Write a Blog >>
ICSE 2020
Wed 24 June - Thu 16 July 2020
Sat 11 Jul 2020 16:35 - 16:47 at Goguryeo - A29-Code Analysis and Verification Chair(s): Elena Sherman

Application programming interfaces (APIs) have become ubiquitous in software development. However, external APIs are not guaranteed to contain every desirable feature, nor are they immune to software defects. Therefore, API users must sometimes be faced with situations where a current API does not satisfy all of their requirements but migrating to another API is costly. In these cases, due to the lack of communication channels between API developers and users, API users may intentionally bypass the existing API after inquiring into workarounds for their API problems with online communities. This mechanism takes the API developer out of the conversation, potentially leaving API bugs unreported and desirable API features undiscovered. In this paper, we explore API workaround inquiries from API users on Stack Overflow. We determine eight general reasons why API users inquire about API workarounds and eight general solutions to API workaround requests. Furthermore, using workaround implementations in Stack Overflow answers, we develop three API workaround implementation patterns. We identify instances of these patterns in real-life open source project and determine their value for API developers from their responses to feature requests based on the identified API workarounds.

Sat 11 Jul
Times are displayed in time zone: (UTC) Coordinated Universal Time change

16:05 - 17:05
A29-Code Analysis and VerificationTechnical Papers / New Ideas and Emerging Results at Goguryeo
Chair(s): Elena ShermanBoise State University
16:05
12m
Talk
Heaps'n Leaks: How Heap Snapshots Improve Android Taint AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Manuel BenzUniversity of Paderborn, Erik Krogh KristensenGitHub, Linghui LuoPaderborn University, Germany, Nataniel Borges Jr.CISPA Helmholtz Center for Information Security, Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Andreas ZellerCISPA Helmholtz Center for Information Security
Media Attached File Attached
16:17
12m
Talk
Verifying Object ConstructionTechnicalArtifact Available
Technical Papers
Martin KelloggUniversity of Washington, Seattle, Manli RanUniversity of California, Riverside, Manu SridharanUniversity of California Riverside, Martin SchäfAmazon Web Services, USA, Michael D. ErnstUniversity of Washington, USA
16:29
6m
Talk
Predictive Constraint Solving and AnalysisNew Ideas and Emerging Results Distinguished Paper AwardsNIER
New Ideas and Emerging Results
Alyas AlmaawiThe University of Texas at Austin, Nima DiniUniversity of Texas at Austin, Cagdas YelenThe University of Texas at Austin, Milos GligoricThe University of Texas at Austin, Sasa MisailovicUniversity of Illinois at Urbana-Champaign, Sarfraz KhurshidUniversity of Texas at Austin, USA
16:35
12m
Talk
When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical
Technical Papers
Maxime LamotheConcordia University, Weiyi ShangConcordia University
Pre-print
16:47
12m
Talk
Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical
Technical Papers
Xiaoxue RenZhejiang University, Zhenchang XingAustralia National University, Jiamou SunAustralian National University, Xin XiaMonash University, Jianling SunZhejiang University