Blogs (1) >>
ASE 2019
Sun 10 - Fri 15 November 2019 San Diego, California, United States

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2019 invites high quality contributions describing significant, original, and unpublished results.

Dates
Tracks
You're viewing the program in a time zone which is different from your device's time zone change time zone

Tue 12 Nov

Displayed time zone: Tijuana, Baja California change

08:30 - 10:00
08:30
30m
Welcome from the Chairs
Research Papers

09:00
60m
Talk
Re-engineering Software Engineering for a Data-centric World
Research Papers
Miryung Kim University of California, Los Angeles
10:00 - 10:40
Poster Session: Tool Demonstrations 1Demonstrations at Kensington Ballroom
10:00
40m
Demonstration
Pangolin: An SFL-based Toolset for Feature Localization
Demonstrations
Bruno Miguel Sotto-Mayor de Castro Machado IST, University of Lisbon, Alexandre Perez Palo Alto Research Center, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID
10:00
40m
Demonstration
A Quantitative Analysis Framework for Recurrent Neural Network
Demonstrations
Xiaoning Du Nanyang Technological University, Xiaofei Xie Nanyang Technological University, Yi Li Nanyang Technological University, Lei Ma Kyushu University, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University
10:00
40m
Demonstration
Ares: Inferring Error Specifications through Static Analysis
Demonstrations
Li Chi Tsinghua University, Zuxing Gu School of Software, Tsinghua University, Min Zhou Tsinghua University, Ming Gu Tsinghua University, Hongyu Zhang The University of Newcastle
10:00
40m
Demonstration
SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-based Analysis of Variant-Rich Software
Demonstrations
Dennis Reuling Software Engineering Group, University of Siegen, Udo Kelter Software Engineering Group, University of Siegen, Sebastian Ruland TU Darmstadt, Real-time Systems Lab, Malte Lochau TU Darmstadt
Pre-print Media Attached File Attached
10:00
40m
Demonstration
VeriAbs : Verification by Abstraction and Test Generation
Demonstrations
Mohammad Afzal Tata Cosultancy Services, A Asia Tata Cosultancy Services, Avriti Chauhan Tata Cosultancy Services, Bharti Chimdyalwar Tata Consultancy Services, Priyanka Darke Tata Consultancy Services, Advaita Datar Tata Consultancy Services Ltd, Shrawan Kumar Tata Cosultancy Services, R Venkatesh Tata Research Development and Design Centre
10:00
40m
Demonstration
DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks
Demonstrations
Xiaofei Xie Nanyang Technological University, Hongxu Chen Nanyang Technological University, Yi Li Nanyang Technological University, Lei Ma Kyushu University, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University
10:00
40m
Demonstration
SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs
Demonstrations
Xutong Ma Institute of Software, Chinese Academy of Sciences, Jiwei Yan Institute of Software, Chinese Academy of Sciences, Yaqi Li Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software, Chinese Academy of Sciences
10:00
40m
Demonstration
LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform
Demonstrations
Shengcheng Yu Nanjing University, China, Chunrong Fang Nanjing University, Yang Feng University of California, Irvine, Wenyuan Zhao Nanjing University, Zhenyu Chen Nanjing University
File Attached
10:00
40m
Demonstration
FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing
Demonstrations
Xiao Liu School of Information Technology, Deakin University, Lingmin Fan School of Computer Science and Technology, Anhui University, Jia Xu School of Computer Science and Technology, Anhui University, Xuejun Li School of Computer Science and Technology, Anhui University, Lina Gong School of Computer Science and Technology, Anhui University, John Grundy Monash University, Yun Yang Swinburne University of Technology
10:00
40m
Demonstration
SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection
Demonstrations
Da Li State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan Wang State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang Xu Nanjing University, Ruiqing Zhang Search Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing Ma State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University
10:00
40m
Demonstration
FPChecker: Detecting Floating-Point Exceptions in GPU Applications
Demonstrations
Ignacio Laguna Lawrence Livermore National Laboratory
10:00
40m
Demonstration
PMExec: An Execution Engine of Partial UML-RT Models
Demonstrations
Mojtaba Bagherzadeh Queen's University, Karim Jahed Queen's University, Nafiseh Kahani Queen's University, Juergen Dingel Queen's University, Kingston, Ontario
Pre-print
10:40 - 12:20
Testing and CoverageResearch Papers / Demonstrations / Journal First Presentations / Industry Showcase at Cortez 1
Chair(s): Jonathan Bell George Mason University
10:40
20m
Talk
Automatic Self-Validation for Code Coverage Profilers
Research Papers
Yibiao Yang Huazhong University of Science and Technology, Yanyan Jiang Nanjing University, Zhiqiang Zuo Nanjing University, China, Yang Wang Nanjing University, Hao Sun Unaffiliated, Hongmin Lu Nanjing University, Yuming Zhou Nanjing University, Baowen Xu Nanjing University
Pre-print
11:00
20m
Talk
Efficient Test Generation Guided by Field Coverage Criteria
Research Papers
Ariel Godio Dept. of Software Engineering Instituto Tecnológico de Buenos Aires, Valeria Bengolea Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Pablo Ponzio Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Nazareno Aguirre Dept. of Computer Science FCEFQyN, University of Rio Cuarto, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
11:20
20m
Talk
Exploring Output-Based Coverage for Testing PHP Web Applications
Journal First Presentations
Hung Viet Nguyen Google LLC, USA, Hung Dang Phan ECpE Department, Iowa State University, Christian Kästner Carnegie Mellon University, Tien N. Nguyen University of Texas at Dallas
Link to publication
11:40
20m
Talk
PHANTA: Diversified Test Code Quality Measurement for Modern Software Development
Industry Showcase
Susumu Tokumoto Fujitsu Laboratories Ltd., Kuniharu Takayama Fujitsu Laboratories Ltd.
Media Attached
12:00
10m
Demonstration
TestCov: Robust Test-Suite Execution and Coverage Measurement
Demonstrations
Dirk Beyer LMU Munich, Thomas Lemberger LMU Munich
Pre-print Media Attached File Attached
12:10
10m
Demonstration
VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization
Demonstrations
Chijin Zhou Tsinghua University, Mingzhe Wang Tsinghua University, Jie Liang Tsinghua University, Zhe Liu Nanjing University of Aeronautics and Astronautics, Chengnian Sun Waterloo University, Yu Jiang Tsinghua University
10:40 - 12:20
10:40
20m
Talk
Assessing the Generalizability of code2vec Token Embeddings
Research Papers
Hong Jin Kang School of Information Systems, Singapore Management University, Tegawendé F. Bissyandé SnT, University of Luxembourg, David Lo Singapore Management University
Pre-print
11:00
20m
Talk
Multi-Modal Attention Network Learning for Semantic Source Code Retrieval
Research Papers
Yao Wan Zhejiang University, Jingdong Shu Zhejiang University, Yulei Sui University of Technology Sydney, Australia, Guandong Xu University of Technology, Sydney, Zhou Zhao Zhejiang University, Jian Wu Zhejiang University, philip yu University of Illinois at Chicago
11:20
20m
Talk
Experience Paper: Search-based Testing in Automated Driving Control ApplicationsACM SIGSOFT Distinguished Paper Award
Research Papers
Christoph Gladisch Corporate Research, Robert Bosch GmbH, Thomas Heinz Corporate Research, Robert Bosch GmbH, Christian Heinzemann Corporate Research, Robert Bosch GmbH, Jens Oehlerking Corporate Research, Robert Bosch GmbH, Anne von Vietinghoff Corporate Research, Robert Bosch GmbH, Tim Pfitzer Robert Bosch Automotive Steering GmbH
11:40
20m
Talk
Machine Translation-Based Bug Localization Technique for Bridging Lexical Gap
Journal First Presentations
Yan Xiao Department of Computer Science, City University of Hong Kong, Jacky Keung Department of Computer Science, City University of Hong Kong, Kwabena E. Bennin Blekinge Institute of Technology, SERL Sweden, Qing Mi Department of Computer Science, City University of Hong Kong
Link to publication
12:00
10m
Talk
AutoFocus: Interpreting Attention-based Neural Networks by Code Perturbation
Research Papers
Nghi D. Q. Bui Singapore Management University, Singapore, Yijun Yu The Open University, UK, Lingxiao Jiang Singapore Management University
Pre-print
12:10
10m
Demonstration
A Quantitative Analysis Framework for Recurrent Neural Network
Demonstrations
Xiaoning Du Nanyang Technological University, Xiaofei Xie Nanyang Technological University, Yi Li Nanyang Technological University, Lei Ma Kyushu University, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University
10:40 - 12:20
10:40
20m
Talk
Test Transfer Across Mobile Apps Through Semantic Mapping
Research Papers
Jun-Wei Lin University of California, Irvine, Reyhaneh Jabbarvand University of California, Irvine, Sam Malek University of California, Irvine
11:00
20m
Talk
Test Migration Between Mobile Apps with Similar Functionality
Research Papers
Farnaz Behrang Georgia Tech, Alessandro Orso Georgia Tech
11:20
20m
Talk
DaPanda: Detecting Aggressive Push Notification in Android Apps
Research Papers
Tianming Liu Beijing University of Posts and Telecommunications, China, Haoyu Wang Beijing University of Posts and Telecommunications, China, Li Li Monash University, Australia, Guangdong Bai Griffith University, Yao Guo Peking University, Guoai Xu Beijing University of Posts and Telecommunications
11:40
20m
Talk
Automatic, highly accurate app permission recommendation
Journal First Presentations
Zhongxin Liu Zhejiang University, Xin Xia Monash University, David Lo Singapore Management University, John Grundy Monash University
Link to publication
12:00
10m
Demonstration
LIRAT: Layout and Image Recognition Driving Automated Mobile Testing of Cross-Platform
Demonstrations
Shengcheng Yu Nanjing University, China, Chunrong Fang Nanjing University, Yang Feng University of California, Irvine, Wenyuan Zhao Nanjing University, Zhenyu Chen Nanjing University
File Attached
12:10
10m
Demonstration
Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing
Demonstrations
Yuanchun Li Peking University, Ziyue Yang Peking University, Yao Guo Peking University, Xiangqun Chen Peking University
13:40 - 15:20
Testing and VerificationResearch Papers / Demonstrations / Industry Showcase at Cortez 1
