of Offensive Security Practitioners
Industry Papers
Andreas Happe TU Wien, Jürgen Cito TU Wien
DOI Media Attached
14:00 - 15:30
14:00
15m
Talk
Statfier: Automated Testing of Static Analyzers via Semantic-preserving Program Transformations
Research Papers
Huaien Zhang Southern University of Science and Technology, The Hong Kong Polytechnic University, Yu Pei Hong Kong Polytechnic University, Junjie Chen Tianjin University, Shin Hwei Tan Concordia University
Media Attached
14:15
15m
Talk
Towards Efficient Record and Replay: A Case Study in WeChat
Industry Papers
Sidong Feng Monash University, Haochuan Lu Tencent, Ting Xiong Tencent Inc., Yuetang Deng Tencent Inc., Chunyang Chen Monash University
DOI Media Attached
14:30
15m
Talk
Contextual Predictive Mutation Testing
Research Papers
Kush Jain Carnegie Mellon University, Uri Alon Carnegie Mellon University, Alex Groce Northern Arizona University, Claire Le Goues Carnegie Mellon University
Media Attached
14:45
15m
Talk
Towards Automated Software Security Testing: Augmenting Penetration Testing through LLMs
Ideas, Visions and Reflections
Andreas Happe TU Wien, Jürgen Cito TU Wien
Media Attached
15:00
7m
Talk
LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android Fragmentation
Demonstrations
Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Yonghui Liu Monash University, John Grundy Monash University, Li Li Beihang University
Media Attached
15:08
7m
Talk
Rotten Green Tests in Google Test
Industry Papers
DOI Media Attached
15:15
15m
Talk
MuAkka: Mutation Testing for Actor Concurrency in Akka Using Real-World Bugs
Research Papers
Mohsen Moradi Moghadam Oakland University, Mehdi Bagherzadeh Oakland University, Raffi Khatchadourian City University of New York (CUNY) Hunter College, Hamid Bagheri University of Nebraska-Lincoln
Pre-print Media Attached
14:00 - 15:30
Software Evolution IIndustry Papers / Research Papers / Demonstrations at Golden Gate C2
Chair(s): Rangeet Pan IBM Research
14:00
15m
Talk
Understanding Solidity Event Logging Practices in the Wild
Research Papers
Lantian Li Shandong University, Yejian Liang Shandong University, Zhihao Liu Shandong University, Zhongxing Yu Shandong University
Media Attached
14:15
15m
Talk
Last Diff Analyzer: Multi-language Automated Approver for Behavior-Preserving Code Revisions
Industry Papers
Yuxin Wang Uber Technologies, Adam Welc Mysten Labs, Lazaro Clapp Uber Technologies Inc, Lingchao Chen Uber Technologies
DOI Media Attached
14:30
15m
Talk
EvaCRC: Evaluating Code Review Comments
Research Papers
Lanxin Yang Nanjing University, Jinwei Xu Nanjing University, YiFan Zhang Nanjing University, He Zhang Nanjing University, Alberto Bacchelli University of Zurich
Media Attached
14:45
15m
Talk
HyperDiff: Computing Source Code Diffs at Scale
Research Papers
Quentin Le-dilavrec Univ. Rennes, IRISA, INRIA, Djamel Eddine Khelladi CNRS, IRISA, University of Rennes, Arnaud Blouin Univ Rennes, INSA Rennes, Inria, CNRS, IRISA, Jean-Marc Jézéquel Univ Rennes - IRISA
Media Attached
15:00
7m
Talk
npm-follower: A Complete Dataset Tracking the NPM Ecosystem
Demonstrations
Donald Pinckney Northeastern University, Federico Cassano Northeastern University, Arjun Guha Northeastern University and Roblox, Jonathan Bell Northeastern University
Media Attached
15:08
7m
Talk
Issue Report Validation in an Industrial Context
Industry Papers
Ethem Utku Aktas Softtech Inc., Ebru Cakmak Microsoft EMEA, Mete Cihad Inan Softtech Research and Development, Cemal Yilmaz Sabancı University
DOI Media Attached
15:15
15m
Talk
Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated Data
Industry Papers
DOI
14:00 - 15:30
Program Analysis IResearch Papers / Demonstrations / Industry Papers at Golden Gate C3
Chair(s): Michael Pradel University of Stuttgart
14:00
15m
Talk
An Automated Approach to Extracting Local Variables
Research Papers
Xiaye Chi Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Weixiao Wang Beijing Institute of Technology, Yunni Xia Chongqing University, Yanjie Jiang Peking University, Yuxia Zhang Beijing Institute of Technology, Weixing Ji Beijing Institute of Technology
Media Attached
14:15
15m
Talk
Incrementalizing Production CodeQL Analyses
Industry Papers
Tamás Szabó GitHub Next
DOI Media Attached
14:30
15m
Talk
Statistical Reachability Analysis
Research Papers
Seongmin Lee Max Planck Institute for Security and Privacy (MPI-SP), Marcel Böhme Max Planck Institute for Security and Privacy
Media Attached
14:45
15m
Talk
PPR: Pairwise Program Reduction
Research Papers
Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yu Jiang Tsinghua University, Chengnian Sun University of Waterloo
Media Attached
15:00
15m
Talk
When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime Performance
Research Papers
Alan Romano University of Southern California, Weihang Wang University of Southern California
Pre-print Media Attached
15:15
7m
Talk
Ad Hoc Syntax-Guided Program Reduction
Demonstrations
Jia Le Tian University of Waterloo, Mengxiao Zhang University of Waterloo, Zhenyang Xu University of Waterloo, Yongqiang Tian The Hong Kong University of Science and Technology; University of Waterloo, Yiwen Dong , Chengnian Sun University of Waterloo
Media Attached
15:30 - 16:00
Coffee/tea BreakSocial / Plenary Events at Golden Gate B
16:00 - 18:00
Code Search and Text to CodeResearch Papers / Industry Papers / Journal First / Demonstrations at Golden Gate A
Chair(s): Miryung Kim University of California at Los Angeles, USA
16:00
15m
Talk
[Remote] Self-Supervised Query Reformulation for Code Search
Research Papers
Yuetian Mao Shanghai Jiao Tong University, Chengcheng Wan East China Normal University, Yuze Jiang Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University
Media Attached
16:15
15m
Talk
[Remote] Natural Language to Code: How Far are We?
Research Papers
Shangwen Wang National University of Defense Technology, Mingyang Geng National University of Defense Technology, Bo Lin National University of Defense Technology, Zhensu Sun Singapore Management University, Ming Wen Huazhong University of Science and Technology, Yepang Liu Southern University of Science and Technology, Li Li Beihang University, Tegawendé F. Bissyandé University of Luxembourg, Xiaoguang Mao National University of Defense Technology
DOI Pre-print Media Attached
16:30
15m
Talk
[Remote] xASTNN: Improved Code Representations for Industrial Practice
Industry Papers
Zhiwei Xu Tsinghua University, Min Zhou Tsinghua University, Xibin Zhao Tsinghua University, Yang Chen Huazhong University of Science and Technology, Xi Cheng VMware, Hongyu Zhang Chongqing University
DOI Media Attached
16:45
7m
Talk
[Remote] On the Dual Nature of Necessity in Use of Rust Unsafe Code
Industry Papers
Yuchen Zhang New York University, USA, Ashish Kundu Cisco Research, Georgios Portokalidis Stevens Institute of Technology, Jun Xu The University of Utah
DOI Media Attached
16:53
7m
Talk
On Using Information Retrieval to Recommend Machine Learning Good Practices for Software Engineers
Demonstrations
Laura Cabra-Acela Universidad de Los Andes, Anamaria Mojica-Hanke University of Passau, Universidad de Los Andes, Mario Linares-Vásquez Universidad de los Andes, Steffen Herbold University of Passau
Media Attached
17:00
15m
Talk
MultiPL-E: A Scalable and Polyglot Approach to Benchmarking Neural Code Generation
Journal First
Federico Cassano Northeastern University, John Gouwar Northeastern University, Daniel Nguyen Hannover High School, Sydney Nguyen Wellesley College, Luna Phipps-Costin Northeastern University, Donald Pinckney Northeastern University, Ming-Ho Yee Northeastern University, Yangtian Zi Northeastern University, Carolyn Jane Anderson Wellesley College, Molly Q Feldman Oberlin College, Arjun Guha Northeastern University and Roblox, Michael Greenberg Stevens Institute of Technology, Abhinav Jangda Microsoft Research
Link to publication Media Attached
17:15
15m
Talk
NCQ: Code reuse support for Node.js developers
Journal First
Brittany Reid The University of Adelaide, Marcelo d'Amorim North Carolina State University, Markus Wagner Monash University, Australia, Christoph Treude University of Melbourne
Link to publication DOI Pre-print Media Attached
17:30
15m
Talk
Efficient Text-to-Code Retrieval with Cascaded Fast and Slow Transformer Models
Research Papers
Akhilesh Deepak Gotmare Salesforce Research, Junnan Li Salesforce Research, Shafiq Joty Salesforce Research, Steven C.H. Hoi Salesforce Research Asia
Media Attached
17:45
15m
Talk
PEM: Representing Binary Program Semantics for Similarity Analysis via A Probabilistic Execution Model
Research Papers
Xiangzhe Xu Purdue University, Zhou Xuan , Shiwei Feng Purdue University, Siyuan Cheng Purdue University, Yapeng Ye Purdue University, Qingkai Shi The Hong Kong University of Science and Technology, Guanhong Tao Purdue University, Le Yu , Zhuo Zhang Purdue University, Xiangyu Zhang Purdue University
Media Attached
16:00 - 18:00
Log Analysis and DebuggingIndustry Papers / Research Papers at Golden Gate C1
Chair(s): Yiming Tang Rochester Institute of Technology
16:00
15m
Talk
[Remote] STEAM: Observability-Preserving Trace Sampling
Industry Papers
Shilin He Microsoft Research, Botao Feng Microsoft, Liqun Li Microsoft Research, Xu Zhang Microsoft Research, Yu Kang Microsoft Research, Qingwei Lin Microsoft, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research
DOI Media Attached
16:15
15m
Talk
[Remote] Demystifying Dependency Bugs in Deep Learning Stack
Research Papers
Kaifeng Huang Fudan University, Bihuan Chen Fudan University, Susheng Wu Fudan University, Junming Cao Fudan University, Lei Ma The University of Tokyo / University of Alberta, Xin Peng Fudan University
Media Attached
16:30
15m
Talk
From Point-wise to Group-wise: A Fast and Accurate Microservice Trace Anomaly Detection Approach
Industry Papers
Zhe Xie Tsinghua University, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Wanxue Li eBay, USA, Huai Jiang eBay, USA, Liangfei Su eBay, USA, Jianhui Li Computer Network Information Center at Chinese Academy of Sciences, Gaogang Xie Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University
DOI Media Attached
16:45
15m
Talk
Semantic Debugging
Research Papers
Martin Eberlein Humboldt University of Berlin, Marius Smytzek CISPA Helmholtz Center for Information Security, Dominic Steinhöfel CISPA Helmholtz Center for Information Security, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security
Media Attached
17:00
7m
Talk
Analyzing Microservice Connectivity with Kubesonde
Industry Papers
Jacopo Bufalino Aalto University, Mario Di Francesco Eficode; Aalto University, Tuomas Aura Aalto University
DOI Media Attached
17:08
15m
Talk
[Remote] Hue: A User-Adaptive Parser for Hybrid Logs
Research Papers
Junjielong Xu Chinese University of Hong Kong, Shenzhen, Qiuai Fu Huawei Cloud Computing Technologies CO., LTD., Zhouruixing Zhu Chinese University of Hong Kong, Shenzhen, Yutong Cheng Chinese University of Hong Kong, Shenzhen, zhijing li , Yuchi Ma Huawei Cloud Computing Technologies CO., LTD., Pinjia He The Chinese University of Hong Kong, Shenzhen
Media Attached
17:23
15m
Talk
[Remote] Log Parsing with Generalization Ability under New Log Types
Research Papers
Siyu Yu Guangxi University, Yifan Wu Peking University, Zhijing Li The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen, Ningjiang Chen Guangxi University, Changjian Liu Guangxi University
Media Attached
16:00 - 18:00
Machine Learning IIResearch Papers / Ideas, Visions and Reflections at Golden Gate C2
Chair(s): Iftekhar Ahmed University of California at Irvine
16:00
15m
Talk
[Remote] Compatibility Issues in Deep Learning Systems: Problems and Opportunities
Research Papers
Jun Wang Nanjing University of Aeronautics and Astronautics, Nanjing, China, Guanping Xiao Nanjing University of Aeronautics and Astronautics, China, Shuai Zhang Nanjing University of Aeronautics and Astronautics, China, Huashan Lei Nanjing University of Aeronautics and Astronautics, China, Yepang Liu Southern University of Science and Technology, Yulei Sui University of New South Wales, Australia
DOI Pre-print Media Attached
16:15
15m
Talk
[Remote] An Extensive Study on Adversarial Attack against Pre-trained Models of Code
Research Papers
Xiaohu Du Huazhong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Zichao Wei Huazhong University of Science and Technology, Shangwen Wang National University of Defense Technology, Hai Jin Huazhong University of Science and Technology
Media Attached
16:30
15m
Talk
Can Machine Learning Pipelines Be Better Configured?
Research Papers
Yibo Wang Northeastern University, Ying Wang Northeastern University, Tingwei Zhang Northeastern University, Yue Yu National University of Defense Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hai Yu Software College, Northeastern University, Zhiliang Zhu Software College, Northeastern University
Media Attached
16:45
15m
Talk
Towards Feature-Based Analysis of the Machine Learning Development Lifecycle
Ideas, Visions and Reflections
Boyue Caroline Hu University of Toronto, Marsha Chechik University of Toronto
Media Attached
17:00
15m
Talk
Fix Fairness, Don’t Ruin Accuracy: Performance Aware Fairness Repair using AutoML
Research Papers
Giang Nguyen Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Hridesh Rajan Dept. of Computer Science, Iowa State University
Pre-print Media Attached
17:15
15m
Talk
BiasAsker: Measuring the Bias in Conversational AI System
Research Papers
Yuxuan Wan The Chinese University of Hong Kong, Wenxuan Wang Chinese University of Hong Kong, Pinjia He The Chinese University of Hong Kong, Shenzhen, Jiazhen Gu Chinese University of Hong Kong, Haonan Bai The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
Media Attached
17:30
15m
Talk
Pitfalls in Experiments with DNN4SE: An Analysis of the State of the Practice
Research Papers
Sira Vegas Universidad Politecnica de Madrid, Sebastian Elbaum University of Virginia
Media Attached
17:45
15m
Talk
DecompoVision: Reliability Analysis of Machine Vision Components Through Decomposition and Reuse
Research Papers
Boyue Caroline Hu University of Toronto, Lina Marsso University of Toronto, Nikita Dvornik Waabi, Huakun Shen University of Toronto, Marsha Chechik University of Toronto
Media Attached
16:00 - 18:00
Fault Diagnosis and Root Cause Analysis IResearch Papers / Journal First / Industry Papers at Golden Gate C3
Chair(s): Akond Rahman Auburn University
16:00
15m
Talk
[Remote] Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-Modal Observability Data
Research Papers
Guangba  Yu Sun Yat-Sen University, Pengfei Chen Sun Yat-Sen University, Yufeng Li Sun Yat-sen University, Hongyang Chen School of Computer Science and Engineering, Sun Yat-sen University, Xiaoyun Li Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
Pre-print
16:15
15m
Full-paper
[Remote] DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems
Research Papers
Zhiming Chen Sun Yat-sen University, Pengfei Chen Sun Yat-Sen University, Guangba  Yu Sun Yat-Sen University, Zilong He Sun Yat-Sen University, Genting Mai Sun Yat-sen University, Peipei Wang ByteDance Infrastructure System Lab
Pre-print Media Attached
16:30
15m
Talk
[Remote] Pre-training Code Representation with Semantic Flow Graph for Effective Bug Localization
Research Papers
Yali Du Shandong University, Zhongxing Yu Shandong University
Media Attached
16:45
15m
Talk
[Remote] A Practical Human Labeling Method for Online Just-in-Time Software Defect Prediction
Research Papers
Liyan Song Southern University of Science and Technology, China, Leandro Minku University of Birmingham, Cong Teng Southern University of Science and Technology, Xin Yao Southern University of Science and Technology
Pre-print Media Attached
17:00
15m
Talk
Trace Diagnostics for Signal-Based Temporal Properties
Journal First
Chaima Boufaied University of Ottawa, Claudio Menghi University of Bergamo; McMaster University, Domenico Bianculli University of Luxembourg, Lionel Briand University of Ottawa, Canada / University of Luxembourg, Luxembourg
Media Attached
17:15
15m
Talk
TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice Systems
Industry Papers
Ruomeng Ding Microsoft, Chaoyun Zhang Microsoft, Lu Wang Microsoft Research, Yong Xu Microsoft Research, Minghua Ma Microsoft Research, Xiaomin Wu Microsoft, Meng Zhang , Qingjun Chen Microsoft 365, Xin Gao Microsoft 365, Xuedong Gao Microsoft 365, Hao Fan , Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research
DOI Media Attached
17:30
15m
Talk
Triggering Modes in Spectrum-Based Multi-location Fault Localization
Industry Papers
Tung Dao Cvent, Na Meng Virginia Tech, ThanhVu Nguyen George Mason University
DOI Media Attached
17:45
15m
Talk
Automata-based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android
Research Papers
Enze Ma East China Normal University, Shan Huang East China Normal University, weigang he East China Normal University, Ting Su East China Normal University, Jue Wang Nanjing University, Huiyu Liu East China Normal University, Geguang Pu East China Normal University, Zhendong Su ETH Zurich
Media Attached

