Call for Papers
The IEEE/ACM Automated Software Engineering (ASE) Conference series is the premier research forum for automated software engineering. Each year, it brings together researchers and practitioners from academia and industry to discuss foundations, techniques, and tools for automating the analysis, design, implementation, testing, and maintenance of large software systems. ASE 2020 invites high quality contributions describing significant, original, and unpublished results.
Solicited topics include, but are not limited to:- Testing, verification, and validation
- Software analysis
- Empirical software engineering
- Maintenance and evolution
- Artificial intelligence for software engineering
- Software engineering for artificial intelligence
- Software security and trust; data privacy
- Recommender systems for software engineering
- Program synthesis & transformations, automated defect repair
- Program comprehension
- Mobile app development
- Automated reasoning techniques
- Software architecture and design
- Reverse engineering and re-engineering
- Model-driven development
- Knowledge acquisition and management
- Cloud computing
- Human-computer interaction
- Component-based service-oriented systems
- Specification languages
- Configuration management
- Requirements engineering
- Software product line engineering
- Software visualization
Two categories of submissions are solicited:
-
Technical Research Papers should describe innovative research in automating software development activities or automated support to users engaged in such activities. They should describe a novel contribution to the field and should carefully support claims of novelty with citations to the relevant literature. Where a submission builds upon previous work of the author(s), the novelty of the new contribution must be clearly described with respect to the previous work, but the author identity should not be revealed, i.e., prior work should be referenced in the third person, to reflect the double-blind review policy. Papers should also clearly discuss how the results were validated
-
Experience Papers should describe a significant experience in applying automated software engineering technology and should carefully identify and discuss important lessons learned, so that other researchers and/or practitioners can benefit from the experience. Of special interest are experience papers that report on industrial applications of automated software engineering.
Note that unlike prior years, New Ideas Papers will be managed and evaluated by a separate track (Short Paper track), with a separate PC, deadline, etc.
SUBMISSION
Abstracts and papers must be submitted electronically through the ASE 2020 HotCRP submission site.
Format. All submissions must be in English.
All submissions must be in PDF format and conform, at time of submission, to the ACM Proceedings Template (LaTEX users must use \documentclass[sigconf,review,anonymous]{acmart})
.
Papers submitted to this track (Technical Research and Experience Papers) must not exceed 10 pages (including figures) plus up to 2 pages that contain ONLY references. Exceeding this limit will be grounds for rejection without review.
Experience papers should contain the phrase “experience paper” prominently in the abstract, to ensure that they are evaluated appropriately.
The authors are strongly encouraged to use the HotCRP format checker on their submissions. Note that the format checker is not perfect. In particular, it can complain about small fonts in figures, footnotes, or references. As long as the main text follows the requested format, and the figures are readable, the paper will not be rejected for format violations. If you have any concerns, please contact the program chairs at ase2020.research@gmail.com.
Originality. Papers submitted to ASE 2020 must not have been published elsewhere and must not be under review or submitted for review elsewhere when being considered for ASE 2020. Authors should be aware of the ACM Policy and Procedures on Plagiarism and the IEEE Plagiarism FAQ.
To check for double submission and plagiarism issues, the chairs reserve the right to (1) share the list of submissions with the PC Chairs of other conferences, affiliated with ACM or IEEE, with overlapping review periods and (2) use external plagiarism detection software, under contract to the ACM or IEEE, to detect violations of these policies.
ASE 2020 will pursue a double-blind review process. If you have any questions, please see FAQs and/or contact the PC chairs at ase2020.research@gmail.com. Authors are encouraged to double check conflicts of interest on their papers in HotCRP shortly after the submission deadline.
Submissions that do not adhere to these limits or that violate the formatting guidelines will be desk-rejected without review.
Supplementary material. Supplementary material can be uploaded via the HotCRP site or anonymously linked from the paper submission. Although PC members are not obligated to look at this material, we strongly encourage submitters to use supplementary material to provide access to anonymized code or data, whenever possible. Please carefully review any supplementary material to ensure it conforms to the double-blind policy (described next). For example, code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site to support review. One resource that may be helpful in accomplishing this task is this blog post:
ACCEPTED PAPERS
Accepted papers will be permitted an additional page of content to allow authors to incorporate review feedback. The page limit for published papers will therefore be 11 pages (including figures), plus 2 pages which may only contain references. Note that all submitted papers must conform to the 10+2 requirement, described above.
We strongly encourage authors of accepted papers to archive the research artifacts, including code and data, associated with their ASE papers. Software Heritage (presented in a keynote at ASE 2018) requires only providing a URL to an existing archive:
Other often used solutions, focusing on data, include Figshare and Zenodo.
Tue 22 Sep Times are displayed in time zone: (UTC) Coordinated Universal Time
02:20 - 03:20: Test GenerationResearch Papers / Industry Showcase / Tool Demonstrations at Kangaroo Chair(s): Xusheng XiaoCase Western Reserve University | |||
02:20 - 02:40 Talk | Legion: Best-First Concolic Testing Research Papers Dongge LiuThe Univeristy of Melbourne, Gidon ErnstLMU Munich, Toby MurrayUniversity of Melbourne, Australia, Benjamin I.P. RubinsteinUniversity of Melbourne | ||
02:40 - 03:00 Talk | The New Approach to IT Testing Industry Showcase | ||
03:00 - 03:10 Talk | MetPurity: A Learning-Based Tool of Pure Method Identification for Automatic Test Generation Tool Demonstrations |