Chair(s): Weihang Wang University at Buffalo, SUNY
13:40
20m
Talk
Systematically Covering Input Structure
Research Papers
Nikolas Havrikov CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security
Pre-print
14:00
20m
Talk
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs
Research Papers
Devika Sondhi IIIT Delhi, Rahul Purandare IIIT-Delhi
Pre-print
14:20
20m
Talk
Detecting Error-Handling Bugs without Error Specification Input
Research Papers
Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Tingting Yu University of Kentucky, Xiangke Liao National University of Defense Technology, China, Ji Wang National University of Defense Technology, Xiaodong Liu National University of Defense Technology, Yunhuai Liu Peking University
14:40
20m
Talk
Test Automation and its Limitations
Industry Showcase
Ahyoung Sung Samsung Electronics, Yangsu Kim Samsung Electronics, Sangjun Kim Samsung Electronics, Jongin Kim Samsung Electronics, Neo Jang Samsung Electronics
15:00
10m
Talk
Grading-Based Test Suite Augmentation
Research Papers
Jonathan Osei-Owusu University of Illinois at Urbana-Champaign, Angello Astorga University of Illinois at Urbana-Champaign, Liia Butler University of Illinois at Urbana-Champaign, Tao Xie Peking University, Geoffrey Challen University of Illinois at Urbana-Champaign
15:10
10m
Demonstration
MutAPK: Source-Codeless Mutant Generation for Android Apps
Demonstrations
Camilo Escobar-Velásquez Universidad de los Andes, Michael Osorio-Riaño Universidad de los Andes, Mario Linares-Vásquez Systems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia
13:40 - 15:20
Natural Language and Human AspectsResearch Papers / Demonstrations / Journal First Presentations at Cortez 2&3
Chair(s): Bogdan Vasilescu Carnegie Mellon University
13:40
20m
Talk
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites
Research Papers
Xiaoxue Ren Zhejiang University, Zhenchang Xing Australia National University, Xin Xia Monash University, Guoqiang Li Shanghai Jiao Tong University, Jianling Sun Zhejiang University
Pre-print
14:00
20m
Talk
Automating App Review Response Generation
Research Papers
Cuiyun Gao Nanyang Technological University, Singapore, Jichuan Zeng The Chinese University of Hong Kong, Xin Xia Monash University, David Lo Singapore Management University, Michael Lyu The Chinese University of Hong Kong, Irwin King The Chinese University of Hong Kong
Pre-print
14:20
20m
Talk
Automatic Generation of Pull Request DescriptionsACM SIGSOFT Distinguished Paper Award
Research Papers
Zhongxin Liu Zhejiang University, Xin Xia Monash University, Christoph Treude The University of Adelaide, David Lo Singapore Management University, Shanping Li Zhejiang University
Pre-print
14:40
20m
Talk
Recommending Who to Follow in the Software Engineering Twitter Space
Journal First Presentations
Abhishek Sharma Singapore Management University, Singapore, Yuan Tian Queens University, Kingston, Canada, Agus Sulistya School of Information Systems, Singapore Management University, Dinusha Wijedasa School of Information Systems, Singapore Management University, David Lo Singapore Management University
Pre-print
15:00
10m
Demonstration
Developer Reputation Estimator (DRE)
Demonstrations
Sadika Amreen University of Tennessee Knoxville, Andrey Karnauch University of Tennessee Knoxville, Audris Mockus University of Tennessee - Knoxville
15:10
10m
Demonstration
CocoQa: Question Answering for Coding Conventions over Knowledge Graphs
Demonstrations
Tianjiao Du Shanghai JiaoTong University, Junming Cao Shanghai JiaoTong University, Qinyue Wu Shanghai JiaoTong University, Wei Li Shanghai JiaoTong University, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University
13:40 - 15:20
Mobile 2Research Papers / Journal First Presentations at Hillcrest
Chair(s): Myra Cohen Iowa State University
13:40
20m
Talk
A Qualitative Analysis of Android Taint-Analysis Results
Research Papers
Linghui Luo Paderborn University, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM, Johannes Späth Fraunhofer IEM
Pre-print File Attached
14:00
20m
Talk
Goal-Driven Exploration for Android Applications
Research Papers
Duling Lai University of British Columbia, Julia Rubin University of British Columbia
Pre-print
14:20
20m
Talk
RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation
Research Papers
Onur Sahin Boston University, Assel Aliyeva Boston University, Hariharan Mathavan Boston University, Ayse Coskun Boston University, Manuel Egele Boston University, USA
14:40
20m
Talk
Specifying Callback Control Flow of Mobile Apps Using Finite Automata
Journal First Presentations
Danilo Dominguez Perez Iowa State University, Wei Le Iowa State University
Link to publication
15:00
20m
Talk
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Research Papers
Yueming Wu Huazhong University of Science and Technology, Xiaodi Li University of Texas at Dallas, Deqing Zou Huazhong University of Science and Technology, Wei Yang University of Texas at Dallas, Xin Zhang Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology
Pre-print
16:00 - 17:40
Testing and VisualizationDemonstrations / Research Papers / Journal First Presentations at Cortez 1
Chair(s): Amin Alipour University of Houston
16:00
20m
Talk
History-Guided Configuration Diversification for Compiler Test-Program GenerationACM SIGSOFT Distinguished Paper Award
Research Papers
Junjie Chen Tianjin University, Guancheng Wang Peking University, Dan Hao Peking University, Yingfei Xiong Peking University, Hongyu Zhang The University of Newcastle, Lu Zhang Peking University
16:20
20m
Talk
Data-Driven Compiler Testing and Debugging
Research Papers
Junjie Chen Tianjin University
16:40
20m
Talk
Targeted Example Generation for Compilation Errors
Research Papers
Umair Z. Ahmed National University of Singapore, Renuka Sindhgatta Queensland University of Technology, Australia, Nisheeth Srivastava Indian Institute of Technology, Kanpur, Amey Karkare IIT Kanpur
Link to publication Pre-print
17:00
20m
Talk
Lightweight Assessment of Test-Case Effectiveness using Source-Code-Quality Indicators
Journal First Presentations
Giovanni Grano University of Zurich, Fabio Palomba Department of Informatics, University of Zurich, Harald Gall University of Zurich
Link to publication Pre-print
17:20
10m
Demonstration
Visual Analytics for Concurrent Java Executions
Demonstrations
Cyrille Artho KTH Royal Institute of Technology, Sweden, Monali Pande KTH Royal Institute of Technology, Qiyi Tang University of Oxford
17:30
10m
Demonstration
NeuralVis: Visualizing and Interpreting Deep Learning Models
Demonstrations
Xufan Zhang State Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue Yin State Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang Feng University of California, Irvine, Qingkai Shi Hong Kong University of Science and Technology, Jia Liu State Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu Chen Nanjing University
16:00 - 17:40
Code and Artifact AnalysisJournal First Presentations / Research Papers at Cortez 2&3
Chair(s): Sarah Nadi University of Alberta
16:00
20m
Talk
Emotions Extracted from Text vs. True Emotions –An Empirical Evaluation in SE Context
Research Papers
Yi Wang Rochester Institute of Technology
16:20
20m
Talk
Collaborative feature location in models through automatic query expansion
Journal First Presentations
Francisca Pérez SVIT Research GroupUniversidad San Jorge, Jaime Font San Jorge University, Spain, Lorena Arcega San Jorge University, Carlos Cetina San Jorge University, Spain
Link to publication
16:40
20m
Talk
Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets
Research Papers
C M Khaled Saifullah Department of Computer Science, University of Saskatchewan, Muhammad Asaduzzaman Postdoctoral Research Fellow, Software Analysis and Intelligence Lab, Queen's University, Canada, Chanchal K. Roy University of Saskatchewan
Pre-print
17:00
20m
Talk
Inferring Program Transformations From Singular Examples via Big Code
Research Papers
Jiajun Jiang Peking University, Luyao Ren Peking University, Yingfei Xiong Peking University, Lingming Zhang The University of Texas at Dallas
Link to publication Pre-print
17:20
20m
Talk
Extracting and studying the Logging-Code-Issue-Introducing changes in Java-based large-scale open source software systems
Journal First Presentations
Boyuan Chen York University, Zhen Ming (Jack) Jiang York University
Link to publication
16:00 - 17:40
SecurityDemonstrations / Research Papers / Journal First Presentations at Hillcrest
Chair(s): Julia Rubin University of British Columbia
16:00
20m
Talk
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint AnalysisACM SIGSOFT Distinguished Paper Award
Research Papers
Dongjie He University of New South Wales; Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Haofeng Li Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Lei Wang Institute of Computing Technology, Chinese Academy of Science, Haining Meng Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Hengjie Zheng Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Jie Liu University of New South Wales, Shuangwei Hu vivo AI Lab, Lian Li Institute of Computing Technology at Chinese Academy of Sciences, China, Jingling Xue UNSW Sydney
16:20
20m
Talk
Characterizing Android App Signing Issues
Research Papers
Haoyu Wang Beijing University of Posts and Telecommunications, China, Hongxuan Liu Peking University, Xusheng Xiao Case Western Reserve University, Guozhu Meng Institute of Information Engineering, Chinese Academy of Sciences, Yao Guo Peking University
16:40
20m
Talk
OAuthLint: An Empirical Study on OAuth Bugs in Android Applications
Research Papers
Tamjid Al Rahat University of Virginia, Yu Feng University of California, Santa Barbara, Yuan Tian University of Virginia
Pre-print
17:00
20m
Talk
Are Free Android App Security Analysis Tools Effective in Detecting Known Vulnerabilities?
Journal First Presentations
Venkatesh-Prasad Ranganath Kansas State University, Joydeep Mitra Kansas State University
Link to publication DOI Pre-print Media Attached
17:20
10m
Demonstration
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Demonstrations
Goran Piskachev Fraunhofer IEM, Lisa Nguyen Quang Do Google, Oshando Johnson Fraunhofer IEM, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM
Pre-print Media Attached File Attached
17:30
10m
Demonstration
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs
Demonstrations
Ayesha Sadiq Monash University, Li Li Monash University, Australia, Yuan-Fang Li Monash University, Ijaz Ahmed University of Lahore, Sea Ling Monash University

