Write a Blog >>
ICSE 2020
Wed 24 June - Thu 16 July 2020

ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering.

Dates
Tracks
You're viewing the program in a time zone which is different from your device's time zone - change time zone

Tue 7 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

07:00 - 08:00
I1-MetastudiesNew Ideas and Emerging Results / Technical Papers / Journal First / Demonstrations at Baekje
Chair(s): Michael Vierhauser Johannes Kepler University Linz
07:00
12m
Talk
An Evidence-Based Inquiry into the Use of Grey Literature in Software EngineeringTechnical
Technical Papers
He Zhang Nanjing University, Xin Zhou State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Xin Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Huang Huang State Key Laboratory of Novel Software Technology, Software Institute, Nanjing University, Muhammad Ali Babar The University of Adelaide
07:12
8m
Talk
An Extended Abstract of "Metamorphic Robustness Testing: Exposing Hidden Defects in Citation Statistics and Journal Impact Factors"J1
Journal First
Zhi Quan (George) Zhou University of Wollongong, Australia, T. H. Tse The University of Hong Kong, Matt Witheridge University of Wollongong
07:20
8m
Talk
A Procedure and Guidelines for Analyzing Groups of Software Engineering ReplicationsJ1
Journal First
Adrian Santos Parrilla University of Oulu, Sira Vegas Universidad Politecnica de Madrid, Markku Oivo University of Oulu, Natalia Juristo Universidad Politecnica de Madrid
07:28
3m
Talk
An SLR-Tool: Search Process in PracticeDemo
Demonstrations
Andreas Hinderks University of Seville, Francisco José Domínguez Mayo University of Seville, Jörg Thomaschewski University of Applied Sciences Emden/Leer, María José Escalona University of Seville
07:31
6m
Talk
Threats to Validity in Experimenting Mutation-Based Fault LocalizationNIER
New Ideas and Emerging Results
Juyoung Jeon Handong Global University, Shin Hong Handong Global University
07:37
8m
Talk
Methodological Principles for Reproducible Performance Evaluation in Cloud ComputingJ1
Journal First
Alessandro Vittorio Papadopoulos Mälardalen University, Laurens Versluis Vrije Universiteit Amsterdam, André Bauer University of Würzburg, Nikolas Herbst University of Würzburg, Joakim von Kistowski University of Würzburg, Ahmed Ali-Eldin UMass Amherst, Cristina L. Abad Escuela Superior Politecnica del Litoral, Jose Nelson Amaral University of Alberta, Petr Tuma Charles University, Alexandru Iosup Vrije Universiteit Amsterdam
07:45
8m
Talk
Bayesian Data Analysis in Empirical Software Engineering ResearchJ1
Journal First
Carlo A. Furia Università della Svizzera italiana (USI), Robert Feldt Chalmers | University of Gothenburg, Blekinge Institute of Technology, Richard Torkar Chalmers and the University of Gothenburg
DOI Pre-print
07:00 - 08:00
I2-SecurityNew Ideas and Emerging Results / Technical Papers at Goguryeo
Chair(s): Andrea Stocco Università della Svizzera italiana
07:00
12m
Talk
Targeted Greybox Fuzzing with Static Lookahead AnalysisTechnical
Technical Papers
Valentin Wüstholz ConsenSys Diligence, Maria Christakis MPI-SWS
Pre-print
07:12
12m
Talk
HyDiff: Hybrid Differential Software AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Yannic Noller Humboldt-Universität zu Berlin, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, Marcel Böhme Monash University, Youcheng Sun Queen's University Belfast, Hoang Lam Nguyen Humboldt-Universität zu Berlin, Lars Grunske Humboldt-Universität zu Berlin
Pre-print
07:24
12m
Talk
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of UncertaintyTechnical
Technical Papers
Xiyue Zhang Peking University, Xiaofei Xie Nanyang Technological University, Lei Ma Kyushu University, Xiaoning Du Nanyang Technological University, Qiang Hu Kyushu University, Japan, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University, Meng Sun Peking University
Pre-print
07:36
12m
Talk
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning TypesTechnical
Technical Papers
Anastasia Danilova University of Bonn, Alena Naiakshina University of Bonn, Matthew Smith University of Bonn, Fraunhofer FKIE
07:48
6m
Talk
Hey, my data are mine! Active data to empower the userNIER
New Ideas and Emerging Results
Gian Luca Scoccia University of L'Aquila, Matteo Maria Fiore University of L'Aquila, Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg, Marco Autili University of L'Aquila, Italy, Paola Inverardi University of L'Aquila, Alejandro Russo Chalmers University of Technology, Sweden
07:54
6m
Talk
Threat modeling: from infancy to maturityNIER
New Ideas and Emerging Results
Koen Yskout imec - DistriNet, KU Leuven, Thomas Heyman Toreon, Dimitri Van Landuyt Katholieke Universiteit Leuven, Laurens Sion imec-DistriNet, KU Leuven, Kim Wuyts imec-DistriNet, KU Leuven, Wouter Joosen Katholieke Universiteit Leuven
Pre-print
08:05 - 09:05
I4-Clones and ChangesTechnical Papers / Journal First / New Ideas and Emerging Results / Demonstrations at Baekje
Chair(s): Chanchal K. Roy University of Saskatchewan
08:05
12m
Talk
HARP: Holistic Analysis for Refactoring Python-Based Analytics ProgramsTechnical
Technical Papers
Weijie Zhou North Carolina State University, Yue Zhao NCSU, Guoqiang Zhang North Carolina State University, Xipeng Shen North Carolina State University
08:17
12m
Talk
CC2Vec: Distributed Representations of Code ChangesTechnical
Technical Papers
Thong Hoang Singapore Management University, Singapore, Hong Jin Kang School of Information Systems, Singapore Management University, Julia Lawall Inria, David Lo Singapore Management University
Pre-print
08:29
6m
Talk
Code Duplication on Stack OverflowNIER
New Ideas and Emerging Results
Sebastian Baltes QAware GmbH and The University of Adelaide, Christoph Treude The University of Adelaide
Pre-print Media Attached
08:35
8m
Talk
Siamese: Scalable and Incremental Code Clone Search via Multiple Code RepresentationsJ1
Journal First
Chaiyong Ragkhitwetsagul Mahidol University, Thailand, Jens Krinke University College London
Link to publication DOI Pre-print Media Attached
08:43
8m
Talk
Empirical comparison of text-based mobile apps similarity measurement techniquesJ1
Journal First
Afnan Al-Subaihin King Saud University, Federica Sarro University College London, UK, Sue Black Durham University, Licia Capra University College London
Link to publication DOI Media Attached File Attached
08:51
3m
Talk
SimilarAPI: Mining Analogical APIs for Library MigrationDemo
Demonstrations
Chunyang Chen Monash University
08:05 - 09:05
I5-Deep Learning Testing and DebuggingTechnical Papers / Demonstrations at Goguryeo
Chair(s): Pooyan Jamshidi University of South Carolina
08:05
12m
Talk
DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer DissectionTechnical
Technical Papers
Huiyan Wang State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Jingwei Xu Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University
08:17
12m
Talk
White-box Fairness Testing through Adversarial SamplingACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Peixin Zhang Zhejiang University, Jingyi Wang National University of Singapore, Singapore, Jun Sun Singapore Management University, Guoliang Dong Computer College of Zhejiang University, Xinyu Wang Zhejiang University, Xingen Wang Zhejiang University, Jin Song Dong National University of Singapore, Dai Ting Huawei Corporation
08:29
3m
Talk
FeatureNET: Diversity-driven Generation of Deep Learning ModelsDemo
Demonstrations
Salah Ghamizi SntT - University of Luxembourg, Maxime Cordy SnT, University of Luxembourg, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg
08:32
3m
Talk
EvalDNN: A Toolbox for Evaluating Deep Neural Network ModelsDemo
Demonstrations
Yongqiang TIAN The Hong Kong University of Science and Technology, Zhihua Zeng Zhejiang University, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Tzu-yang Kuo The Hong Kong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
08:35
12m
Talk
Taxonomy of Real Faults in Deep Learning SystemsACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Nargiz Humbatova Università della Svizzera italiana, Gunel Jahangirova Università della Svizzera italiana, Gabriele Bavota Università della Svizzera italiana, Vincenzo Riccio Università della Svizzera italiana, Andrea Stocco Università della Svizzera italiana, Paolo Tonella Università della Svizzera italiana
08:47
12m
Talk
An Empirical Study on Program Failures of Deep Learning JobsACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Ru Zhang Microsoft Research, Wencong Xiao Alibaba, Hongyu Zhang University of Newcastle, Australia, Yu Liu Microsoft Research, Haoxiang Lin Microsoft Research, Mao Yang Microsoft Research
08:05 - 09:05
I6-Empirical Studies and RequirementsJournal First / Software Engineering in Practice / Technical Papers at Silla
Chair(s): Ita Richardson Lero - The Irish Software Research Centre and University of Limerick
08:05
8m
Talk
What do Programmers Discuss about Deep Learning FrameworksJ1
Journal First
Junxiao Han Zhejiang University, Emad Shihab Concordia University, Zhiyuan Wan Zhejiang University, Shuiguang Deng Zhejiang University, Xin Xia Monash University
08:13
12m
Talk
Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese NetworkTechnicalArtifact Available
Technical Papers
Lin Shi ISCAS, Mingzhe Xing ISCAS, Mingyang Li ISCAS, Yawen Wang ISCAS, Shoubin Li ISCAS, Qing Wang Institute of Software, Chinese Academy of Sciences
08:25
8m
Talk
Recognizing lines of code violating company-specific coding guidelines using machine learningJ1
Journal First
Miroslaw Ochodek Poznan University of Technology, Regina Hebig Chalmers University of Technology & University of Gothenburg, Wilhelm Meding Ericsson, Gert Frost Grundfos, Miroslaw Staron University of Gothenburg
08:33
12m
Talk
Context-aware In-process Crowdworker RecommendationACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Junjie Wang Institute of Software, Chinese Academy of Sciences, Ye Yang Stevens institute of technology, Song Wang York University, Yuanzhe Hu Institute of Software, Chinese Academy of Sciences, Dandan Wang Institute of Software, Chinese Academy of Sciences, Qing Wang Institute of Software, Chinese Academy of Sciences
08:45
12m
Talk
Using a Context-Aware Approach to Recommend Code Reviewers: Findings from an Industrial Case StudySEIP
Software Engineering in Practice
Anton Strand Ericsson AB, Markus Gunnarsson Ericsson AB, Ricardo Britto Ericsson / Blekinge Institute of Technology, Muhammad Usman Blekinge Institute of Technology
09:10 - 10:00
09:10
50m
Talk
SimilarAPI: Mining Analogical APIs for Library MigrationDemo
Demonstrations
Chunyang Chen Monash University
09:10
50m
Talk
EvalDNN: A Toolbox for Evaluating Deep Neural Network ModelsDemo
Demonstrations
Yongqiang TIAN The Hong Kong University of Science and Technology, Zhihua Zeng Zhejiang University, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Tzu-yang Kuo The Hong Kong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
09:10
50m
Talk
An SLR-Tool: Search Process in PracticeDemo
Demonstrations
Andreas Hinderks University of Seville, Francisco José Domínguez Mayo University of Seville, Jörg Thomaschewski University of Applied Sciences Emden/Leer, María José Escalona University of Seville
09:10
50m
Talk
FeatureNET: Diversity-driven Generation of Deep Learning ModelsDemo
Demonstrations
Salah Ghamizi SntT - University of Luxembourg, Maxime Cordy SnT, University of Luxembourg, Mike Papadakis University of Luxembourg, Yves Le Traon University of Luxembourg
15:00 - 16:00
A1-Autonomous Driving SystemsTechnical Papers at Baekje
Chair(s): Donghwan Shin University of Luxembourg (SnT)
15:00
12m
Talk
SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in SimulinkArtifact ReusableTechnicalArtifact Available
Technical Papers
Shafiul Azam Chowdhury University of Texas at Arlington, Sohil Lal Shrestha The University of Texas at Arlington, Taylor T Johnson Vanderbilt University, Christoph Csallner University of Texas at Arlington
Link to publication DOI Media Attached
15:12
12m
Talk
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving SystemsTechnical
Technical Papers
Husheng Zhou The University of Texas at Dallas, Wei Li Southern University of Science and Technology, Zelun Kong The University of Texas at Dallas, Junfeng Guo The University of Texas at Dallas, Yuqun Zhang Southern University of Science and Technology, Lingming Zhang The University of Texas at Dallas, Bei Yu The Chinese University of Hong Kong, Cong Liu UT Dallas
15:24
12m
Talk
Misbehaviour Prediction for Autonomous Driving SystemsTechnical
Technical Papers
Andrea Stocco Università della Svizzera italiana, Michael Weiss Università della Svizzera Italiana (USI), Marco Calzana Università della Svizzera Italiana (USI), Paolo Tonella Università della Svizzera italiana
Pre-print
15:36
12m
Talk
Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System IdentificationArtifact ReusableTechnicalArtifact Available
Technical Papers
Claudio Menghi University of Luxembourg, Shiva Nejati University of Ottawa, Lionel Briand SnT Centre/University of Luxembourg, Yago Isasi Parache LuxSpace
15:48
12m
Talk
A Comprehensive Study of Autonomous Vehicle BugsTechnical
Technical Papers
Joshua Garcia University of California, Irvine, Yang Feng Nanjing University, Junjie Shen University of California, Irvine, Sumaya Almanee University of California, Irvine, Yuan Xia University of California, Irvine, Qi Alfred Chen University of California, Irvine
15:00 - 16:00
15:00
12m
Talk
Studying the Use of Java Logging Utilities in the WildTechnical
Technical Papers
Boyuan Chen York University, Zhen Ming (Jack) Jiang York University
Authorizer link Pre-print
15:12
12m
Talk
Causal Testing: Understanding Defects' Root CausesACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Brittany Johnson University of Massachusetts Amherst, Yuriy Brun University of Massachusetts Amherst, Alexandra Meliou University of Massachusetts Amherst
Link to publication DOI Pre-print Media Attached
15:24
8m
Talk
Studying the Characteristics of Logging Practices in Mobile Apps: A Case Study on F-Droid.J1
Journal First
Yi Zeng Concordia University, Jinfu Chen Concordia University, Canada, Weiyi Shang Concordia University, Tse-Hsun (Peter) Chen Concordia University
Authorizer link Pre-print
15:32
6m
Talk
Automatically Predicting Bug Severity Early in the Development ProcessNIER
New Ideas and Emerging Results
Jude Arokiam Ontario Tech University, Jeremy Bradbury Ontario Tech University
15:38
8m
Talk
A Survey on Adaptive Random TestingJ1
Journal First
Rubing Huang Jiangsu University, Weifeng Sun Jiangsu University, Yinyin Xu Jiangsu University, Haibo Chen Jiangsu University, Dave Towey University of Nottingham Ningbo China, Xin Xia Monash University
15:46
12m
Talk
Code Level Model-Checking in the Software Development WorkflowArtifact ReusableArtifact AvailableSEIP
Software Engineering in Practice
Nathan Chong Amazon, Byron Cook Amazon, Konstantinos Kallas University of Pennsylvania, Kareem Khazem Amazon, Felipe R. Monteiro Amazon, Daniel Schwartz-Narbonne Amazon, n.n., Serdar Tasiran Amazon, n.n., Michael Tautschnig Amazon Web Services, Mark R. Tuttle Amazon
Pre-print Media Attached
15:00 - 16:00
A3-Code SummarizationTechnical Papers / New Ideas and Emerging Results at Silla
Chair(s): Shaohua Wang New Jersey Institute of Technology, USA
15:00
12m
Talk
Posit: Simultaneously Tagging Natural and Programming LanguagesTechnicalArtifact Available
Technical Papers
Profir-Petru Pârțachi University College London, Santanu Kumar Dash University College London, UK, Christoph Treude The University of Adelaide, Earl T. Barr University College London, UK
Pre-print Media Attached File Attached
15:12
12m
Talk
CPC: Automatically Classifying and Propagating Natural Language Comments via Program AnalysisTechnicalArtifact Available
Technical Papers
Juan Zhai Rutgers University, Xiangzhe Xu Nanjing University, Yu Shi Purdue University, Guanhong Tao Purdue University, Minxue Pan Nanjing University, Shiqing Ma Rutgers University, Lei Xu National Key Laboratory for Novel Software Technology, Nanjing University, Weifeng Zhang Nanjing University of Posts and Telecommunications, Lin Tan Purdue University, Xiangyu Zhang Purdue University
15:24
12m
Talk
Suggesting Natural Method Names to Check Name ConsistenciesTechnical
Technical Papers
Son Nguyen The University of Texas at Dallas, Hung Phan , Trinh Le University of Engineering and Technology, Tien N. Nguyen University of Texas at Dallas
Pre-print
15:36
6m
Talk
Where should I comment my code? A dataset and model for predicting locations that need commentsNIER
New Ideas and Emerging Results
Annie Louis University of Edinburgh, Santanu Kumar Dash University College London, UK, Earl T. Barr University College London, UK, Michael D. Ernst University of Washington, USA, Charles Sutton Google Research
15:42
12m
Talk
Retrieval-based Neural Source Code SummarizationTechnical
Technical Papers
Jian Zhang Beihang University, Xu Wang Beihang University, Hongyu Zhang University of Newcastle, Australia, Hailong Sun Beihang University, Xudong Liu Beihang University
Pre-print
15:54
6m
Talk
The Dual Channel HypothesisNIER
New Ideas and Emerging Results
Casey Casalnuovo University of California at Davis, USA, Earl T. Barr University College London, UK, Santanu Kumar Dash University College London, UK, Prem Devanbu University of California, Emily Morgan University of California, Davis
16:05 - 17:05
A4-Cyber-Physical SystemsSoftware Engineering in Practice / Technical Papers / Demonstrations at Baekje
Chair(s): Joanne M. Atlee University of Waterloo
16:05
12m
Talk
Adapting Requirements Models to Varying EnvironmentsTechnical
Technical Papers
Dalal Alrajeh Imperial College London, Antoine Cailliau ICTEAM, UCLouvain, Axel van Lamsweerde Université catholique de Louvain
16:17
12m
Talk
Comparing Formal Tools for System Design: a Judgment StudyTechnical
Technical Papers
Alessio Ferrari CNR-ISTI, Franco Mazzanti ISTI-CNR, Davide Basile University of Florence, Maurice H. ter Beek ISTI-CNR, Alessandro Fantechi University of Florence
DOI Pre-print
16:29
3m
Talk
Demo: SLEMI: Finding Simulink Compiler Bugs through Equivalence Modulo Input (EMI)Demo
Demonstrations
Shafiul Azam Chowdhury University of Texas at Arlington, Sohil Lal Shrestha The University of Texas at Arlington, Taylor T Johnson Vanderbilt University, Christoph Csallner University of Texas at Arlington
Link to publication DOI Media Attached
16:32
12m
Talk
The Forgotten Case of the Dependency Bugs: On the Example of the Robot Operating SystemSEIP
Software Engineering in Practice
Anders Fischer-Nielsen IT University of Copenhagen, Zhoulai Fu IT University of Copenhagen, Denmark, Ting Su ETH Zurich, Switzerland, Andrzej Wąsowski IT University of Copenhagen, Denmark
Pre-print
16:44
3m
Talk
PROMISE: High-Level Mission Specification for Multiple RobotsDemo
Demonstrations
Sergio Garcia Chalmers | University of Gothenburg, Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg, Claudio Menghi University of Luxembourg, Thorsten Berger Chalmers | University of Gothenburg, Tomas Bures Charles University, Czech Republic
16:47
12m
Talk
How do you Architect your Robots? State of the Practice and Guidelines for ROS-based SystemsArtifact ReusableArtifact AvailableSEIP
Software Engineering in Practice
Ivano Malavolta Vrije Universiteit Amsterdam, Grace Lewis Carnegie Mellon Software Engineering Institute, Bradley Schmerl Carnegie Mellon University, USA, Patricia Lago Vrije Universiteit Amsterdam, David Garlan Carnegie Mellon University
16:05 - 17:05
A5-Testing and Debugging 2Demonstrations / New Ideas and Emerging Results / Technical Papers at Goguryeo
Chair(s): Marcelo d'Amorim Federal University of Pernambuco
16:05
12m
Talk
Efficient Generation of Error-Inducing Floating-Point Inputs via Symbolic ExecutionArtifact ReusableTechnicalArtifact Available
Technical Papers
Hui Guo University of California, Davis, Cindy Rubio-González University of California, Davis
16:17
12m
Talk
A Study on the Lifecycle of Flaky TestsTechnical
Technical Papers
Wing Lam University of Illinois at Urbana-Champaign, Kıvanç Muşlu Microsoft, Hitesh Sajnani Microsoft , Suresh Thummalapenta Microsoft
16:29
6m
Talk
Is Your Quantum Program Bug-Free?New Ideas and Emerging Results Distinguished Paper AwardsNIER
New Ideas and Emerging Results
Andriy Miranskyy Ryerson University, Lei Zhang Ryerson University, Javad Doliskani Ryerson University, Toronto, Canada
Pre-print
16:35
3m
Talk
DCO Analyzer: Local Controllability and Observability Analysis and Enforcement of Distributed Test ScenariosDemo
Demonstrations
Bruno Lima Faculty of Engineering, University of Porto and INESC TEC, João Pascoal Faria Faculty of Engineering, University of Porto and INESC TEC
16:38
12m
Talk
Ankou: Guiding Grey-box Fuzzing towards Combinatorial DifferenceArtifact ReusableTechnicalArtifact Available
Technical Papers
Valentin Manès CSRC, KAIST, Soomin Kim KAIST, Sang Kil Cha KAIST
16:50
3m
Talk
PG-KLEE: Trading Soundness for CoverageDemo
Demonstrations
Richard Rutledge Georgia Institute of Technology, Alessandro Orso Georgia Tech
16:53
6m
Talk
Blending Kinematic and Software Models for Tighter Reachability AnalysisNIER
New Ideas and Emerging Results
Carl Hildebrandt University of Virginia, Sebastian Elbaum University of Virginia, USA, Nicola Bezzo University of Virginia