02:20 - 03:20: Formal Methods (1)Research Papers / NIER track at Koala Chair(s): Nazareno AguirreDept. of Computer Science FCEFQyN, University of Rio Cuarto | |||
02:20 - 02:40 Talk | Accelerating All-SAT Computation with Short Blocking Clauses Research Papers Yueling ZhangSingapore Management University, Geguang PuEast China Normal University, Jun SunSingapore Management University | ||
02:40 - 03:00 Talk | A Predictive Analysis for Detecting Deadlock in MPI Programs Research Papers Yu HuangSouthwestern University of Finance and Economics, Benjamin OglesBrigham Young University, Eric MercerBrigham Young University Pre-print | ||
03:00 - 03:10 Talk | Proving Termination by k-Induction NIER track |
02:20 - 03:20: Maintenance and Evolution (1)Research Papers / Tool Demonstrations at Wombat Chair(s): Yi LiNanyang Technological University, Singapore | |||
02:20 - 02:40 Talk | Learning to Handle Exceptions Research Papers Jian ZhangBeihang University, Xu WangBeihang University, Hongyu ZhangUniversity of Newcastle, Australia, Hailong SunBeihang University, Yanjun PuBeihang University, Xudong LiuBeihang University Pre-print | ||
02:40 - 03:00 Talk | BuildFast: History-Aware Build Outcome Prediction for Fast Feedback and Reduced Cost in Continuous Integration Research Papers Bihuan ChenFudan University, China, Linlin ChenFudan University, Chen ZhangFudan University, Xin PengFudan University, China | ||
03:00 - 03:10 Talk | OSLDetector: Identifying Open-Source Libraries through Binary Analysis Tool Demonstrations Dan ZhangTsinghua University |
08:00 - 09:00: Software Analysis (1)Research Papers at Kangaroo Chair(s): Michael PradelUniversity of Stuttgart, Germany | |||
08:00 - 08:20 Talk | Pending Constraints in Symbolic Execution for Better Exploration and Seeding Research Papers Timotej KapusImperial College London, UK, Frank BusseImperial College London, Cristian CadarImperial College London, UK Pre-print Media Attached | ||
08:20 - 08:40 Talk | Broadening Horizons of Multilingual Static Analysis: Semantic Summary Extraction from C Code for JNI Program Analysis![]() Research Papers | ||
08:40 - 09:00 Talk | Assessing and Restoring Reproducibility of Jupyter Notebooks Research Papers Jiawei Wang, Tzu-yang KuoThe Hong Kong University of Science and Technology, Li LiMonash University, Australia, Andreas ZellerCISPA, Germany |
08:00 - 09:00: Maintenance and Evolution (2)Research Papers / Journal-first Papers at Koala Chair(s): Cuiyun GaoHarbin Institute of Technology | |||
08:00 - 08:20 Talk | M3: Semantic API Migrations Research Papers Bruce CollieUniversity of Edinburgh, Philip GinsbachGitHub Software UK, Jackson WoodruffUniversity of Edinburgh, Ajitha RajanUniversity of Edinburgh, Michael F. P. O'BoyleUniversity of Edinburgh Pre-print Media Attached | ||
08:20 - 08:40 Talk | The Impact of Generic Data Structures: Decoding the Role of Lists in the Linux Kernel Research Papers Pre-print | ||
08:40 - 09:00 Talk | Game-theoretic Analysis of Development Practices: Challenges and Opportunities Journal-first Papers Carlos Gavidia-CalderonUniversity College London, Federica SarroUniversity College London, UK, Mark HarmanUniversity College London, UK, Earl T. BarrUniversity College London, UK Link to publication DOI Pre-print Media Attached |
09:10 - 10:10: Formal Methods (2)Research Papers at Kangaroo Chair(s): Eunsuk KangCarnegie Mellon University, USA | |||
09:10 - 09:30 Talk | Verified from Scratch: Program Analysis for Learners' Programs Research Papers Andreas StahlbauerUniversity of Passau, Christoph FrädrichUniversity of Passau, Gordon FraserUniversity of Passau | ||
09:30 - 09:50 Talk | Interval Change-Point Detection for Runtime Probabilistic Model Checking Research Papers Xingyu ZhaoHeriot-Watt University, Radu CalinescuUniversity of York, UK, Simos GerasimouUniversity of York, UK, Valentin RobuHeriot-Watt University, David FlynnHeriot-Watt University Pre-print | ||
09:50 - 10:10 Talk | UnchartIt: An Interactive Framework for Program Recovery from Charts Research Papers Daniel RamosINESC-ID/IST, Universidade de Lisboa, Jorge PereiraINESC-ID/IST, Universidade de Lisboa, Ines LynceINESC-ID/IST, Universidade de Lisboa, Vasco ManquinhoINESC-ID/IST, Universidade de Lisboa, Ruben MartinsCarnegie Mellon University |
09:10 - 10:10: Mobile App (1)Research Papers / Tool Demonstrations at Koala Chair(s): Jacques KleinUniversity of Luxembourg, Luxembourg | |||
09:10 - 09:30 Talk | Demystifying Diehard Android Apps Research Papers Hao ZhouThe Hong Kong Polytechnic University, Haoyu WangBeijing University of Posts and Telecommunications, China, Yajin ZhouZhejiang University, Xiapu LuoThe Hong Kong Polytechnic University, Yutian TangShanghaiTech University, Lei XueThe Hong Kong Polytechnic University, Ting WangPenn State University | ||
09:30 - 09:50 Talk | UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps Research Papers Hao ZhouThe Hong Kong Polytechnic University, Ting ChenUniversity of Electronic Science and Technology of China, Haoyu WangBeijing University of Posts and Telecommunications, China, Le YuThe Hong Kong Polytechnic University, Xiapu LuoThe Hong Kong Polytechnic University, Ting WangPenn State University, Wei ZhangNanjing University of Posts and Telecommunications | ||
09:50 - 10:00 Talk | FILO: FIx-LOcus Localization for Backward Incompatibilities Caused by Android Framework Upgrades Tool Demonstrations Marco MobilioUniversity of Milano Bicocca, Oliviero RiganelliUniversity of Milano-Bicocca, Italy, Daniela MicucciUniversity of Milano-Bicocca, Italy, Leonardo MarianiUniversity of Milano Bicocca |
09:10 - 10:10: Search-Based TestingResearch Papers / Journal-first Papers / Tool Demonstrations at Wombat Chair(s): Maria KechagiaUniversity College London | |||
09:10 - 09:30 Talk | Good Things Come In Threes: Improving Search-based Crash Reproduction With Helper Objectives Research Papers Pouria DerakhshanfarDelft University of Technology, Xavier DevroeyDelft University of Technology, Andy ZaidmanDelft University of Technology, Arie van DeursenDelft University of Technology, Netherlands, Annibale PanichellaDelft University of Technology DOI Pre-print Media Attached | ||
09:30 - 09:50 Talk | Multi-criteria test cases selection for model transformations Journal-first Papers Bader AlkhaziKuwait University, Chaima AbidUniversity of Michigan, Marouane KessentiniUniversity of Michigan, Dorian LeroyJKU Linz, Manuel WimmerJohannes Kepler University Linz Link to publication DOI | ||
09:50 - 10:00 Talk | Botsing, a Search-based Crash Reproduction Framework for Java Tool Demonstrations Pouria DerakhshanfarDelft University of Technology, Xavier DevroeyDelft University of Technology, Annibale PanichellaDelft University of Technology, Andy ZaidmanDelft University of Technology, Arie van DeursenDelft University of Technology, Netherlands DOI Pre-print Media Attached |