Wed 6 Dec

Displayed time zone: Pacific Time (US & Canada) change

10:30 - 11:00
Coffee/tea BreakSocial / Plenary Events at Golden Gate B
11:00 - 12:30
Human Aspects IIIdeas, Visions and Reflections / Research Papers / Journal First at Golden Gate A
Chair(s): Raula Gaikovina Kula Nara Institute of Science and Technology
11:00
15m
Talk
[Remote] Towards Automated Detection of Unethical Behavior in Open-source Software Projects
Research Papers
Hsu Myat Win Southern University of Science and Technology, Haibo Wang Southern University of Science and Technology, Shin Hwei Tan Concordia University
Media Attached
11:15
15m
Talk
Flow experience in software engineering
Research Papers
Saima Ritonummi University of Jyväskylä, Valtteri Siitonen University of Jyväskylä, Markus Salo University of Jyväskylä, Henri Pirkkalainen Tampere University, Anu Sivunen University of Jyväskylä
DOI Media Attached
11:30
15m
Talk
Exploring Moral Principles Exhibited in OSS: A Case Study on GitHub Heated Issues
Ideas, Visions and Reflections
Ramtin Ehsani Drexel University, Rezvaneh Rezapour Drexel University, Preetha Chatterjee Drexel University, USA
Pre-print Media Attached
11:45
15m
Talk
Towards Understanding Emotions in Informal Developer Interactions: A Gitter Chat Study
Ideas, Visions and Reflections
Amirali Sajadi , Kostadin Damevski Virginia Commonwealth University, Preetha Chatterjee Drexel University, USA
Pre-print Media Attached
12:00
15m
Talk
Building and Sustaining Ethnically, Racially, and Gender Diverse Software Engineering Teams: A Study at Google
Research Papers
Ella Dagan Google, Anita Sarma Oregon State University, Alison Chang Google, Sarah D'Angelo Google, Jillian Dicker Google, Emerson Murphy-Hill Google
Pre-print Media Attached
12:15
15m
Talk
Code Reviews in Open Source Projects : How Do Gender Biases Affect Participation and Outcomes?
Journal First
Sayma Sultana Wayne State University, Asif Kamal Turzo Wayne State University, Amiangshu Bosu Wayne State University
Link to publication DOI Pre-print Media Attached
11:00 - 12:30
Testing IIIIndustry Papers / Demonstrations / Research Papers at Golden Gate C1
Chair(s): Tianyi Zhang Purdue University
11:00
15m
Talk
[Remote] Heterogeneous Testing for Coverage Profilers Empowered with Debugging Support
Research Papers
Yibiao Yang State Key Laboratory for Novel Software Technology, Nanjing University, Maolin Sun Nanjing University, Yang Wang National Key Laboratory for Novel Software Technology, Nanjing University, Qingyang Li National Key Laboratory for Novel Software Technology, Nanjing University, Ming Wen Huazhong University of Science and Technology, Yuming Zhou Nanjing University
Pre-print Media Attached
11:15
7m
Talk
[Remote] Testing Real-World Healthcare IoT Application: Experiences and Lessons Learned
Industry Papers
Hassan Sartaj Simula Research Laboratory, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Kjetil Moberg Norwegian Health Authority
DOI Pre-print Media Attached
11:23
7m
Talk
Helion: Enabling Natural Testing of Smart Homes
Demonstrations
Prianka Mandal William & Mary, Sunil Manandhar IBM T.J. Watson Research Center, Kaushal Kafle College of William & Mary, Kevin Moran University of Central Florida, Denys Poshyvanyk William & Mary, Adwait Nadkarni William & Mary
Media Attached
11:30
15m
Talk
NeuRI: Diversifying DNN Generation via Inductive Rule Inference
Research Papers
Jiawei Liu University of Illinois at Urbana-Champaign, Jinjun Peng Columbia University, Yuyao Wang Nanjing University, Lingming Zhang University of Illinois at Urbana-Champaign
Pre-print Media Attached
11:45
15m
Talk
Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget Perception
Industry Papers
Yongxiang Hu Fudan University, China, Jiazhen Gu Fudan University, China, Shuqing Hu Fudan University, Yu Zhang Meituan, Wenjie Tian Meituan, Shiyu Guo Meituan, Chaoyi Chen Meituan, Yangfan Zhou Fudan University
DOI Media Attached
12:00
15m
Talk
MuRS: Mutant Ranking and Suppression using Identifier Templates
Industry Papers
Zimin Chen KTH Royal Institute of Technology, Malgorzata Salawa Google, Manushree Vijayvergiya Google, Goran Petrović Google Inc, Marko Ivanković Google; Universität Passau, René Just University of Washington
DOI Media Attached
12:15
15m
Talk
Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer
Research Papers
Shubham Agarwal Adobe Research, Sarthak Chakraborty Adobe Research, Shaddy Garg Adobe Research, Sumit Bisht Amazon, Chahat Jain Traceable.ai, Ashritha Gonuguntla Cisco, Shiv Saini Adobe Research
Media Attached
11:00 - 12:30
Software Evolution IIIndustry Papers / Research Papers / Journal First at Golden Gate C2
Chair(s): Csaba Nagy Software Institute - USI, Lugano
11:00
15m
Talk
Multilingual Code Co-Evolution Using Large Language Models
Research Papers
Jiyang Zhang University of Texas at Austin, Pengyu Nie University of Waterloo, Junyi Jessy Li University of Texas at Austin, USA, Milos Gligoric University of Texas at Austin
Media Attached
11:15
15m
Talk
A Characterization Study of Merge Conflicts in Java Projects
Journal First
Bowen Shen Virginia Tech, Muhammad Ali Gulzar Virginia Tech, USA, Fei He Tsinghua University, Na Meng Virginia Tech
Media Attached
11:30
15m
Talk
Modeling the Centrality of Developer Output with Software Supply Chains
Industry Papers
Audris Mockus The University of Tennessee, Peter C Rigby Meta; Concordia University, Rui Abreu Meta, Parth Suresh Meta Platforms, Inc., Yifen Chen Meta Inc, Nachiappan Nagappan Meta
DOI Pre-print Media Attached
11:45
15m
Talk
Knowledge-based Version Incompatibility Detection for Deep Learning
Research Papers
Zhongkai Zhao Tongji University, Bonan Kou Purdue University, Mohamed Yilmaz Ibrahim Purdue University, Muhao Chen University of Southern California, Tianyi Zhang Purdue University
Media Attached
12:00
15m
Talk
On-Premise AIOps Infrastructure for a Software Editor SME: An Experience Report
Industry Papers
Anes Bendimerad Infologic, Youcef REMIL INSA Lyon, INFOLOGIC, Romain Mathonat Infologic, Mehdi Kaytoue Infologic
DOI Media Attached
11:00 - 12:30
Program Analysis IIResearch Papers / Journal First at Golden Gate C3
Chair(s): Nico Rosner Amazon Web Services
11:00
15m
Talk
[Remote] OOM-Guard: Towards Improving The Ergonomics of Rust OOM Handling via A Reservation-based Approach
Research Papers
Chengjun Chen Fudan University; Ant Group, Zhicong Zhang Fudan University, Hongliang Tian Ant Group, Shoumeng Yan Ant Group, Hui Xu Fudan University
Media Attached
11:15
15m
Talk
[Remote] DeepInfer: Deep Type Inference from Smart Contract Bytecode
Research Papers
Kunsong Zhao The Hong Kong Polytechnic University, Zihao Li The Hong Kong Polytechnic Universituy, Jianfeng Li Xi’an Jiaotong University, He Ye KTH Royal Institute of Technology, Xiapu Luo Hong Kong Polytechnic University, Ting Chen University of Electronic Science and Technology of China
Media Attached
11:30
15m
Talk
Statistical Type Inference for Incomplete Programs
Research Papers
Yaohui Peng School of Computer Science, Wuhan University, Jing Xie School of Computer Science, Wuhan University, Qiongling Yang School of Computer Science, Wuhan University, Hanwen Guo School of Computer Science, Wuhan University, Qingan Li School of Computer Science, Wuhan University, Jingling Xue School of Computer Science and Engineering, UNSW Sydney, YUAN Mengting School of Computer Science, Wuhan University, Wuhan, China
Media Attached
11:45
15m
Talk
Demystifying Hidden Sensitive Operations in Android apps
Journal First
Xiaoyu Sun Australian National University, Australia, Xiao Chen Monash University, Li Li Beihang University, Haipeng Cai Washington State University, John Grundy Monash University, Jordan Samhi University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Jacques Klein University of Luxembourg
Media Attached
12:00
15m
Talk
DeMinify: Neural Variable Name Recovery and Type Inference
Research Papers
Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas
Media Attached
12:30 - 14:00
14:00 - 15:30
Clone and Similarity DetectionResearch Papers / Industry Papers at Golden Gate A
Chair(s): Denys Poshyvanyk William & Mary
14:00
15m
Talk
AdaptivePaste: Intelligent Copy-Paste in IDE
Industry Papers
Xiaoyu Liu Microsoft Corporation, Jinu Jang Microsoft, Neel Sundaresan Microsoft, Miltiadis Allamanis Google DeepMind, Alexey Svyatkovskiy Microsoft
DOI Media Attached
14:15
15m
Talk
Scalable Program Clone Search Through Spectral Analysis
Research Papers
Tristan Benoit Université de Lorraine, CNRS, LORIA, Jean-Yves Marion LORIA, Université de Lorraine, Sébastien Bardin CEA, Université Paris Saclay
DOI Pre-print Media Attached
14:30
15m
Talk
[Remote] Tritor: Detecting Semantic Code Clones by Building Social Network-based Triads Model
Research Papers
Deqing Zou Huazhong University of Science and Technology, Siyue Feng Huazhong University of Science and Technology, Yueming Wu Nanyang Technological University, Wenqi Suo Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Media Attached
14:45
15m
Talk
[Remote] C³: Code Clone-Based Identification of Duplicated Components
Industry Papers
Yanming Yang Zhejiang University, Ying Zou Queen's University, Kingston, Ontario, Xing Hu Zhejiang University, David Lo School of Computing and Information Systems, Singapore Management University, Chao Ni School of Software Technology, Zhejiang University, John Grundy Monash University, Xin Xia Huawei Technologies
DOI Media Attached
15:00