Wed 8 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

00:00 - 01:00
P7-Human AspectsNew Ideas and Emerging Results / Technical Papers / Journal First at Baekje
Chair(s): Mei Nagappan University of Waterloo
00:00
8m
Talk
What Predicts Software Developers' Productivity?J1
Journal First
Emerson Murphy-Hill Google, Ciera Jaspan , Caitlin Sadowski Google, David C. Shepherd Virginia Commonwealth University, Michael Phillips National Instruments, Collin Winter Waymo, Andrea Knight , Edward Smith Bloomberg LP, Matthew Jorde Google, Inc.
00:08
6m
Talk
Towards Understanding Emotional Response to Requirements Changes in Agile TeamsNIER
New Ideas and Emerging Results
Kashumi Madampe Monash University, Australia, Rashina Hoda Monash University, Paramvir Singh The University of Auckland
Pre-print
00:14
12m
Talk
A Study on the Prevalence of Human Values in Software Engineering Publications, 2015 – 2018TechnicalArtifact Available
Technical Papers
Jon Whittle Monash University, Gillian Oliver Faculty of Information Technology, Monash University, Waqar Hussain Monash University, Davoud Mougouei Faculty of Information Technology, Monash University, Harsha Perera Monash University, Arif Nurwidyantoro Faculty of Information Technology, Monash University, Rifat Ara Shams Monash University
00:26
12m
Talk
Pushback in Code Review: Characterizing and Detecting Negative Interpersonal InteractionsTechnical
Technical Papers
Pre-print
00:38
12m
Talk
Engineering Gender-Inclusivity into Software: Ten Teams' Tales from the TrenchesTechnical
Technical Papers
Claudia Hilderbrand Oregon State University, Christopher Perdriau Oregon State University, Lara Letaw Oregon State University, Jillian Emard Oregon State University, Zoe Steine-Hanson Oregon State University, Margaret Burnett Oregon State University, Anita Sarma Oregon State University
00:50
8m
Talk
How does Machine Learning Change Software Development Practices?J1
Journal First
Zhiyuan Wan Zhejiang University, Xin Xia Monash University, David Lo Singapore Management University, Gail Murphy University of British Columbia
00:00 - 01:00
00:00
12m
Talk
PRECFIX: Large-Scale Patch Recommendation by Mining Defect-Patch PairsSEIP
Software Engineering in Practice
Xindong Zhang Alibaba Group, Chenguang Zhu University of Texas, Austin, Yi Li Nanyang Technological University, Jianmei Guo Alibaba Group, Lihua Liu Alibaba Group, Haobo Gu Alibaba Group
Pre-print
00:12
12m
Talk
On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Kui Liu Nanjing University of Aeronautics and Astronautics, Shangwen Wang National University of Defense Technology, Anil Koyuncu University of Luxembourg, Luxembourg, Kisub Kim University of Luxembourg, SnT, Tegawendé F. Bissyandé SnT, University of Luxembourg, Dongsun Kim Furiosa.ai, Peng Wu National University of Defense Technology, Jacques Klein University of Luxembourg, SnT, Xiaoguang Mao National University of Defense Technology, Yves Le Traon University of Luxembourg
Pre-print
00:24
8m
Talk
SEQUENCER: Sequence-to-Sequence Learning for End-to-End Program RepairJ1
Journal First
Zimin Chen KTH Royal Institute of Technology, Steve Kommrusch Colorado State University, Michele Tufano College of William and Mary, Louis-Noël Pouchet Colorado State University, USA, Denys Poshyvanyk William and Mary, Martin Monperrus KTH Royal Institute of Technology
00:32
8m
Talk
A Study of Bug Resolution Characteristics in Popular Programming LanguagesJ1
Journal First
Jie M. Zhang University College London, UK, Feng Li , Dan Hao Peking University, Meng Wang University of Bristol, UK, Hao Tang Peking University, Lu Zhang Peking University, China, Mark Harman Facebook and University College London
00:40
12m
Talk
Automated Bug Reproduction from User Reviews for Android ApplicationsSEIP
Software Engineering in Practice
Shuyue Li Xi'an Jiaotong University, Jiaqi Guo Xi'an Jiaotong University, Ming Fan Xi'an Jiaotong University, Jian-Guang Lou Microsoft Research, Qinghua Zheng Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
00:52
6m
Talk
CHASE: Checklist to Assess User Experience in Internet of Things EnvironmentsNIER
New Ideas and Emerging Results
Rodrigo Almeida Federal University of Ceará, Joseane Paiva Federal University of Ceará, Rossana Andrade Federal University of Ceará, Ticianne Darin Federal University of Ceará
01:05 - 02:05
01:05
8m
Talk
What Do Programmers Discuss about Blockchain? A Case Study on the Use of Balanced LDA and the Reference Architecture of a Domain to Capture Online Discussions about Blockchain Platforms across Stack Exchange CommunitiesJ1
Journal First
Zhiyuan Wan Zhejiang University, Xin Xia Monash University, Ahmed E. Hassan Queen's University
01:13
8m
Talk
Bounties on Technical Q&A Sites: A Case Study of Stack Overflow BountiesJ1
Journal First
Jiayuan Zhou Queen's University, Shaowei Wang Mississippi State University, Cor-Paul Bezemer University of Alberta, Canada, Ahmed E. Hassan Queen's University
01:21
8m
Talk
MSRBot: Using Bots to Answer Questions from Software RepositoriesJ1
Journal First
Ahmad Abdellatif Concordia University, Khaled Badran Concordia University, Emad Shihab Concordia University
DOI
01:29
6m
Talk
Why Will My Question Be Closed? NLP-Based Pre-Submission Predictions of Question Closing Reasons on Stack OverflowNIER
New Ideas and Emerging Results
Laszlo Toth University of Szeged, Hungary, Balázs Nagy University of Szeged, Hungary, László Vidács University of Szeged, Hungary, Tibor Gyimóthy University of Szeged, Hungary
01:35
12m
Talk
Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack OverflowTechnical
Technical Papers
Alex Cummaudo Applied Artificial Intelligence Institute, Deakin University, Rajesh Vasa Deakin University, Scott Barnett Deakin University, John Grundy Monash University, Mohamed Abdelrazek Deakin University
01:05 - 02:05
P11-Natural Language ArtifactsJournal First / Technical Papers at Goguryeo
Chair(s): Jane Cleland-Huang University of Notre Dame
01:05
8m
Talk
Neural Network Based Classification of Self-admitted Technical Debt: From Performance to Explainability and DeployabilityJ1
Journal First
Xiaoxue Ren Zhejiang University, Zhenchang Xing Australia National University, Xin Xia Monash University, David Lo Singapore Management University, Xinyu Wang Zhejiang University, John Grundy Monash University
01:13
8m
Talk
Domain-specific Machine Translation with Recurrent Neural Network for Software LocalizationJ1
Journal First
Xu Wang College of Engineering & Computer ScienceAustralian National University, Canberra, Australia, Chunyang Chen Monash University, Zhenchang Xing Australia National University
01:21
12m
Talk
Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge DistributionTechnicalArtifact Available
Technical Papers
Ehsan Mirsaeedi Concordia University, Peter Rigby Concordia University, Montreal, Canada
01:05 - 02:05
P12-Testing and DebuggingJournal First / Software Engineering in Practice at Silla
Chair(s): Taeksu Kim Samsung Research, Samsung Electronics
01:05
12m
Talk
Debugging Crashes using Continuous Contrast Set MiningSEIP
Software Engineering in Practice
Rebecca Qian Facebook, Inc., Yang Yu Purdue University, Wonhee Park Facebook, Inc., Vijayaraghavan Murali Facebook, Inc., Stephen J Fink Facebook, Satish Chandra Facebook
01:17
12m
Talk
Automatic Abnormal Log Detection by Analyzing Log History for Providing Debugging InsightSEIP
Software Engineering in Practice
Jinhan Kim , Valeriy Savchenko Ivannikov Institute for System Programming of the RAS, Kihyuck Shin Samsung Electronics, Konstantin Sorokin Ivannikov Institute for System Programming of the RAS, Hyunseok Jeon Samsung Electronics, Georgiy Pankratenko Ivannikov Institute for System Programming of the RAS, Sergey Markov Ivannikov Institute for System Programming of the RAS, Chul-Joo Kim Samsung Electronics
01:29
8m
Talk
Explaining Regressions via Alignment Slicing and MendingJ1
Journal First
Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Yun Lin National University of Singapore, Zijiang Yang Western Michigan University, Jun Sun Singapore Management University, Yang Liu Nanyang Technological University, Singapore, Jin Song Dong National University of Singapore, Qinghua Zheng Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University
01:37
8m
Talk
Historical Spectrum based Fault LocalizationJ1
Journal First
Ming Wen Huazhong University of Science and Technology, China, Junjie Chen Tianjin University, China, Yongqiang TIAN The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Dan Hao Peking University, Shi Han Microsoft Research Asia, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
01:45
8m
Talk
Visualizing distributed system executionsJ1
Journal First
Ivan Beschastnikh Computer Science, University of British Columbia, Perry Liu University of British Columbia, Albert Xing University of British Columbia, Patty Wang University of British Columbia, Yuriy Brun University of Massachusetts Amherst, Michael D. Ernst University of Washington, USA
DOI Pre-print
01:53
8m
Talk
An Integration Test Order Strategy to Consider Control CouplingJ1
Journal First
Shujuan Jiang China University of Mining and Technology, Miao ZHANG City University of Hong Kong, Yanmei ZHANG China University of Mining and Technology, Rongcun Wang China University of Mining and Technology, Qiao YU Jiangsu Normal University, Jacky Keung City University of Hong Kong
15:00 - 16:00
A7-Human Aspects 1Technical Papers / Journal First / New Ideas and Emerging Results at Baekje
Chair(s): Alexander Serebrenik Eindhoven University of Technology
15:00
8m
Talk
Towards a theory of software developer job satisfaction and perceived productivityJ1
Journal First
Margaret-Anne Storey University of Victoria, Thomas Zimmermann Microsoft Research, Christian Bird Microsoft Research, Jacek Czerwonka Developer Services, Microsoft, Brendan Murphy Microsoft Research, Eirini Kalliamvakou University of Victoria
Pre-print Media Attached
15:08
6m
Talk
Eye of the Mind: Image Processing for Social CodingNIER
New Ideas and Emerging Results
Maleknaz Nayebi York University
Pre-print
15:14
12m
Talk
How Software Practitioners Use Informal Local Meetups to Share Software Engineering KnowledgeTechnical
Technical Papers
Claire Ingram University of York, Anders Drachen University of York
15:26
12m
Talk
Explaining Pair Programming Session Dynamics from Knowledge GapsTechnical
Technical Papers
Franz Zieris Freie Universität Berlin, Lutz Prechelt Freie Universität Berlin
DOI Pre-print Media Attached
15:38
6m
Talk
Better Code, Better Sharing: On the Need of Analyzing Jupyter NotebooksNIER
New Ideas and Emerging Results
Jiawei Wang Monash University, Li Li Monash University, Australia, Andreas Zeller CISPA Helmholtz Center for Information Security
Pre-print
15:44
6m
Talk
Stress and Burnout in Open Source: Toward Finding, Understanding, and Mitigating Unhealthy InteractionsNIER
New Ideas and Emerging Results
Naveen Raman University of Maryland, College Park, Minxuan Cao Carnegie Mellon University, Yulia Tsvetkov Carnegie Mellon University, Christian Kästner Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
Pre-print
15:50
8m
Talk
Enabling Good Work Habits in Software Developers through Reflective Goal-SettingJ1
Journal First
André N. Meyer University of Zurich, Gail Murphy University of British Columbia, Thomas Zimmermann Microsoft Research, Thomas Fritz University of Zurich
Pre-print Media Attached
15:00 - 16:00
A8-Machine Learning and ModelsJournal First / Technical Papers at Goguryeo
Chair(s): Liliana Pasquale University College Dublin & Lero
15:00
8m
Talk
Improving Vulnerability Inspection Efficiency Using Active LearningJ1
Journal First
Zhe Yu NORTH CAROLINA STATE UNIVERSITY, Chris Theisen Microsoft, Laurie Williams North Carolina State University, Tim Menzies North Carolina State University
15:08
8m
Talk
How Bugs Are Born: A Model to Identify How Bugs Are Introduced in Software ComponentsJ1
Journal First
Gema Rodríguez-Pérez University of Waterloo, Canada, Gregorio Robles Universidad Rey Juan Carlos, Alexander Serebrenik Eindhoven University of Technology, Andy Zaidman TU Delft, Daniel M. German University of Victoria, Jesus M. Gonzalez-Barahona Universidad Rey Juan Carlos
DOI Pre-print
15:16
8m
Talk
How to “DODGE” Complex Software AnalyticsJ1
Journal First
Amritanshu Agrawal Wayfair, Wei Fu Landing AI, Di Chen North Carolina State University, USA, Xipeng Shen North Carolina State University, Tim Menzies North Carolina State University
15:24
12m
Talk
Importance-Driven Deep Learning System TestingTechnical
Technical Papers
Simos Gerasimou University of York, UK, Hasan Ferit Eniser MPI-SWS, Alper Sen Bogazici University, Turkey, Alper Çakan Bogazici University, Turkey
15:36
12m
Talk
Quickly Generating Diverse Valid Test Inputs with Reinforcement LearningArtifact ReusableTechnicalArtifact Available
Technical Papers
Sameer Reddy University of California, Berkeley, Caroline Lemieux University of California, Berkeley, Rohan Padhye Carnegie Mellon University, Koushik Sen University of California, Berkeley
15:48
8m
Talk
Impact of Discretization Noise of the Dependent variable on Machine Learning Classifiers in Software EngineeringJ1
Journal First
Gopi Krishnan Rajbahadur Queen's University, Shaowei Wang Mississippi State University, Yasutaka Kamei Kyushu University, Ahmed E. Hassan Queen's University
15:00 - 16:00
15:00
12m
Talk
A Novel Approach to Tracing Safety Requirements and State-Based Design ModelsTechnical
Technical Papers
Mounifah Alenazi University of Cincinnati, Nan Niu University of Cincinnati, Juha Savolainen Danfoss
15:12
12m
Talk
Establishing Multilevel Test-to-Code Traceability LinksArtifact ReusableTechnicalArtifact Available
Technical Papers
Robert White University College London, UK, Jens Krinke University College London, Raymond Tan University College London
15:24
6m
Talk
Synthesis of Assurance Cases for Software CertificationNIER
New Ideas and Emerging Results
Hamid Bagheri University of Nebraska-Lincoln, USA, Eunsuk Kang Carnegie Mellon University, Niloofar Mansoor University of Nebraska - Lincoln
Pre-print
15:30
3m
Talk
TimeTracer: A Tool for Back in Time Traceability ReplayingDemo
Demonstrations
Christoph Mayr-Dorn Johannes Kepler University Linz, Michael Vierhauser Johannes Kepler University Linz, Felix Keplinger Johannes Kepler University, Linz, Stefan Bichler Johannes Kepler University, Linz, Alexander Egyed Johannes Kepler University, Linz
15:33
12m
Talk
Lack of Adoption of Units of Measurement Libraries: Survey and AnecdotesSEIP
Software Engineering in Practice
Steve McKeever Department of Informatics and Media, Uppsala University, Sweden, Omar-Alfred Salah Department of Informatics and Media, Uppsala University, Sweden
15:45
12m
Talk
Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian NetworksTechnical
Technical Papers
Kevin Moran William & Mary/George Mason University, David Nader Palacio William & Mary, Carlos Bernal-Cárdenas William and Mary, Denys Poshyvanyk William and Mary, Daniel McCrystal William & Mary, Chris Shenefiel Cisco Systems, Jeff Johnson Cisco Systems
Pre-print Media Attached
16:05 - 17:05
A10-Human Aspects 2Journal First / Technical Papers at Baekje
Chair(s): Giuseppe Scanniello University of Basilicata
16:05
8m
Talk
Characterizing and Identifying Reverted CommitsJ1
Journal First
Meng Yan Chongqing University, Xin Xia Monash University, David Lo Singapore Management University, Ahmed E. Hassan Queen's University, Shanping Li Zhejiang University
16:13
8m
Talk
An Empirical Study of Obsolete Answers on Stack OverflowJ1
Journal First
Haoxiang Zhang Software Analysis and Intelligence Lab (SAIL), Queen’s University, Kingston, Ontario, Canada, Shaowei Wang Mississippi State University, Tse-Hsun (Peter) Chen Concordia University, Ying Zou Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen's University
16:21
8m
Talk
An Empirical Characterization of Bad Practices in Continuous IntegrationJ1
Journal First
Fiorella Zampetti University of Sannio, Carmine Vassallo University of Zurich, Sebastiano Panichella Zurich University of Applied Sciences, Gerardo Canfora University of Sannio, Harald Gall University of Zurich, Massimiliano Di Penta University of Sannio
Link to publication DOI Pre-print
16:29
8m
Talk
To the Attention of Mobile Software Developers: Guess What, Test your App!J1
Journal First
Luís Cruz Deflt University of Technology, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, David Lo Singapore Management University
DOI Pre-print Media Attached
16:37
12m
Talk
Primers or Reminders? The Effects of Existing Review Comments on Code ReviewACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Davide Spadini Delft University of Technology, Netherlands, Gül Calikli Chalmers | University of Gothenburg, Alberto Bacchelli University of Zurich
DOI Pre-print Media Attached
16:05 - 17:05
A11-Performance and AnalysisNew Ideas and Emerging Results / Journal First / Technical Papers / Demonstrations at Goguryeo
Chair(s): Pooyan Jamshidi University of South Carolina
16:05
3m
Talk
Nimbus: Improving the Developer Experience for Serverless ApplicationsDemo
Demonstrations
Robert Chatley Imperial College London, Thomas Allerton Starling Bank
Pre-print
16:08
8m
Talk
Testing with Fewer Resources: An Adaptive Approach to Performance-Aware Test Case GenerationJ1
Journal First
Giovanni Grano University of Zurich, Christoph Laaber University of Zurich, Annibale Panichella Delft University of Technology, Sebastiano Panichella Zurich University of Applied Sciences
Link to publication DOI Pre-print
16:16
8m
Talk
What's Wrong with My Benchmark Results? Studying Bad Practices in JMH BenchmarksJ1
Journal First
Diego Costa Concordia University, Canada, Cor-Paul Bezemer University of Alberta, Canada, Philipp Leitner Chalmers University of Technology & University of Gothenburg, Artur Andrzejak Heidelberg University
16:24
12m
Talk
Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are We There Yet?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Zishuo Ding Concordia University, Canada, Jinfu Chen Concordia University, Canada, Weiyi Shang Concordia University
Pre-print
16:36
8m
Talk
ModGuard: Identifying Integrity & Confidentiality Violations in Java ModulesJ1
Journal First
Andreas Dann Paderborn University, Ben Hermann Paderborn University, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM
Link to publication DOI
16:44
6m
Talk
Program Debloating via Stochastic OptimizationNIER
New Ideas and Emerging Results
Qi Xin Georgia Institute of Technology, Myeongsoo Kim Georgia Institute of Technology, Qirun Zhang Georgia Institute of Technology, USA, Alessandro Orso Georgia Tech
16:50
8m
Talk
The ORIS Tool: Quantitative Evaluation of Non-Markovian SystemsJ1
Journal First
Marco Paolieri University of Southern California, Marco Biagi University of Florence, Laura Carnevali University of Florence, Enrico Vicario University of Florence
16:05 - 17:05
A12-TestingJournal First / New Ideas and Emerging Results / Demonstrations / Technical Papers at Silla
Chair(s): Sasa Misailovic University of Illinois at Urbana-Champaign
16:05
12m
Talk
Practical Fault Detection in Puppet ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Thodoris Sotiropoulos Athens University of Economics and Business, Dimitris Mitropoulos Athens University of Economics and Business, Diomidis Spinellis Athens University of Economics and Business
16:17
8m
Talk
Empirical Assessment of Multimorphic TestingJ1
Journal First
Paul Temple PReCISE, NaDi, UNamur, Mathieu Acher (Univ Rennes, Inria, IRISA), Jean-Marc Jézéquel Univ Rennes - IRISA
16:25
3m
Talk
RTj: a Java framework for detecting and refactoring rotten green test casesDemo
Demonstrations
Matias Martinez Université Polytechnique Hauts-de-France, Anne Etien Université de Lille, CNRS, Inria, Centrale Lille, UMR 9189 –CRIStAL, Stéphane Ducasse INRIA Lille, Christopher Fuhrman École de technologie supérieure
Pre-print Media Attached
16:28
6m
Talk
A Container-Based Infrastructure for Fuzzy-Driven Root Causing of Flaky TestsNIER
New Ideas and Emerging Results
Valerio Terragni Università della Svizzera Italiana, Pasquale Salza University of Zurich, Filomena Ferrucci University of Salerno
Pre-print Media Attached
16:34
12m
Talk
Learning from, Understanding, and Supporting DevOps Artifacts for DockerArtifact ReusableTechnicalArtifact Available
Technical Papers
Jordan Henkel University of Wisconsin–Madison, Christian Bird Microsoft Research, Shuvendu Lahiri Microsoft Research, Thomas Reps University of Wisconsin-Madison, USA
16:46
8m
Talk
Improving Change Prediction Models with Code Smell-Related InformationJ1
Journal First
Gemma Catolino Delft University of Technology, Fabio Palomba University of Salerno, Francesca Arcelli Fontana University of Milano-Bicocca, Andrea De Lucia University of Salerno, Andy Zaidman TU Delft, Filomena Ferrucci University of Salerno
DOI Pre-print
16:54
3m
Talk
SMRL: A Metamorphic Security Testing Tool for Web SystemsDemo
Demonstrations
Phu X. Mai University of Luxembourg, Arda Goknil SnT, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel C. Briand SnT Centre/University of Luxembourg
17:10 - 18:00
17:10
50m
Talk
PG-KLEE: Trading Soundness for CoverageDemo
Demonstrations
Richard Rutledge Georgia Institute of Technology, Alessandro Orso Georgia Tech
17:10
50m
Talk
SMRL: A Metamorphic Security Testing Tool for Web SystemsDemo
Demonstrations
Phu X. Mai University of Luxembourg, Arda Goknil SnT, University of Luxembourg, Fabrizio Pastore University of Luxembourg, Lionel C. Briand SnT Centre/University of Luxembourg
17:10
50m
Talk
Nimbus: Improving the Developer Experience for Serverless ApplicationsDemo
Demonstrations
Robert Chatley Imperial College London, Thomas Allerton Starling Bank
Pre-print