16:00 - 17:00: Synthesis and RepairResearch Papers at Kangaroo Chair(s): Shahar MaozTel Aviv University, Israel | |||
16:00 - 16:20 Talk | Synthesis of Infinite-State Systems with Random Behavior Research Papers Andreas KatisUniversity of Minnesota, Grigory FedyukovichFlorida State University, Jeffrey ChenUniversity of Minnesota, David GreveCollins Aerospace, Sanjai RayadurgamUniversity of Minnesota, Michael W. WhalenUniversity of Minnesota | ||
16:20 - 16:40 Talk | Demystifying Loops in Smart Contracts Research Papers Benjamin MarianoUniversity of Texas at Austin, Yanju ChenUniversity of California, Santa Barbara, Yu FengUniversity of California, Santa Barbara, Shuvendu K. LahiriMicrosoft Research, Isil DilligUniversity of Texas at Austin, USA | ||
16:40 - 17:00 Talk | Patching as Translation: The Data and the Metaphor Research Papers Yangruibo DingColumbia University, Baishakhi RayColumbia University, USA, Prem DevanbuUniversity of California, Vincent HellendoornCarnegie Mellon University DOI Pre-print |
16:00 - 17:00: Maintenance and Evolution (3)Research Papers / Tool Demonstrations at Koala Chair(s): Yongjie ZhengCalifornia State University San Marcos | |||
16:00 - 16:20 Talk | Subdomain-Based Generality-Aware Debloating Research Papers Qi XinGeorgia Institute of Technology, Myeongsoo KimGeorgia Institute of Technology, Qirun ZhangGeorgia Institute of Technology, USA, Alessandro OrsoGeorgia Tech | ||
16:20 - 16:40 Talk | Revisiting the relationship between fault detection, test adequacy criteria, and test set size. Research Papers Yiqun ChenUniversity of Washington, Rahul GopinathCISPA Helmholtz Center for Information Security, Anita TadakamallaGeorge Mason University, USA, Michael D. ErnstUniversity of Washington, USA, Reid HolmesUniversity of British Columbia, Gordon FraserUniversity of Passau, Paul AmmannGeorge Mason University, USA, René JustUniversity of Washington, USA | ||
16:40 - 16:50 Talk | WASim: Understanding WebAssembly Applications through Classification Tool Demonstrations | ||
16:50 - 17:00 Talk | Sosed: a tool for finding similar software projects Tool Demonstrations Egor BogomolovJetBrains Research, Yaroslav GolubevJetBrains Research, ITMO University, Artyom LobanovJetBrains Research, Vladimir KovalenkoJetBrains Research, JetBrains N.V., Timofey BryksinJetBrains Research, Saint Petersburg State University |
17:10 - 18:10: Software Analysis (2) Research Papers / Industry Showcase at Kangaroo Chair(s): Saba AlimadadiSimon Fraser University | |||
17:10 - 17:30 Talk | Representing and Reasoning about Dynamic Code Research Papers Jesse BartelsUniversity of Arizona, Jon StephensUniversity of Texas at Austin, Saumya DebrayUniversity of Arizona | ||
17:30 - 17:50 Talk | ER Catcher: A Static Analysis Framework for Accurate and Scalable Event-Race Detection in Android Research Papers Navid SalehnamadiUniversity of California, Irvine, Abdulaziz AlshaybanUniversity of California, Irvine, Iftekhar AhmedUniversity of California at Irvine, USA, Sam MalekUniversity of California at Irvine, USA | ||
17:50 - 18:10 Talk | Automatic Generation of IFTTT Mashup Infrastructures Industry Showcase Lei LiuFujitsu Laboratories of America, Inc., Mehdi BahramiFujitsu Laboratories of America, Inc., Wei-Peng ChenFujitsu Laboratories of America, Inc. |
17:10 - 18:10: AI for Software Engineering (1)Research Papers / NIER track at Koala Chair(s): Tingting YuUniversity of Kentucky | |||
17:10 - 17:30 Talk | DeepTC-Enhancer: Improving the Readability of Automatically Generated Tests Research Papers Devjeet RoyWashington State University, Ziyi ZhangWashington State University, Maggie MaWashington State University, Venera ArnaoudovaWashington State University, Annibale PanichellaDelft University of Technology, Sebastiano PanichellaZurich University of Applied Sciences, Danielle GonzalezRochester Institute of Technology, USA, Mehdi MirakhorliRochester Institute of Technology | ||
17:30 - 17:50 Talk | Hybrid Deep Neural Networks to Infer State Models of Black-Box Systems Research Papers Pre-print | ||
17:50 - 18:00 Talk | On Benign Features in Malware Detection NIER track Michael CaoThe University of British Columbia, Sahar BadihiUniversity of British Columbia, Canada, Khaled AhmedThe University of British Columbia, Peiyu XiongThe University of British Columbia, Julia RubinUniversity of British Columbia, Canada |
Wed 23 Sep Times are displayed in time zone: (UTC) Coordinated Universal Time
00:00 - 01:00: Software Engineering for AI (1)Research Papers / NIER track at Kangaroo Chair(s): Song WangYork University, Canada | |||
00:00 - 00:20 Talk | Multiple-Boundary Clustering and Prioritization to Promote Neural Network Retraining Research Papers Weijun ShenNanjing University, Yanhui LiDepartment of Computer Science and Technology, Nanjing University, Lin ChenNanjing University, YuanLei HanNanjing University, Yuming ZhouNanjing University, Baowen XuState Key Laboratory for Novel Software Technology, Nanjing University | ||
00:20 - 00:40 Talk | MARBLE: Model-Based Robustness Analysis of Stateful Deep Learning Systems Research Papers Xiaoning DuNanyang Technological University, Yi LiNanyang Technological University, Singapore, Xiaofei XieNanyang Technological University, Lei MaKyushu University, Yang LiuNanyang Technological University, Singapore, Jianjun ZhaoKyushu University | ||
00:40 - 00:50 Talk | Making Fair ML Software using Trustworthy Explanation NIER track Joymallya ChakrabortyNorth Carolina State University, USA, Kewen PengNorth Carolina State University, Tim MenziesNorth Carolina State University, USA Link to publication DOI Pre-print Media Attached |
00:00 - 01:00: AI for Software Engineering (2)Research Papers at Koala Chair(s): Tse-Hsun (Peter) ChenConcordia University | |||
00:00 - 00:20 Talk | A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum Research Papers Mingyang LiISCAS, Lin ShiISCAS, Ye YangStevens institute of technology, Qing WangInstitute of Software, Chinese Academy of Sciences | ||
00:20 - 00:40 Talk | Retrieve and Refine: Exemplar-based Neural Comment Generation Research Papers Bolin WeiPeking University, Yongmin LiPeking University, Ge LiPeking University, Xin XiaMonash University, Zhi JinPeking University Pre-print | ||
00:40 - 01:00 Talk | Where Shall We Log? Studying and Suggesting Logging Locations in Code Blocks Research Papers Zhenhao LiConcordia University, Tse-Hsun (Peter) ChenConcordia University, Weiyi ShangConcordia University |
00:00 - 01:00: Incidents and Bug ReportsResearch Papers at Platypus Chair(s): Yepang LiuSouthern University of Science and Technology | |||