15m
Talk
[Remote] Demystifying the Composition and Code Reuse in Solidity Smart Contracts
Research Papers
Kairan Sun Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Kaixuan Li East China Normal University, Yang Liu Nanyang Technological University
Pre-print Media Attached
15:15
15m
Talk
[Remote] Gitor: Scalable Code Clone Detection by Building Global Sample Graph
Research Papers
Junjie shan Westlake University, Shihan Dou Fudan University, Yueming Wu Nanyang Technological University, Hairu wu Fudan University, Yang Liu Nanyang Technological University
Media Attached
14:00 - 15:30
PerformanceResearch Papers / Industry Papers / Journal First at Golden Gate C1
Chair(s): Aitor Arrieta Mondragon University
14:00
15m
Talk
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing
Research Papers
Min-Yih Hsu University of California, Irvine, Felicitas Hetzelt University of California, Irvine, David Gens University of California, Irvine, Michael Maitland SiFive, Michael Franz University of California, Irvine
Media Attached
14:15
15m
Talk
Towards effective assessment of steady state performance in Java software: Are we there yet?
Journal First
Luca Traini University of L'Aquila, Vittorio Cortellessa Università dell'Aquila, Italy, Daniele Di Pompeo University of L'Aquila, Michele Tucci University of L'Aquila
Link to publication DOI Media Attached
14:30
15m
Talk
Adapting Performance Analytic Techniques in a Real-World Database-Centric System: An Industrial Experience Report
Industry Papers
Lizhi Liao University of Waterloo, Heng Li Polytechnique Montréal, Weiyi Shang University of Waterloo, Catalin Sporea ERA Environmental Management Solutions, Andrei Toma ERA Environmental Management Solutions, Sarah Sajedi ERA Environmental Management Solutions
DOI Media Attached
14:45
15m
Talk
IoPV: On Inconsistent Option Performance Variations
Research Papers
Jinfu Chen Jiangsu University, Zishuo Ding University of Waterloo, Yiming Tang Rochester Institute of Technology, Mohammed Sayagh ETS Montreal, University of Quebec, Heng Li Polytechnique Montréal, Bram Adams Queen's University, Kingston, Ontario, Weiyi Shang University of Waterloo
Pre-print Media Attached
15:00
15m
Talk
Predicting Software Performance with Divide-and-Learn
Research Papers
Jingzhi Gong Loughborough University, Tao Chen University of Birmingham
Pre-print Media Attached
15:15
15m
Talk
[Remote] Discovering Parallelisms in Python Programs
Research Papers
Siwei Wei State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China, Guyang Song AntGroup, Senlin Zhu AntGroup, Ruoyi Ruan AntGroup, Shihao Zhu State Key Laboratory of Computer Science,Institute of Software,Chinese Academy of Sciences,China, Yan Cai State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China
Media Attached
14:00 - 15:30
Machine Learning IIIDemonstrations / Industry Papers / Research Papers at Golden Gate C2
Chair(s): Rangeet Pan IBM Research
14:00
15m
Talk
Benchmarking Robustness of AI-enabled Multi-sensor Fusion Systems: Challenges and Opportunities
Research Papers
Xinyu Gao , Zhijie Wang University of Alberta, Yang Feng Nanjing University, Lei Ma The University of Tokyo / University of Alberta, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University
Media Attached
14:15
7m
Talk
A Language Model of Java Methods with Train/Test Deduplication
Demonstrations
Chia-Yi Su University of Notre Dame, Aakash Bansal University of Notre Dame, Vijayanta Jain University of Maine, Sepideh Ghanavati University of Maine , Collin McMillan University of Notre Dame
Media Attached
14:23
7m
Talk
DENT - A Tool for Tagging Stack Overflow Posts With Deep Learning Energy Patterns
Demonstrations
Shriram Shanbhag Indian Institute of Technology Tirupati, Sridhar Chimalakonda Indian Institute of Technology Tirupati, Vibhu Saujanya Sharma Accenture Labs, India, Vikrant Kaulgud Accenture Labs, India
Media Attached
14:30
15m
Talk
Automated Testing and Improvement of Named Entity Recognition Systems
Research Papers
BoXi Yu The Chinese University of Hong Kong, Shenzhen, Yiyan Hu The Chinese University of Hong Kong, Shenzhen, Qiuyang Mang The Chinese University of Hong Kong, Shenzhen, Wenhan Hu The Chinese University of Hong Kong, Shenzhen, Pinjia He The Chinese University of Hong Kong, Shenzhen
Pre-print Media Attached
14:45
15m
Talk
KDDT: Knowledge Distillation-Empowered Digital Twin for Anomaly Detection
Industry Papers
Xu Qinghua Simula Research Laboratory; University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Zaimovic Nedim Alstom Rail, Inderjeet Singh Alstom
DOI Media Attached
15:00
15m
Talk
Deep Learning Based Feature Envy Detection Boosted by Real-World Examples
Research Papers
Bo Liu Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Guangjie Li National Innovation Institute of Defense Technology, Nan Niu University of Cincinnati, Zimao Xu Beijing Institute of Technology, Yifan Wang Huawei Cloud, Yunni Xia Chongqing University, Yuxia Zhang Beijing Institute of Technology, Yanjie Jiang Peking University
DOI Pre-print Media Attached
15:15
15m
Talk
[Remote] The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code Classification
Research Papers
Anastasiia Grishina Simula Research Laboratory, Max Hort Simula Research Laboratory, Leon Moonen Simula Research Laboratory and BI Norwegian Business School
Pre-print Media Attached
14:00 - 15:30
Security IResearch Papers / Demonstrations / Journal First at Golden Gate C3
Chair(s): Abhik Roychoudhury National University of Singapore
14:00
15m
Talk
Can the configuration of static analyses make resolving security vulnerabilities more effective? - A user study
Journal First
Goran Piskachev Amazon Web Services, Matthias Becker Fraunhofer IEM, Eric Bodden University of Paderborn
Media Attached
14:15
15m
Talk
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects
Research Papers
Lida Zhao Singapore Management University, Singapore, Sen Chen College of Intelligence and Computing, Tianjin University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Lyuye Zhang Nanyang Technological University, Wu Jiahui Nanyang Technological University, Jun Sun Singapore Management University, Yang Liu Nanyang Technological University
Media Attached
14:30
15m
Talk
Input-driven Dynamic Program Debloating for Code-reuse Attack Mitigation
Research Papers
Xiaoke Wang Wuhan University, Tao Hui Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Lei Zhao Key Laboratory of Aerospace Information Security and Trusted Computing, Ministry of Education, School of Cyber Science and Engineering, Wuhan University, Yueqiang Cheng NIO
DOI Pre-print Media Attached
14:45
7m
Talk
MASC: A Tool for Mutation-based Evaluation of Static Crypto-API Misuse Detectors
Demonstrations
Amit Seal Ami William & Mary, Syed Yusuf Ahmed University of Dhaka, Radowan Mahmud Redoy University of Dhaka, Nathan Cooper William & Mary, Kaushal Kafle College of William & Mary, Kevin Moran University of Central Florida, Denys Poshyvanyk William & Mary, Adwait Nadkarni William & Mary
Media Attached
14:53
7m
Talk
[Remote] llvm2CryptoLine: Verifying Arithmetic in Cryptographic C Programs
Demonstrations
Ruiling Chen Shenzhen University, Jiaxiang Liu Shenzhen University, Xiaomu Shi Institute of Software, Chinese Academy of Sciences, Ming-Hsien Tsai National Institute of Cyber Security, Bow-Yaw Wang , Bo-Yin Yang Academia Sinica
Media Attached
15:00
15m
Talk
[Remote] Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
Research Papers
Kaixuan Li East China Normal University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Ruitao Feng University of New South Wales, Han Liu East China Normal University, Chengwei Liu Nanyang Technological University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University
Pre-print Media Attached
15:15
15m
Talk
[Remote] TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts
Research Papers
Chenyang Ma Nanjing University of Science and Technology, Wei Song Nanjing University of Science and Technology, Jeff Huang Texas A&M University
DOI Pre-print Media Attached
15:30 - 16:00
Coffee/tea BreakSocial / Plenary Events at Golden Gate B
16:00 - 18:00
Fault Diagnosis and Root Cause Analysis IIIndustry Papers / Research Papers at Golden Gate A
Chair(s): Yun Lin Shanghai Jiao Tong University
16:00
15m
Talk
DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers
Research Papers
Xianglin Yang Shanghai Jiao Tong University; National University of Singapore, Yun Lin Shanghai Jiao Tong University, Yifan Zhang National University of Singapore, Linpeng Huang Shanghai Jiao Tong University, Jin Song Dong National University of Singapore, Hong Mei Peking University
Media Attached
16:15
15m
Talk
AG3: Automated Game GUI Text Glitch Detection Based on Computer Vision
Industry Papers
Xiaoyun Liang ByteDance, Jiayi Qi ByteDance, Yongqiang Gao ByteDance, Chao Peng ByteDance, China, Ping Yang Bytedance Network Technology
DOI Media Attached
16:30
15m
Talk
TransMap: Pinpointing Mistakes in Neural Code Translation
Research Papers
Bo Wang National University of Singapore, Ruishi Li National University of Singapore, Mingkai Li National University of Singapore, Prateek Saxena National University of Singapore
Media Attached
16:45
15m
Talk
Dynamic Prediction of Delays in Software Projects Using Delay Patterns and Bayesian Modeling
Research Papers
Elvan Kula Delft University of Technology, Eric Greuter ING, Arie van Deursen Delft University of Technology, Georgios Gousios Endor Labs & Delft University of Technology