Thu 9 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

00:00 - 01:00
P13-SecurityTechnical Papers / Software Engineering in Practice at Baekje
Chair(s): Joshua Garcia University of California, Irvine
00:00
12m
Talk
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return AddressesTechnicalArtifact Available
Technical Papers
Changwei Zou UNSW Sydney, Jingling Xue UNSW Sydney
00:12
12m
Talk
Automated Identification of Libraries from Vulnerability DataSEIP
Software Engineering in Practice
Chen Yang Veracode, Inc., Andrew Santosa Veracode, Inc., Asankhaya Sharma Veracode, Inc., David Lo Singapore Management University
Pre-print Media Attached
00:24
12m
Talk
Unsuccessful Story about Few Shot Malware-Family Classification and Siamese Network to the RescueTechnical
Technical Papers
Yude Bai Tianjin University, Zhenchang Xing Australia National University, Li Xiaohong TianJin University, Zhiyong Feng Tianjin University, Duoyuan Ma Tianjin University
00:36
12m
Talk
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak DetectionTechnical
Technical Papers
Shengjian Guo Baidu X-Lab, Yueqi Chen The Pennsylvania State University, Peng Li Baidu X-Lab, Yueqiang Cheng Baidu Security, Huibo Wang Baidu X-Lab, Meng Wu Ant Financial, Zhiqiang Zuo Nanjing University, China
00:48
12m
Talk
Building and Maintaining a Third-Party Library Supply Chain for Productive and Secure SGX Enclave DevelopmentSEIP
Software Engineering in Practice
Pei Wang Baidu X-Lab, Yu Ding Baidu X-Lab, Mingshen Sun Baidu X-Lab, Huibo Wang Baidu X-Lab, Tongxin Li Baidu X-Lab, Rundong Zhou Baidu X-Lab, Zhaofeng Chen , Yiming Jing Baidu X-Lab
00:00 - 01:00
P14-TestingTechnical Papers / Software Engineering in Practice at Goguryeo
Chair(s): Shin Yoo Korea Advanced Institute of Science and Technology
00:00
12m
Talk
Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t GuidelinesTechnical
Technical Papers
Dehai Zhao Australian National University, Zhenchang Xing Australia National University, Chunyang Chen Monash University, Xiwei Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China
00:12
12m
Talk
Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksTechnical
Technical Papers
Xiang Gao National University of Singapore, Singapore, Ripon Saha Fujitsu Laboratories of America, Inc., Mukul R. Prasad Fujitsu Laboratories of America, Inc, Abhik Roychoudhury National University of Singapore, Singapore
00:24
12m
Talk
Modeling and Ranking Flaky Tests at AppleSEIP
Software Engineering in Practice
Emily Kowalczyk Apple Inc., Karan Nair Apple, Zebao Gao Apple, Leopold Silberstein Apple Inc., Teng Long Apple, Atif Memon Apple Inc.
00:36
12m
Talk
Testing File System Implementations on Layered ModelsTechnicalArtifact Available
Technical Papers
Dongjie Chen Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University
00:48
12m
Talk
A Cost-efficient Approach to Building in Continuous IntegrationTechnical
Technical Papers
Xianhao Jin Virginia Tech, USA, Francisco Servant Virginia Tech
Pre-print
01:05 - 02:05
P16-Security and LearningTechnical Papers / Journal First at Baekje
Chair(s): Lingming Zhang The University of Texas at Dallas
01:05
12m
Talk
Software Visualization and Deep Transfer Learning for Effective Software Defect PredictionTechnical
Technical Papers
Jinyin Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Keke Hu College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Zhuangzhi Chen College of Information Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Qi Xuan Institute of Cyberspace Security, Zhejiang University of Technology, Hangzhou 310023, China, Yi Liu Institute of Process Equipment and Control Engineering, Zhejiang University of Technology, Hangzhou 310023, China, Vladimir Filkov University of California at Davis, USA
01:17
8m
Talk
Easy-to-Deploy API Extraction by Multi-Level Feature Embedding and Transfer LearningJ1
Journal First
Suyu Ma Monash University, Zhenchang Xing Australia National University, Chunyang Chen Monash University, Cheng Chen PricewaterhouseCoopers Firm, Lizhen Qu Monash University, Guoqiang Li Shanghai Jiao Tong University
01:25
12m
Talk
How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?TechnicalArtifact Available
Technical Papers
Xueling Zhang University of Texas at San Antonio, Xiaoyin Wang University of Texas at San Antonio, USA, Rocky Slavin University of Texas at San Antonio, Travis Breaux Carnegie Mellon University, Jianwei Niu University of Texas at San Antonio
01:37
12m
Talk
Securing UnSafe Rust Programs with XRustArtifact ReusableTechnical
Technical Papers
Peiming Liu Texas A&M University, Gang Zhao Texas A&m University, Jeff Huang Texas A&M University
01:49
12m
Talk
Is Rust Used Safely by Software Developers?Technical
Technical Papers
Ana Nora Evans University of Virginia, USA, Bradford Campbell University of Virginia, Mary Lou Soffa University of Virginia
01:05 - 02:05
P17-Software DevelopmentJournal First / Technical Papers / Demonstrations at Goguryeo
Chair(s): Minghui Zhou Peking University
01:05
8m
Talk
Improving the Pull Requests Review Process Using Learning-to-rank AlgorithmsJ1
Journal First
Guoliang Zhao Computer Science of Queen's University, Daniel Alencar Da Costa University of Otago, Ying Zou Queen's University, Kingston, Ontario
01:13
8m
Talk
Understanding the motivations, challenges and needs of Blockchain software developers: a surveyJ1
Journal First
Amiangshu Bosu Wayne State University, Anindya Iqbal Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Rifat Shahriyar Bangladesh University of Engineering and Technology Dhaka, Bangladesh, Partho Chakraborty Bangladesh University of Engineering and Technology Dhaka, Bangladesh
01:21
12m
Talk
Gap between Theory and Practice : An Empirical Study of Security Patches in SolidityArtifact ReusableTechnicalArtifact Available
Technical Papers
01:33
12m
Talk
A Tale from the Trenches: Cognitive Biases and Software DevelopmentACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Souti Chattopadhyay Graduate Student, Nicholas Nelson Oregon State University, Audrey Au Oregon State University, Natalia Morales Oregon State University, Christopher Sanchez Oregon State University, Rahul Pandita Phase Change Software, Anita Sarma Oregon State University
01:45
3m
Talk
VITALSE: Visualizing Eye Tracking and Biometric DataDemo
Demonstrations
Devjeet Roy Washington State University, Sarah Fakhoury Washington State University, Venera Arnaoudova Washington State University
Pre-print
01:05 - 02:05
P18-Open Source SystemsJournal First / Technical Papers at Silla
Chair(s): John Grundy Monash University
01:05
8m
Talk
Companies' Participation in OSS Development - An Empirical Study of OpenStackJ1
Journal First
Yuxia Zhang Peking University, Minghui Zhou Peking University, Audris Mockus University of Tennessee - Knoxville, Zhi Jin Peking University
01:13
8m
Talk
Moving from Closed to Open Source: Observations from Six Transitioned Projects to GitHubJ1
Journal First
Pavneet Singh Kochhar Microsoft, Eirini Kalliamvakou University of Victoria, Nachiappan Nagappan Microsoft Research, Thomas Zimmermann Microsoft Research, Christian Bird Microsoft Research
Pre-print Media Attached
01:21
12m
Talk
How do Companies Collaborate in Open Source Ecosystems? An Empirical Study of OpenStackTechnical
Technical Papers
Yuxia Zhang Peking University, Minghui Zhou Peking University, Klaas-Jan Stol University College Cork and Lero, Ireland, Jianyu Wu Peking University, Zhi Jin Peking University
Pre-print
01:33
12m
Talk
How to Not Get Rich: An Empirical Study of Donations in Open SourceArtifact ReusableTechnical
Technical Papers
Cassandra Overney Olin College of Engineering, Jens Meinicke Carnegie Mellon University, Christian Kästner Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
Pre-print
01:45
12m
Talk
Scaling Open Source Communities: an Empirical Study of the Linux kernelTechnical
Technical Papers
Xin Tan Peking University, Minghui Zhou Peking University, Brian Fitzgerald Lero - The Irish Software Research Centre and University of Limerick
Pre-print
02:10 - 03:00
02:10
50m
Talk
VITALSE: Visualizing Eye Tracking and Biometric DataDemo
Demonstrations
Devjeet Roy Washington State University, Sarah Fakhoury Washington State University, Venera Arnaoudova Washington State University
Pre-print
07:00 - 08:00
I13-Testing and Debugging 1Demonstrations / Technical Papers / Software Engineering in Practice / Journal First at Baekje
Chair(s): Shin Hwei Tan Southern University of Science and Technology
07:00
12m
Talk
Learning-to-Rank vs Ranking-to-Learn: Strategies for Regression Testing in Continuous IntegrationTechnical
Technical Papers
Antonia Bertolino CNR-ISTI, Antonio Guerriero Università di Napoli Federico II, Breno Miranda Federal University of Pernambuco, Roberto Pietrantuono Università di Napoli Federico II, Stefano Russo Università di Napoli Federico II
07:12
12m
Talk
Debugging InputsArtifact ReusableTechnicalArtifact Available
Technical Papers
Lukas Kirschner Saarland University, Ezekiel O. Soremekun CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security
Link to publication DOI Pre-print
07:24
12m
Talk
Property-based Testing for LG Home Appliances using Accelerated Software-in-the-Loop SimulationIEEE Software Best Software Engineering in Practice AwardSEIP
Software Engineering in Practice
Mingyu Park LG Electronics, Hoon Jang Hyundai Motor Company, Taejoon Byun University of Minnesota, Yunja Choi Kyungpook National University
Pre-print
07:36
8m
Talk
Predicting Software Defect Type using Concept-based ClassificationJ1
Journal First
Sangameshwar Patil Dept. of CSE, IIT Madras and TRDDC, TCS, Balaraman Ravindran IIT Madras
07:44
8m
Talk
The Art, Science, and Engineering of Fuzzing: A SurveyJ1
Journal First
Valentin Manès CSRC, KAIST, HyungSeok Han KAIST, Choongwoo Han NAVER Corporation, Sang Kil Cha KAIST, Manuel Egele Boston University, USA, Edward Schwartz Carnegie Mellon University, Maverick Woo Carnegie Mellon University
07:52
3m
Talk
GeekyNote: A Technical Documentation Tool with Coverage, Backtracking, Traces, and CouplingsDemo
Demonstrations
Yung-Pin Cheng National Central University, Wei-Nien Hsiung National Central University, Yu-Shan Wu IsCoollab Co. Ltd, Li-Hsuan Chen IsCoollab Co. Ltd
07:00 - 08:00
07:00
12m
Talk
Impact Analysis of Cross-Project Bugs on Software EcosystemsTechnical
Technical Papers
Wanwangying Ma Nanjing University, Lin Chen Nanjing University, Xiangyu Zhang Purdue University, Yang Feng Nanjing University, Zhaogui Xu Nanjing University, China, Zhifei Chen Huawei, Yuming Zhou Nanjing University, Baowen Xu Nanjing University
07:12
8m
Talk
SIEVE: Helping Developers Sift Wheat from Chaff via Cross-Platform AnalysisJ1
Journal First
Agus Sulistya Telkom Institute of Technology Surabaya, Gede Artha Azriadi Prana Singapore Management University, Abhishek Sharma Singapore Management University, Singapore, David Lo Singapore Management University, Christoph Treude The University of Adelaide
07:20
18m
Talk
Sharing at Scale: An Open-Source-Software-based License Compliance EcosystemSEIP
Software Engineering in Practice
Frances Paulisch Siemens Healthineers, Arun Azhakesan Siemens Healthineers
07:38
8m
Talk
Extended abstract “Software Deployment on Heterogeneous Platforms: A Systematic Mapping Study”J1
Journal First
Hugo Andrade Chalmers University of Technology, Jan Schroeder Chalmers | University of Gothenburg, Ivica Crnkovic Chalmers | University of Gothenburg
07:46
8m
Talk
A Large Scale Study of Long-Time Contributor Prediction for GitHub ProjectsJ1
Journal First
Lingfeng Bao Zhejiang University, Xin Xia Monash University, David Lo Singapore Management University, Gail Murphy University of British Columbia
08:05 - 09:05
I16-Testing and Debugging 2Technical Papers / Journal First at Baekje
Chair(s): Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID
08:05
12m
Talk
Low-Overhead Deadlock PredictionTechnical
Technical Papers
Yan Cai Institute of Software, Chinese Academy of Sciences, Ruijie Meng University of Chinese Academy of Sciences, Jens Palsberg University of California, Los Angeles
08:17
8m
Talk
The Impact of Feature Reduction Techniques on Defect Prediction ModelsJ1
Journal First
Masanari Kondo Kyoto Institute of Technology, Cor-Paul Bezemer University of Alberta, Canada, Yasutaka Kamei Kyushu University, Ahmed E. Hassan Queen's University, Osamu Mizuno Kyoto Institute of Technology
08:25
8m
Talk
The Impact of Correlated Metrics on the Interpretation of Defect ModelsJ1
Journal First
Jirayus Jiarpakdee Monash University, Australia, Chakkrit Tantithamthavorn Monash University, Australia, Ahmed E. Hassan Queen's University
08:33
8m
Talk
The Impact of Mislabeled Changes by SZZ on Just-in-Time Defect PredictionJ1
Journal First
Yuanrui Fan Zhejiang University, Xin Xia Monash University, Daniel Alencar Da Costa University of Otago, David Lo Singapore Management University, Ahmed E. Hassan Queen's University, Shanping Li Zhejiang University
08:41
8m
Talk
Which Variables Should I Log?J1
Journal First
Zhongxin Liu Zhejiang University, Xin Xia Monash University, David Lo Singapore Management University, Zhenchang Xing Australia National University, Ahmed E. Hassan Queen's University, Shanping Li Zhejiang University
08:49
12m
Talk
Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical StudyTechnicalArtifact Available
Technical Papers
Ke Li University of Exeter, Zilin Xiang University of Electronic Science and Technology of China, Tao Chen Loughborough University, Shuo Wang , Kay Chen Tan City University of Hong Kong
Pre-print
08:05 - 09:05
I17-Contracts and AnalysisDemonstrations / Technical Papers / Software Engineering in Practice / Journal First at Goguryeo
Chair(s): Jaechang Nam Handong Global University
08:05
10m
Talk
How to reduce risk effectively in fixed price software developmentSEIP
Software Engineering in Practice
Volker Gruhn University Duisburg-Essen, Niklas Spitczok von Brisinski adesso AG
08:15
10m
Talk
Seraph: Enabling Cross-Platform Security Analysis For EVM and WASM Smart ContractsDemo
Demonstrations
Zhiqiang Yang Oxford-Hainan Blockchain Research Institute, Han Liu Tsinghua University, Yue Li Oxford-Hainan Blockchain Research Institute, Huixuan Zheng Oxford-Hainan Blockchain Research Institute, Lei Wang Oxford-Hainan Blockchain Research Institute, Bangdao Chen Oxford-Hainan Blockchain Research Institute
08:25
10m
Talk
Escape from Escape Analysis of GolangSEIP
Software Engineering in Practice
Cong Wang Tsinghua University, Mingrui Zhang Tsinghua University, Beijing, China, Yu Jiang , Huafeng Zhang Huawei Technologies, Hangzhou, China, Zhenchang Xing Australia National University, Ming Gu
08:35
10m
Talk
Smart Contract Development: Challenges and OpportunitiesJ1
Journal First
Weiqin Zou Nanjing University, David Lo Singapore Management University, Pavneet Singh Kochhar Microsoft, Xuan-Bach D. Le Singapore Management University, Singapore, Xin Xia Monash University, Yang Feng Nanjing University, Zhenyu Chen Nanjing University, Baowen Xu Nanjing University
08:45
10m
Talk
Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart ContractsArtifact ReusableTechnicalArtifact Available
Technical Papers
Thomas Durieux KTH Royal Institute of Technology, Sweden, João F. Ferreira INESC-ID and IST, University of Lisbon, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, Pedro Cruz IST, University of Lisbon, Portugal
Pre-print
08:55
10m
Talk
An Extended Abstract of “METRIC+: A Metamorphic Relation Identification Technique Based on Input Plus Output Domains”J1
Journal First
Chang-ai Sun University of Science and Technology Beijing, An Fu University of Science and Technology Beijing, Pak-Lok Poon School of Engineering & Technology, Central Queensland University, Australia, Xiaoyuan Xie School of Computer Science, Wuhan University, China, Huai Liu Swinburne University of Technology, Tsong Yueh Chen Swinburne University of Technology
08:05 - 09:05
I18-APIs and CommitsNew Ideas and Emerging Results / Journal First / Technical Papers at Silla
Chair(s): Massimiliano Di Penta University of Sannio
08:05
8m
Talk
Enriching API Documentation with Code Samples and Usage Scenarios from Crowd KnowledgeJ1
Journal First
Jingxuan Zhang Nanjing University of Aeronautics and Astronautics, He Jiang School of Software, Dalian University of Technology, Zhilei Ren Dalian University of Technology, Tao Zhang Harbin Engineering University, Zhiqiu Huang Nanjing University of Aeronautics and Astronautics
08:13
6m
Talk
Cooperative API Misuse Detection Using Correction RulesNIER
New Ideas and Emerging Results
Sebastian Nielebock Otto-von-Guericke University Magdeburg, Germany, Robert Heumüller Chair of Software Engineering, Faculty of Computer Science, Otto-von-Guericke-University Magdeburg, Jacob Krüger Otto von Guericke University Magdeburg, Frank Ortmeier Otto-von-Guericke-University Magdeburg, Faculty of Computer Science, Chair of Software Engineering
DOI Pre-print
08:19
12m
Talk
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale StudyTechnical
Technical Papers
Hao Xia Fudan University, Yuan Zhang Fudan University, Yingtian Zhou Fudan University, Xiaoting Chen Fudan University, Yang Wang Fudan University, Xiangyu Zhang Purdue University, Shuaishuai Cui Fudan University, Geng Hong Fudan University, Xiaohan Zhang Fudan University, Min Yang Fudan University, Zhemin Yang Fudan University
08:31
12m
Talk
An Empirical Study on API Parameter RulesTechnical
Technical Papers
Hao Zhong Shanghai Jiao Tong University, Na Meng Virginia Tech, Zexuan Li Shanghai Jiao Tong University, Li Jia Shanghai Jiao Tong University
08:43
6m
Talk
Boosting Automated Program Repair with Bug-Inducing CommitsNIER
New Ideas and Emerging Results
Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
08:49
12m
Talk
Software Documentation: The Practitioners' PerspectiveTechnical
Technical Papers
Emad Aghajani Software Institute, USI - Lugano, Switzerland, Csaba Nagy Software Institute - USI, Lugano, Switzerland, Mario Linares-Vásquez Universidad de los Andes, Laura Moreno Colorado State University, Gabriele Bavota Università della Svizzera italiana, Michele Lanza Universita della Svizzera italiana (USI), David C. Shepherd Virginia Commonwealth University
Pre-print Media Attached
09:10 - 10:00
09:10
50m
Talk
GeekyNote: A Technical Documentation Tool with Coverage, Backtracking, Traces, and CouplingsDemo
Demonstrations
Yung-Pin Cheng National Central University, Wei-Nien Hsiung National Central University, Yu-Shan Wu IsCoollab Co. Ltd, Li-Hsuan Chen IsCoollab Co. Ltd