00:00 - 00:20 Talk | How Incidental are the Incidents? Characterizing and Prioritizing Incidents for Large-Scale Online Service SystemsExperience Research Papers Junjie ChenTianjin University, China, Shu ZhangMicrosoft Research, Beijing, Xiaoting HeMicrosoft, Qingwei LinMicrosoft Research, China, Hongyu ZhangUniversity of Newcastle, Australia, Dan HaoPeking University, China, Yu KangMicrosoft Research, China, Feng GaoMicrosoft, China, Zhangwei XuMicrosoft, China, Yingnong DangMicrosoft, USA, Dongmei ZhangMicrosoft Research, China | ||
00:20 - 00:40 Talk | Stay Professional and Efficient: Automatically Generate Titles for Your Bug Reports Research Papers Songqiang ChenSchool of Computer Science, Wuhan University, Xiaoyuan XieSchool of Computer Science, Wuhan University, China, Bangguo YinSchool of Computer Science, Wuhan University, Yuanxiang JiSchool of Computer Science, Wuhan University, Lin ChenNanjing University, Baowen XuState Key Laboratory for Novel Software Technology, Nanjing University | ||
00:40 - 01:00 Talk | Owl Eyes: Spotting UI Display Issues via Visual Understanding Research Papers Zhe LiuLaboratory for Internet Software Technologies, Institute of Software Chinese Academy of Sciences, University of Chinese Academy of Sciences, Chunyang ChenMonash University, Australia, Junjie WangInstitute of Software, Chinese Academy of Sciences, Yuekai HuangInstitute of Software, Chinese Academy of Sciences, Jun HuInstitute of Software, Chinese Academy of Sciences, Qing WangInstitute of Software, Chinese Academy of Sciences |
00:00 - 01:00: Testing (1)Research Papers / Tool Demonstrations at Wombat Chair(s): Lingming ZhangUniversity of Illinois at Urbana-Champaign, USA | |||
00:00 - 00:20 Talk | MockSniffer: Characterizing and Recommending Mocking Decisions for Unit Tests Research Papers Hengcheng ZhuSouthern University of Science and Technology, Lili WeiThe Hong Kong University of Science and Technology, Ming WenHuazhong University of Science and Technology, China, Yepang LiuSouthern University of Science and Technology, Shing-Chi CheungHong Kong University of Science and Technology, China, Qin ShengWeBank Co Ltd, Cui ZhouWeBank Co Ltd DOI Pre-print | ||
00:20 - 00:40 Talk | Defect Prediction Guided Search-Based Software Testing Research Papers Anjana PereraMonash University, Aldeida AletiMonash University, Marcel BöhmeMonash University, Australia, Burak TurhanMonash University DOI Pre-print | ||
00:40 - 00:50 Talk | STIFA: Crowdsourced Mobile Testing Report Selection Based on Text and Image Fusion Analysis Tool Demonstrations Zhenfei CaoNanjing University, Xu WangNanjing University, Shengcheng YuNanjing University, China, Yexiao YunNanjing University, Chunrong FangNanjing University, China |
01:10 - 02:10: Software Engineering for AI (2) Research Papers / Industry Showcase at Kangaroo Chair(s): Aldeida AletiMonash University | |||
01:10 - 01:30 Talk | Audee: Automated Testing for Deep Learning Frameworks Research Papers Qianyu GuoCollege of Intelligence and Computing, Tianjin University, Xiaofei XieNanyang Technological University, Yi LiNanyang Technological University, Singapore, Xiaoyu ZhangXi'an Jiaotong University, Yang LiuNanyang Technological University, Singapore, Li XiaohongTianJin University, Chao ShenXi'an Jiaotong University | ||
01:30 - 01:50 Talk | Towards Interpreting Recurrent Neural Networks through Probabilistic Abstraction Research Papers Guoliang DongComputer College of Zhejiang University, Jingyi WangZhejiang University, Jun SunSingapore Management University, Yang ZhangZhejiang University, Xinyu WangZhejiang University, Dai TingHuawei International Pte Ltd, Jin Song DongNational University of Singapore, Xingen WangZhejiang University | ||
01:50 - 02:10 Talk | Towards Building Robust DNN Applications: An Industrial Case Study of Evolutionary Data Augmentation Industry Showcase Haruki YokoyamaFujitsu Laboratories Ltd., Satoshi OnoueFujitsu Ltd., Shinji KikuchiFujitsu Laboratories Ltd. |
01:10 - 02:10: Recommender Systems for Software EngineeringResearch Papers / Tool Demonstrations at Koala Chair(s): Shaowei WangMississippi State University | |||
01:10 - 01:30 Talk | API-Misuse Detection Driven by Fine-Grained API-Constraint Knowledge Graph Research Papers Xiaoxue RenZhejiang University, Xinyuan YeAustralian National University, Zhenchang XingAustralian National University, Australia, Xin XiaMonash University, Xiwei XuData61 at CSIRO, Australia, Liming ZhuData61 at CSIRO, Australia / UNSW, Australia, Jianling SunZhejiang University Pre-print | ||
01:30 - 01:50 Talk | Multi-task Learning based Pre-trained Language Model for Code Completion Research Papers Fang LiuPeking University, Ge LiPeking University, Yunfei ZhaoPeking University, Zhi JinPeking University | ||
01:50 - 02:00 Talk | HomoTR: Online Test Recommendation System Based on Homologous Code Matching Tool Demonstrations Chenqian ZhuNanjing University, Weisong SunState Key Laboratory for Novel Software Technology, Nanjing University, Qin LIU, Yangyang YuanNanjing University, Chunrong FangNanjing University, China, Yong HuangState Key Laboratory for Novel Software Technology, Nanjing University |
01:10 - 02:10: Software Security and Trust (1) Research Papers / NIER track / Tool Demonstrations at Platypus Chair(s): Christoph CsallnerUniversity of Texas at Arlington | |||
01:10 - 01:30 Talk | Continuous ComplianceExperience Research Papers Martin KelloggUniversity of Washington, Seattle, Martin SchäfAmazon Web Services, Serdar TasiranAmazon Web Services, Michael D. ErnstUniversity of Washington, USA | ||
01:30 - 01:50 Talk | SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementions Research Papers Lili QuanCollege of Intelligence and Computing,Tianjin University, Qianyu GuoCollege of Intelligence and Computing, Tianjin University, Hongxu ChenResearch Associate, xiexiaofei , Li XiaohongTianJin University, Yang LiuNanyang Technological University, Singapore, Jing HuTianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing,Tianjin University | ||
01:50 - 02:00 Talk | A Hybrid Analysis to Detect Java Serialisation Vulnerabilities NIER track | ||
02:00 - 02:10 Talk | EXPRESS: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems Tool Demonstrations |
01:10 - 02:10: Testing of Emerging ApplicationsResearch Papers / Tool Demonstrations at Wombat Chair(s): Yuan TianQueens University, Kingston, Canada | |||
01:10 - 01:30 Talk | CoFI: Consistency-Guided Fault Injection for Cloud Systems Research Papers Haicheng ChenThe Ohio State University, USA, Wensheng DouInstitute of Software, Chinese Academy of Sciences, Dong WangInstitute of software, Chinese academy of sciences, Feng QinOhio State University, USA | ||