Wed 13 Nov

Displayed time zone: Tijuana, Baja California change

08:30 - 10:00
08:30
30m
Awards
ASE Award Ceremony
Research Papers

09:00
60m
Talk
The Human Dimension of Cloud Computing
Research Papers
Yuanyuan Zhou University of California, San Diego
10:00 - 10:40
Poster Session: Tool Demonstrations 2Demonstrations at Kensington Ballroom
10:00
40m
Demonstration
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis
Demonstrations
Yuexing Wang Tsinghua University, Guang Chen Tsinghua University, Min Zhou Tsinghua University, Ming Gu Tsinghua University, Jiaguang Sun Tsinghua University
10:00
40m
Demonstration
BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules
Demonstrations
Pavan Kumar Chittimalli TCS Research, Kritika Anand TCS Research, Shrishti Pradhan TCS Research, Sayandeep Mitra TCS Research, Chandan Prakash TCS Research, Rohit Shere TCS Research, Ravindra Naik TCS Research, TRDDC, India
10:00
40m
Demonstration
Lancer: Your Code Tell Me What You Need
Demonstrations
Shufan Zhou School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao Zhong Shanghai Jiao Tong University
10:00
40m
Demonstration
TestCov: Robust Test-Suite Execution and Coverage Measurement
Demonstrations
Dirk Beyer LMU Munich, Thomas Lemberger LMU Munich
Pre-print Media Attached File Attached
10:00
40m
Demonstration
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis
Demonstrations
Yihao Huang East China Normal University, Jincao Feng East China Normal University, Hanyue Zheng East China Normal University, Jiayi Zhu East China Normal University, Shang Wang East China Normal University, Siyuan Jiang Eastern Michigan University, Weikai Miao Shanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang Pu East China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd
10:00
40m
Demonstration
XRaSE: Towards Virtually Tangible Software using Augmented Reality
Demonstrations
Rohit Mehra Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture
10:00
40m
Demonstration
MuSC: A Tool for Mutation Testing of Ethereum Smart Contract
Demonstrations
Zixin Li Nanjing University, Haoran Wu State Key Laboratory for Novel Software Technology, Nanjing University, Jiehui Xu Nanjing University, Xingya Wang State Key Laboratory for Novel Software Technology, Nanjing University, Lingming Zhang The University of Texas at Dallas, Zhenyu Chen Nanjing University
10:00
40m
Demonstration
VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq
Demonstrations
Bernd Fischer Stellenbosch University, Salvatore La Torre Università degli Studi di Salerno, Gennaro Parlato University of Molise
10:00
40m
Demonstration
DeepMutation++: a Mutation Testing Framework for Deep Learning Systems
Demonstrations
Qiang Hu Kyushu University, Japan, Lei Ma Kyushu University, Xiaofei Xie Nanyang Technological University, Bing Yu Kyushu University, Japan, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University
10:00
40m
Demonstration
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts
Demonstrations
Mark Mossberg Trail of Bits, Felipe Manzano Trail of Bits, Eric Hennenfent Trail of Bits, Alex Groce Northern Arizona University, Gustavo Grieco Trail of Bits, Josselin Feist Trail of Bits, Trent Brunson Trail of Bits, Artem Dinaburg Trail of Bits
Media Attached
10:00
40m
Demonstration
ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities
Demonstrations
Ruijie Meng University of Chinese Academy of Sciences, Biyun Zhu University of Chinese Academy of Sciences, Hao Yun University of Chinese Academy of Sciences, Haicheng Li University of Chinese Academy of Sciences, Yan Cai Institute of Software, Chinese Academy of Sciences, Zijiang Yang Western Michigan University
10:00
40m
Demonstration
mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines
Demonstrations
Reza Ahmadi Queen's University, Karim Jahed Queen's University, Juergen Dingel Queen's University, Kingston, Ontario
10:40 - 12:20
Testing and Program AnalysisResearch Papers / Demonstrations at Cortez 1
Chair(s): Jun Sun Singapore Management University, Singapore
10:40
20m
Talk
Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular ExpressionsACM SIGSOFT Distinguished Paper Award
Research Papers
Louis G. Michael IV Virginia Tech, James Donohue University of Bradford, James C. Davis Virginia Tech, USA, Dongyoon Lee Stony Brook University, Francisco Servant Virginia Tech
Pre-print File Attached
11:00
20m
Talk
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study
Research Papers
James C. Davis Virginia Tech, USA, Daniel Moyer Virginia Tech, Ayaan M. Kazerouni Virginia Tech, Dongyoon Lee Stony Brook University
Pre-print File Attached
11:20
20m
Talk
Accurate String Constraints Solution Counting with Weighted Automata
Research Papers
Elena Sherman Boise State University, Andrew Harris Boise State University
11:40
20m
Talk
Subformula Caching for Model Counting and Quantitative Program Analysis
Research Papers
William Eiers University of California at Santa Barbara, USA, Seemanta Saha University of California Santa Barbara, Tegan Brennan University of California, Santa Barbara, Tevfik Bultan University of California, Santa Barbara
12:00
10m
Demonstration
SPrinter: A Static Checker for Finding Smart Pointer Errors in C++ Programs
Demonstrations
Xutong Ma Institute of Software, Chinese Academy of Sciences, Jiwei Yan Institute of Software, Chinese Academy of Sciences, Yaqi Li Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software, Chinese Academy of Sciences, Jian Zhang Institute of Software, Chinese Academy of Sciences
12:10
10m
Demonstration
FPChecker: Detecting Floating-Point Exceptions in GPU Applications
Demonstrations
Ignacio Laguna Lawrence Livermore National Laboratory
10:40 - 12:20
Program RepairResearch Papers / Demonstrations / Journal First Presentations at Cortez 2&3
Chair(s): Yingfei Xiong Peking University
10:40
20m
Talk
Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models
Research Papers
Hao Zhang City University of Hong Kong, Wing-Kwong Chan City University of Hong Kong, Hong Kong
11:00
20m
Talk
Re-factoring based Program Repair applied to Programming Assignments
Research Papers
Yang Hu The University of Texas at Austin, Umair Z. Ahmed National University of Singapore, Sergey Mechtaev University College London, Ben Leong National University of Singapore, Abhik Roychoudhury National University of Singapore
Pre-print
11:20
20m
Talk
InFix: Automatically Repairing Novice Program Inputs
Research Papers
Madeline Endres University of Michigan, Georgios Sakkas University of California, San Diego, Benjamin Cosman University of California at San Diego, USA, Ranjit Jhala University of California, San Diego, Westley Weimer University of Michigan
Pre-print
11:40
20m
Talk
Astor: Exploring the Design Space of Generate-and-Validate Program Repair beyond GenProg
Journal First Presentations
Matias Martinez Université Polytechnique Hauts-de-France, Martin Monperrus KTH Royal Institute of Technology
Pre-print
12:00
10m
Demonstration
PraPR: Practical Program Repair via Bytecode Mutation
Demonstrations
Ali Ghanbari Iowa State University, Lingming Zhang The University of Texas at Dallas
12:10
10m
Talk
Understanding Automatically-Generated Patches Through Symbolic Invariant Differences
Research Papers
Padraic Cashin Arizona State University, Cari Martinez University of New Mexico, Stephanie Forrest Arizona State University, Westley Weimer University of Michigan
Pre-print
10:40 - 12:20
Cloud and Online ServicesJournal First Presentations / Research Papers / Demonstrations at Hillcrest
Chair(s): Dan Hao Peking University
10:40
20m
Talk
Understanding Exception-Related Bugs in Large-Scale Cloud Systems
Research Papers
Haicheng Chen The Ohio State University, Wensheng Dou Institute of Software, Chinese Academy of Sciences, Yanyan Jiang Nanjing University, Feng Qin Ohio State University, USA
Pre-print Media Attached
11:00
20m
Talk
iFeedback: Exploiting User Feedback for Real-time Issue Detection in Large-Scale Online Service Systems
Research Papers
Wujie Zheng Tencent, Inc., Haochuan Lu Fudan University, Yangfan Zhou Fudan University, Jianming Liang Tencent, Haibing Zheng Tencent, Yuetang Deng Tencent, Inc.
11:20
20m
Talk
Software Microbenchmarking in the Cloud. How Bad is it Really?
Journal First Presentations
Christoph Laaber University of Zurich, Joel Scheuner Chalmers | University of Gothenburg, Philipp Leitner Chalmers University of Technology & University of Gothenburg
Link to publication Pre-print
11:40
20m
Talk
Continuous Incident Triage for Large-Scale Online Service Systems
Research Papers
Junjie Chen Tianjin University, Xiaoting He Microsoft, Qingwei Lin Microsoft Research, China, Hongyu Zhang The University of Newcastle, Dan Hao Peking University, Feng Gao Microsoft, Zhangwei Xu Microsoft, Yingnong Dang Microsoft Azure, Dongmei Zhang Microsoft Research, China
12:00
10m
Demonstration
Kotless: a Serverless Framework for Kotlin
Demonstrations
Vladislav Tankov JetBrains, ITMO University, Yaroslav Golubev JetBrains Research, Timofey Bryksin JetBrains Research, Saint-Petersburg State University
12:10
10m
Demonstration
FogWorkflowSim: An Automated Simulation Toolkit for Workflow Performance Evaluation in Fog Computing
Demonstrations
Xiao Liu School of Information Technology, Deakin University, Lingmin Fan School of Computer Science and Technology, Anhui University, Jia Xu School of Computer Science and Technology, Anhui University, Xuejun Li School of Computer Science and Technology, Anhui University, Lina Gong School of Computer Science and Technology, Anhui University, John Grundy Monash University, Yun Yang Swinburne University of Technology
13:40 - 15:20
Verification and Bug DetectionDemonstrations / Research Papers at Cortez 1
Chair(s): Raghavan Komondoor Indian Institute of Science, Bangalore
13:40
20m
Talk
Mutation Analysis for Coq
Research Papers
Ahmet Celik The University of Texas at Austin, Karl Palmskog University of Texas at Austin, Marinela Parovic The University of Texas at Austin, Emilio Jesús Gallego Arias MINES ParisTech, Milos Gligoric The University of Texas at Austin
14:00
20m
Talk
Verifying Arithmetic in Cryptographic C Programs
Research Papers
Jiaxiang Liu Shenzhen University, Xiaomu Shi Shenzhen University, Ming-Hsien Tsai Academia Sinica, Taiwan, Bow-Yaw Wang Academia Sinica, Bo-Yin Yang Academia Sinica
Pre-print
14:20
20m
Talk
Model checking embedded control software using OS-in-the-loop CEGAR
Research Papers
Dongwoo Kim Kyungpook National University, Yunja Choi Kyungpook National University
Pre-print
14:40
20m
Talk
Get rid of inline assembly through verification-oriented lifting