Fri 10 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

07:00 - 08:00
I19-Code Generation and VerificationTechnical Papers / Software Engineering in Practice / New Ideas and Emerging Results at Baekje
Chair(s): Raffi Khatchadourian City University of New York (CUNY) Hunter College
07:00
6m
Talk
Using Hypersafety Verification for Proving Correctness of Programming AssignmentsNIER
New Ideas and Emerging Results
Jude Anil TCS Research, Sumanth Prabhu TCS Research, Kumar Madhukar TCS Innovation Labs (TRDDC), R Venkatesh
07:06
12m
Talk
Automatically Testing String SolversArtifact ReusableTechnicalArtifact Available
Technical Papers
Alexandra Bugariu ETH Zurich, Peter Müller ETH Zurich
Pre-print
07:18
6m
Talk
On the Power of Abstraction: a Model-Driven Co-evolution Approach of Software CodeNIER
New Ideas and Emerging Results
Djamel Eddine Khelladi CNRS, France, Benoit Combemale University of Toulouse and Inria, Mathieu Acher (Univ Rennes, Inria, IRISA), Olivier Barais (Univ Rennes, Inria, IRISA)
07:24
12m
Talk
Co-Evolving Code with Evolving MetamodelsTechnical
Technical Papers
Djamel Eddine Khelladi CNRS, France, Benoit Combemale University of Toulouse and Inria, Mathieu Acher (Univ Rennes, Inria, IRISA), Olivier Barais (Univ Rennes, Inria, IRISA), Jean-Marc Jézéquel Univ Rennes - IRISA
07:36
12m
Talk
Rule-based Code Generation in Industrial Automation: Four Large-scale Case Studies applying the CAYENNE MethodSEIP
Software Engineering in Practice
Heiko Koziolek ABB Corporate Research, Andreas Burger ABB Corporate Research, Marie Platenius-Mohr ABB Corporate Research, Julius Rückert ABB Corporate Research, Hadil Abukwaik ABB Corporate Research, Raoul Jetley ABB, Abdulla PP ABB Corporate Research
Pre-print
07:48
12m
Talk
Understanding and Handling Alert Storm for Online Service SystemsSEIP
Software Engineering in Practice
Nengwen Zhao Tsinghua University, Junjie Chen Tianjin University, Xiao Peng China EverBright Bank, Honglin Wang BizSeer, Xinya Wu BizSeer, Yuanzong Zhang BizSeer, Zikai Chen Tsinghua University, Xiangzhong Zheng BizSeer, Xiaohui Nie Tsinghua University, Gang Wang China EverBright Bank, Yong Wu China EverBright Bank, Fang Zhou China EverBright Bank, Wenchi Zhang BizSeer, Kaixin Sui BizSeer, Dan Pei Tsinghua University
07:00 - 08:00
I20-Android TestingTechnical Papers at Goguryeo
Chair(s): Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology
07:00
12m
Talk
Multiple-Entry Testing of Android Applications by Constructing Activity Launching ContextsTechnicalArtifact Available
Technical Papers
Jiwei Yan Institute of Software, Chinese Academy of Sciences, Hao Liu Beijing University of Technology, Linjie Pan Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software, Chinese Academy of Sciences, Bin Liang Renmin University of China, China
07:12
12m
Talk
Time-travel Testing of Android AppsACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Zhen Dong National University of Singapore, Marcel Böhme Monash University, Lucia Cojocaru Politehnica University of Bucharest, Abhik Roychoudhury National University of Singapore, Singapore
07:24
12m
Talk
Collaborative Bug Finding for Android AppsTechnical
Technical Papers
Shin Hwei Tan Southern University of Science and Technology, Ziqiang Li Southern University of Science and Technology
Media Attached File Attached
07:36
12m
Talk
An Empirical Assessment of Security Risks of Global Android Banking AppsTechnical
Technical Papers
Sen Chen Nanyang Technological University, Singapore, Lingling Fan Nanyang Technological University, Singapore, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Ting Su ETH Zurich, Switzerland, Jason Minhui Xue The University of Adelaide, Yinxing Xue , Yang Liu Nanyang Technological University, Singapore, Lihua Xu New York University Shanghai
Pre-print
07:48
12m
Talk
RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen ApplicationsTechnical
Technical Papers
Ju Qian Nanjing University of Aeronautics and Astronautics, Zhengyu Shang Nanjing University of Aeronautics and Astronautics, Shuoyan Yan Nanjing University of Aeronautics and Astronautics, Yan Wang , Lin Chen Nanjing University
07:00 - 08:00
I21-Version Control and ProgrammingTechnical Papers / Journal First / Software Engineering in Practice at Silla
Chair(s): Sunghun Kim Hong Kong University of Science and Technology
07:00
12m
Talk
Towards Understanding and Fixing Upstream Merge Induced Conflicts in Divergent Forks: An industrial Case StudySEIP
Software Engineering in Practice
Chungha Sung University of Southern California, Shuvendu Lahiri Microsoft Research, Mike Kaufman Microsoft Corporation, Pallavi Choudhury Microsoft Corporation, Chao Wang USC
07:12
8m
Talk
Version Control Systems: An Information Foraging PerspectiveJ1
Journal First
Sruti Srinivasa Ragavan Microsoft Research; School of EECS, Oregon State University, Mihai Codoban Microsoft, David Piorkowski IBM Research AI, Danny Dig University of Colorado, Boulder, Margaret Burnett Oregon State University
07:20
8m
Talk
How different are different diff algorithms in Git?J1
Journal First
Yusuf Sulistyo Nugroho Nara Institute of Science and Technology, Hideaki Hata Nara Institute of Science and Technology, Kenichi Matsumoto Nara Institute of Science and Technology
DOI Media Attached
07:28
8m
Talk
Characterizing the Usage, Evolution and Impact of Java Annotations in PracticeJ1
Journal First
Zhongxing Yu KTH Royal Institute of Technology, Chenggang Bai Beihang University, Lionel Seinturier , Martin Monperrus KTH Royal Institute of Technology
07:36
8m
Talk
Why Reinventing the Wheels? An Empirical Study on Library Reuse and Re-implementationJ1
Journal First
Bowen Xu Singapore Management University, Le An Polytechnique Montreal, Ferdian Thung Singapore Management University, Foutse Khomh Polytechnique Montréal, David Lo Singapore Management University
07:44
12m
Talk
HeteroRefactor: Refactoring for Heterogeneous Computing with FPGATechnicalArtifact Available
Technical Papers
Aishwarya Sivaraman University of California, Los Angeles, Jason Lau University of California, Los Angeles, Qian Zhang University of California, Los Angeles, Muhammad Ali Gulzar University of California, Los Angeles, Jason Cong UCLA, Miryung Kim University of California, Los Angeles
DOI
08:05 - 09:05
I22-TestingTechnical Papers / Demonstrations at Baekje
Chair(s): Phil McMinn University of Sheffield
08:05
3m
Talk
FuRong: Fusing Report of Automated Android Testing on Multi-DevicesDemo
Demonstrations
Yuanhan Tian Nanjing University, Shengcheng Yu Nanjing University, China, Chunrong Fang Nanjing University, Peiyuan Li Nanjing University
08:08
12m
Talk
MemLock: Memory Usage Guided FuzzingArtifact ReusableTechnicalArtifact Available
Technical Papers
Cheng Wen Shenzhen University, Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Yuekang Li Nanyang Technological University, Shengchao Qin University of Teesside, Yang Liu Nanyang Technological University, Singapore, Zhiwu Xu Shenzhen University, Hongxu Chen Research Associate, Xiaofei Xie Nanyang Technological University, Geguang Pu East China Normal University, Ting Liu Xi'an Jiaotong University
DOI Pre-print Media Attached
08:20
12m
Talk
Symbolic Verification of Message Passing Interface ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Hengbiao Yu National University of Defense Technology, Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China, Zhendong Su ETH Zurich, Switzerland, Jun Sun Singapore Management University, Chun Huang National University of Defense Technology, Wei Dong School of Computer, National University of Defense Technology, China
Pre-print
08:32
12m
Talk
SAVER: Scalable, Precise, and Safe Memory-Error RepairArtifact ReusableTechnicalArtifact Available
Technical Papers
Seongjoon Hong Korea University, Junhee Lee Korea University, South Korea, Jeongsoo Lee Korea University, Hakjoo Oh Korea University, South Korea
08:44
12m
Talk
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons LearnedTechnical
Technical Papers
Bingchang Liu Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Chao Zhang Institute for Network Sciences and Cyberspace of Tsinghua University, Feng Li Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China, Qi Gong Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Min Lin Institute for Network Sciences and Cyberspace of Tsinghua University, Dandan Sun Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China, Wei Huo Institute of Information Engineering, Chinese Academy of Sciences, Wei Zou Key Laboratory of Network Assessment Technology, Institute of Information Engineering, Chinese Academy of Sciences, China; School of CyberSpace Security at University of Chinese Academy of Sciences, China
08:56
3m
Talk
MPI-SV: A Symbolic Verifier for MPI ProgramsDemo
Demonstrations
Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Hengbiao Yu National University of Defense Technology, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China
Pre-print
08:05 - 09:05
I23-Code Artifact AnalysisJournal First / Technical Papers at Goguryeo
Chair(s): Benoit Baudry KTH Royal Institute of Technology
08:05
12m
Talk
Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical
Technical Papers
Qingkai Shi The Hong Kong University of Science and Technology, Rongxin Wu Department of Cyber Space Security, Xiamen University, Gang Fan Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology
08:17
12m
Talk
Pipelining Bottom-up Data Flow AnalysisTechnical
Technical Papers
Qingkai Shi The Hong Kong University of Science and Technology, Charles Zhang The Hong Kong University of Science and Technology
08:29
8m
Talk
An Empirical Validation of Oracle ImprovementJ1
Journal First
Gunel Jahangirova Università della Svizzera italiana, David Clark University College London, Mark Harman , Paolo Tonella Università della Svizzera italiana
08:37
8m
Talk
Is Static Analysis Able to Identify Unnecessary Source Code?J1
Journal First
Roman Haas CQSE GmbH, Rainer Niedermayr CQSE GmbH, Tobias Roehm CQSE GmbH, Sven Apel Saarland University
Pre-print
08:45
8m
Talk
Memory and Resource Leak Defects and Their Repairs in Java ProjectsJ1
Journal First
Mohammadreza Ghanavati Heidelberg University, Diego Costa Concordia University, Canada, Janos Seboek Heidelberg University, David Lo Singapore Management University, Artur Andrzejak Heidelberg University
08:53
8m
Talk
Towards Understanding and Detecting Fake Reviews in App StoresJ1
Journal First
Daniel Martens University of Hamburg, Walid Maalej University of Hamburg
09:10 - 10:00
09:10
50m
Talk
MPI-SV: A Symbolic Verifier for MPI ProgramsDemo
Demonstrations
Zhenbang Chen College of Computer, National University of Defense Technology, Changsha, PR China, Hengbiao Yu National University of Defense Technology, Xianjin Fu National University of Defense Technology, Ji Wang School of Computer, National University of Defense Technology, China
Pre-print
15:00 - 16:00
15:00
12m
Talk
Recognizing Developers' Emotions while ProgrammingTechnicalArtifact Available
Technical Papers
Daniela Girardi University of Bari, Nicole Novielli University of Bari, Davide Fucci Blekinge Institute of Technology, Filippo Lanubile University of Bari
DOI Pre-print
15:12
12m
Talk
Neurological Divide: An fMRI Study of Prose and Code WritingArtifact ReusableTechnicalArtifact Available
Technical Papers
Ryan Krueger University of Michigan, Yu Huang University of Michigan, Xinyu Liu University of Michigan, Tyler Santander University of California at Santa Barbara, Westley Weimer University of Michigan, USA, Kevin Leach University of Michigan
Pre-print
15:24
12m
Talk
Assessing Practitioner BeliefsSEIP
Software Engineering in Practice
Shrikanth N C North Carolina State University, Tim Menzies North Carolina State University
Pre-print Media Attached
15:36
12m
Talk
Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Nischal Shrestha North Carolina State University, Colton Botta North Carolina State University, Titus Barik Microsoft, Chris Parnin North Carolina State University
Pre-print
15:48
6m
Talk
Understanding FLOSS through community publications: Strategies for Grey Literature ReviewNIER
New Ideas and Emerging Results
Melissa Wen University of São Paulo, Leonardo Alexandre Ferreira Leite University of São Paulo, Fabio Kon University of São Paulo, Paulo Meirelles Federal University of São Paulo
15:00 - 16:00
A21-Testing and Debugging 3Journal First / Technical Papers at Silla
Chair(s): Tingting Yu University of Kentucky
15:00
12m
Talk
Schrödinger's Security: Opening the Box on App Developers' Security RationaleTechnical
Technical Papers
Dirk van der Linden University of Bristol, Pauline Anthonysamy Google Inc., Bashar Nuseibeh The Open University (UK) & Lero (Ireland), Thein Tun , Marian Petre The Open University, Mark Levine Lancaster University, John Towse Lancaster University, Awais Rashid University of Bristol, UK
15:12
8m
Talk
Smart Greybox FuzzingJ1
Journal First
Van-Thuan Pham Monash University, Marcel Böhme Monash University, Andrew Santosa National University of Singapore, Alexandru Răzvan Căciulescu UiPath, Abhik Roychoudhury National University of Singapore, Singapore
15:20
8m
Talk
Deep Transfer Bug LocalizationJ1
Journal First
Xuan Huo Nanjing University, Ferdian Thung Singapore Management University, Ming Li Nanjing University, David Lo Singapore Management University, Shu-Ting Shi Nanjing University
15:28
8m
Talk
A Benchmark-Based Evaluation of Search-Based Crash ReproductionJ1
Journal First
Mozhan Soltani Leiden University, Pouria Derakhshanfar Delft University of Technology, Xavier Devroey Delft University of Technology, Arie van Deursen Delft University of Technology
Link to publication DOI Pre-print Media Attached
15:36
12m
Talk
An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect PredictionTechnical
Technical Papers
Sadia Tabassum University of Birmingham, UK, Leandro Minku University of Birmingham, UK, Danyi Feng XiLiu Tech, George Cabral Universidade Federal Rural de Pernambuco, Liyan Song University of Birmingham
15:48
8m
Talk
An Empirical Study of the Long Duration of Continuous Integration BuildsJ1
Journal First
Taher Ahmed Ghaleb Queen's University, Daniel Alencar Da Costa University of Otago, Ying Zou Queen's University, Kingston, Ontario
Link to publication DOI Pre-print
16:05 - 17:05
A23-RequirementsJournal First / Technical Papers / New Ideas and Emerging Results at Goguryeo
Chair(s): Dalal Alrajeh Imperial College London
16:05
12m
Talk
Caspar: Extracting and Synthesizing User Stories of Problems from App ReviewsTechnical
Technical Papers
Hui Guo North Carolina State University, Munindar P. Singh North Carolina State University
16:17
8m
Talk
Dealing with Non-Functional Requirements in Model-Driven Development: A SurveyJ1
Journal First
David Ameller Universitat Politècnica de Catalunya, Xavier Franch Universitat Politècnica de Catalunya, Cristina Gómez Universitat Politècnica de Catalunya, Silverio Martínez-Fernández UPC-BarcelonaTech, João Araújo Universidade Nova de Lisboa, Stefan Biffl Vienna University of Technology, Jordi Cabot ICREA - UOC, Vittorio Cortellesa University of L’Aquila, Daniel Mendez Technische Universität München, Ana Moreira FCT / Universidade Nova de Lisboa, Henry Muccini University of L'Aquila, Italy, Antonio Vallecillo University of Málaga, Spain, Manuel Wimmer Johannes Kepler University Linz, Vasco Amaral Universidade Nova de Lisboa, Wolfang Böhm Technische Universität München, Hugo Brunelière Inria, Mines Nantes & LINA, Loli Burgueño Universidad de Malaga, Miguel Goulao NOVA-LINCS, FCT/UNL, Sabine Teufl Fortiss GmbH, Luca Berardinelli Johannes Kepler University Linz
16:25
8m
Talk
Locating Latent Design Information in Developer Discussions: A Study on Pull RequestsJ1
Journal First
Giovanni Viviani University of British Columbia, Michalis Famelis Université de Montréal, Xin Xia Monash University, Calahan Janik-Jones University of Toronto, Gail Murphy University of British Columbia
16:33
8m
Talk
Status Quo in Requirements Engineering: A Theory and a Global Family of SurveysJ1
Journal First
Stefan Wagner University of Stuttgart
Link to publication DOI Pre-print
16:41
8m
Talk
Corba: Crowdsourcing to Obtain Requirements from Regulations and BreachesJ1
Journal First
Hui Guo North Carolina State University, Ozgur Kafali University of Kent, Anne-Liz Jeukeng University of Florida, Laurie Williams North Carolina State University, Munindar P. Singh North Carolina State University
16:49
6m
Talk
With Registered Reports Towards Large Scale Data CurationNIER
New Ideas and Emerging Results
Steffen Herbold University of Göttingen
Pre-print
16:05 - 17:05
A24-Testing and Debugging 4Technical Papers / New Ideas and Emerging Results / Journal First / Demonstrations at Silla
Chair(s): Yijun Yu The Open University, UK
16:05
6m
Talk
Manifold for Machine Learning AssuranceNIER
New Ideas and Emerging Results
Taejoon Byun University of Minnesota, Sanjai Rayadurgam University of Minnesota
16:11
12m
Talk
On Learning Meaningful Assert Statements for Unit Test CasesTechnical
Technical Papers
Cody Watson Washington and Lee University, Michele Tufano Microsoft, Kevin Moran William & Mary/George Mason University, Gabriele Bavota Università della Svizzera italiana, Denys Poshyvanyk William and Mary
Pre-print Media Attached
16:23
12m
Talk
TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural NetworksArtifact ReusableTechnicalArtifact Available
Technical Papers
Guanhong Tao Purdue University, Shiqing Ma Rutgers University, Yingqi Liu Purdue University, USA, Qiuling Xu Purdue University, Xiangyu Zhang Purdue University
Pre-print
16:35
3m
Talk
DeepMutation: A Neural Mutation ToolDemo
Demonstrations
Michele Tufano Microsoft, Jason Kimko William & Mary, Shiya Wang William & Mary, Cody Watson Washington and Lee University, Gabriele Bavota Università della Svizzera italiana, Massimiliano Di Penta University of Sannio, Denys Poshyvanyk William and Mary
Pre-print
16:38
8m
Talk
Specification Patterns for Robotic MissionsJ1
Journal First
Claudio Menghi University of Luxembourg, Christos Tsigkanos TU Vienna, Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg, Carlo Ghezzi Politecnico di Milano, Thorsten Berger Chalmers | University of Gothenburg
16:46
8m
Talk
ProXray: Protocol Model Learning and Guided Firmware AnalysisJ1
Journal First
Farhaan Fowze University of Florida, Dave (Jing) Tian Purdue University, Grant Hernandez University of Florida, Kevin Butler Univ. Florida, Tuba Yavuz University of Florida
16:54
6m
Talk
Visual Sketching: From Image Sketches to CodeNIER
New Ideas and Emerging Results
Marcelo d'Amorim Federal University of Pernambuco, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID, Carlos Mello Federal University of Pernambuco
Pre-print Media Attached