01:30 - 01:50 Talk | ChemTest: An Automated Software Testing Framework for an Emerging Paradigm![]() Research Papers Michael C. GertenIowa State University, James I. LathropIowa State University, Myra CohenIowa State University, Titus H. KlingeDrake University Pre-print | ||
01:50 - 02:00 Talk | ImpAPTr: A Tool For Identifying The Clues To Online Service Anomalies Tool Demonstrations hao wang, Guoping RongNanjing University, Yangchen XuNanjing University, Yong YouMeituan-Dianping Group |
02:20 - 03:20: Tool Demo Showcase (1)Tool Demonstrations at Wombat Chair(s): Yanyan JiangNanjing University | |||
02:20 - 02:25 Talk | JITBot: An Explainable Just-In-Time Defect Prediction Bot Tool Demonstrations Chaiyakarn KhananMahidol University, Worawit LuewichanaMahidol University, Krissakorn PruktharathikoonMahidol University, Jirayus JiarpakdeeMonash University, Australia, Chakkrit (Kla) TantithamthavornMonash University, Australia, Morakot ChoetkiertikulMahidol University, Thailand, Chaiyong RakhitwetsagulMahidol University, Thailand, Thanwadee SunetnantaMahidol University | ||
02:25 - 02:30 Talk | OSLDetector: Identifying Open-Source Libraries through Binary Analysis Tool Demonstrations Dan ZhangTsinghua University | ||
02:30 - 02:35 Talk | AirMochi – A Tool for Remotely Controlling iOS Devices Tool Demonstrations Nikola LukicUniversity of Southern California, Saghar TalebipourUniversity of Southern California, Nenad MedvidovićUniversity of Southern California, USA | ||
02:35 - 02:40 Talk | Edge4Real: A Cost-Effective Edge Computing based Human Behaviour Recognition System for Human-Centric Software Engineering Tool Demonstrations DI SHAOSchool of Information Technology, Deakin University, Xiao LiuSchool of Information Technology, Deakin University, Ben ChengSchool of Information Technology, Deakin University, Owen WangSchool of Information Technology, Deakin University, Thuong HoangSchool of Information Technology, Deakin University | ||
02:40 - 02:45 Talk | HomoTR: Online Test Recommendation System Based on Homologous Code Matching Tool Demonstrations Chenqian ZhuNanjing University, Weisong SunState Key Laboratory for Novel Software Technology, Nanjing University, Qin LIU, Yangyang YuanNanjing University, Chunrong FangNanjing University, China, Yong HuangState Key Laboratory for Novel Software Technology, Nanjing University | ||
02:45 - 02:50 Talk | WASim: Understanding WebAssembly Applications through Classification Tool Demonstrations | ||
02:50 - 03:20 Live Q&A | Q&A or Discussion Tool Demonstrations |
09:10 - 10:10: SynthesisResearch Papers at Kangaroo Chair(s): Domenico BianculliUniversity of Luxembourg | |||
09:10 - 09:30 Talk | Just-In-Time Reactive Synthesis Research Papers | ||
09:30 - 09:50 Talk | JISET: JavaScript IR-based Semantics Extraction Toolchain Research Papers | ||
09:50 - 10:10 Talk | FlashRegex: Deducing Anti-ReDoS Regexes from Examples Research Papers Yeting LiInstitute of Software, Chinese Academy of Sciences; University of Chinese Academy of Sciences, Zhiwu XuShenzhen University, Jialun CaoDepartment of Computer Science and Engineering, The Hong Kong University of Science and Technology, Haiming ChenInstitute of Software, Chinese Academy of Sciences, Tingjian GeUniversity of Massachusetts, Lowell, Shing-Chi CheungHong Kong University of Science and Technology, China, Haoren ZhaoShaanxi Normal University, Xi'an, China |
09:10 - 10:10: Configuration Management (1)Research Papers at Koala Chair(s): Carmine VassalloUniversity of Zurich, Switzerland | |||
09:10 - 09:30 Talk | Automated Implementation of Windows-related Security-Configuration Guides Research Papers Patrick StöckleTechnical University of Munich, Bernd GrobauerSiemens AG, Alexander PretschnerTechnical University of Munich DOI Pre-print | ||
09:30 - 09:50 Talk | Identifying Software Performance Changes Across Variants and Versions Research Papers Stefan MühlbauerLeipzig University, Sven ApelSaarland University, Germany, Norbert SiegmundLeipzig University DOI Pre-print | ||
09:50 - 10:10 Talk | CP-Detector: Using Configuration-related Performance Properties to Expose Performance Bugs Research Papers Haochen HeNational University of Defense Technology, Zhouyang JiaNational University of Defense Technology, Shanshan LiNational University of Defense Technology, China, Erci XuNational University of Defense Technology, Tingting YuUniversity of Kentucky, Yue YuCollege of Computer, National University of Defense Technology, Changsha 410073, China, Ji WangNational University of Defense Technology, Xiangke LiaoNational University of Defense Technology, China DOI Pre-print |
09:10 - 10:10: AI for Software Engineering (3)Research Papers at Wombat Chair(s): Artur AndrzejakHeidelberg University | |||
09:10 - 09:30 Talk | Automatic Extraction of Cause-Effect-Relations from Requirements Artifacts Research Papers Julian FrattiniBlekinge Institute of Technology, Maximilian JunkerTechnische Universität Muenchen, Michael UnterkalmsteinerBlekinge Institute of Technology, Daniel MendezBlekinge Institute of Technology | ||
09:30 - 09:50 Talk | BiLO-CPDP: Bi-Level Programming for Automated Model Discovery in Cross-Project Defect Prediction Research Papers Ke LiUniversity of Exeter, Zilin XiangUniversity of Electronic Science and Technology of China, Tao ChenLoughborough University, Kay Chen TanCity University of Hong Kong Pre-print | ||
09:50 - 10:10 Talk | Automating Just-In-Time Comment Updating![]() Research Papers Zhongxin LiuZhejiang University, Xin XiaMonash University, Meng YanChongqing University, Shanping LiZhejiang University Pre-print |
10:20 - 11:20: Tool Demo Showcase (2)Tool Demonstrations at Wombat Chair(s): Junjie ChenTianjin University | |||
10:20 - 10:25 Talk | MetPurity: A Learning-Based Tool of Pure Method Identification for Automatic Test Generation Tool Demonstrations | ||
10:25 - 10:30 Talk | STIFA: Crowdsourced Mobile Testing Report Selection Based on Text and Image Fusion Analysis Tool Demonstrations Zhenfei CaoNanjing University, Xu WangNanjing University, Shengcheng YuNanjing University, China, Yexiao YunNanjing University, Chunrong FangNanjing University, China | ||
10:30 - 10:35 Talk | ImpAPTr: A Tool For Identifying The Clues To Online Service Anomalies Tool Demonstrations hao wang, Guoping RongNanjing University, Yangchen XuNanjing University, Yong YouMeituan-Dianping Group | ||
10:35 - 10:40 Talk | PerfCI: A Toolchain for Automated Performance Testing during Continuous Integration of Python Projects Tool Demonstrations Omar JavedUniversità della Svizzera italiana, Joshua Heneage DawesUniversity of Manchester and CERN, Marta HanUniversity of Zagreb and CERN, Giovanni FranzoniCERN, Andreas PfeifferCERN, Giles RegerUniversity of Manchester, Walter BinderUniversity of Lugano, Switzerland | ||