Pre-print Media Attached
17:00
15m
Talk
Commit-level, Neural Vulnerability Detection and Assessment
Research Papers
Yi Li New Jersey Institute of Technology, Aashish Yadavally The University of Texas at Dallas, Jiaxing Zhang New Jersey Institute of Technology, Shaohua Wang Central University of Finance and Economics , Tien N. Nguyen University of Texas at Dallas
Media Attached
17:15
15m
Talk
[Remote] Mining Resource-Operation Knowledge to Support Resource Leak Detection
Research Papers
Chong Wang Nanyang Technological University, Yiling Lou Fudan University, Xin Peng Fudan University, Jianan Liu Fudan University, Baihan Zou Fudan University
Media Attached
17:30
15m
Talk
[Remote] Detection Is Better Than Cure: A Cloud Incidents Perspective
Industry Papers
Vaibhav Ganatra Microsoft, Anjaly Parayil Microsoft, Supriyo Ghosh Microsoft, Yu Kang Microsoft Research, Minghua Ma Microsoft Research, Chetan Bansal Microsoft Research, Suman Nath Microsoft Research, Jonathan Mace Microsoft
DOI Media Attached
17:45
7m
Talk
[Remote] Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365
Industry Papers
Fangkai Yang Microsoft Research, Wenjie Yin KTH Royal Institute of Technology, Lu Wang Microsoft Research, Tianci Li Microsoft, Pu Zhao Microsoft Research, Bo Liu Beijing Institute of Technology, Paul Wang Microsoft 365, Bo Qiao Microsoft Research, Yudong Liu Microsoft Research, Mårten Björkman KTH Royal Institute of Technology, Saravan Rajmohan Microsoft 365, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research
DOI Media Attached
16:00 - 18:00
FuzzingResearch Papers at Golden Gate C1
Chair(s): Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University
16:00
15m
Talk
Enhancing Coverage-guided Fuzzing via Phantom Program
Research Papers
Mingyuan Wu Southern University of Science and Technology and the University of Hong Kong, Kunqiu Chen Southern University of Science and Technology, Qi Luo Southern University of Science and Technology, Jiahong Xiang Southern University of Science and Technology, Ji Qi The University of Hong Kong, Junjie Chen Tianjin University, Heming Cui University of Hong Kong, Yuqun Zhang Southern University of Science and Technology
Media Attached
16:15
15m
Talk
Co-Dependence Aware Fuzzing for Dataflow-based Big Data Analytics
Research Papers
Ahmad Humayun Virginia Tech, Miryung Kim University of California at Los Angeles, USA, Muhammad Ali Gulzar Virginia Tech
Pre-print Media Attached
16:30
15m
Talk
SJFuzz: Seed & Mutator Scheduling for JVM Fuzzing
Research Papers
Mingyuan Wu Southern University of Science and Technology and the University of Hong Kong, Yicheng Ouyang University of Illinois at Urbana-Champaign, Minghai Lu Southern University of Science and Technology, Junjie Chen Tianjin University, Yingquan Zhao College of Intelligence and Computing, Tianjin University, Heming Cui University of Hong Kong, Guowei Yang University of Queensland, Yuqun Zhang Southern University of Science and Technology
Media Attached
16:45
15m
Talk
Metamong: Detecting Render-update Bugs in Web Browsers through Fuzzing
Research Papers
Suhwan Song Seoul National University, South Korea, Byoungyoung Lee Seoul National University, South Korea
Media Attached
17:00
15m
Talk
Property-based Fuzzing for Finding Data Manipulation Errors in Android Apps
Research Papers
Jingling Sun East China Normal University, Ting Su East China Normal University, Jiayi Jiang East China Normal University, Jue Wang Nanjing University, Geguang Pu East China Normal University, Zhendong Su ETH Zurich
Media Attached
17:15
15m
Talk
Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications
Research Papers
Jiyuan Wang University of California at Los Angeles, Qian Zhang University of California, Riverside, Hongbo Rong Intel Labs, Guoqing Harry Xu University of California at Los Angeles, Miryung Kim University of California at Los Angeles, USA
Pre-print Media Attached
17:30
15m
Talk
NaNofuzz: A Usable Tool for Automatic Test Generation
Research Papers
Matthew C. Davis Carnegie Mellon University, Sangheon Choi Rose-Hulman Institute of Technology, Sam Estep Carnegie Mellon University, Brad A. Myers Carnegie Mellon University, Joshua Sunshine Carnegie Mellon University
Link to publication DOI Media Attached
17:45
15m
Talk
[Remote] A Generative and Mutational Approach for Synthesizing Bug-exposing Test Cases to Guide Compiler Fuzzing
Research Papers
Guixin Ye Northwest University, Tianmin Hu Northwest University, Zhanyong Tang Northwest University, Zhenye Fan Northwest University, Shin Hwei Tan Concordia University, Bo Zhang Tencent Security Platform Department, Wenxiang Qian Tencent Security Platform Department, Zheng Wang University of Leeds, UK
Media Attached
16:00 - 18:00
16:00
15m
Talk
State Merging with Quantifiers in Symbolic Execution
Research Papers
David Trabish Tel Aviv University, Noam Rinetzky Tel Aviv University, Sharon Shoham Tel Aviv University, Vaibhav Sharma University of Minnesota
DOI Pre-print Media Attached
16:15
15m
Talk
Towards Strengthening Formal Specifications with Mutation Model Checking
Ideas, Visions and Reflections
Maxime Cordy SnT, University of Luxembourg, Sami Lazreg SnT, University of Luxembourg, Axel Legay Université Catholique de Louvain, Belgium, Pierre Yves Schobbens University of Namur
Media Attached
16:30
15m
Talk
PropProof: Free Model-Checking Harnesses from PBT
Industry Papers
Yoshiki Takashima Carnegie Mellon University
DOI Media Attached
16:45
15m
Talk
Engineering a Formally Verified Automated Bug Finder
Research Papers
Arthur Correnson CISPA Helmholtz Center for Information Security, Dominic Steinhöfel CISPA Helmholtz Center for Information Security
Media Attached
17:00
15m
Talk
LightF3: A Lightweight Fully-Process Formal Framework for Automated Verifying Railway Interlocking Systems
Industry Papers
Yibo Dong East China Normal University; Shanghai Trusted Industrial Control Platform, Xiaoyu Zhang East China Normal University, Yicong Xu East China Normal University, Chang Cai East China Normal University, Yu Chen East China Normal University, Weikai Miao East China Normal University, Jianwen Li East China Normal University, China, Geguang Pu East China Normal University
DOI Media Attached
17:15
15m
Talk
Speeding up SMT Solving via Compiler Optimization
Research Papers
Benjamin Mikek Georgia Institute of Technology, Qirun Zhang Georgia Institute of Technology
Media Attached
17:30
15m
Talk
[Remote] Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering
Research Papers
Bin Yu School of Computer Science and Technology, Xidian University, Cong Tian Xidian University, Hengrui Xing School of Computer Science and Technology, Xidian University, Zuchao Yang School of Computer Science and Technology, Xidian University, Jie Su School of Computer Science and Technology, Xidian University, Xu Lu School of Computer Science and Technology, Xidian University, Jiyu Yang School of Computer Science and Technology, Xidian University, Liang Zhao School of Computer Science and Technology, Xidian University, Xiaofeng Li Beijing Institute of Control Engineering, Zhenhua Duan Xidian University
Media Attached
17:45
7m
Talk
[Remote] P4b: A Translator from P4 Programs to Boogie
Demonstrations
Chong Ye Tsinghua University, Fei He Tsinghua University
Media Attached
16:00 - 18:00
Automated Repair IIJournal First / Research Papers at Golden Gate C3
Chair(s): Luciano Baresi Politecnico di Milano
16:00
15m
Talk
A Large-scale Empirical Review of Patch Correctness Checking Approaches
Research Papers
Jun Yang UIUC, Yuehan Wang University of Illinois at Urbana-Champaign, Yiling Lou Fudan University, Ming Wen Huazhong University of Science and Technology, Lingming Zhang University of Illinois at Urbana-Champaign
Media Attached
16:15
15m
Talk
Program Repair Guided by Datalog-Defined Static Analysis
Research Papers
Yu Liu Beijing University of Technology, Sergey Mechtaev University College London, Pavle Subotic Microsoft, Abhik Roychoudhury National University of Singapore
Media Attached
16:30
15m
Talk
SynShine: Improved Fixing of Syntax Errors
Journal First
Toufique Ahmed University of California at Davis, Noah Rose Ledesma UC Davis, Prem Devanbu University of California at Davis
Media Attached
16:45
15m
Talk
Baldur: Whole-Proof Generation and Repair with Large Language Models
Research Papers
Emily First University of California, San Diego, Markus Rabe Google, Talia Ringer University of Illinois at Urbana-Champaign, Yuriy Brun University of Massachusetts
Media Attached
17:00
15m
Talk
KG4CraSolver: Recommending Crash Solutions via Knowledge Graph
Research Papers
Xueying Du Fudan University, Yiling Lou Fudan University, Mingwei Liu Fudan University, Xin Peng Fudan University, Tianyong Yang Fudan University
Pre-print Media Attached
17:15
15m
Talk
[Remote] Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps
Research Papers
Yuxin Zhang Tianjin University, Sen Chen College of Intelligence and Computing, Tianjin University, Lingling Fan College of Cyber Science, Nankai University, Chunyang Chen Monash University, Xiaohong Li Tianjin University
Media Attached
17:30
15m
Talk
[Remote] Semantic Test Repair for Web applications
Research Papers
Xiaofang Qi School of Computer Science and Engineering, Southeast University, Xiang Qian School of Computer Science and Engineering, Southeast University, Yanhui Li Nanjing University
Media Attached