Sat 11 Jul

Displayed time zone: (UTC) Coordinated Universal Time change

00:00 - 01:00
P25-FuzzingTechnical Papers at Baekje
Chair(s): Marcel Böhme Monash University
00:00
12m
Talk
Typestate-Guided Fuzzer for Discovering Use-after-Free VulnerabilitiesTechnical
Technical Papers
Haijun Wang Ant Financial Services Group, China; CSSE, Shenzhen University, China, Xiaofei Xie Nanyang Technological University, Yi Li Nanyang Technological University, Cheng Wen Shenzhen University, Yuekang Li Nanyang Technological University, Yang Liu Nanyang Technological University, Singapore, Shengchao Qin University of Teesside, Hongxu Chen Research Associate, Yulei Sui University of Technology Sydney, Australia
Link to publication DOI Pre-print
00:12
12m
Talk
sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart ContractsTechnical
Technical Papers
Tai D. Nguyen Singapore Management University, Long H. Pham Singapore University of Technology and Design, Jun Sun Singapore Management University, Yun Lin National University of Singapore, Minh Quang Tran Ho Chi Minh City University of Technology
00:24
12m
Talk
Planning for Untangling: Predicting the Difficulty of Merge ConflictsTechnical
Technical Papers
Caius Brindescu Oregon State University, Iftekhar Ahmed University of California at Irvine, USA, Rafael Leano Oregon State University, Anita Sarma Oregon State University
00:36
12m
Talk
Gang of Eight: A Defect Taxonomy for Infrastructure as Code ScriptsTechnicalArtifact Available
Technical Papers
Akond Rahman Tennessee Tech University, Effat Farhana North Carolina State University, Chris Parnin North Carolina State University, Laurie Williams North Carolina State University
Pre-print
00:48
12m
Talk
JVM Fuzzing for JIT-Induced Side-Channel DetectionTechnical
Technical Papers
Tegan Brennan University of California, Santa Barbara, Seemanta Saha University of California Santa Barbara, Tevfik Bultan University of California, Santa Barbara
00:00 - 01:00
P26-Deep Learning Testing and DebuggingTechnical Papers at Goguryeo
Chair(s): Tim Menzies North Carolina State University
00:00
12m
Talk
ReluDiff: Differential Verification of Deep Neural NetworksArtifact ReusableTechnical
Technical Papers
Brandon Paulsen University of Southern California, Jingbo Wang University of Southern California, Chao Wang USC
Pre-print
00:12
12m
Talk
Structure-Invariant Testing for Machine TranslationTechnical
Technical Papers
Pinjia He ETH Zurich, Clara Meister ETH Zurich, Zhendong Su ETH Zurich, Switzerland
00:24
12m
Talk
Automatic Testing and Improvement of Machine TranslationTechnical
Technical Papers
Zeyu Sun Peking University, Jie M. Zhang University College London, UK, Mark Harman Facebook and University College London, Mike Papadakis University of Luxembourg, Lu Zhang Peking University, China
00:36
12m
Talk
Testing DNN Image Classifier for Confusion & Bias ErrorsArtifact ReusableTechnicalArtifact Available
Technical Papers
Yuchi Tian Columbia University, Ziyuan Zhong Columbia University, Vicente Ordonez University of Virginia, Gail Kaiser Columbia University, Baishakhi Ray Columbia University, New York
00:48
12m
Talk
Repairing Deep Neural Networks: Fix Patterns and ChallengesArtifact ReusableTechnicalArtifact Available
Technical Papers
Md Johirul Islam Iowa State University, Rangeet Pan Iowa State University, USA, Giang Nguyen Dept. of Computer Science, Iowa State University, Hridesh Rajan Iowa State University, USA
00:00 - 01:00
00:00
12m
Talk
Big Code != Big Vocabulary: Open-Vocabulary Models for Source codeACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Rafael-Michael Karampatsis The University of Edinburgh, Hlib Babii Free University of Bozen-Bolzano, Romain Robbes Free University of Bozen-Bolzano, Charles Sutton Google Research, Andrea Janes Free University of Bozen-Bolzano
DOI Pre-print
00:12
12m
Talk
Engineering for a Science-Centric Experimentation PlatformSEIP
Software Engineering in Practice
Nikos Diamantopoulos Netflix, Inc., Jeffrey Wong Netflix, Inc., David Issa Mattos Chalmers University of Technology, Ilias Gerostathopoulos Vrije Universiteit Amsterdam, Matthew Wardrop Netflix, Inc., Tobias Mao Netflix, Inc., Colin McFarland Netflix, Inc.
00:24
12m
Talk
Managing data constraints in database-backed web applicationsArtifact ReusableTechnicalArtifact Available
Technical Papers
Junwen Yang University of Chicago, Utsav Sethi University of Chicago, Cong Yan University of Washington, Alvin Cheung University of California, Berkeley, Shan Lu University of Chicago
00:36
12m
Talk
Improving Data Scientist Efficiency with ProvenanceArtifact ReusableTechnicalArtifact Available
Technical Papers
Jingmei Hu Harvard University, Jiwon Joung Harvard University, Maia Jacobs Harvard University, Margo Seltzer University of British Columbia, Krzysztof Gajos Harvard University
01:05 - 02:05
P28-Analysis and VerificationSoftware Engineering in Practice / Technical Papers / Demonstrations at Baekje
Chair(s): Rahul Purandare IIIT-Delhi
01:05
12m
Talk
Tailoring Programs for Static Analysis via Program TransformationTechnicalArtifact Available
Technical Papers
Rijnard van Tonder Sourcegraph, Claire Le Goues Carnegie Mellon University
01:17
3m
Talk
Phoenix: A Tool for Automated Data-Driven Synthesis of Repairs for Static Analysis ViolationsDemo
Demonstrations
Hiroaki Yoshida Fujitsu Laboratories of America, Inc., Rohan Bavishi UC Berkeley, Keisuke Hotta Fujitsu Laboratories Ltd., Yusuke Nemoto Fujitsu Laboratories Ltd., Mukul R. Prasad Fujitsu Laboratories of America, Inc, Shinji Kikuchi Fujitsu Laboratories Ltd.
01:20
12m
Talk
BCFA: Bespoke Control Flow Analysis for CFA at ScaleTechnical
Technical Papers
Ramanathan Ramu Iowa State University, Ganesha Upadhyaya Harmony.one, Hoan Anh Nguyen Amazon, Hridesh Rajan Iowa State University, USA
01:32
12m
Talk
On the Recall of Static Call Graph Construction in PracticeArtifact ReusableTechnicalArtifact Available
Technical Papers
Li Sui Massey University, New Zealand, Jens Dietrich Victoria University of Wellington, Amjed Tahir Massey University, George Fourtounis University of Athens
Pre-print
01:44
12m
Talk
DeCaf: Diagnosing & Triaging Performance Issues in Large-Scale Cloud ServicesSEIP
Software Engineering in Practice
Chetan Bansal Microsoft Research, Sundararajan Renganathan Stanford University, Ashima Asudani Microsoft, Olivier Midy Microsoft, Mathru Janakiraman Amazon
Pre-print
01:56
3m
Talk
mCoq: Mutation Analysis for Coq Verification ProjectsDemo
Demonstrations
Kush Jain The University of Texas at Austin, Karl Palmskog KTH Royal Institute of Technology, Ahmet Celik Facebook, Inc., Emilio Jesús Gallego Arias INRIA, Milos Gligoric The University of Texas at Austin
01:05 - 02:05
P29-Android and Web TestingDemonstrations / Technical Papers / Software Engineering in Practice at Goguryeo
Chair(s): Hironori Washizaki Waseda University
01:05
12m
Talk
SLACC: Simion-based Language Agnostic Code ClonesArtifact ReusableTechnical
Technical Papers
George Mathew North Carolina State University, Chris Parnin North Carolina State University, Kathryn Stolee North Carolina State University
Pre-print
01:17
8m
Talk
Near-Duplicate Detection in Web App Model InferenceTechnicalArtifact Available
Technical Papers
Rahulkrishna Yandrapally University of British Columbia, Canada, Andrea Stocco Università della Svizzera italiana, Ali Mesbah University of British Columbia
Pre-print
01:25
12m
Talk
JSidentify: A Hybrid Framework for Detecting Plagiarism Among JavaScript Code in Online Mini GamesSEIP
Software Engineering in Practice
Qun Xia Tencent Inc., Zhongzhu Zhou , Zhihao Li Tencent Inc., Bin Xu Tencent Inc., Wei Zou Tencent Inc., Zishun Chen Tencent Inc., Huafeng Ma Tencent Inc., Gangqiang Liang Tencent Inc., Haochuan Lu Fudan University, Shiyu Guo Tencent Inc., Ting Xiong Tencent Inc., Yuetang Deng Tencent, Inc., Tao Xie Peking University
01:37
12m
Talk
Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep LearningACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Jieshan Chen Australian National University, Chunyang Chen Monash University, Zhenchang Xing Australia National University, Xiwei Xu Data 61, Liming Zhu CSIRO's Data61 and UNSW, Guoqiang Li Shanghai Jiao Tong University, Jinshui Wang School of Information Science and Engineering, Fujian University of Technology, Fuzhou, China
01:49
3m
Talk
DroidMutator: An Effective Mutation Analysis Tool for Android ApplicationsDemo
Demonstrations
Jian Liu East China Normal University, Xusheng Xiao Case Western Reserve University, Lihua Xu New York University Shanghai, Liang Dou East China Normal University, Andy Podgurski Case Western University
01:52
3m
Talk
BigTest: Symbolic Execution Based Systematic Test Generation Tool for Apache SparkDemo
Demonstrations
Muhammad Ali Gulzar University of California, Los Angeles, Madan Musuvathi Microsoft Research, Miryung Kim University of California, Los Angeles
01:05 - 02:05
P30-Ecosystems 2Technical Papers / Journal First at Silla
Chair(s): Chang Xu Nanjing University
01:05
8m
Talk
Studying the Impact of Noises in Build Breakage DataJ1
Journal First
Taher Ahmed Ghaleb Queen's University, Daniel Alencar Da Costa University of Otago, Ying Zou Queen's University, Kingston, Ontario, Ahmed E. Hassan Queen's University
Link to publication DOI Pre-print
01:13
12m
Talk
Taming Behavioral Backward Incompatibilities via Cross-Project Testing and AnalysisTechnical
Technical Papers
Lingchao Chen The University of Texas at Dallas, Foyzul Hassan University of Texas at San Antonio, USA, Xiaoyin Wang University of Texas at San Antonio, USA, Lingming Zhang The University of Texas at Dallas
01:25
12m
Talk
Watchman: Monitoring Dependency Conflicts for Python Library EcosystemArtifact ReusableTechnicalArtifact Available
Technical Papers
Ying Wang Northeastern University, China, Ming Wen Huazhong University of Science and Technology, China, Yepang Liu Southern University of Science and Technology, Yibo Wang Northeastern University, Zhenming Li Northeastern University, Chao Wang University of Southern California, Hai Yu Northeastern University, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Chang Xu Nanjing University, Zhiliang Zhu Northeastern University, China
01:37
12m
Talk
How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHubTechnical
Technical Papers
Shurui Zhou Carnegie Mellon University, USA / University of Toronto, CA, Bogdan Vasilescu Carnegie Mellon University, Christian Kästner Carnegie Mellon University
Pre-print
02:10 - 03:00
02:10
50m
Talk
mCoq: Mutation Analysis for Coq Verification ProjectsDemo
Demonstrations
Kush Jain The University of Texas at Austin, Karl Palmskog KTH Royal Institute of Technology, Ahmet Celik Facebook, Inc., Emilio Jesús Gallego Arias INRIA, Milos Gligoric The University of Texas at Austin
02:10
50m
Talk