10:40 - 10:45 Talk | Botsing, a Search-based Crash Reproduction Framework for Java Tool Demonstrations Pouria DerakhshanfarDelft University of Technology, Xavier DevroeyDelft University of Technology, Annibale PanichellaDelft University of Technology, Andy ZaidmanDelft University of Technology, Arie van DeursenDelft University of Technology, Netherlands DOI Pre-print Media Attached | ||
10:45 - 10:50 Talk | Speeding up GUI Testing by On-Device Test Generation Tool Demonstrations Nataniel Borges Jr.CISPA Helmholtz Center for Information Security, Jenny RauCISPA Helmholtz Center for Information Security, Andreas ZellerCISPA, Germany | ||
10:50 - 11:20 Live Q&A | Q&A or Discussion Tool Demonstrations |
16:00 - 17:00: Testing (2)Research Papers at Kangaroo Chair(s): Alex GroceNorthern Arizona University | |||
16:00 - 16:20 Talk | TestMC: Testing Model Counters using Differential and Metamorphic TestingExperience Research Papers Muhammad UsmanUniversity of Texas at Austin, USA, Wenxi WangUniversity of Texas at Austin, USA, Sarfraz KhurshidUniversity of Texas at Austin, USA | ||
16:20 - 16:40 Talk | BigFuzz: Efficient Fuzz Testing for Data Analytics using Framework Abstraction Research Papers Qian ZhangUniversity of California, Los Angeles, Jiyuan WangUniversity of California, Los Angeles, Muhammad Ali GulzarUniversity of California at Los Angeles, USA, Rohan PadhyeCarnegie Mellon University, Miryung KimUniversity of California at Los Angeles, USA | ||
16:40 - 17:00 Talk | Scaling Client-Specific Equivalence Checking via Impact Boundary Search Research Papers Nick FengUniversity of Toronto, Vincent HuiUniversity of Toronto, Federico MoraUniversity of California, Berkeley, Marsha ChechikUniversity of Toronto |
16:00 - 17:00: Configuration Management (2)Research Papers at Koala Chair(s): Arie van DeursenDelft University of Technology, Netherlands | |||
16:00 - 16:20 Talk | Inferring and Applying Def-Use Like Configuration Couplings in Deployment Descriptors Research Papers Chengyuan WenVirginia Tech, Yaxuan ZhangVirginia Tech, Xiao HeUniversity of Science and Technology Beijing, China, Na MengVirginia Tech | ||
16:20 - 16:40 Talk | Mastering Uncertainty in Performance Estimations of Configurable Software Systems Research Papers Johannes DornLeipzig University, Sven ApelSaarland University, Germany, Norbert SiegmundLeipzig University DOI Pre-print | ||
16:40 - 17:00 Talk | Team Discussions and Dynamics During DevOps Tool Adoptions in OSS Projects![]() Research Papers |
17:10 - 18:10: Empirical Software Engineering (1)Research Papers / Journal-first Papers at Koala Chair(s): Jinqiu YangConcordia University, Montreal, Canada | |||
17:10 - 17:30 Talk | Code to Comment "Translation": Data, Metrics, Baselining & Evaluation Research Papers David GrosUniversity of California, Davis, Hariharan SezhiyanUniversity of California, Davis, Prem DevanbuUniversity of California, Zhou YuUniversity of California, Davis | ||
17:30 - 17:50 Talk | Reproducing Performance Bug Reports in Server Applications: The Researchers' Experiences Journal-first Papers Xue HanUniversity of Kentucky, Daniel CarrollUniversity of Kentucky, Tingting YuUniversity of Kentucky Link to publication DOI | ||
17:50 - 18:10 Talk | Exploring the Architectural Impact of Possible Dependencies in Python software Research Papers Wuxia JinXi'an Jiaotong University, Yuanfang Cai Drexel University, Rick KazmanUniversity of Hawai‘i at Mānoa, Gang ZhangEmergent Design Inc, Qinghua ZhengXi'an Jiaotong University, Ting LiuXi'an Jiaotong University |
Thu 24 Sep Times are displayed in time zone: (UTC) Coordinated Universal Time
01:10 - 02:10: Test EfficiencyResearch Papers / NIER track at Kangaroo Chair(s): Darko MarinovUniversity of Illinois at Urbana-Champaign | |||
01:10 - 01:30 Research paper | Multiplex Symbolic Execution: Exploring Multiple Paths by Solving Once Research Papers Yufeng ZhangCollege of Information Science and Engineering, Hunan University, Zhenbang ChenCollege of Computer, National University of Defense Technology, Changsha, PR China, Ziqi ShuaiNational University of Defense Technology, Tianqi ZhangNational University of Defense Technology, Kenli LiCollege of Information Science and Engineering, National Supercomputing Center in Changsha, Hunan University, Ji WangNational University of Defense Technology Pre-print | ||
01:30 - 01:50 Talk | Zeror: Speed Up Fuzzing with Coverage-sensitive Tracing and Scheduling Research Papers Chijin ZhouTsinghua University, Mingzhe WangSchool of Software, Tsinghua University, Jie LiangSchool of Software, Tsinghua University, Zhe LiuNanjing University of Aeronautics and Astronautics, Yu Jiang | ||
01:50 - 02:00 Talk | SRRTA: Regression Testing Acceleration via State Reuse NIER track |
01:10 - 02:10: Maintenance and Evolution (4)Research Papers / Tool Demonstrations at Koala Chair(s): Xin XiaMonash University | |||
01:10 - 01:30 Talk | SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis Research Papers Yueming WuHuazhong University of Science and Technology, Deqing ZouHuazhong University of Science and Technology, Shihan DouHuazhong University of Science and Technology, Siru YangHuazhong University of Science and Technology, Wei YangUniversity of Texas at Dallas, USA, Feng ChengHuazhong University of Science and Technology, Hong LiangHuazhong University of Science and Technology, Hai JinHuazhong University of Science and Technology | ||
01:30 - 01:50 Talk | Generating Concept based API Element Comparison Using a Knowledge Graph Research Papers Yang LiuFudan University, China, Mingwei LiuFudan University, China, Xin PengFudan University, China, Christoph TreudeUniversity of Adelaide, Australia, Zhenchang XingAustralian National University, Australia, Xiaoxin ZhangFudan University, China | ||
01:50 - 02:00 Talk | JITBot: An Explainable Just-In-Time Defect Prediction Bot Tool Demonstrations Chaiyakarn KhananMahidol University, Worawit LuewichanaMahidol University, Krissakorn PruktharathikoonMahidol University, Jirayus JiarpakdeeMonash University, Australia, Chakkrit (Kla) TantithamthavornMonash University, Australia, Morakot ChoetkiertikulMahidol University, Thailand, Chaiyong RakhitwetsagulMahidol University, Thailand, Thanwadee SunetnantaMahidol University |
01:10 - 02:10: Human-computer interactionResearch Papers / Tool Demonstrations at Wombat Chair(s): Zhiyuan WanZhejiang University | |||
01:10 - 01:30 Talk | Identifying and Describing Information Seeking Tasks Research Papers Chris SatterfieldUniversity of British Columbia, Thomas FritzUniversity of Zurich, Gail MurphyUniversity of British Columbia | ||
01:30 - 01:50 Talk | Predicting Code Context Models for Software Development Tasks Research Papers Pre-print | ||