Thu 7 Dec

Displayed time zone: Pacific Time (US & Canada) change

10:30 - 11:00
Coffee/tea BreakSocial / Plenary Events at Golden Gate B
11:00 - 12:30
Human Aspects IIIResearch Papers / Industry Papers / Demonstrations / Journal First at Golden Gate A
Chair(s): Tien N. Nguyen University of Texas at Dallas
11:00
15m
Talk
A Case Study of Developer Bots: Motivations, Perceptions, and Challenges
Research Papers
Sumit Asthana University of Michigan, Hitesh Sajnani The Trade Desk, Elena Voyloshnikova Microsoft, Birendra Acharya Microsoft, Kim Herzig Microsoft
Media Attached
11:15
15m
Talk
"We Feel Like We're Winging It": A Study on Navigating Open-Source Dependency Abandonment
Research Papers
Courtney Miller Carnegie Mellon University, Christian Kästner Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
Pre-print Media Attached
11:30
15m
Talk
How Practitioners Expect Code Completion?
Research Papers
Chaozheng Wang The Chinese University of Hong Kong, Junhao Hu Peking University, Cuiyun Gao The Chinese University of Hong Kong, Yu Jin Tencent Inc., Tao Xie Peking University, Hailiang Huang Tencent Inc., Zhenyu Lei Tencent Inc., Yuetang Deng Tencent Inc.
Media Attached
11:45
15m
Talk
BFSig: Leveraging File Significance in Bus Factor Estimation
Industry Papers
Vahid Haratian Bilkent University, Mikhail Evtikhiev JetBrains Research, Pouria Derakhshanfar JetBrains Research, Eray Tüzün Bilkent University, Vladimir Kovalenko JetBrains Research
DOI Media Attached
12:00
15m
Talk
Challenges of Working from Home in Software Development during COVID-19 Lockdowns
Journal First
Katharina Müller , Christian Koch Technische Hochschule Nürnberg Georg Simon Ohm / FAU Erlangen-Nürnberg, Germany, Dirk Riehle U of Erlangen, Michael Stops Institut für Arbeitsmarkt- und Berufsforschung, Germany, Nikolay Harutyunyan Friedrich-Alexander University Erlangen-Nuremberg, Germany
Link to publication DOI Media Attached
12:15
7m
Talk
D2S2: Drag ’n’ Drop Mobile App Screen Search
Demonstrations
Soumik Mohian University of Texas at Arlington, Tony Tang University of Texas at Arlington, Tuan Trinh University of Texas at Arlington, Don Dang University of Texas at Arlington, Christoph Csallner University of Texas at Arlington
Link to publication Media Attached
12:23
7m
Talk
[Remote] The Most Agile Teams Are the Most Disciplined: On Scaling out Agile Development
Industry Papers
Zheng Li Queen's University Belfast, UK, Austen Rainer Queen's University Belfast
DOI Media Attached
11:00 - 12:30
Testing IVResearch Papers / Industry Papers at Golden Gate C1
Chair(s): Jonathan Bell Northeastern University
11:00
15m
Talk
Code Coverage Criteria for Asynchronous Programs
Research Papers
Mohammad Ganji Simon Fraser University, Saba Alimadadi Simon Fraser University, Frank Tip Northeastern University
Media Attached
11:15
15m
Talk
Automated Test Generation for Medical Rules Web Services: A Case Study at the Cancer Registry of Norway
Industry Papers
Christoph Laaber Simula Research Laboratory, Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Thomas Schwitalla Cancer Registry of Norway, Jan F. Nygård Cancer Registry of Norway
DOI Pre-print Media Attached
11:30
15m
Talk
Test Case Generation for Drivability Requirements of an Automotive Cruise Controller: An Experience with an Industrial Simulator
Industry Papers
Federico Formica McMaster University, Nicholas Petrunti McMaster University, Lucas Bruck McMaster University, Vera Pantelic McMaster University, Mark Lawford McMaster University, Claudio Menghi University of Bergamo; McMaster University
DOI Media Attached
11:45
15m
Talk
Prioritizing Natural Language Test Cases Based on Highly-Used Game Features
Industry Papers
Markos Viggiato University of Alberta, Dale Paas Prodigy Education, Cor-Paul Bezemer University of Alberta
DOI Media Attached
12:00
15m
Talk
EtherDiffer: Differential Testing on RPC Services of Ethereum Nodes
Research Papers
Shinhae Kim The Affiliated Institute of ETRI, Sungjae Hwang Sungkyunkwan University
Media Attached
12:15
15m
Talk
[Remote] API-Knowledge Aware Search-based Software Testing: Where, What and How
Research Papers
Xiaoxue Ren Zhejiang University, Xinyuan Ye Australian National University, Yun Lin Shanghai Jiao Tong University, Zhenchang Xing Data61, Shuqing Li The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
Media Attached
11:00 - 12:30
11:00
15m
Talk
Dynamic Data Fault Localization for Deep Neural Networks
Research Papers
Yining Yin Nanjing University, China, Yang Feng Nanjing University, Shihao Weng Nanjing University, Zixi Liu Nanjing University, Yuan Yao Nanjing University, Yichi Zhang Nanjing University, Zhihong Zhao , Zhenyu Chen Nanjing University
Media Attached
11:15
15m
Talk
Assisting Static Analysis with Large Language Models: A ChatGPT Experiment
Ideas, Visions and Reflections
Haonan Li University of California at Riverside, USA, Yu Hao University of California at Riverside, USA, Yizhuo Zhai University of California at Riverside, USA, Zhiyun Qian University of California at Riverside, USA
Media Attached
11:30
15m
Talk
Understanding the Bug Characteristics and Fix Strategies of Federated Learning Systems
Research Papers
Xiaohu Du Huazhong University of Science and Technology, Xiao CHEN Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Jialun Cao Hong Kong University of Science and Technology, Ming Wen Huazhong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Media Attached
11:45
15m
Talk
EvoCLINICAL: Evolving Cyber-Cyber Digital Twin with Active Transfer Learning for Automated Cancer Registry System
Industry Papers
Chengjie Lu Simula Research Laboratory; University of Oslo, Xu Qinghua Simula Research Laboratory; University of Oslo, Tao Yue Beihang University, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Thomas Schwitalla Cancer Registry of Norway, Jan F. Nygård Cancer Registry of Norway
DOI Media Attached
12:00
15m
Talk
Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing
Research Papers
bozhi wu Singapore Management University, Shangqing Liu Nanyang Technological University, Yang Xiao Institute of Information Engineering at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiming Li Nanyang Technological University, Singapore, Jun Sun Singapore Management University, Shang-Wei Lin Nanyang Technological University
Media Attached
12:15
15m
Talk
[Remote] DeepRover: A Query-efficient Blackbox Attack for Deep Neural Networks
Research Papers
Fuyuan Zhang Kyushu University, Xinwen Hu Hunan Normal University, Lei Ma The University of Tokyo / University of Alberta, Jianjun Zhao Kyushu University
Media Attached
11:00 - 12:30
Program Analysis IIIDemonstrations / Research Papers / Industry Papers at Golden Gate C3
Chair(s): Marsha Chechik University of Toronto
11:00
15m
Talk
Practical Inference of Nullability Types
Research Papers
Nima Karimipour University of California, Riverside, Justin Pham University of California, Riverside, Lazaro Clapp Uber Technologies Inc, Manu Sridharan University of California at Riverside
Media Attached
11:15
15m
Talk
LibKit: Detecting Third-Party Libraries in iOS Apps
Research Papers
Daniel Dominguez Alvarez University of Verona and IMDEA Software Institute, Alejandro de la Cruz IMDEA Software Institute, Alessandra Gorla IMDEA Software Institute, Juan Caballero IMDEA Software Institute
Media Attached
11:30
15m
Talk
Compositional Taint Analysis for Enforcing Security Policies at Scale
Industry Papers
Subarno Banerjee Amazon Web Services, Siwei Cui Texas A & M University, Michael Emmi Amazon Web Services, Antonio Filieri Amazon Web Services, Liana Hadarean Amazon Web Services, Peixuan Li Amazon Web Services, Linghui Luo Amazon Web Services, Goran Piskachev Amazon Web Services, Nico Rosner Amazon Web Services, Aritra Sengupta Amazon Web Services, Omer Tripp Amazon, Jingbo Wang University of Southern California
DOI Media Attached
11:45
15m
Talk
FunProbe: Probing Functions from Binary Code through Probabilistic Analysis
Research Papers
Soomin Kim KAIST, Hyungseok Kim The Affiliated Institute of ETRI, Sang Kil Cha KAIST, South Korea
Media Attached
12:00
15m
Talk
BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework
Research Papers
Zewen Sun Nanjing University, Duanchen Xu Nanjing University, Yiyu Zhang Nanjing University, Yun Qi Nanjing University, Yueyang Wang Nanjing University, Zhiqiang Zuo Nanjing University, Zhaokang Wang Nanjing University, Yue Li Nanjing University, Xuandong Li Nanjing University, Qingda Lu Alibaba Group, Wenwen Peng Alibaba Group, Shengjian (Daniel) Guo Baidu Security
Media Attached
12:15
7m
Talk
CONAN: Statically Detecting Connectivity Issues in Android Applications
Demonstrations
Alejandro Mazuera-Rozo Universita della Svizzera italiana, Lugano, Switzerland and Universidad de los Andes, Colombia, Camilo Escobar-Velásquez Universidad de los Andes, Juan Espitia-Acero Universidad de los Andes, Colombia, Mario Linares-Vásquez Universidad de los Andes, Gabriele Bavota Software Institute, USI Università della Svizzera italiana