Research Papers
Frédéric Recoules CEA LIST, Sébastien Bardin CEA LIST, Richard Bonichon CEA LIST, Laurent Mounier Université Grenoble Alpes, Marie-Laure Potet Université Grenoble Alpes
DOI Pre-print
15:00
10m
Demonstration
VeriAbs : Verification by Abstraction and Test Generation
Demonstrations
Mohammad Afzal Tata Cosultancy Services, A Asia Tata Cosultancy Services, Avriti Chauhan Tata Cosultancy Services, Bharti Chimdyalwar Tata Consultancy Services, Priyanka Darke Tata Consultancy Services, Advaita Datar Tata Consultancy Services Ltd, Shrawan Kumar Tata Cosultancy Services, R Venkatesh Tata Research Development and Design Centre
15:10
10m
Demonstration
SGUARD: A Feature-based Clustering Tool for Effective Spreadsheet Defect Detection
Demonstrations
Da Li State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Huiyan Wang State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University, Nanjing, China, Chang Xu Nanjing University, Ruiqing Zhang Search Tech. Center Asia, Microsoft, Suzhou, China, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Xiaoxing Ma State Key Lab. for Novel Software Tech. and Dept. of Comp. Sci. and Tech., Nanjing University
13:40 - 15:20
Systems and LocalizationIndustry Showcase / Research Papers / Demonstrations at Cortez 2&3
Chair(s): Tegawendé F. Bissyandé SnT, University of Luxembourg
13:40
20m
Talk
Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical Study
Research Papers
Jiajun Jiang Peking University, Ran Wang Peking University, Yingfei Xiong Peking University, Xiangping Chen Sun Yat-sen University, Lu Zhang Peking University
Pre-print
14:00
20m
Talk
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Research Papers
Tarannum Shaila Zaman University of Kentucky, Xue Han University of Kentucky, Tingting Yu University of Kentucky
Pre-print File Attached
14:20
20m
Talk
Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing
Research Papers
Zhilei Ren Dalian University of Technology, Changlin Liu Case Western Reserve University, Xusheng Xiao Case Western Reserve University, He Jiang School of Software, Dalian University of Technology, Tao Xie Peking University
14:40
20m
Talk
PTracer: A Linux Kernel Patch Trace Bot
Industry Showcase
Yang Wen ZTE Corporation, Jicheng Cao ZTE Corporation, Shengyu Cheng ZTE Corporation
15:00
10m
Demonstration
Pangolin: An SFL-based Toolset for Feature Localization
Demonstrations
Bruno Miguel Sotto-Mayor de Castro Machado IST, University of Lisbon, Alexandre Perez Palo Alto Research Center, Rui Abreu Instituto Superior Técnico, U. Lisboa & INESC-ID
15:10
10m
Demonstration
SiMPOSE - Configurable N-Way Program Merging Strategies for Superimposition-based Analysis of Variant-Rich Software
Demonstrations
Dennis Reuling Software Engineering Group, University of Siegen, Udo Kelter Software Engineering Group, University of Siegen, Sebastian Ruland TU Darmstadt, Real-time Systems Lab, Malte Lochau TU Darmstadt
Pre-print Media Attached File Attached
13:40 - 15:20
Configurations and VariabilityJournal First Presentations / Research Papers at Hillcrest
Chair(s): Shin Hwei Tan
13:40
20m
Talk
ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial Networks
Research Papers
Liang Bao School of Computer Science and Technology, XiDian University, Xin Liu Department of Computer Science, University of California, Davis, Fangzheng Wang School of Computer Science and Technology, XiDian University, Baoyin Fang School of Computer Science and Technology, XiDian University
14:00
20m
Talk
Automated N-way Program Merging for Facilitating Family-Based Analyses of Variant-Rich Software
Journal First Presentations
Dennis Reuling Software Engineering Group, University of Siegen, Udo Kelter Software Engineering Group, University of Siegen, Johannes Bürdek TU Darmstadt, Real-time Systems Lab, Malte Lochau TU Darmstadt
Link to publication DOI
14:20
20m
Talk
V2: Fast Detection of Configuration Drift in Python
Research Papers
Eric Horton North Carolina State University, Chris Parnin NCSU
Pre-print
14:40
20m
Talk
Feature-Interaction Aware Configuration Prioritization for Configurable Code
Research Papers
Son Nguyen The University of Texas at Dallas, Hoan Anh Nguyen Amazon, Ngoc Tran University of Texas at Dallas, Hieu Tran The University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas
15:00
20m
Talk
Search-based test case implantation for testing untested configurations
Journal First Presentations
Dipesh Pradhan Simula Research Laboratory, Norway, Shuai Wang Hong Kong University of Science and Technology, Tao Yue Nanjing University of Aeronautics and Astronautics & Simula Research Laboratory, Shaukat Ali Simula Research Lab, Marius Liaaen Cisco Systems
Link to publication
16:00 - 17:40
PredictionResearch Papers / Journal First Presentations at Cortez 1
Chair(s): Xin Xia Monash University
16:00
20m
Talk
Predicting Licenses for Changed Source Code
Research Papers
Xiaoyu Liu Department of Computer Science and Engineering, Southern Methodist University, Liguo Huang Dept. of Computer Science, Southern Methodist University, Dallas, TX, 75205, Jidong Ge State Key Laboratory for Novel Software and Technology, Nanjing University, Vincent Ng Human Language Technology Research Institute, University of Texas at Dallas, Richardson, TX 75083-0688
16:20
20m
Talk
Empirical evaluation of the impact of class overlap on software defect prediction
Research Papers
Lina Gong China University of Mining and Technology, Shujuan Jiang China University of Mining and Technology, Rongcun Wang China University of Mining and Technology, Li Jiang China University of Mining and Technology
16:40
20m
Talk
Combining Program Analysis and Statistical Language Model for Code Statement Completion
Research Papers
Son Nguyen The University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas, Yi Li New Jersey Institute of Technology, USA, Shaohua Wang New Jersey Institute of Technology, USA
17:00
20m
Talk
Balancing the trade-off between accuracy and interpretability in software defect prediction
Journal First Presentations
Toshiki Mori Corporate Software Engineering & Technology Center, Toshiba Corporation, Naoshi Uchihira School of Knowledge Science, Japan Advanced Institute of Science and Technology (JAIST)
Link to publication File Attached
17:20
20m
Talk
Fine-grained just-in-time defect prediction
Journal First Presentations
Luca Pascarella Delft University of Technology, Fabio Palomba Department of Informatics, University of Zurich, Alberto Bacchelli University of Zurich
Link to publication
16:00 - 17:40
API and RenamingResearch Papers / Journal First Presentations at Cortez 2&3
Chair(s): Massimiliano Di Penta University of Sannio
16:00
20m
Talk
CodeKernel: A Graph Kernel based Approach to the Selection of API Usage Examples
Research Papers
Xiaodong Gu The Hong Kong University of Science and Technology, Hongyu Zhang The University of Newcastle, Sunghun Kim Hong Kong University of Science and Technology
Pre-print
16:20
20m
Talk
Machine Learning Based Automated Method Name Recommendation: How Far Are We
Research Papers
Lin Jiang beijing university of posts and telecommunication, Hui Liu Beijing Institute of Technology, He Jiang School of Software, Dalian University of Technology
Link to publication Pre-print
16:40
20m
Talk
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems
Research Papers
Daye Nam Carnegie Mellon University, Amber Horvath Carnegie Mellon University, Andrew Macvean Google, Inc., Brad A. Myers Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
Pre-print
17:00
20m
Talk
DIRE: A Neural Approach to Decompiled Identifier Renaming
Research Papers
Jeremy Lacomis Carnegie Mellon University, Pengcheng Yin Carnegie Mellon University, Edward J. Schwartz Carnegie Mellon University Software Engineering Institute, Miltiadis Allamanis Microsoft Research, Cambridge, Claire Le Goues Carnegie Mellon University, Graham Neubig Carnegie Mellon University, Bogdan Vasilescu Carnegie Mellon University
Pre-print Media Attached
17:20
20m
Talk
Automatic Detection and Update Suggestion for Outdated API Names in Documentation
Journal First Presentations
Seonah Lee Gyeongsang National University, Rongxin Wu Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Shing-Chi Cheung Department of Computer Science and Engineering, The Hong Kong University of Science and Technology, Sungwon Kang Korea Advanced Institute of Science and Technology
Link to publication
16:00 - 17:50
PerformanceResearch Papers / Demonstrations at Hillcrest
Chair(s): Tim Menzies North Carolina State University
16:00
20m
Talk
Accurate Modeling of Performance Histories for Evolving Software Systems
Research Papers
Stefan Mühlbauer Bauhaus-University Weimar, Sven Apel Saarland University, Norbert Siegmund Bauhaus-University Weimar
Pre-print
16:20
20m
Talk
An Industrial Experience Report on Performance-Aware Refactoring on a Database-centric Web Application
Research Papers
Boyuan Chen York University, Zhen Ming (Jack) Jiang York University, Paul Matos Copywell Inc., Michael Lacaria Copywell Inc.
Authorizer link Pre-print
16:40
20m
Talk
An Experience Report of Generating Load Tests Using Log-recovered Workloads at Varying Granularities of User Behaviour
Research Papers
Jinfu Chen Jiangsu University, Weiyi Shang Concordia University, Canada, Ahmed E. Hassan Queen's University, Yong Wang Alibaba Group, Jiangbin Lin Alibaba Group
Pre-print
17:00
10m
Talk
How Do API Selections Affect the Runtime Performance of Data Analytics Tasks?
Research Papers
Yida Tao Shenzhen University, Shan Tang Shenzhen University, Yepang Liu Southern University of Science and Technology, Zhiwu Xu Shenzhen University, Shengchao Qin University of Teesside
17:10
10m
Talk
Demystifying Application Performance Management Libraries for Android
Research Papers
Yutian Tang The Hong Kong Polytechnic University, Xian Zhan The Hong Kong Polytechnic University, Hao Zhou The Hong Kong Polytechnic University, Xiapu Luo The Hong Kong Polytechnic University, Zhou Xu Wuhan University, Yajin Zhou Zhejiang University, Qiben Yan Michigan State University
17:20
10m
Demonstration
PeASS: A Tool for Identifying Performance Changes at Code Level
Demonstrations
David Georg Reichelt Universität Leipzig, Stefan Kühne Universität Leipzig, Wilhelm Hasselbring Kiel University
Pre-print Media Attached File Attached
17:30
20m
Talk
ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler
Research Papers
Daniil Stepanov Saint Petersburg Polytechnic University, Marat Akhin Saint Petersburg Polytechnic University / JetBrains Research, Mikhail Belyaev Saint Petersburg Polytechnic University
Pre-print