DroidMutator: An Effective Mutation Analysis Tool for Android ApplicationsDemo
Demonstrations
Jian Liu East China Normal University, Xusheng Xiao Case Western Reserve University, Lihua Xu New York University Shanghai, Liang Dou East China Normal University, Andy Podgurski Case Western University
15:00 - 16:00
A25-Android TestingTechnical Papers / Journal First at Baekje
Chair(s): Ting Su
15:00
8m
Talk
On the Energy Footprint of Mobile Testing FrameworksJ1
Journal First
Luís Cruz Deflt University of Technology, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID
DOI Pre-print Media Attached
15:08
12m
Talk
ComboDroid: Generating High-Quality Test Inputs for Android Apps via Use Case CombinationsTechnicalArtifact Available
Technical Papers
Jue Wang Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University, Chun Cao Nanjing University, Xiaoxing Ma Nanjing University, Jian Lu Nanjing University
15:20
12m
Talk
Translating Video Recordings of Mobile App Usages into Replayable ScenariosACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Carlos Bernal-Cárdenas William and Mary, Nathan Cooper College of William & Mary, Kevin Moran William & Mary/George Mason University, Oscar Chaparro College of William & Mary, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk William and Mary
Pre-print Media Attached
15:32
8m
Talk
An Empirical Study on Quality of AndroidApplications written in Kotlin languageJ1
Journal First
Bruno Gois Mateus Université Polytechnique Hauts-de-France, Matias Martinez Université Polytechnique Hauts-de-France
15:40
8m
Talk
Enhancing Trustability of Android Applications via User-Centric Flexible PermissionsJ1
Journal First
Gian Luca Scoccia University of L'Aquila, Ivano Malavolta Vrije Universiteit Amsterdam, Marco Autili University of L'Aquila, Italy, Amleto Di Salle University of L'Aquila, Paola Inverardi University of L'Aquila
Link to publication DOI Pre-print
15:48
8m
Talk
A Longitudinal Study of Popular Ad Libraries in the Google Play StoreJ1
Journal First
Md Ahasanuzzaman Queen's University, Safwat Hassan Queens University, Kingston, Canada, Cor-Paul Bezemer University of Alberta, Canada, Ahmed E. Hassan Queen's University
15:00 - 16:00
A26-Bugs and RepairJournal First / Technical Papers at Goguryeo
Chair(s): Davide Falessi California Polytechnic State University
15:00
12m
Talk
Simulee: Detecting CUDA Synchronization Bugs via Memory-Access ModelingTechnical
Technical Papers
Mingyuan Wu Southern University of Science and Technology, Yicheng Ouyang Southern University of Science and Technology, Husheng Zhou The University of Texas at Dallas, Lingming Zhang The University of Texas at Dallas, Cong Liu UT Dallas, Yuqun Zhang Southern University of Science and Technology
15:12
8m
Talk
Fine-Grained Dynamic Resource Allocation for Big-Data ApplicationsJ1
Journal First
Luciano Baresi Politecnico di Milano, Alberto Leva Politecnico di Milano, Giovanni Quattrocchi Politecnico di Milano
15:20
8m
Talk
The Assessor's Dilemma: Improving Bug Repair via Empirical Game TheoryJ1
Journal First
Carlos Gavidia-Calderon University College London, Federica Sarro University College London, UK, Mark Harman Facebook and University College London, Earl T. Barr University College London, UK
Link to publication DOI Pre-print Media Attached
15:28
8m
Talk
FixMiner: Mining Relevant Fix Patterns for Automated Program RepairJ1
Journal First
Anil Koyuncu University of Luxembourg, Luxembourg, Kui Liu Nanjing University of Aeronautics and Astronautics, Tegawendé F. Bissyandé SnT, University of Luxembourg, Dongsun Kim Furiosa.ai, Jacques Klein University of Luxembourg, SnT, Martin Monperrus KTH Royal Institute of Technology, Yves Le Traon University of Luxembourg
Pre-print
15:36
8m
Talk
IntRepair: Informed Repairing of Integer OverflowsJ1
Journal First
Paul Muntean TU Munich, Martin Monperrus KTH Royal Institute of Technology, Hao Sun Unaffiliated, Jens Grossklags Technical University of Munich, Claudia Eckert Technical University of Munich
15:44
12m
Talk
DLFix: Context-based Code Transformation Learning for Automated Program RepairTechnical
Technical Papers
Yi Li New Jersey Institute of Technology, USA, Shaohua Wang New Jersey Institute of Technology, USA, Tien N. Nguyen University of Texas at Dallas
15:00 - 16:00
A27-Software ArchitectureNew Ideas and Emerging Results / Journal First / Demonstrations / Software Engineering in Practice at Silla
Chair(s): Patrizio Pelliccione University of L'Aquila and Chalmers | University of Gothenburg
15:00
8m
Talk
What should your Run-time Configuration Framework do to Help Developers?J1
Journal First
Mohammed SAYAGH Queen's University, Noureddine Kerzazi Ensias-Rabat, Fabio Petrillo University of Quebec at Chicoutimi, Khalil Bennani Polytechnique Montreal, Bram Adams MCIS, Polytechnique Montréal
15:08
3m
Talk
The SmartSHARK Ecosystem for Software Repository MiningDemo
Demonstrations
Alexander Trautsch University of Göttingen, Fabian Trautsch University of Göttingen, Steffen Herbold University of Göttingen, Benjamin Ledel University of Göttingen, Jens Grabowski University of Göttingen
Pre-print
15:11
12m
Talk
Piranha: Reducing Feature Flag Debt at UberSEIP
Software Engineering in Practice
Murali Krishna Ramanathan Uber Technologies Inc., Lazaro Clapp Uber Technologies Inc, Raj Barik Uber Technologies Inc., Manu Sridharan University of California Riverside
Pre-print
15:23
6m
Talk
Towards Engineering Future Gameful ApplicationsNIER
New Ideas and Emerging Results
Antonio Bucchiarone Fondazione Bruno Kessler, Trento, Italy, Antonio Cicchetti Mälardalen University, Annapaola Marconi Fondazione Bruno Kessler, Trento, Italy
15:29
18m
Talk
Software Development Data for Architecture Analysis: Expectation, Reality, and Future DirectionsSEIP
Software Engineering in Practice
Yuanfang Cai Drexel University, Rick Kazman University of Hawai‘i at Mānoa
16:05 - 17:05
A28-Android and Web TestingTechnical Papers / Demonstrations at Baekje
Chair(s): Reyhaneh Jabbarvand University of Illinois Urbana-Champaign
16:05
3m
Talk
AppTestMigrator: A Tool for Automated Test Migration for Android AppsDemo
Demonstrations
Farnaz Behrang Georgia Tech, Alessandro Orso Georgia Tech
16:08
12m
Talk
Revealing Injection Vulnerabilities by Leveraging Existing TestsArtifact ReusableTechnicalArtifact Available
Technical Papers
Katherine Hough George Mason University, Gebrehiwet Biyane Welearegai University of Potsdam, Germany, Christian Hammer University of Potsdam, A: Jonathan Bell Northeastern University
16:20
12m
Talk
Accessibility Issues in Android Apps: State of Affairs, Sentiments, and Ways ForwardTechnical
Technical Papers
Abdulaziz Alshayban University of California, Irvine, Iftekhar Ahmed University of California at Irvine, USA, Sam Malek University of California, Irvine
16:32
3m
Talk
WasmView: Visual Testing for WebAssembly ApplicationsDemo
Demonstrations
Alan Romano University at Buffalo, SUNY, Weihang Wang University at Buffalo, SUNY
16:35
12m
Talk
Extracting Taint Specifications for JavaScript LibrariesTechnical
Technical Papers
Cristian-Alexandru Staicu TU Darmstadt, Martin Toldam Torp Aarhus University, Max Schaefer GitHub, Inc., Anders Møller Aarhus University, Michael Pradel University of Stuttgart
Pre-print Media Attached
16:47
12m
Talk
Finding Client-side Business Flow Tampering VulnerabilitiesTechnical
Technical Papers
I Luk Kim Purdue University, Yunhui Zheng IBM Research, Hogun Park Purdue University, Weihang Wang University at Buffalo, SUNY, Wei You Renmin University of China, Yousra Aafer Purdue University, Xiangyu Zhang Purdue University
16:05 - 17:05
A29-Code Analysis and VerificationTechnical Papers / New Ideas and Emerging Results at Goguryeo
Chair(s): Elena Sherman Boise State University
16:05
12m
Talk
Heaps'n Leaks: How Heap Snapshots Improve Android Taint AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Manuel Benz University of Paderborn, Erik Krogh Kristensen GitHub, Linghui Luo Paderborn University, Germany, Nataniel Borges Jr. CISPA Helmholtz Center for Information Security, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Andreas Zeller CISPA Helmholtz Center for Information Security
Media Attached File Attached
16:17
12m
Talk
Verifying Object ConstructionTechnicalArtifact Available
Technical Papers
Martin Kellogg University of Washington, Seattle, Manli Ran University of California, Riverside, Manu Sridharan University of California Riverside, Martin Schäf Amazon Web Services, USA, Michael D. Ernst University of Washington, USA
16:29
6m
Talk
Predictive Constraint Solving and AnalysisNew Ideas and Emerging Results Distinguished Paper AwardsNIER
New Ideas and Emerging Results
Alyas Almaawi The University of Texas at Austin, Nima Dini University of Texas at Austin, Cagdas Yelen The University of Texas at Austin, Milos Gligoric The University of Texas at Austin, Sasa Misailovic University of Illinois at Urbana-Champaign, Sarfraz Khurshid University of Texas at Austin, USA
16:35
12m
Talk
When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical
Technical Papers
Maxime Lamothe Concordia University, Weiyi Shang Concordia University
Pre-print
16:47
12m
Talk
Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical
Technical Papers
Xiaoxue Ren Zhejiang University, Zhenchang Xing Australia National University, Jiamou Sun Australian National University, Xin Xia Monash University, Jianling Sun Zhejiang University
16:05 - 17:05
A30-Dependencies and ConfigurationTechnical Papers / Software Engineering in Practice at Silla
Chair(s): Diomidis Spinellis Athens University of Economics and Business
16:05
12m
Talk
Lazy Product Discovery in Huge Configuration SpacesArtifact ReusableTechnicalArtifact Available
Technical Papers
Michael Lienhardt ONERA, Ferruccio Damiani University of Turin, Einar Broch Johnsen University of Oslo, Jacopo Mauro University of Southern Denmark
16:17
12m
Talk
Reducing Run-Time Adaptation Space via Analysis of Possible Utility BoundsTechnical
Technical Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln, USA
Pre-print
16:29
12m
Talk
Exploring Differences and Commonalities between Feature Flags and Configuration OptionsSEIP
Software Engineering in Practice
Jens Meinicke Carnegie Mellon University, Chu-Pan Wong Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University, Christian Kästner Carnegie Mellon University
Pre-print
17:10 - 18:00
17:10
50m
Talk
The SmartSHARK Ecosystem for Software Repository MiningDemo
Demonstrations
Alexander Trautsch University of Göttingen, Fabian Trautsch University of Göttingen, Steffen Herbold University of Göttingen, Benjamin Ledel University of Göttingen, Jens Grabowski University of Göttingen
Pre-print
17:10
50m
Talk
WasmView: Visual Testing for WebAssembly ApplicationsDemo
Demonstrations
Alan Romano University at Buffalo, SUNY, Weihang Wang University at Buffalo, SUNY