Media Attached
12:30 - 14:00
14:00 - 15:30
Empirical Studies IIResearch Papers / Ideas, Visions and Reflections / Industry Papers / Journal First at Golden Gate A
Chair(s): Peter Rigby Concordia University; Meta
14:00
15m
Talk
Reflecting on the use of the Policy-Process-Product Theory in Empirical Software Engineering
Ideas, Visions and Reflections
Kelechi G. Kalu Purdue University, Taylor R. Schorlemmer Purdue University, Sophie Chen University of Michigan, Kyle A. Robinson Purdue University, Erik Kocinare Purdue University, James C. Davis Purdue University
DOI Pre-print Media Attached
14:15
15m
Talk
Understanding the Role of External Pull Requests in the NPM Ecosystem
Journal First
Vittunyuta Maeprasart Nara Institute of Science and Technology, Supatsara Wattanakriengkrai Nara Institute of Science and Technology, Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne, Kenichi Matsumoto Nara Institute of Science and Technology
Media Attached
14:30
15m
Talk
A Multidimensional Analysis of Bug Density in SAP HANA
Industry Papers
Julian Reck SAP, Thomas Bach SAP, Jan Stoess University of Applied Sciences Karlsruhe
DOI Media Attached
14:45
15m
Talk
[Remote] Understanding the topics and challenges of GPU programming by classifying and analyzing Stack Overflow posts
Research Papers
Wenhua Yang Nanjing University of Aeronautics and Astronautics, Chong Zhang Nanjing University, Minxue Pan Nanjing University
Media Attached
15:00
15m
Talk
[Remote] Ownership in the Hands of Accountability at Brightsquid: A Case Study and a Developer Survey
Industry Papers
Umme Ayman Koana York University, Francis Chew Brightsquid, Chris Carlson Brightsquid, Maleknaz Nayebi York University
DOI
15:15
15m
Talk
[Remote] Software Architecture in Practice: Challenges and Opportunities
Research Papers
Zhiyuan Wan Zhejiang University, Yun Zhang Zhejiang University City College, Xin Xia Huawei Technologies, Yi Jiang Huawei, David Lo School of Computing and Information Systems, Singapore Management University
Media Attached
14:00 - 15:30
Models of Code and DocumentationResearch Papers / Journal First / Ideas, Visions and Reflections at Golden Gate C1
Chair(s): Gema Rodríguez-Pérez University of British Columbia (UBC)
14:00
15m
Talk
On the Usage of Continual Learning for Out-of-Distribution Generalization in Pre-trained Language Models of Code
Research Papers
Martin Weyssow DIRO, Université de Montréal, Xin Zhou Singapore Management University, Singapore, Kisub Kim School of Computing and Information Systems, Singapore Management University, David Lo School of Computing and Information Systems, Singapore Management University, Houari Sahraoui DIRO, Université de Montréal
Pre-print Media Attached
14:15
15m
Talk
A Vision on Intentions in Software Engineering
Ideas, Visions and Reflections
Jacob Krüger Eindhoven University of Technology, Yi Li Nanyang Technological University, Chenguang Zhu Meta, Marsha Chechik University of Toronto, Thorsten Berger Ruhr University Bochum, Julia Rubin University of British Columbia, Canada
Media Attached
14:30
15m
Paper
Automated Identification of Toxic Code Reviews Using ToxiCR
Journal First
Jaydeb Sarker Department of Computer Science, Wayne State University, Asif Kamal Turzo Wayne State University, Amiangshu Bosu Wayne State University, Ming Dong Wayne State University
Link to publication DOI Pre-print Media Attached
14:45
15m
Talk
GrACE: Language Models Meet Code Edits
Research Papers
Priyanshu Gupta Microsoft, Avishree Khare Microsoft, Yasharth Bajpai Microsoft, Saikat Chakraborty Microsoft Research , Sumit Gulwani Microsoft, Aditya Kanade Microsoft Research India, Arjun Radhakrishna Microsoft, Gustavo Soares Microsoft, Ashish Tiwari Microsoft
Media Attached
15:00
15m
Talk
Recommending Analogical APIs via Knowledge Graph Embedding
Research Papers
Mingwei Liu Fudan University, Yanjun Yang Fudan University, Yiling Lou Fudan University, Xin Peng Fudan University, Zhong Zhou Fudan University, Xueying Du Fudan University, Tianyong Yang Fudan University
Pre-print Media Attached
15:15
15m
Talk
[Remote] CCT5: A Code-Change-Oriented Pre-Trained Model
Research Papers
Bo Lin National University of Defense Technology, Shangwen Wang National University of Defense Technology, Zhongxin Liu Zhejiang University, Yepang Liu Southern University of Science and Technology, Xin Xia Huawei Technologies, Xiaoguang Mao National University of Defense Technology
DOI Pre-print Media Attached
14:00 - 15:30
Machine Learning VResearch Papers / Ideas, Visions and Reflections / Journal First at Golden Gate C2
Chair(s): Prem Devanbu University of California at Davis
14:00
15m
Talk
LExecutor: Learning-Guided Execution
Research Papers
Beatriz Souza Universität Stuttgart, Michael Pradel University of Stuttgart
Media Attached
14:15
15m
Talk
Deeper Notions of Correctness in Image-based DNNs: Lifting Properties from Pixel to Entities
Ideas, Visions and Reflections
Felipe Toledo , David Shriver University of Virginia, Sebastian Elbaum University of Virginia, Matthew B Dwyer University of Virginia
Link to publication DOI Pre-print Media Attached
14:30
15m
Talk
Software Architecture Recovery with Information Fusion
Research Papers
Yiran Zhang Nanyang Technological University, Zhengzi Xu Nanyang Technological University, Chengwei Liu Nanyang Technological University, Hongxu Chen Huawei Technologies Co., Ltd., Sun Jianwen Huawei Technologies Co., Ltd, Dong Qiu Huawei Technologies Co., Ltd, Yang Liu Nanyang Technological University
Media Attached
14:45
15m
Talk
What Kinds of Contracts Do ML APIs Need?
Journal First
Samantha Syeda Khairunnesa Bradley University, Shibbir Ahmed Dept. of Computer Science, Iowa State University, Sayem Mohammad Imtiaz Iowa State University, Hridesh Rajan Dept. of Computer Science, Iowa State University, Gary T. Leavens University of Central Florida
Media Attached
15:00
15m
Talk
Evaluating Transfer Learning for Simplifying GitHub READMEs
Research Papers
Haoyu Gao The University of Melbourne, Christoph Treude University of Melbourne, Mansooreh Zahedi The Univeristy of Melbourne
Pre-print Media Attached
15:15
15m
Talk
[Remote] CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Research Papers
Zhensu Sun Singapore Management University, Xiaoning Du Monash University, Australia, Fu Song State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, and University of Chinese Academy of Sciences Beijing, China, Li Li Beihang University
Pre-print Media Attached
14:00 - 15:30
Security IIResearch Papers / Journal First at Golden Gate C3
Chair(s): Caroline Lemieux University of British Columbia
14:00
15m
Talk
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Research Papers
Ruoxi Sun CSIRO's Data61, Jason Minhui Xue CSIRO’s Data61, Gareth Tyson Hong Kong University of Science and Technology, Tian Dong Shanghai Jiao Tong University, Shaofeng Li Shanghai Jiao Tong University, Shuo Wang CSIRO's Data61, Haojin Zhu Shanghai Jiao Tong University, Seyit Camtepe CSIRO Data61, Surya Nepal CSIRO’s Data61
Media Attached
14:15
15m
Talk
Security Misconfigurations in Open Source Kubernetes Manifests: An Empirical Study
Journal First
Akond Rahman Auburn University, USA, Shazibul Islam Shamim Auburn University, Dibyendu Brinto Bose Virginia Tech, Rahul Pandita GitHub, Inc.
Media Attached
14:30
15m
Talk
Crystallizer: A Hybrid Path Analysis Framework To Aid in Uncovering Deserialization Vulnerabilities
Research Papers
Prashast Srivastava Columbia University, USA, Flavio Toffalini EPFL, Kostyantyn Vorobyov Oracle Labs, Australia, François Gauthier Oracle Labs, Antonio Bianchi Purdue University, Mathias Payer EPFL
Media Attached
14:45
15m
Talk
Neural Transfer Learning for Repairing Security Vulnerabilities in C Code
Journal First
Zimin Chen KTH Royal Institute of Technology, Steve Kommrusch Leela AI, Martin Monperrus KTH Royal Institute of Technology
Media Attached
15:00
15m
Talk
ViaLin: Path-Aware Dynamic Taint Analysis for Android
Research Papers
Khaled Ahmed University of British Columbia (UBC), Yingying Wang University of British Columbia, Mieszko Lis The University of British Columbia, Canada, Julia Rubin University of British Columbia, Canada
Media Attached
15:15
15m
Talk
[Remote] Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation
Research Papers
Chao Ni School of Software Technology, Zhejiang University, Xin Yin The State Key Laboratory of Blockchain and Data Security, Zhejiang University, Kaiwen Yang College of Computer Science and Technology, Zhejiang University, Dehai Zhao Australian National University, Australia, Zhenchang Xing Data61, Xin Xia Huawei Technologies
Media Attached
15:30 - 16:00
Coffee/tea BreakSocial / Plenary Events at Golden Gate B