01:50 - 02:00 Talk | Edge4Real: A Cost-Effective Edge Computing based Human Behaviour Recognition System for Human-Centric Software Engineering Tool Demonstrations DI SHAOSchool of Information Technology, Deakin University, Xiao LiuSchool of Information Technology, Deakin University, Ben ChengSchool of Information Technology, Deakin University, Owen WangSchool of Information Technology, Deakin University, Thuong HoangSchool of Information Technology, Deakin University |
02:20 - 03:20: Software Analysis (3)Research Papers / Industry Showcase at Kangaroo Chair(s): Rahul PurandareIIIT-Delhi | |||
02:20 - 02:40 Talk | CCGraph: a PDG-based code clone detector with approximate graph matching Research Papers Yue ZouDepartment of Computer Science and Technology, University of Science and Technology of China, Bihuan BanSchool of Data Science, University of Science and Technology of China, Yinxing Xue, Yun XuUniversity of Science and Technology of China | ||
02:40 - 03:00 Talk | Towards Generating Thread-Safe Classes Automatically Research Papers Haichi WangCollege of Intelligence and Computing, Tianjin University, Zan WangTianjin University, China, Jun SunSingapore Management University, Shuang LiuTianjin University, China, Ayesha SadiqMonash University, Yuan-Fang LiMonash University | ||
03:00 - 03:20 Talk | Industry practice of JavaScript Dynamic Analysis on WeChat Mini-Programs Industry Showcase Yi LiuSouthern University of Science and Technology, Jinhui XieTencent Inc., Jianbo YangTencent Inc., Shiyu GuoTencent Inc., Yuetang DengTencent, Inc., Shuqing LiSouthern University of Science and Technology, Yechang WuSouthern University of Science and Technology, Yepang LiuSouthern University of Science and Technology |
02:20 - 03:20: Empirical Software Engineering (2)Research Papers at Koala Chair(s): Julia RubinUniversity of British Columbia, Canada | |||
02:20 - 02:40 Talk | Understanding Performance Concerns in the API Documentation of Data Science Libraries Research Papers Yida TaoShenzhen University, Jiefang JiangShenzhen University, Yepang LiuSouthern University of Science and Technology, Zhiwu XuShenzhen University, Shengchao QinUniversity of Teesside | ||
02:40 - 03:00 Talk | On the Effectiveness of Unified Debugging: An Extensive Study on 16 Program Repair Systems Research Papers Samuel BentonThe University of Texas at Dallas, Xia LiKennesaw State University, Yiling LouPeking University, China, Lingming ZhangUniversity of Illinois at Urbana-Champaign, USA | ||
03:00 - 03:20 Talk | Automated Third-party Library Detection for Android Applications: Are We There Yet?Experience Research Papers Zhan XianThe Hong Kong Polytechnic University, Lingling FanNanyang Technological University, Singapore, Tianming LiuMonash University, Australia, Sen ChenNanyang Technological University, Singapore, Li LiMonash University, Australia, Haoyu WangBeijing University of Posts and Telecommunications, China, Yifei XuSouthern University of Science and Technology, Xiapu LuoThe Hong Kong Polytechnic University, Yang LiuNanyang Technological University, Singapore |
02:20 - 03:20: AI for Software Engineering (4)Research Papers / NIER track at Wombat Chair(s): Hoa Khanh DamUniversity of Wollongong | |||
02:20 - 02:40 Talk | Detecting and Explaining Self-Admitted Technical Debts with Attention-based Neural Networks Research Papers | ||
02:40 - 03:00 Talk | OCoR: An Overlapping-Aware Code Retriever Research Papers Qihao ZhuPeking University, Zeyu SunPeking University, Xiran LiangPeking University, Yingfei XiongPeking University, China, Lu ZhangPeking University, China | ||
03:00 - 03:10 Talk | BugPecker: Locating Faulty Methods with Deep Learning on Revision Graphs NIER track Junming CaoSchool of Software, Shanghai Jiao Tong University, Shouliang YangSchool of Software, Shanghai Jiao Tong University, Wenhui JiangSchool of Software, Shanghai Jiao Tong University, Hushuang ZengSchool of Software, Shanghai Jiao Tong University, Beijun ShenSchool of Software, Shanghai Jiao Tong University, Hao ZhongShanghai Jiao Tong University |
08:00 - 09:00: Bugs and Automated RepairResearch Papers at Kangaroo Chair(s): Jifeng XuanWuhan University | |||
08:00 - 08:20 Talk | No Strings Attached: An Empirical Study of String-related Software Bugs Research Papers Pre-print File Attached | ||
08:20 - 08:40 Research paper | Automated Patch Correctness Assessment: How Far are We? Research Papers Shangwen WangNational University of Defense Technology, Ming WenHuazhong University of Science and Technology, China, Bo LinNational University of Defense Technology, Hongjun WuNational University of Defense Technology, Yihao QinNational University of Defense Technology, Deqing ZouHuazhong University of Science and Technology, Xiaoguang MaoNational University of Defense Technology, Hai JinHuazhong University of Science and Technology DOI Pre-print Media Attached | ||
08:40 - 09:00 Research paper | Evaluating Representation Learning of Code Changes for Predicting Patch Correctness in Program Repair Research Papers Haoye TianUniversity of Luxembourg, Kui LiuUniversity of Luxembourg, Luxembourg, Abdoul Kader KaboréUniversity of Luxembourg, Anil KoyuncuUniversity of Luxembourg, Luxembourg, Li LiMonash University, Australia, Jacques KleinUniversity of Luxembourg, Luxembourg, Tegawendé F. BissyandéUniversity of Luxembourg, Luxembourg |
08:00 - 09:00: Verification and TestingResearch Papers / Tool Demonstrations / Industry Showcase at Koala Chair(s): Jun SunSingapore Management University | |||
08:00 - 08:20 Talk | Attend and Represent: A Novel View on Algorithm Selection for Software Verification Research Papers | ||
08:20 - 08:40 Talk | Lightweight MBT Testing for National e-Health Portal in Norway Industry Showcase Davrondzhon GafurovNorsk Helsenett SF, Margrete Sunde GrovanNorsk Helsenett SF, Margrete Sunde GrovanNorsk Helsenett SF | ||
08:40 - 08:50 Talk | Speeding up GUI Testing by On-Device Test Generation Tool Demonstrations Nataniel Borges Jr.CISPA Helmholtz Center for Information Security, Jenny RauCISPA Helmholtz Center for Information Security, Andreas ZellerCISPA, Germany | ||
08:50 - 09:00 Talk | PerfCI: A Toolchain for Automated Performance Testing during Continuous Integration of Python Projects Tool Demonstrations Omar JavedUniversità della Svizzera italiana, Joshua Heneage DawesUniversity of Manchester and CERN, Marta HanUniversity of Zagreb and CERN, Giovanni FranzoniCERN, Andreas PfeifferCERN, Giles RegerUniversity of Manchester, Walter BinderUniversity of Lugano, Switzerland |
08:00 - 09:00: Model-Driven Development and Rapid PrototypingResearch Papers / Tool Demonstrations at Wombat Chair(s): Timo KehrerHumboldt-Universtität zu Berlin | |||