Thu 14 Nov

Displayed time zone: Tijuana, Baja California change

08:30 - 10:00
08:30
15m
Awards
Student Research Competition Awards Ceremony
Student Research Competition

08:45
15m
ASE 2020 Announcement
Research Papers

09:00
60m
Talk
Automated Debug & Profiling of AAA Games
Research Papers
Mathieu Nayrolles Ubisoft Montreal
10:00 - 10:40
Poster Session: Tool Demonstrations 3Demonstrations at Kensington Ballroom
10:00
40m
Demonstration
PraPR: Practical Program Repair via Bytecode Mutation
Demonstrations
Ali Ghanbari Iowa State University, Lingming Zhang The University of Texas at Dallas
10:00
40m
Demonstration
Kotless: a Serverless Framework for Kotlin
Demonstrations
Vladislav Tankov JetBrains, ITMO University, Yaroslav Golubev JetBrains Research, Timofey Bryksin JetBrains Research, Saint-Petersburg State University
10:00
40m
Demonstration
PeASS: A Tool for Identifying Performance Changes at Code Level
Demonstrations
David Georg Reichelt Universität Leipzig, Stefan Kühne Universität Leipzig, Wilhelm Hasselbring Kiel University
Pre-print Media Attached File Attached
10:00
40m
Demonstration
MutAPK: Source-Codeless Mutant Generation for Android Apps
Demonstrations
Camilo Escobar-Velásquez Universidad de los Andes, Michael Osorio-Riaño Universidad de los Andes, Mario Linares-Vásquez Systems and Computing Engineering Department , Universidad de los Andes , Bogotá, Colombia
10:00
40m
Demonstration
CocoQa: Question Answering for Coding Conventions over Knowledge Graphs
Demonstrations
Tianjiao Du Shanghai JiaoTong University, Junming Cao Shanghai JiaoTong University, Qinyue Wu Shanghai JiaoTong University, Wei Li Shanghai JiaoTong University, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Yuting Chen Shanghai Jiao Tong University
10:00
3m
Demonstration
Humanoid: A Deep Learning-based Approach to Automated Black-box Android App Testing
Demonstrations
Yuanchun Li Peking University, Ziyue Yang Peking University, Yao Guo Peking University, Xiangqun Chen Peking University
10:00
40m
Demonstration
Developer Reputation Estimator (DRE)
Demonstrations
Sadika Amreen University of Tennessee Knoxville, Andrey Karnauch University of Tennessee Knoxville, Audris Mockus University of Tennessee - Knoxville
10:00
40m
Demonstration
NeuralVis: Visualizing and Interpreting Deep Learning Models
Demonstrations
Xufan Zhang State Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Ziyue Yin State Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Yang Feng University of California, Irvine, Qingkai Shi Hong Kong University of Science and Technology, Jia Liu State Key Laboratory for Novel Software Technology Nanjing University, Nanjing, China, Zhenyu Chen Nanjing University
10:00
40m
Demonstration
Visual Analytics for Concurrent Java Executions
Demonstrations
Cyrille Artho KTH Royal Institute of Technology, Sweden, Monali Pande KTH Royal Institute of Technology, Qiyi Tang University of Oxford
10:00
40m
Demonstration
Sip4J: Statically Inferring Access Permission Contracts for Parallelising Sequential Java Programs
Demonstrations
Ayesha Sadiq Monash University, Li Li Monash University, Australia, Yuan-Fang Li Monash University, Ijaz Ahmed University of Lahore, Sea Ling Monash University
10:00
40m
Demonstration
SWAN_ASSIST: Semi-Automated Detection of Code-Specific, Security-Relevant Methods
Demonstrations
Goran Piskachev Fraunhofer IEM, Lisa Nguyen Quang Do Google, Oshando Johnson Fraunhofer IEM, Eric Bodden Heinz Nixdorf Institut, Paderborn University and Fraunhofer IEM
Pre-print Media Attached File Attached
10:00
40m
Demonstration
VisFuzz: Understanding and Intervening Fuzzing with Interactive Visualization
Demonstrations
Chijin Zhou Tsinghua University, Mingzhe Wang Tsinghua University, Jie Liang Tsinghua University, Zhe Liu Nanjing University of Aeronautics and Astronautics, Chengnian Sun Waterloo University, Yu Jiang Tsinghua University
10:40 - 12:20
ConcurrencyResearch Papers / Demonstrations at Cortez 1
Chair(s): Elena Sherman Boise State University
10:40
20m
Talk
MAP-Coverage: a Novel Coverage Criterion for Testing Thread-Safe Classes
Research Papers
Zan Wang College of Intelligence and Computing, Tianjin University, Yingquan Zhao College of Intelligence and Computing, Tianjin University, Shuang Liu College of Intelligence and Computing, Tianjin University, Jun Sun Singapore Management University, Singapore, Xiang Chen School of Information Science and Technology, Nantong University, Huarui Lin College of Intelligence and Computing, Tianjin University
11:00
20m
Talk
Automating Non-Blocking Synchronization In Concurrent Data Abstractions
Research Papers
Jiange Zhang University of Colorado Colorado Springs, Qing Yi University of Colorado Colorado Springs, Damian Dechev University of Central Florida
Pre-print
11:20
20m
Talk
Automating CUDA Synchronization via Program Transformation
Research Papers
Mingyuan Wu Southern University of Science and Technology, Lingming Zhang The University of Texas at Dallas, Cong Liu Eindhoven University of Technology, Shin Hwei Tan , Yuqun Zhang Southern University of Science and Technology
11:40
20m
Talk
Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs
Research Papers
Ernest Bota Pobee City University of Hong Kong, Xiupei Mei City University of Hong Kong, Wing-Kwong Chan City University of Hong Kong, Hong Kong
12:00
10m
Demonstration
VeriSmart 2.0: Swarm-Based Bug-Finding for Multi-Threaded Programs with Lazy-CSeq
Demonstrations
Bernd Fischer Stellenbosch University, Salvatore La Torre Università degli Studi di Salerno, Gennaro Parlato University of Molise
12:10
10m
Demonstration
ConVul: An Effective Tool for Detecting Concurrency Vulnerabilities
Demonstrations
Ruijie Meng University of Chinese Academy of Sciences, Biyun Zhu University of Chinese Academy of Sciences, Hao Yun University of Chinese Academy of Sciences, Haicheng Li University of Chinese Academy of Sciences, Yan Cai Institute of Software, Chinese Academy of Sciences, Zijiang Yang Western Michigan University
10:40 - 12:20
Deep ModelsResearch Papers / Demonstrations at Cortez 2&3
Chair(s): Nazareno Aguirre Dept. of Computer Science FCEFQyN, University of Rio Cuarto
10:40
20m
Talk
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement LearningACM SIGSOFT Distinguished Paper Award
Research Papers
Yan Zheng Tianjin University, Xiaofei Xie Nanyang Technological University, Ting Su ETH Zurich, Lei Ma Kyushu University, Jianye Hao Tianjin University, Zhaopeng Meng Tianjin University, Yang Liu Nanyang Technological University, Singapore, Ruimin Shen Fuxi AI Lab in Netease, Yinfeng Chen Fuxi AI Lab in Netease, Changjie Fan Fuxi AI Lab in Netease
Link to publication Pre-print
11:00
20m
Talk
A Study of Oracle Approximations in Testing Deep Learning Libraries
Research Papers
Mahdi Nejadgholi Concordia University, Jinqiu Yang Concordia University, Montreal, Canada
11:20
20m
Talk
Property Inference for Deep Neural Networks
Research Papers
Divya Gopinath Carnegie Mellon University, Hayes Converse The University of Texas at Austin, Corina S. Pasareanu Carnegie Mellon University Silicon Valley, NASA Ames Research Center, Ankur Taly Google
11:40
20m
Talk
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms
Research Papers
Qianyu Guo Tianjin University, Sen Chen Nanyang Technological University, Singapore, Xiaofei Xie Nanyang Technological University, Lei Ma Kyushu University, Qiang Hu Kyushu University, Japan, Hongtao Liu Tianjin University, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University, Xiaohong Li TianJin University
Pre-print
12:00
10m
Demonstration
DeepMutation++: a Mutation Testing Framework for Deep Learning Systems
Demonstrations
Qiang Hu Kyushu University, Japan, Lei Ma Kyushu University, Xiaofei Xie Nanyang Technological University, Bing Yu Kyushu University, Japan, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University
12:10
10m
Demonstration
DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks
Demonstrations
Xiaofei Xie Nanyang Technological University, Hongxu Chen Nanyang Technological University, Yi Li Nanyang Technological University, Lei Ma Kyushu University, Yang Liu Nanyang Technological University, Singapore, Jianjun Zhao Kyushu University
10:40 - 12:20
Refactoring and Software ProductionResearch Papers / Industry Showcase / Demonstrations at Hillcrest
Chair(s): Cyrille Artho KTH Royal Institute of Technology, Sweden
10:40
20m
Talk
RefBot: Intelligent Software Refactoring Bot
Research Papers
Vahid Alizadeh University of Michigan, Mohamed Amine Ouali University of Michigan, Marouane Kessentini University of Michigan, Meriem Chater University of Michigan
11:00
20m
Talk
Automated Refactoring to Reactive Programming
Research Papers
Mirko Köhler Technische Universität Darmstadt, Guido Salvaneschi Technische Universität Darmstadt
11:20
20m
Talk
Trusted Software Supply Chain
Industry Showcase
Kapil Singi Accenture, R.P. Jagadeesh Chandra Bose Accenture Labs, Sanjay Podder Accenture, Adam P. Burden Accenture
11:40
20m
Talk
A Journey Towards Providing Intelligence and Actionable Insights to Development Teams in Software Delivery
Industry Showcase
Vibhu Saujanya Sharma Accenture Labs, Rohit Mehra Accenture Labs, India, Sanjay Podder Accenture, Adam P. Burden Accenture
12:00
10m
Demonstration
Prema: A Tool for Precise Requirements Editing, Modeling and Analysis
Demonstrations
Yihao Huang East China Normal University, Jincao Feng East China Normal University, Hanyue Zheng East China Normal University, Jiayi Zhu East China Normal University, Shang Wang East China Normal University, Siyuan Jiang Eastern Michigan University, Weikai Miao Shanghai Key Lab for Trustworthy Computing, School of Computer Science and Software Engineering, East China Normal University, Geguang Pu East China Normal University&Shanghai Trusted Industrial Control Platform Co., Ltd
12:10
10m
Talk
Empirical Study of Programming to an Interface
Research Papers
Benoît Verhaeghe INRIA, Christopher Fuhrman École de technologie supérieure, Nicolas Anquetil INRIA, Latifa Guerrouj École de Technologie Supérieure, Stéphane Ducasse INRIA Lille
Pre-print Media Attached
13:40 - 15:20
Program AnalysisResearch Papers / Demonstrations at Cortez 1
Chair(s): Coen De Roover Vrije Universiteit Brussel
13:40
20m
Talk
Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation
Research Papers
Brandon Paulsen University of Southern California, Chungha Sung University of Southern California, Peter Peterson University of Minnesota Duluth, Chao Wang USC
14:00
20m
Talk
Fine-grain memory object representation in symbolic execution
Research Papers
Martin Nowack Imperial College London
14:20
20m
Talk
RENN: Efficient Reverse Execution with Neural-Network-assisted Alias Analysis
Research Papers