Accepted Papers

Title
A Case Study of Developer Bots: Motivations, Perceptions, and Challenges
Research Papers
Media Attached
Accelerating Continuous Integration with Parallel Batch Testing
Research Papers
Pre-print Media Attached
A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level Tracing
Research Papers
Media Attached
A Large-scale Empirical Review of Patch Correctness Checking Approaches
Research Papers
Media Attached
A Longitudinal Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention
Research Papers
Pre-print Media Attached
An Automated Approach to Extracting Local Variables
Research Papers
Media Attached
Automata-based Trace Analysis for Aiding Diagnosing GUI Testing Tools for Android
Research Papers
Media Attached
Automated Testing and Improvement of Named Entity Recognition Systems
Research Papers
Pre-print Media Attached
Automatically Resolving Dependency-Conflict Building Failures via Behavior-Consistent Loosening of Library Version Constraints
Research Papers
Media Attached
Baldur: Whole-Proof Generation and Repair with Large Language Models
Research Papers
Media Attached
Benchmarking Robustness of AI-enabled Multi-sensor Fusion Systems: Challenges and Opportunities
Research Papers
Media Attached
BiasAsker: Measuring the Bias in Conversational AI System
Research Papers
Media Attached
BigDataflow: A Distributed Interprocedural Dataflow Analysis Framework
Research Papers
Media Attached
Building and Sustaining Ethnically, Racially, and Gender Diverse Software Engineering Teams: A Study at Google
Research Papers
Pre-print Media Attached
Can Machine Learning Pipelines Be Better Configured?
Research Papers
Media Attached
Code Coverage Criteria for Asynchronous Programs
Research Papers
Media Attached
Co-Dependence Aware Fuzzing for Dataflow-based Big Data Analytics
Research Papers
Pre-print Media Attached
Commit-level, Neural Vulnerability Detection and Assessment
Research Papers
Media Attached
Contextual Predictive Mutation Testing
Research Papers
Media Attached
Copiloting the Copilots: Fusing Large Language Models with Completion Engines for Automated Program Repair
Research Papers
Pre-print Media Attached
Crystallizer: A Hybrid Path Analysis Framework To Aid in Uncovering Deserialization Vulnerabilities
Research Papers
Media Attached
DecompoVision: Reliability Analysis of Machine Vision Components Through Decomposition and Reuse
Research Papers
Media Attached
DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers
Research Papers
Media Attached
Deep Learning Based Feature Envy Detection Boosted by Real-World Examples
Research Papers
DOI Pre-print Media Attached
DeMinify: Neural Variable Name Recovery and Type Inference
Research Papers
Media Attached
Design by Contract for Deep Learning APIs
Research Papers
DOI Media Attached
DistXplore: Distribution-guided Testing for Evaluating and Enhancing Deep Learning Systems
Research Papers
Media Attached
Do CONTRIBUTING files provide information about OSS newcomers' onboarding barriers?
Research Papers
Pre-print Media Attached
Dynamic Data Fault Localization for Deep Neural Networks
Research Papers
Media Attached
Dynamic Prediction of Delays in Software Projects Using Delay Patterns and Bayesian Modeling
Research Papers
Pre-print Media Attached
Efficient Text-to-Code Retrieval with Cascaded Fast and Slow Transformer Models
Research Papers
Media Attached
Engineering a Formally Verified Automated Bug Finder
Research Papers
Media Attached
Enhancing Coverage-guided Fuzzing via Phantom Program
Research Papers
Media Attached
EtherDiffer: Differential Testing on RPC Services of Ethereum Nodes
Research Papers
Media Attached
EvaCRC: Evaluating Code Review Comments
Research Papers
Media Attached
Evaluating Transfer Learning for Simplifying GitHub READMEs
Research Papers
Pre-print Media Attached
Fix Fairness, Don’t Ruin Accuracy: Performance Aware Fairness Repair using AutoML
Research Papers
Pre-print Media Attached
Flow experience in software engineering
Research Papers
DOI Media Attached
From Leaks to Fixes: Automated Repairs for Resource Leak Warnings
Research Papers
Pre-print Media Attached
FunProbe: Probing Functions from Binary Code through Probabilistic Analysis
Research Papers
Media Attached
GrACE: Language Models Meet Code Edits
Research Papers
Media Attached
How Early Participation Determines Long-Term Sustained Activity in GitHub Projects?
Research Papers
Pre-print Media Attached
How Practitioners Expect Code Completion?
Research Papers
Media Attached
HyperDiff: Computing Source Code Diffs at Scale
Research Papers
Media Attached
Input-driven Dynamic Program Debloating for Code-reuse Attack Mitigation
Research Papers
DOI Pre-print Media Attached
IoPV: On Inconsistent Option Performance Variations
Research Papers
Pre-print Media Attached
KG4CraSolver: Recommending Crash Solutions via Knowledge Graph
Research Papers
Pre-print Media Attached
Knowledge-based Version Incompatibility Detection for Deep Learning
Research Papers
Media Attached
Learning Program Semantics for Vulnerability Detection via Vulnerability-specific Inter-procedural Slicing
Research Papers
Media Attached
Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous Applications
Research Papers
Pre-print Media Attached
LExecutor: Learning-Guided Execution
Research Papers
Media Attached
LibKit: Detecting Third-Party Libraries in iOS Apps
Research Papers
Media Attached
Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract Contributors
Research Papers
Media Attached
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors
Research Papers
Media Attached
Metamong: Detecting Render-update Bugs in Web Browsers through Fuzzing
Research Papers
Media Attached
MuAkka: Mutation Testing for Actor Concurrency in Akka Using Real-World Bugs
Research Papers
Pre-print Media Attached
Multilingual Code Co-Evolution Using Large Language Models
Research Papers
Media Attached
NaNofuzz: A Usable Tool for Automatic Test Generation
Research Papers
Link to publication DOI Media Attached
Neural-Based Test Oracle Generation: A Large-scale Evaluation and Lessons Learned
Research Papers
Pre-print Media Attached
NeuRI: Diversifying DNN Generation via Inductive Rule Inference
Research Papers
Pre-print Media Attached
On the Relationship Between Code Verifiability and Understandability
Research Papers
Media Attached
On the Usage of Continual Learning for Out-of-Distribution Generalization in Pre-trained Language Models of Code
Research Papers
Pre-print Media Attached
Outage-Watch: Early Prediction of Outages using Extreme Event Regularizer
Research Papers
Media Attached
PEM: Representing Binary Program Semantics for Similarity Analysis via A Probabilistic Execution Model
Research Papers
Media Attached
Pitfalls in Experiments with DNN4SE: An Analysis of the State of the Practice
Research Papers
Media Attached
PPR: Pairwise Program Reduction
Research Papers
Media Attached
Practical Inference of Nullability Types
Research Papers
Media Attached
Predicting Software Performance with Divide-and-Learn
Research Papers
Pre-print Media Attached
Program Repair Guided by Datalog-Defined Static Analysis
Research Papers
Media Attached
Property-based Fuzzing for Finding Data Manipulation Errors in Android Apps
Research Papers
Media Attached
RAP-Gen: Retrieval-Augmented Patch Generation with CodeT5 for Automatic Program Repair
Research Papers
Media Attached
Recommending Analogical APIs via Knowledge Graph Embedding
Research Papers
Pre-print Media Attached
[Remote] A Generative and Mutational Approach for Synthesizing Bug-exposing Test Cases to Guide Compiler Fuzzing
Research Papers
Media Attached
[Remote] An Extensive Study on Adversarial Attack against Pre-trained Models of Code
Research Papers
Media Attached
[Remote] API-Knowledge Aware Search-based Software Testing: Where, What and How
Research Papers
Media Attached
[Remote] A Practical Human Labeling Method for Online Just-in-Time Software Defect Prediction
Research Papers
Pre-print Media Attached
[Remote] Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android Apps
Research Papers
Media Attached
[Remote] CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering Arrays
Research Papers
DOI Pre-print Media Attached
[Remote] CCT5: A Code-Change-Oriented Pre-Trained Model
Research Papers
DOI Pre-print Media Attached
[Remote] CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion Models
Research Papers
Pre-print Media Attached
[Remote] Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
Research Papers
Pre-print Media Attached
[Remote] Compatibility Issues in Deep Learning Systems: Problems and Opportunities
Research Papers
DOI Pre-print Media Attached
[Remote] DeepInfer: Deep Type Inference from Smart Contract Bytecode
Research Papers
Media Attached
[Remote] DeepRover: A Query-efficient Blackbox Attack for Deep Neural Networks
Research Papers
Media Attached
[Remote] Demystifying Dependency Bugs in Deep Learning Stack
Research Papers
Media Attached
[Remote] Demystifying the Composition and Code Reuse in Solidity Smart Contracts
Research Papers
Pre-print Media Attached
[Remote] Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-Triggering
Research Papers
Media Attached
[Remote] DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems
Research Papers
Pre-print Media Attached
[Remote] Discovering Parallelisms in Python Programs
Research Papers
Media Attached
[Remote] Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and Explanation
Research Papers
Media Attached
[Remote] Gitor: Scalable Code Clone Detection by Building Global Sample Graph
Research Papers
Media Attached
[Remote] Heterogeneous Testing for Coverage Profilers Empowered with Debugging Support
Research Papers
Pre-print Media Attached
[Remote] Hue: A User-Adaptive Parser for Hybrid Logs
Research Papers
Media Attached
[Remote] Log Parsing with Generalization Ability under New Log Types
Research Papers
Media Attached
[Remote] Mining Resource-Operation Knowledge to Support Resource Leak Detection
Research Papers
Media Attached
[Remote] Natural Language to Code: How Far are We?
Research Papers
DOI Pre-print Media Attached
[Remote] Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-Modal Observability Data
Research Papers
Pre-print
[Remote] OOM-Guard: Towards Improving The Ergonomics of Rust OOM Handling via A Reservation-based Approach
Research Papers
Media Attached
[Remote] Pre-training Code Representation with Semantic Flow Graph for Effective Bug Localization
Research Papers
Media Attached
[Remote] Self-Supervised Query Reformulation for Code Search
Research Papers
Media Attached
[Remote] Semantic Test Repair for Web applications
Research Papers
Media Attached
[Remote] Software Architecture in Practice: Challenges and Opportunities
Research Papers
Media Attached
[Remote] The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code Classification
Research Papers
Pre-print Media Attached
[Remote] Towards Automated Detection of Unethical Behavior in Open-source Software Projects
Research Papers
Media Attached
[Remote] TransRacer: Function Dependence-Guided Transaction Race Detection for Smart Contracts
Research Papers
DOI Pre-print Media Attached
[Remote] Tritor: Detecting Semantic Code Clones by Building Social Network-based Triads Model
Research Papers
Media Attached
[Remote] Understanding the topics and challenges of GPU programming by classifying and analyzing Stack Overflow posts
Research Papers
Media Attached
Revisiting Neural Program Smoothing for Fuzzing
Research Papers
Media Attached
Scalable Program Clone Search Through Spectral Analysis
Research Papers
DOI Pre-print Media Attached
Semantic Debugging
Research Papers
Media Attached
SJFuzz: Seed & Mutator Scheduling for JVM Fuzzing
Research Papers
Media Attached
SmartFix: Fixing Vulnerable Smart Contracts by Accelerating Generate-and-Verify Repair using Statistical Models
Research Papers
Media Attached
Software Architecture Recovery with Information Fusion
Research Papers
Media Attached
Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects
Research Papers
Media Attached
Speeding up SMT Solving via Compiler Optimization
Research Papers
Media Attached
State Merging with Quantifiers in Symbolic Execution
Research Papers
DOI Pre-print Media Attached
Statfier: Automated Testing of Static Analyzers via Semantic-preserving Program Transformations
Research Papers
Media Attached
Statistical Reachability Analysis
Research Papers
Media Attached
Statistical Type Inference for Incomplete Programs
Research Papers
Media Attached
Testing Coreference Resolution Systems without Labeled Test Sets
Research Papers
Media Attached
Towards Greener Yet Powerful Code Generation via Quantization: An Empirical Study
Research Papers
Media Attached
TransMap: Pinpointing Mistakes in Neural Code Translation
Research Papers
Media Attached
Understanding Solidity Event Logging Practices in the Wild
Research Papers
Media Attached
Understanding the Bug Characteristics and Fix Strategies of Federated Learning Systems
Research Papers
Media Attached
ViaLin: Path-Aware Dynamic Taint Analysis for Android
Research Papers
Media Attached
"We Feel Like We're Winging It": A Study on Navigating Open-Source Dependency Abandonment
Research Papers
Pre-print Media Attached
When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime Performance
Research Papers
Pre-print Media Attached

Call for Papers

We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research.

NEW THIS YEAR: major revisions allowed! The main novelty of this year’s review process is that the initial output can be accept, reject or major revision. In case a paper is deemed publishable upon major revision, authors are granted 8 weeks to perform major revisions, which might include additional experiments or new analyses of existing results; major rewriting of algorithms and explanations; clarifications, better scoping, and improved motivations. The same reviewers who requested major revisions will then assess whether the revised submission satisfies their requests adequately.

NEW THIS YEAR: research methods declaration! This year, in addition to declaring the topics which are relevant for their submissions, authors will be asked to declare the research methods employed in their submissions. This will enable us to ensure reviewer expertise both for research methods and topics. For full definitions of the research methods, see the SIGSOFT Empirical Standards.