Call for Papers

ICSE is the premier forum for presenting and discussing the most recent and significant technical research contributions in the field of Software Engineering. We invite high quality submissions of technical research papers describing original and unpublished results of software engineering research. We welcome submissions addressing topics across the full spectrum of Software Engineering including but not limited to:

            Agile software development                                                   Program analysis
            AI and software engineering                                                   Program comprehension
            Apps and app store analysis                                                  Program repair
            Autonomic and (self-)adaptive systems                                  Program synthesis
            Cloud computing                                                                    Programming languages
            Component-based software engineering                                Recommendation systems
            Configuration management and deployment                          Refactoring
            Crowd sourced software engineering                                      Requirements engineering
            Cyber physical systems                                                          Reverse engineering
            Debugging                                                                              Search-based software engineering
            Dependability, safety, and reliability                                        Security, privacy, and trust
            Distributed and collaborative software engineering                Software architecture
            Embedded software                                                                Software economics and metrics
            Empirical software engineering                                               Software evolution and maintenance
            End-user software engineering                                               Software modeling and design
            Fault localization                                                                     Software process
            Formal methods                                                                      Software product lines
            Green and sustainable technologies                                       Software reuse
            Human and social aspects of software engineering                Software services
            Human-computer interaction                                                   Software testing
            Middleware, frameworks, and APIs                                         Software visualization
            Mining software engineering repositories                                Specification and modeling languages
            Mobile applications                                                                  Tools and environments
            Model-driven engineering                                                        Traceability
            Parallel, distributed, and concurrent systems                          Validation and verification
            Performance

Review Criteria

Each paper submitted to the Technical Track will be evaluated based on the following criteria:

  • Soundness: The extent to which the paper’s contributions are supported by rigorous application of appropriate research methods

  • Significance: The extent to which the paper’s contributions are important with respect to open software engineering challenges

  • Novelty: The extent to which the contribution is sufficiently original and is clearly explained with respect to the state-of-the-art

  • Verifiability: The extent to which the paper includes sufficient information to support independent verification or replication of the paper’s claimed contributions

  • Presentation: The extent to which the paper’s quality of writing meets the high standards of ICSE, including clear descriptions and explanations, adequate use of the English language, absence of major ambiguity, clearly readable figures and tables, and adherence to the formatting instructions provided below

Reviewers will carefully consider all of these criteria during the review process, and as a result, high-quality papers may vary considerably in their type of contribution. For example, one paper could provide an extensive replication of prior work while another could describe a highly novel approach supported by non-trivial experimentation or empirical analysis.

How to Submit

  • All submissions must conform to the ICSE 2020 formatting and submission instructions and must not exceed 10 pages for the main text, inclusive of all figures, tables, appendices, etc. Two more pages containing only references are permitted. All submissions must be in PDF. The page limit is strict, and it will not be possible to purchase additional pages at any point in the process (including after the paper is accepted).

  • Formatting instructions are available at https://www.acm.org/publications/proceedings-template for both LaTeX and Word users. LaTeX users must use the provided acmart.cls and ACM-Reference-Format.bst without modification, enable the conference format in the preamble of the document (i.e., \documentclass[sigconf,review]{acmart}), and use the ACM reference format for the bibliography (i.e., \bibliographystyle{ACM-Reference-Format}). The review option adds line numbers, thereby allowing referees to refer to specific lines in their comments.

  • By submitting to the ICSE Research Track, authors acknowledge that they are aware of and agree to be bound by the ACM Policy and Procedures on Plagiarism (https://www.acm.org/publications/policies/plagiarism) and the IEEE Plagiarism FAQ (https://www.ieee.org/publications/rights/plagiarism/plagiarism-faq.html). In particular, papers submitted to ICSE 2020 must not have been published elsewhere and must not be under review or submitted for review elsewhere whilst under consideration for ICSE 2020. Contravention of this concurrent submission policy will be deemed a serious breach of scientific ethics, and appropriate action will be taken in all such cases. To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.

  • Lastly, the ICSE 2020 Technical Track will employ a double-blind review process. Thus, no submission may reveal its authors’ identities. The authors must make every effort to honor the double-blind review process. In particular, the authors’ names must be omitted from the submission and references to their prior work should be in the third person. Further advice, guidance, and explanation about the double-blind review process can be found in the Q&A page (https://conf.researchr.org/track/icse-2020/icse-2020-papers#Submitting-to-ICSE-Q-A).

Submissions to the Technical Track that meet the above requirements can be made via the Technical Track submission site (https://icse2020.hotcrp.com) by the submission deadline. We encourage the authors to upload their paper info early (and can submit the PDF later) to properly enter conflicts for double-blind reviewing.

Any submission that does not comply with these requirements may be desk rejected by the Technical Track PC Chairs without further review.

Conference Attendance Expectation

If a submission is accepted, at least one author of the paper is required to register for and attend the full 3-day technical conference and present the paper in person.