Dongliang Mu Nanjing University, Wenbo Guo The Pennsylvania State University, Alejandro Cuevas The Pennsylvania State University, Yueqi Chen The Pennsylvania State University, Jinxuan Gai The Pennsylvania State University, Xinyu Xing The Pennsylvania State University, Bing Mao Nanjing University, Chengyu Song UC Riverside
14:40
20m
Talk
Batch Alias Analysis
Research Papers
Jyothi Vedurada IIT Madras, V Krishna Nandivada IIT Madras
Pre-print
15:00
10m
Demonstration
Manticore: A User-Friendly Symbolic Execution Framework for Binaries and Smart Contracts
Demonstrations
Mark Mossberg Trail of Bits, Felipe Manzano Trail of Bits, Eric Hennenfent Trail of Bits, Alex Groce Northern Arizona University, Gustavo Grieco Trail of Bits, Josselin Feist Trail of Bits, Trent Brunson Trail of Bits, Artem Dinaburg Trail of Bits
Media Attached
15:10
10m
Demonstration
BuRRiTo: A Framework to Extract, Specify, Verify and Analyze Business Rules
Demonstrations
Pavan Kumar Chittimalli TCS Research, Kritika Anand TCS Research, Shrishti Pradhan TCS Research, Sayandeep Mitra TCS Research, Chandan Prakash TCS Research, Rohit Shere TCS Research, Ravindra Naik TCS Research, TRDDC, India
13:40 - 15:20
Mining and Bug DetectionDemonstrations / Journal First Presentations at Cortez 2&3
Chair(s): Chanchal K. Roy University of Saskatchewan
13:40
20m
Talk
Automatically 'Verifying' Complex Systems through Learning, Abstraction and Refinement
Journal First Presentations
Jingyi Wang National University of Singapore, Singapore, Jun Sun Singapore Management University, Singapore, Shengchao Qin University of Teesside, Cyrille Jegourel ISTD, Singapore University of Technology and Design
Link to publication
14:00
20m
Talk
Interactive semi-automated specification mining for debugging: An experience report
Journal First Presentations
Mohammad Jafar Mashhadi University of Calgary, Taha R. Siddiqui InfoMagnetics Technologies Corp, Hadi Hemmati University of Calgary, Howard W. Loewen Department of Electrical & Computer Engineering, University of Calgary
Link to publication
14:20
20m
Talk
Improving reusability of software libraries through usage pattern mining
Journal First Presentations
Mohamed Aymen Saied Concordia University, Ali Ouni ETS Montreal, University of Quebec, Houari Sahraoui Université de Montréal, Raula Gaikovina Kula NAIST, Katsuro Inoue Osaka University, David Lo Singapore Management University
Link to publication
14:40
20m
Talk
Rule-based specification mining leveraging learning to rank
Journal First Presentations
Zherui Cao Zhejiang University, Yuan Tian Queens University, Kingston, Canada, Tien-Duy B. Le School of Information Systems, Singapore Management University, David Lo Singapore Management University
Link to publication
15:00
10m
Demonstration
TsmartGP: A Tool for Finding Memory Defects with Pointer Analysis
Demonstrations
Yuexing Wang Tsinghua University, Guang Chen Tsinghua University, Min Zhou Tsinghua University, Ming Gu Tsinghua University, Jiaguang Sun Tsinghua University
15:10
10m
Demonstration
Ares: Inferring Error Specifications through Static Analysis
Demonstrations
Li Chi Tsinghua University, Zuxing Gu School of Software, Tsinghua University, Min Zhou Tsinghua University, Ming Gu Tsinghua University, Hongyu Zhang The University of Newcastle
13:40 - 15:20
Models and LogsResearch Papers / Demonstrations at Hillcrest
Chair(s): Timo Kehrer Humboldt-Universtität zu Berlin
13:40
20m
Talk
Statistical Log Differencing
Research Papers
Lingfeng Bao Institute of Information Engineering, Chinese Academy of Sciences, Nimrod Busany Tel Aviv University, David Lo Singapore Management University, Shahar Maoz Tel Aviv University
Pre-print
14:00
20m
Talk
Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression
Research Papers
Jinyang Liu Sun Yat-Sen University, Jieming Zhu Huawei Noah's Ark Lab, Shilin He Chinese University of Hong Kong, Pinjia He ETH Zurich, Zibin Zheng Sun Yat-Sen University, Michael Lyu The Chinese University of Hong Kong
14:20
20m
Talk
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling
Research Papers
Artur Boronat University of Leicester
14:40
20m
Talk
Size and Accuracy in Model Inference
Research Papers
Nimrod Busany Tel Aviv University, Shahar Maoz Tel Aviv University, Yehonatan Yulazari Tel Aviv University
Pre-print
15:00
10m
Demonstration
PMExec: An Execution Engine of Partial UML-RT Models
Demonstrations
Mojtaba Bagherzadeh Queen's University, Karim Jahed Queen's University, Nafiseh Kahani Queen's University, Juergen Dingel Queen's University, Kingston, Ontario
Pre-print
15:10
10m
Demonstration
mCUTE: A Model-level Concolic Unit Testing Engine for UML State Machines
Demonstrations
Reza Ahmadi Queen's University, Karim Jahed Queen's University, Juergen Dingel Queen's University, Kingston, Ontario
16:00 - 17:40
Emerging DomainsDemonstrations / Journal First Presentations / Research Papers at Cortez 1
Chair(s): Joshua Garcia University of California, Irvine
16:00
20m
Talk
Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility
Research Papers
Jeffrey Palmerino Rochester Institute of Technology, Qi Yu Rochester Institute of Technology, Travis Desell University of North Dakota, Daniel Krutz Rochester Institute of Technology
Pre-print
16:20
20m
Talk
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Research Papers
Yuqi Chen Singapore University of Technology and Design, Singapore, Chris Poskitt Singapore University of Technology and Design, Jun Sun Singapore Management University, Singapore, Sridhar Adepu Singapore University of Technology and Design, Singapore, Fan Zhang Zhejiang University, Zhejiang Lab, and Alibaba-Zhejiang University Joint Institute of Frontier Technologies, China
DOI Pre-print File Attached
16:40
20m
Talk
Uncertainty-wise Test Case Generation and Minimization for Cyber-Physical Systems
Journal First Presentations
Man Zhang Kristiania University, Shaukat Ali Simula Research Lab, Tao Yue Nanjing University of Aeronautics and Astronautics & Simula Research Laboratory
Link to publication
17:00
20m
Talk
Finding Trends in Software Research
Journal First Presentations
George Mathew Department of Computer Science, North Carolina State University, Amritanshu Agrawal Wayfair, Tim Menzies North Carolina State University
Link to publication
17:20
10m
Demonstration
XRaSE: Towards Virtually Tangible Software using Augmented Reality
Demonstrations
Rohit Mehra Accenture Labs, India, Vibhu Saujanya Sharma Accenture Labs, Vikrant Kaulgud Accenture Labs, India, Sanjay Podder Accenture
17:30
10m
Demonstration
MuSC: A Tool for Mutation Testing of Ethereum Smart Contract
Demonstrations
Zixin Li Nanjing University, Haoran Wu State Key Laboratory for Novel Software Technology, Nanjing University, Jiehui Xu Nanjing University, Xingya Wang State Key Laboratory for Novel Software Technology, Nanjing University, Lingming Zhang The University of Texas at Dallas, Zhenyu Chen Nanjing University
16:00 - 17:40
Untangling and MergingResearch Papers at Cortez 2&3
Chair(s): Iftekhar Ahmed University of California at Irvine, USA
16:00
20m
Talk
The Impact of Structure on Software Merging: Semistructured versus Structured Merge
Research Papers
Guilherme Cavalcanti Federal University of Pernambuco, Brazil, Paulo Borba Federal University of Pernambuco, Brazil, Georg Seibt University of Passau, Sven Apel Saarland University
Pre-print
16:20
20m
Talk
Semistructured Merge in JavaScript Systems
Research Papers
Alberto Trindade Tavares Federal University of Pernambuco, Paulo Borba Federal University of Pernambuco, Brazil, Guilherme Cavalcanti Federal University of Pernambuco, Brazil, Sergio Soares Federal University of Pernambuco
Pre-print
16:40
20m
Talk
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation
Research Papers
Kawser Nafi University of Saskatchewan, Tonny Shekha Kar University of Saskatchewan, Canada, Banani Roy University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Kevin Schneider University of Saskatchewan
17:00
20m
Talk
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
Research Papers
Muyue Feng Institute of Information Engineering, Chinese Academy of Sciences, Zimu Yuan Institute of Information Engineering, Chinese Academy of Sciences, Feng Li Institute of Computing Technology at Chinese Academy of Sciences, China, Gu Ban Institute of Information Engineering, Chinese Academy of Sciences, Yang Xiao Institute of Information Engineering, Chinese Academy of Sciences & School of Cyber Security, University of Chinese Academy of Sciences, Shiyang Wang Institute of Information Engineering, Chinese Academy of Sciences, Qian Tang Institute of Information Engineering, Chinese Academy of Sciences, He Su Institute of Information Engineering, Chinese Academy of Sciences, Chendong Yu University of Chinese Academy of Sciences, Jiahuan Xu Institute of Information Engineering, Chinese Academy of Sciences, Aihua Piao Institute of Information Engineering, Chinese Academy of Sciences, Jingling Xue UNSW Sydney, Wei Huo Institute of Information Engineering, Chinese Academy of Sciences
17:20
20m
Talk
CoRA: Decomposing and Describing Tangled Code Changes for Reviewer
Research Papers
Min Wang Peking University, Zeqi Lin Microsoft Research, China, Yanzhen Zou Peking University, Bing Xie Peking University
16:00 - 17:40
16:00
20m
Talk
What is Wrong with Topic Modeling? (and How to Fix it Using Search-based Software Engineering)
Journal First Presentations
Amritanshu Agrawal Wayfair, Wei Fu Department of Computer Science, North Carolina State University, Tim Menzies North Carolina State University
Link to publication
16:20
20m
Talk
Cautious Adaptation of Defiant Components
Research Papers
Paulo Maia State University of Ceará, Lucas Vieira State University of Ceará, Matheus Chagas State University of Ceará, Yijun Yu The Open University, UK, Andrea Zisman The Open University, Bashar Nuseibeh The Open University (UK) & Lero (Ireland)
16:40
20m
Talk
Better Development of Safety Critical Systems:Chinese High Speed Railway System Development Experience Report
Industry Showcase
Zhiwei Wu East China Normal University, Jing Liu East China Normal University, Xiang Chen CASCO Signal Ltd.
17:00
20m
Talk
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation
Research Papers
Qiong Feng Drexel University, Yuanfang Cai Drexel University, Rick Kazman University of Hawai‘i at Mānoa, Di Cui Xi'an Jiaotong University, Ting Liu Xi'an Jiaotong University, Hongzhou Fang Drexel University
17:20
10m
Talk
Automated Trainability Evaluation for Smart Software Functions
Research Papers
Ilias Gerostathopoulos Technical University of Munich, Stefan Kugele Technical University of Munich, Christoph Segler BMW Group Research, New Technologies, Innovations, Tomas Bures Charles University, Czech Republic, Alois Knoll Technical University of Munich
Pre-print
17:30
10m
Demonstration
Lancer: Your Code Tell Me What You Need
Demonstrations
Shufan Zhou School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Hao Zhong Shanghai Jiao Tong University