NEW THIS YEAR: adoption of SIGSOFT Open Science Policy! This year, ESEC/FSE has adopted the SIGSOFT Open Science Policy, and we encourage authors to provide a replication package. For authors, this means providing a supporting statement on the availability of a replication package (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section. See more details below.

Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems are also welcome, as well as replication papers. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call.

How to Submit

At the time of submission, all papers must conform to the ESEC/FSE 2023 Format and Submission Guidelines, and must not exceed 10 pages for all text and figures plus 2 pages for references. All submissions must be in English and in PDF format. Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the ESEC/FSE submission site:

https://esecfse2023.hotcrp.com/

Each submission will be reviewed by at least three members of the program committee. When the initial output of the three reviews is major revision, authors will have an opportunity to address the reviewers’ requests during an 8 week major revision period. The revised submission must be accompanied by a response letter, where the authors explain how they addressed each concern expressed by the reviewers.

Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation (if relevant), quality of presentation, and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.

Double-Anonymous Review Process

In order to ensure the fairness of the reviewing process, the ESEC/FSE 2023 Research Papers Track will employ a double-anonymous review process, where external reviewers do not know the identity of authors, and authors do not know the identity of external reviewers. The papers submitted must not reveal the authors’ identities in any way:

  • Authors should leave out author names and affiliations from the body of their submission.
  • Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
  • Authors should not include URLs to author-revealing sites (tools, datasets). Authors are still encouraged to follow open science principles and submit replication packages, see more details on the open science policy below.
  • Authors should anonymize author-revealing company names but instead provide general characteristics of the organisations involved needed to understand the context of the paper.
  • Authors should ensure that paper acknowledgements do not reveal the origin of their work.

The double-anonymous process used this year is “heavy”, i.e., the paper anonymity will be maintained during all reviewing and discussion periods. In case of major revision, authors must therefore maintain anonymity in their response letter and must provide no additional information that could be author-revealing.

To facilitate double-anonymous reviewing, we recommend the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification. If the authors have uploaded to arXiv or similar, they should avoid specifying that the manuscript was submitted to ESEC/FSE 2023.

Authors with further questions on double-anonymous reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-anonymous review process will be desk-rejected.

Submission Policies

Papers submitted for consideration to ESEC/FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.

To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.

All publications are subject to the ACM Author Representations policy.

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.

Alleged violations to any of the above policies will be reported to ACM for further investigation and may result in a full retraction of your paper, in addition to other potential penalties, as per the ACM Publications Policies.

Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process if your paper is accepted. ACM has been involved in ORCID from the start and they have recently made a commitment to collect ORCID IDs from all of published authors. The collection process has started and will roll out as a requirement throughout 2022. ACM is committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.

Important Dates

All dates are 23:59:59 AoE (UTC-12h)

  • Paper registration: 26 January, 2023 (to register a paper, only the paper title, author list and some additional metadata are required)
  • Full paper submission: 2 February, 2023
  • Initial notification: 4 May, 2023
  • Revised manuscript submissions (major revisions only): 29 June, 2023
  • Final notification for major revisions: 27 July, 2023
  • Camera ready: 24 August, 2023

NOTE: The official publication date is the date the proceedings are made available in the ACM Digital Library. This date may be up to two weeks prior to the first day of the conference. The official publication date affects the deadline for any patent filings related to published work.

Open Science Policy

The research track of ESEC/FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.

Upon submission to the research track, authors are asked to make a replication package available to the program committee (via upload of supplemental material or a link to a private or public repository) or to comment on why this is not possible or desirable. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. We ask authors to provide a supporting statement on the availability of a replication package (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section. Be careful that such statements continue to maintain author anonymity. For more details, see the ESEC/FSE open science policy.

Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate ESEC/FSE’23 artefact evaluation committee.

Topics of Interest

Topics of interest include, but are not limited to:

  • Artificial intelligence and machine learning for software engineering
  • Autonomic computing
  • Debugging and fault localization
  • Dependability, safety, and reliability
  • Distributed and collaborative software engineering
  • Embedded software, safety-critical systems, and cyber-physical systems
  • Empirical software engineering
  • Human aspects of software engineering
  • Human-computer interaction
  • Mining software repositories
  • Mobile development
  • Model checking
  • Model-driven engineering
  • Parallel, distributed, and concurrent systems
  • Performance engineering
  • Program analysis
  • Program comprehension
  • Program repair
  • Program synthesis
  • Programming languages
  • Recommendation systems
  • Requirements engineering
  • Search-based software engineering
  • Services, components, and cloud
  • Software architectures
  • Software engineering education
  • Software engineering for machine learning and artificial intelligence
  • Software evolution
  • Software processes
  • Software security
  • Software testing
  • Software traceability
  • Symbolic execution
  • Tools and environments

FAQ on Review Process: Major Revisions, Open Science Policy, Double-Anonymous Reviewing

Major Revision Process

Q: Why is ESEC/FSE allowing major revisions?

A: SE conferences are currently forced to reject papers that include valuable material, but would need major changes to become acceptable for conference presentation, because major revisions cannot be accommodated in the current review process. By supporting only a binary outcome, conferences force reviewers to decide between rejection and acceptance even in borderline cases that would be better judged after a round of major revision. This can cause additional reviewing burden for the community (the paper is resubmitted to another venue with new reviewers) and inconsistency for the authors (the new reviewers have different opinions). We hope by allowing major revisions to both increase the acceptance rate of ESEC/FSE and to help reduce these current problems with the reviewing process.

For Authors

Q: If my paper receives major revisions, what happens next?

A: The meta-review will clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. Authors of these papers are granted 8 weeks to implement the requested changes. In addition to the revised paper, authors are asked to submit a response letter that explains how each required change was implemented. If any change was not implemented, authors can explain why. The same reviewers will then review the revised paper and make their final (binary) decision. Authors can also choose to withdraw their submission if they wish.

Q: Will major revision become the default decision causing initial acceptance rates to drop?

A: This is not the intention: reviewers are instructed to accept all papers that would have been accepted when major revision was not an available outcome.

For Reviewers

Q: When shall I recommend major revision for a paper?

A: Major revision should not become the default choice for borderline papers and should be used only if without major revisions the paper would be rejected, while a properly done major revision, which addresses the reviewers’ concerns, could make the paper acceptable for publication; if the requested changes are doable in 8 weeks and are implementable within the page limit; if the requested changes are strictly necessary for paper acceptance (i.e., not just nice-to-have features); if the requested changes require recheck (i.e., reviewers cannot trust the authors to implement them directly in the camera ready).

Q: When shall I recommend rejection instead of major revision?

A: Rejection is a more appropriate outcome than major revision if the requested additions/changes are not implementable in 8 weeks; if the contribution is very narrow or not relevant to the SE audience, and it cannot be retargeted in 8 weeks; if the methodology is flawed and cannot be fixed in 8 weeks; if results are unconvincing, the paper does not seem to improve the state of the art much, and new convincing results are unlikely to be available after 8 weeks of further experiments; if the customary benchmark used in the community was ignored and cannot be adopted and compared to in 8 weeks.

Q: When shall I recommend acceptance instead of major revision?

A: We do not want major revision to become the primary pathway for acceptance. We should continue to trust the authors to make minor changes to the submissions in the camera ready version. Acceptance is preferable if the requested additions/changes are nice to have features, not mandatory for the acceptability of the work; if minor improvements of the text are needed; if minor clarifications requested by the reviewers should be incorporated; if important but not critical references should be added and discussed; if discussion of results could be improved, but the current one is already sufficient.

Q: What is the difference between major revision and shepherding?

A: Major revision is not shepherding. While shepherding typically focuses on important but minor changes, which can be specified in an operational way and can be checked quite easily and quickly by reviewers, major revisions require major changes (although doable in 8 weeks), which means the instructions for the authors cannot be completely operational and the check will need to go deeply into the new content delivered by the paper. Hence, while the expectation for shepherded papers is that most of them will be accepted once the requested changes are implemented, this is not necessarily the case with major revisions.

Q: Is there a quota of papers that can have major revision as outcome?

A: As there is no quota for the accepted papers, there is also no quota for major revisions. However, we expect that thanks to major revisions we will be able to eventually accept 10-15% more papers, while keeping the quality bar absolutely unchanged.

Q: What shall I write in the meta-review of a paper with major revision outcome?

A: With the possibility of a major revision outcome, meta-reviews become extremely important. The meta-review should clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. The meta-review should act as a contract between reviewers and authors, such that when all required changes are properly made, the paper is accepted. In this respect, the listed changes should be extremely clear, precise, and implementable.

Review Process

For Authors

Q: Can I withdraw my paper?

A: Yes, papers can be withdrawn at any time using HotCRP.

For Reviewers

Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?

A: Contact the Program Co-Chairs, who will download the material on your behalf and make it available to you.

Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?

A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Co-Chairs, especially since additional reviewers might have a different set of conflicts of interest.

Open Science Policy

Q: What is the ESEC/FSE 2023 open science policy and how can I follow it?

A: Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:

  • make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
  • include in the paper an explanation as to why this is not possible or desirable; and
  • indicate if they intend to make their data publicly available upon acceptance. This information should be provided in the submitted papers in a section named Data Availability after the Conclusion section. For more details, see the ESEC/FSE open science policy.

Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?

A: To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site. Instructions are provided in the ESEC/FSE open science policy.

Double-Anonymous Reviewing (DAR)

Q: Why are you using double-anonymous reviewing?

A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.

Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.

A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.

For Authors

Q: What exactly do I have to do to anonymize my paper?

A: Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors.

Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?

A: On the submission site, there will be an option to submit supplementary material along with your main paper. You can also share supplementary material in a private or publicly shared repository (preferred). This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-anonymous guidelines. See instructions on the ESEC/FSE open science policy.

Q: My submission is based on code available in a public repository. How do I deal with this?

A: Making your code publicly available is not incompatible with double-anonymous reviewing. You can create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy. Authors wanting to share GitHub repositories may want to look into using https://anonymous.4open.science/ which is an open source tool that helps you to quickly double-anonymize your repository.

Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission?

A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Co-Chairs.

Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?

A: No. But we recommend you do not use the same title for your ESEC/FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.

Q: Am I allowed to post my (non-anonymized) paper on my web page or arXiv?

A: To facilitate double-anonymous reviewing, we recommend the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification. If the authors have uploaded to arXiv or similar, they should avoid specifying that the manuscript was submitted to ESEC/FSE 2023.

Q: Can I give a talk about my work while it is under review? How do I handle social media?

A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are grey areas and trade-offs; we cannot describe every possible scenario.

Things you may do:

  • Put your submission on your home page.
  • Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
  • Present your work at professional meetings, job interviews, etc.
  • Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.

Things you should not do:

  • Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
  • Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
  • Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, ESEC/FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.

Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.

Q: Will the fact that ESEC/FSE is double-anonymous have an impact on handling conflicts of interest? A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Call for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.

For Reviewers

Q: What should I do if I learn the authors’ identity? What should I do if a prospective ESEC/FSE author contacts me and asks to visit my institution?

A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Co-Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgement.

Q: How do we handle potential conflicts of interest since I cannot see the author names?

A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.

Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?

A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.


The above guidelines are partly based on the PLDI FAQ on double-anonymous reviewing and the ICSE 2022 guidelines on double-anonymous submissions.