Accepted Papers

Title
A Comprehensive Study of Autonomous Vehicle BugsTechnical
Technical Papers
A Cost-efficient Approach to Building in Continuous IntegrationTechnical
Technical Papers
Pre-print
A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons LearnedTechnical
Technical Papers
A Novel Approach to Tracing Safety Requirements and State-Based Design ModelsTechnical
Technical Papers
A Study on the Lifecycle of Flaky TestsTechnical
Technical Papers
A Study on the Prevalence of Human Values in Software Engineering Publications, 2015 – 2018TechnicalArtifact Available
Technical Papers
A Tale from the Trenches: Cognitive Biases and Software DevelopmentACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Accessibility Issues in Android Apps: State of Affairs, Sentiments, and Ways ForwardTechnical
Technical Papers
Adapting Requirements Models to Varying EnvironmentsTechnical
Technical Papers
An Empirical Assessment of Security Risks of Global Android Banking AppsTechnical
Technical Papers
Pre-print
An Empirical Study on API Parameter RulesTechnical
Technical Papers
An Empirical Study on Program Failures of Deep Learning JobsACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
An Evidence-Based Inquiry into the Use of Grey Literature in Software EngineeringTechnical
Technical Papers
An Investigation of Cross-Project Learning in Online Just-In-Time Software Defect PredictionTechnical
Technical Papers
Ankou: Guiding Grey-box Fuzzing towards Combinatorial DifferenceArtifact ReusableTechnicalArtifact Available
Technical Papers
Approximation-Refinement Testing of Compute-Intensive Cyber-Physical Models: An Approach Based on System IdentificationArtifact ReusableTechnicalArtifact Available
Technical Papers
Automatic Testing and Improvement of Machine TranslationTechnical
Technical Papers
Automatically Testing String SolversArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
BCFA: Bespoke Control Flow Analysis for CFA at ScaleTechnical
Technical Papers
Big Code != Big Vocabulary: Open-Vocabulary Models for Source codeACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
DOI Pre-print
Burn After Reading: A Shadow Stack with Microsecond-level Runtime Rerandomization for Protecting Return AddressesTechnicalArtifact Available
Technical Papers
CC2Vec: Distributed Representations of Code ChangesTechnical
Technical Papers
Pre-print
CPC: Automatically Classifying and Propagating Natural Language Comments via Program AnalysisTechnicalArtifact Available
Technical Papers
Caspar: Extracting and Synthesizing User Stories of Problems from App ReviewsTechnical
Technical Papers
Causal Testing: Understanding Defects' Root CausesACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Link to publication DOI Pre-print Media Attached
Co-Evolving Code with Evolving MetamodelsTechnical
Technical Papers
Collaborative Bug Finding for Android AppsTechnical
Technical Papers
Media Attached File Attached
ComboDroid: Generating High-Quality Test Inputs for Android Apps via Use Case CombinationsTechnicalArtifact Available
Technical Papers
Comparing Formal Tools for System Design: a Judgment StudyTechnical
Technical Papers
DOI Pre-print
Conquering the Extensional Scalability Problem for Value-Flow Analysis FrameworksTechnical
Technical Papers
Context-aware In-process Crowdworker RecommendationACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
DISSECTOR: Input Validation for Deep Learning Applications by Crossing-layer DissectionTechnical
Technical Papers
DLFix: Context-based Code Transformation Learning for Automated Program RepairTechnical
Technical Papers
Debugging InputsArtifact ReusableTechnicalArtifact Available
Technical Papers
Link to publication DOI Pre-print
DeepBillboard: Systematic Physical-World Testing of Autonomous Driving SystemsTechnical
Technical Papers
Demystify Official API Usage Directives with Crowdsourced API Misuse Scenarios, Erroneous Code Examples and PatchesTechnical
Technical Papers
Detection of Hidden Feature Requests from Massive Chat Messages via Deep Siamese NetworkTechnicalArtifact Available
Technical Papers
Efficient Generation of Error-Inducing Floating-Point Inputs via Symbolic ExecutionArtifact ReusableTechnicalArtifact Available
Technical Papers
Empirical Review of Automated Analysis Tools on 47,587 Ethereum Smart ContractsArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Engineering Gender-Inclusivity into Software: Ten Teams' Tales from the TrenchesTechnical
Technical Papers
Establishing Multilevel Test-to-Code Traceability LinksArtifact ReusableTechnicalArtifact Available
Technical Papers
Explaining Pair Programming Session Dynamics from Knowledge GapsTechnical
Technical Papers
DOI Pre-print Media Attached
Extracting Taint Specifications for JavaScript LibrariesTechnical
Technical Papers
Pre-print Media Attached
Finding Client-side Business Flow Tampering VulnerabilitiesTechnical
Technical Papers
Fuzz Testing based Data Augmentation to Improve Robustness of Deep Neural NetworksTechnical
Technical Papers
Gang of Eight: A Defect Taxonomy for Infrastructure as Code ScriptsTechnicalArtifact Available
Technical Papers
Pre-print
Gap between Theory and Practice : An Empirical Study of Security Patches in SolidityArtifact ReusableTechnicalArtifact Available
Technical Papers
HARP: Holistic Analysis for Refactoring Python-Based Analytics ProgramsTechnical
Technical Papers
Heaps'n Leaks: How Heap Snapshots Improve Android Taint AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Media Attached File Attached
Here We Go Again: Why Is It Difficult for Developers to Learn Another Programming Language?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Pre-print
HeteroRefactor: Refactoring for Heterogeneous Computing with FPGATechnicalArtifact Available
Technical Papers
DOI
How Android Developers Handle Evolution-induced API Compatibility Issues: A Large-scale StudyTechnical
Technical Papers
How Does Misconfiguration of Analytic Services Compromise Mobile Privacy?TechnicalArtifact Available
Technical Papers
How Has Forking Changed in the Last 20 Years? A Study of Hard Forks on GitHubTechnical
Technical Papers
Pre-print
How Software Practitioners Use Informal Local Meetups to Share Software Engineering KnowledgeTechnical
Technical Papers
How do Companies Collaborate in Open Source Ecosystems? An Empirical Study of OpenStackTechnical
Technical Papers
Pre-print
How to Not Get Rich: An Empirical Study of Donations in Open SourceArtifact ReusableTechnical
Technical Papers
Pre-print
HyDiff: Hybrid Differential Software AnalysisArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Impact Analysis of Cross-Project Bugs on Software EcosystemsTechnical
Technical Papers
Importance-Driven Deep Learning System TestingTechnical
Technical Papers
Improving Data Scientist Efficiency with ProvenanceArtifact ReusableTechnicalArtifact Available
Technical Papers
Improving the Effectiveness of Traceability Link Recovery using Hierarchical Bayesian NetworksTechnical
Technical Papers
Pre-print Media Attached
Interpreting Cloud Computer Vision Pain-Points: A Mining Study of Stack OverflowTechnical
Technical Papers
Is Rust Used Safely by Software Developers?Technical
Technical Papers
JVM Fuzzing for JIT-Induced Side-Channel DetectionTechnical
Technical Papers
Lazy Product Discovery in Huge Configuration SpacesArtifact ReusableTechnicalArtifact Available
Technical Papers
Learning from, Understanding, and Supporting DevOps Artifacts for DockerArtifact ReusableTechnicalArtifact Available
Technical Papers
Learning-to-Rank vs Ranking-to-Learn: Strategies for Regression Testing in Continuous IntegrationTechnical
Technical Papers
Low-Overhead Deadlock PredictionTechnical
Technical Papers
Managing data constraints in database-backed web applicationsArtifact ReusableTechnicalArtifact Available
Technical Papers
MemLock: Memory Usage Guided FuzzingArtifact ReusableTechnicalArtifact Available
Technical Papers
DOI Pre-print Media Attached
Misbehaviour Prediction for Autonomous Driving SystemsTechnical
Technical Papers
Pre-print
Mitigating Turnover with Code Review Recommendation: Balancing Expertise, Workload, and Knowledge DistributionTechnicalArtifact Available
Technical Papers
Multiple-Entry Testing of Android Applications by Constructing Activity Launching ContextsTechnicalArtifact Available
Technical Papers
Near-Duplicate Detection in Web App Model InferenceTechnicalArtifact Available
Technical Papers
Pre-print
Neurological Divide: An fMRI Study of Prose and Code WritingArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
On Learning Meaningful Assert Statements for Unit Test CasesTechnical
Technical Papers
Pre-print Media Attached
On the Efficiency of Test Suite based Program Repair: A Systematic Assessment of 16 Automated Repair Systems for Java ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
On the Recall of Static Call Graph Construction in PracticeArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
One Size Does Not Fit All: A Grounded Theory and Online Survey Study of Developer Preferences for Security Warning TypesTechnical
Technical Papers
Pipelining Bottom-up Data Flow AnalysisTechnical
Technical Papers
Planning for Untangling: Predicting the Difficulty of Merge ConflictsTechnical
Technical Papers
Posit: Simultaneously Tagging Natural and Programming LanguagesTechnicalArtifact Available
Technical Papers
Pre-print Media Attached File Attached
Practical Fault Detection in Puppet ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Primers or Reminders? The Effects of Existing Review Comments on Code ReviewACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
DOI Pre-print Media Attached
Pushback in Code Review: Characterizing and Detecting Negative Interpersonal InteractionsTechnical
Technical Papers
Pre-print
Quickly Generating Diverse Valid Test Inputs with Reinforcement LearningArtifact ReusableTechnicalArtifact Available
Technical Papers
Recognizing Developers' Emotions while ProgrammingTechnicalArtifact Available
Technical Papers
DOI Pre-print
Reducing Run-Time Adaptation Space via Analysis of Possible Utility BoundsTechnical
Technical Papers
Pre-print
ReluDiff: Differential Verification of Deep Neural NetworksArtifact ReusableTechnical
Technical Papers
Pre-print
Repairing Deep Neural Networks: Fix Patterns and ChallengesArtifact ReusableTechnicalArtifact Available
Technical Papers
Retrieval-based Neural Source Code SummarizationTechnical
Technical Papers
Pre-print
Revealing Injection Vulnerabilities by Leveraging Existing TestsArtifact ReusableTechnicalArtifact Available
Technical Papers
RoScript: A Visual Script Driven Truly Non-Intrusive Robotic Testing System for Touch Screen ApplicationsTechnical
Technical Papers
SAVER: Scalable, Precise, and Safe Memory-Error RepairArtifact ReusableTechnicalArtifact Available
Technical Papers
SLACC: Simion-based Language Agnostic Code ClonesArtifact ReusableTechnical
Technical Papers
Pre-print
SLEMI: Equivalence Modulo Input (EMI) Based Mutation of CPS Models for Finding Compiler Bugs in SimulinkArtifact ReusableTechnicalArtifact Available
Technical Papers
Link to publication DOI Media Attached
Scaling Open Source Communities: an Empirical Study of the Linux kernelTechnical
Technical Papers
Pre-print
Schrödinger's Security: Opening the Box on App Developers' Security RationaleTechnical
Technical Papers
Securing UnSafe Rust Programs with XRustArtifact ReusableTechnical
Technical Papers
Seenomaly: Vision-Based Linting of GUI Animation Effects Against Design-Don’t GuidelinesTechnical
Technical Papers
Simulee: Detecting CUDA Synchronization Bugs via Memory-Access ModelingTechnical
Technical Papers
Software Documentation: The Practitioners' PerspectiveTechnical
Technical Papers
Pre-print Media Attached
Software Visualization and Deep Transfer Learning for Effective Software Defect PredictionTechnical
Technical Papers
SpecuSym: Speculative Symbolic Execution for Cache Timing Leak DetectionTechnical
Technical Papers
Structure-Invariant Testing for Machine TranslationTechnical
Technical Papers
Studying the Use of Java Logging Utilities in the WildTechnical
Technical Papers
Authorizer link Pre-print
Suggesting Natural Method Names to Check Name ConsistenciesTechnical
Technical Papers
Pre-print
Symbolic Verification of Message Passing Interface ProgramsArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
TRADER: Trace Divergence Analysis and Embedding Regulation for Debugging Recurrent Neural NetworksArtifact ReusableTechnicalArtifact Available
Technical Papers
Pre-print
Tailoring Programs for Static Analysis via Program TransformationTechnicalArtifact Available
Technical Papers
Taming Behavioral Backward Incompatibilities via Cross-Project Testing and AnalysisTechnical
Technical Papers
Targeted Greybox Fuzzing with Static Lookahead AnalysisTechnical
Technical Papers
Pre-print
Taxonomy of Real Faults in Deep Learning SystemsACM SIGSOFT Distinguished Artifact AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Testing DNN Image Classifier for Confusion & Bias ErrorsArtifact ReusableTechnicalArtifact Available
Technical Papers
Testing File System Implementations on Layered ModelsTechnicalArtifact Available
Technical Papers
Time-travel Testing of Android AppsACM SIGSOFT Distinguished Paper AwardsArtifact ReusableTechnicalArtifact Available
Technical Papers
Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of UncertaintyTechnical
Technical Papers
Pre-print
Towards the Use of the Readily Available Tests from the Release Pipeline as Performance Tests. Are We There Yet?ACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Pre-print
Translating Video Recordings of Mobile App Usages into Replayable ScenariosACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Pre-print Media Attached
Typestate-Guided Fuzzer for Discovering Use-after-Free VulnerabilitiesTechnical
Technical Papers
Link to publication DOI Pre-print
Unblind Your Apps: Predicting Natural-Language Labels for Mobile GUI Components by Deep LearningACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
Understanding the Automated Parameter Optimization on Transfer Learning for Cross-Project Defect Prediction: An Empirical StudyTechnicalArtifact Available
Technical Papers
Pre-print
Unsuccessful Story about Few Shot Malware-Family Classification and Siamese Network to the RescueTechnical
Technical Papers
Verifying Object ConstructionTechnicalArtifact Available
Technical Papers
Watchman: Monitoring Dependency Conflicts for Python Library EcosystemArtifact ReusableTechnicalArtifact Available
Technical Papers
When APIs are Intentionally Bypassed: An Exploratory Study of API WorkaroundsTechnical
Technical Papers
Pre-print
White-box Fairness Testing through Adversarial SamplingACM SIGSOFT Distinguished Paper AwardsTechnical
Technical Papers
sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart ContractsTechnical
Technical Papers

Please note that the Double Blind Review (DBR) process is not used by all tracks. Check in the call for papers whether DBR is used or not.

Q: Why Double Blind?

There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. For more information on motivations for double-blind reviewing, see Claire Le Goues’s very well argued, referenced and evidenced blog posting in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller​​ and Alberto Bacchelli​​ (see https://pure.tudelft.nl/portal/files/17721365/1589a385.pdf).

Q: How to prepare your paper for double-blind reviewing?

You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up as an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:

  1. Omit all authors’ names from the title page. Please note that it is not sufficient to simply change the font color to white, as names may appear when highlighted or on some printers; nor is it sufficient to cover the names with a rectangle. Also, please make sure that no identifying information is stored in the properties metadata of your submitted pdf. There are many ways to check this, for example from linux: $ pdfinfo paper.pdf or from Adobe Acrobat select File/Properties tab.

  2. Refer to your own work in the third person. You should not change the names of your own tools, approaches or systems, since this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches or systems in the third person, so that it is credible that another author could have written your paper. If for any reason it is completely impossible to reference your prior work in the third person, then you will need to provide a blinded reference and send a copy of the original paper to the chairs. However, in most cases we expect you to reference your own work in the third person.

  3. Do not rely on supplementary material (your web site, your github repository, a youTube channel, a companion technical report or thesis) in the paper or in the rebuttal submitted during the clarification period. We allow supplementary material to be uploaded in the submission system, but it is your responsibility to make sure it does not include identifying information. If you choose to upload supplementary material (either through the submission site or as a link), and your material includes identifying information, then your submission could be desk rejected. Furthermore, please keep in mind that reviewers are not obligated to read supplementary material.

Q: I previously published an earlier version of this work in a venue that doesn’t have double-blind. What should I do about acknowledging that previous work?

A: If the work you are submitting for review has previously been published in a non-peer-reviewed venue (e.g., arXiv.org, or a departmental tech report), there is no need to cite it, because work that has not been refereed is not truly part of the scientific literature.

If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors.

Q: Our submission makes use of work from a PhD or master’s thesis, dissertation, or report which has been published. Citing the dissertation might compromise anonymity. What should we do?

A: It’s perfectly OK to publish work arising from a PhD or master’s degree, and there’s no need to cite it in an ICSE submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final post-review, camera ready version of the paper, please do cite the dissertation to acknowledge its contribution, but in any submission to an ICSE track employing a double-blind review process, please refrain from citing the dissertation, to increase anonymity.

You need not worry whether or not the dissertation has appeared. Your job is to ensure that your submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identifies. The referees will be trying hard not to discover the authors’ identity, so they will likely not be searching the web to check whether there is a dissertation related to this work.

Q: What if we want to cite some unpublished work of our own (as motivation for example)

A: If the unpublished paper is an earlier version of the paper you want to submit to ICSE and is currently under review, then you have to wait until your earlier version is through its review process before you can build on it with further submissions (this would be considered double-submission and violates ACM plagiarism policy and procedures). Otherwise, if the unpublished work is not an earlier version of the proposed ICSE submission, then you should simply make it available on a website, for example, and cite it in the third person to preserve anonymity, as you are doing with others of your works.

Q: Can I disseminate non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at ArXiV, etc.?

A: You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you are allowed to put your submission on your home page and present your work at small professional meetings. However, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post your work on ArXiV or a similar site just before or after submitting to the conference.

More info will be posted on this page as it becomes available