Accepted Papers

Title
Accurate Modeling of Performance Histories for Evolving Software Systems
Research Papers
Pre-print
Accurate String Constraints Solution Counting with Weighted Automata
Research Papers
ACTGAN: Automatic Configuration Tuning for Software Systems with Generative Adversarial Networks
Research Papers
Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation
Research Papers
An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms
Research Papers
Pre-print
An Experience Report of Generating Load Tests Using Log-recovered Workloads at Varying Granularities of User Behaviour
Research Papers
Pre-print
An Industrial Experience Report on Performance-Aware Refactoring on a Database-centric Web Application
Research Papers
Authorizer link Pre-print
Apricot: A Weight-Adaptation Approach to Fixing Deep Learning Models
Research Papers
A Qualitative Analysis of Android Taint-Analysis Results
Research Papers
Pre-print File Attached
Assessing the Generalizability of code2vec Token Embeddings
Research Papers
Pre-print
A Study of Oracle Approximations in Testing Deep Learning Libraries
Research Papers
AutoFocus: Interpreting Attention-based Neural Networks by Code Perturbation
Research Papers
Pre-print
Automated Refactoring to Reactive Programming
Research Papers
Automated Trainability Evaluation for Smart Software Functions
Research Papers
Pre-print
Automatic Generation of Pull Request DescriptionsACM SIGSOFT Distinguished Paper Award
Research Papers
Pre-print
Automatic Self-Validation for Code Coverage Profilers
Research Papers
Pre-print
Automating App Review Response Generation
Research Papers
Pre-print
Automating CUDA Synchronization via Program Transformation
Research Papers
Automating Non-Blocking Synchronization In Concurrent Data Abstractions
Research Papers
Pre-print
B2SFinder: Detecting Open-Source Software Reuse in COTS Software
Research Papers
Batch Alias Analysis
Research Papers
Pre-print
Cautious Adaptation of Defiant Components
Research Papers
Characterizing Android App Signing Issues
Research Papers
CLCDSA: Cross Language Code Clone Detection using Syntactical Features and API Documentation
Research Papers
Code-First Model-Driven Engineering: On the Agile Adoption of MDE Tooling
Research Papers
CodeKernel: A Graph Kernel based Approach to the Selection of API Usage Examples
Research Papers
Pre-print
Combining Program Analysis and Statistical Language Model for Code Statement Completion
Research Papers
Combining Spectrum-Based Fault Localization and Statistical Debugging: An Empirical Study
Research Papers
Pre-print
Continuous Incident Triage for Large-Scale Online Service Systems
Research Papers
CoRA: Decomposing and Describing Tangled Code Changes for Reviewer
Research Papers
DaPanda: Detecting Aggressive Push Notification in Android Apps
Research Papers
Debreach: Mitigating Compression Side Channels via Static Analysis and Transformation
Research Papers
Demystifying Application Performance Management Libraries for Android
Research Papers
Detecting Error-Handling Bugs without Error Specification Input
Research Papers
DIRE: A Neural Approach to Decompiled Identifier Renaming
Research Papers
Pre-print Media Attached
Discovering, Explaining and Summarizing Controversial Discussions in Community Q&A Sites
Research Papers
Pre-print
Efficient Test Generation Guided by Field Coverage Criteria
Research Papers
Efficient Transaction-Based Deterministic Replay for Multi-threaded Programs
Research Papers
Emotions Extracted from Text vs. True Emotions –An Empirical Evaluation in SE Context
Research Papers
Empirical evaluation of the impact of class overlap on software defect prediction
Research Papers
Empirical Study of Programming to an Interface
Research Papers
Pre-print Media Attached
Experience Paper: Search-based Testing in Automated Driving Control ApplicationsACM SIGSOFT Distinguished Paper Award
Research Papers
Feature-Interaction Aware Configuration Prioritization for Configurable Code
Research Papers
Fine-grain memory object representation in symbolic execution
Research Papers
Get rid of inline assembly through verification-oriented lifting
Research Papers
DOI Pre-print
Goal-Driven Exploration for Android Applications
Research Papers
Pre-print
Grading-Based Test Suite Augmentation
Research Papers
History-Guided Configuration Diversification for Compiler Test-Program GenerationACM SIGSOFT Distinguished Paper Award
Research Papers
How Do API Selections Affect the Runtime Performance of Data Analytics Tasks?
Research Papers
iFeedback: Exploiting User Feedback for Real-time Issue Detection in Large-Scale Online Service Systems
Research Papers
Improving the Decision-Making Process of Self-Adaptive Systems by Accounting for Tactic Volatility
Research Papers
Pre-print
Inferring Program Transformations From Singular Examples via Big Code
Research Papers
Link to publication Pre-print
InFix: Automatically Repairing Novice Program Inputs
Research Papers
Pre-print
Learning from Examples to Find Fully Qualified Names of API Elements in Code Snippets
Research Papers
Pre-print
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences
Research Papers
DOI Pre-print File Attached
Logzip: Extracting Hidden Structures via Iterative Clustering for Log Compression
Research Papers
Machine Learning Based Automated Method Name Recommendation: How Far Are We
Research Papers
Link to publication Pre-print
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis
Research Papers
Pre-print
MAP-Coverage: a Novel Coverage Criterion for Testing Thread-Safe Classes
Research Papers
MARBLE: Mining for Boilerplate Code to Identify API Usability Problems
Research Papers
Pre-print
Model checking embedded control software using OS-in-the-loop CEGAR
Research Papers
Pre-print
Multi-Modal Attention Network Learning for Semantic Source Code Retrieval
Research Papers
Mutation Analysis for Coq
Research Papers
OAuthLint: An Empirical Study on OAuth Bugs in Android Applications
Research Papers
Pre-print
Performance-Boosting Sparsification of the IFDS Algorithm with Applications to Taint AnalysisACM SIGSOFT Distinguished Paper Award
Research Papers
Predicting Licenses for Changed Source Code
Research Papers
Property Inference for Deep Neural Networks
Research Papers
RANDR: Record and Replay for Android Applications via Targeted Runtime Instrumentation
Research Papers
ReduKtor: How We Stopped Worrying About Bugs in Kotlin Compiler
Research Papers
Pre-print
Re-factoring based Program Repair applied to Programming Assignments
Research Papers
Pre-print
RefBot: Intelligent Software Refactoring Bot
Research Papers
Regexes are Hard: Decision-making, Difficulties, and Risks in Programming Regular ExpressionsACM SIGSOFT Distinguished Paper Award
Research Papers
Pre-print File Attached
RENN: Efficient Reverse Execution with Neural-Network-assisted Alias Analysis
Research Papers
Root Cause Localization for Unreproducible Builds via Causality Analysis over System Call Tracing
Research Papers
SCMiner: Localizing System-Level Concurrency Faults from Large System Call Traces
Research Papers
Pre-print File Attached
SEGATE: Unveiling Semantic Inconsistencies between Code and Specification of String Inputs
Research Papers
Pre-print
Semistructured Merge in JavaScript Systems
Research Papers
Pre-print
Size and Accuracy in Model Inference
Research Papers
Pre-print
Statistical Log Differencing
Research Papers
Pre-print
Subformula Caching for Model Counting and Quantitative Program Analysis
Research Papers
Systematically Covering Input Structure
Research Papers
Pre-print
Targeted Example Generation for Compilation Errors
Research Papers
Link to publication Pre-print
Testing Regex Generalizability And Its Implications: A Large-Scale Many-Language Measurement Study
Research Papers
Pre-print File Attached
Test Migration Between Mobile Apps with Similar Functionality
Research Papers
Test Transfer Across Mobile Apps Through Semantic Mapping
Research Papers
The Impact of Structure on Software Merging: Semistructured versus Structured Merge
Research Papers
Pre-print
Understanding Automatically-Generated Patches Through Symbolic Invariant Differences
Research Papers
Pre-print
Understanding Exception-Related Bugs in Large-Scale Cloud Systems
Research Papers
Pre-print Media Attached
V2: Fast Detection of Configuration Drift in Python
Research Papers
Pre-print
Verifying Arithmetic in Cryptographic C Programs
Research Papers
Pre-print
Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement LearningACM SIGSOFT Distinguished Paper Award
Research Papers
Link to publication Pre-print

Call for Papers

The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2019 invites high quality contributions describing significant, original, and unpublished results.

Solicited topics include, but are not limited to:

  • Automated reasoning techniques
  • Component-based service-oriented systems
  • Cloud computing
  • Computer-supported cooperative work
  • Configuration management
  • Data mining for software engineering
  • Domain modeling and meta-modeling
  • Empirical software engineering
  • Human-computer interaction
  • Knowledge acquisition and management
  • Mobile app development
  • Maintenance and evolution
  • Model-driven development
  • Program synthesis & transformations, automated defect repair
  • Program comprehension
  • Reverse engineering and re-engineering
  • Recommender systems for software engineering
  • Requirements engineering
  • Specification languages
  • Software analysis
  • Software architecture and design
  • Software product line engineering
  • Software visualization
  • Software security and trust; data privacy
  • Testing, verification, and validation

Three categories of submissions are solicited:

  • Technical Research Papers should describe innovative research in automating software development activities or automated support to users engaged in such activities. They should describe a novel contribution to the field and should carefully support claims of novelty with citations to the relevant literature. Where a submission builds upon previous work of the author(s), the novelty of the new contribution must be clearly described with respect to the previous work but the author identity should not be revealed, i.e., prior work should be referenced in the third person, to reflect the double-blind review policy. Papers should also clearly discuss how the results were validated.

  • Experience Papers should describe a significant experience in applying automated software engineering technology and should carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of automated software engineering.

  • New Ideas Papers should describe novel research directions in automating software development activities or automated support to users engaged in such activities. New ideas submissions are intended to describe well-defined research ideas that are at an early stage of investigation and not fully validated, but are argued to be plausible.

SUBMISSION

Abstracts and papers must be submitted electronically through the ASE 2019 HotCRP submission site.

All submissions must be in PDF format and conform, at time of submission, to the IEEE Conference Proceedings Formatting Guidelines (title in 24pt font and full text in 10pt type, LaTeX users must use \documentclass[10pt,conference]{IEEEtran} without including the compsoc or compsocconf option).

Papers submitted to ASE 2019 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2019. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.

To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences, affiliated with ACM or IEEE, with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.

Technical Research Papers and Experience Papers must not exceed 10 pages (including figures) plus up to 2 pages that contain ONLY references. Exceeding this limit will be grounds for rejection without review. Experience papers should contain the words “experience paper” in the abstract to ensure that they are evaluated in the right category.

New Ideas Papers must not exceed 4 pages (including figures AND references).

Supplementary material can be uploaded via the HotCRP site, but PC members have no obligation to look at the supplementary material.

ASE 2019 will again pursue a double-blind review process. If you have any questions, please see FAQs and/or contact the PC chairs at ase19-chairs@lip6.fr. Authors are encouraged to double check the conflicts of interest on their papers in HotCRP shortly after the submission deadline.

All submissions must be in English.

Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.

The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs at ase19-chairs@lip6.fr.

ACCEPTED PAPERS

We strongly encourage authors of accepted papers to archive the research artifacts, including code and data, associated with their ASE papers. Software Heritage (presented in a keynote at ASE 2018) requires only providing a URL to an existing archive: https://www.softwareheritage.org/2019/08/05/saving-and-referencing-research-software-in-software-heritage/ Other often used solutions, focusing on data, include Figshare (https://figshare.com/) and Zenodo (https://zenodo.org/).

For example, here is one webpage that describes how to release the data: https://ineed.coffee/5205/how-to-disclose-data-for-double-blind-review-and-make-it-archived-open-data-upon-acceptance/

If you have questions not answered below, please contact the program chairs at ase19-chairs@lip6.fr

Q: Why Double Blind?

There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. For more information on motivation for double-blind reviewing, see Claire Le Goues’ very well argued, referenced, and evidenced blog posting in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.

Q: How to prepare your paper for double-blind reviewing?

You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:

  • Omit all authors’ names and affiliations from the title page. If you have acknowledgements, do not mention any names or organizations.

  • Refer to your own work in the third person. You should not change the names of your own previously published tools, approaches, or systems, because this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper.

  • If possible, do not rely on supplementary material (your web site, your GitHub repository, your YouTube channel, a companion technical report or thesis) in the paper. Such material might reveal author identities. It is possible to post a link to an anonymous GitHub repository, but the repository should be checked carefully for any information that could reveal author identity, and it could be helpful to warn the reader that accessing the repository could reveal author identity. It is also possible to submit supplementary material with the paper, but again it is necessary to check the material carefully for anything that can reveal author identity.

Q: Can I disseminate non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at arXiv, etc.?

You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you should not discuss your work with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post the submitted work on arXiv or a similar site just shortly before submitting to the conference. One option is to make a tech report at your institution, which allows someone to cite the work, if need be, like arXiv, but doesn’t have the same degree of visibility.

Q: I published a previous version of my work on arXiv or as a tech report at my institution. Do I need to cite it, and if so how?

A paper on arXiv or a tech report is not a publication. If there is a need to cite the old version because it contains some important information that is not in the submission, then the previous version can be cited anonymously, if a normal citation would reveal the names of the authors. If the submission completely subsumes the previous version, then there is no need to cite the previous version at all.

Q: I previously published an earlier version of this work elsewhere than arXiv. What should I do about citing that previous work?

If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors. This would include posters, but only if the poster is accompanied by a paper in the conference proceedings. Posters that are not represented in the proceedings can be ignored.

Q: What about a PhD or master’s thesis?

It’s perfectly fine to publish work arising from a PhD or master’s degree, and there’s no need to cite it in a submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution.

In general, the guideline is that the author’s job is to ensure that the submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identities, so they will likely not be searching the web to check whether there is a tech report or other unpublished material related to this work.

This FAQ is based on guidelines for double-blind reviewing from ASE 2018 (http://www.ase2018.com/?p=author_instructions) and ICSE 2019 (https://2019.icse-conferences.org/track/icse-2019-Submitting-to-ICSE2019-Q-A).