08:00 - 08:20 Talk | Scalable Multiple-View Analysis of Reactive Systems via Bidirectional Model Transformations![]() Research Papers Christos TsigkanosTU Vienna, NIANYU LIPeking University, China, Zhi JinPeking University, Zhenjiang HuPeking University, China, Carlo GhezziPolitecnico di Milano | ||
08:20 - 08:40 Talk | Trace-Checking Signal-based Temporal Properties: A Model-Driven Approach Research Papers Chaima BoufaiedUniversity of Luxembourg, Claudio MenghiUniversity of Luxembourg, Luxembourg, Domenico BianculliUniversity of Luxembourg, Lionel BriandSnT Centre/University of Luxembourg, Yago Isasi ParacheLuxSpace | ||
08:40 - 08:50 Talk | GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language Requirements Tool Demonstrations Kristian KolthoffInstitute for Enterprise Systems (InES), University Of Mannheim, Christian BarteltInstitute for Software and Systems Engineering, TU Clausthal, Simone Paolo PonzettoData and Web Science Group, University of Mannheim |
09:10 - 10:10: Software Security and Trust (2)Research Papers / Tool Demonstrations / Industry Showcase at Kangaroo Chair(s): Raula Gaikovina KulaNAIST | |||
09:10 - 09:30 Talk | Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts Research Papers Yinxing Xue, Mingliang MaUniversity of Science and Technology of China, Yun LinNational University of Singapore, Yulei SuiUniversity of Technology Sydney, Australia, Jiaming YeUniversity of Science and Technology of China, Tianyong PengUniversity of Science and Technology of China | ||
09:30 - 09:50 Talk | Code-based Vulnerability Detection in Node.js Applications: How far are we? Industry Showcase Bodin ChinthanetNara Institute of Science and Technology, Serena Elisa PontaSAP Security Research, Henrik PlateSAP Security Research, Antonino SabettaSAP Security Research, Raula Gaikovina KulaNAIST, Takashi IshioNara Institute of Science and Technology, Kenichi MatsumotoNara Institute of Science and Technology | ||
09:50 - 10:00 Talk | SmartBugs: A Framework to Analyze Solidity Smart Contracts Tool Demonstrations João F. FerreiraINESC-ID and IST, University of Lisbon, Pedro CruzIST, University of Lisbon, Portugal, Thomas DurieuxKTH Royal Institute of Technology, Sweden, Rui AbreuFaculty of Engineering, University of Porto, Portugal |
09:10 - 10:10: Testing and AIResearch Papers / Journal-first Papers at Koala Chair(s): Xiaoyuan XieSchool of Computer Science, Wuhan University, China | |||
09:10 - 09:30 Talk | Predicting failures in multi-tier distributed systems Journal-first Papers Leonardo MarianiUniversity of Milano Bicocca, Mauro PezzeUSI Lugano, Switzerland, Oliviero RiganelliUniversity of Milano-Bicocca, Italy, Rui XinUSI Università della Svizzera italiana | ||
09:30 - 09:50 Talk | Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness Research Papers David BerendNanyang Technological University, Singapore, Xiaofei XieNanyang Technological University, Lei MaKyushu University, Lingjun ZhouCollege of Intelligence and Computing, Tianjin University, Yang LiuNanyang Technological University, Singapore, Chi XuSingapore Institute of Manufacturing Technology, A*Star, Jianjun ZhaoKyushu University | ||
09:50 - 10:10 Talk | Metamorphic Object Insertion for Testing Object Detection Systems Research Papers |
10:20 - 11:20: Tool Demo Showcase (3)Tool Demonstrations at Wombat Chair(s): Csaba NagySoftware Institute - USI, Lugano, Switzerland | |||
10:20 - 10:25 Talk | FILO: FIx-LOcus Localization for Backward Incompatibilities Caused by Android Framework Upgrades Tool Demonstrations Marco MobilioUniversity of Milano Bicocca, Oliviero RiganelliUniversity of Milano-Bicocca, Italy, Daniela MicucciUniversity of Milano-Bicocca, Italy, Leonardo MarianiUniversity of Milano Bicocca | ||
10:25 - 10:30 Talk | EXPRESS: An Energy-Efficient and Secure Framework for Mobile Edge Computing and Blockchain based Smart Systems Tool Demonstrations | ||
10:30 - 10:35 Talk | SmartBugs: A Framework to Analyze Solidity Smart Contracts Tool Demonstrations João F. FerreiraINESC-ID and IST, University of Lisbon, Pedro CruzIST, University of Lisbon, Portugal, Thomas DurieuxKTH Royal Institute of Technology, Sweden, Rui AbreuFaculty of Engineering, University of Porto, Portugal | ||
10:35 - 10:40 Talk | RepoSkillMiner: Identifying software expertise from GitHub repositories using Natural Language Processing Tool Demonstrations Efstratios KourtzanidisUniversity Of Macedonia, Alexander ChatzigeorgiouUniversity of Macedonia, Apostolos AmpatzoglouUniversity of Macedonia Pre-print Media Attached File Attached | ||
10:40 - 10:45 Talk | Sosed: a tool for finding similar software projects Tool Demonstrations Egor BogomolovJetBrains Research, Yaroslav GolubevJetBrains Research, ITMO University, Artyom LobanovJetBrains Research, Vladimir KovalenkoJetBrains Research, JetBrains N.V., Timofey BryksinJetBrains Research, Saint Petersburg State University | ||
10:45 - 10:50 Talk | GUI2WiRe: Rapid Wireframing with a Mined and Large-Scale GUI Repository using Natural Language Requirements Tool Demonstrations Kristian KolthoffInstitute for Enterprise Systems (InES), University Of Mannheim, Christian BarteltInstitute for Software and Systems Engineering, TU Clausthal, Simone Paolo PonzettoData and Web Science Group, University of Mannheim | ||
10:50 - 11:20 Live Q&A | Q&A or Discussion Tool Demonstrations |
16:00 - 17:00: Mobile App (2)Research Papers / NIER track / Tool Demonstrations at Kangaroo Chair(s): Eric BoddenHeinz Nixdorf Institut, Paderborn University and Fraunhofer IEM | |||
16:00 - 16:20 Talk | Seven Reasons Why: An In-Depth Study of the Limitations of Random Test Input Generation for AndroidExperience Research Papers | ||
16:20 - 16:40 Talk | Test Automation in Open-Source Android Apps: A Large-Scale Empirical Study Research Papers Jun-Wei LinUniversity of California, Irvine, Navid SalehnamadiUniversity of California, Irvine, Sam MalekUniversity of California at Irvine, USA | ||
16:40 - 16:50 Talk | A Framework for Automated Test Mocking of Mobile Apps NIER track Mattia FazziniUniversity of Minnesota, Alessandra GorlaIMDEA Software Institute, Alessandro OrsoGeorgia Tech | ||
16:50 - 17:00 Talk | AirMochi – A Tool for Remotely Controlling iOS Devices Tool Demonstrations Nikola LukicUniversity of Southern California, Saghar TalebipourUniversity of Southern California, Nenad MedvidovićUniversity of Southern California, USA |
16:00 - 16:20 Talk | Prober: Practically Defending Overflows with Page Protection Research Papers Hongyu LiuPurdue University, Ruiqin TianCollege of William and Mary, Bin RenCollege of William and Mary, Tongping LiuUniversity of Massachusetts Amherst | ||
16:20 - 16:40 Talk | MinerRay: Semantics-Aware Analysis for Ever-Evolving Cryptojacking Detection Research Papers Alan RomanoUniversity at Buffalo, SUNY, Yunhui ZhengIBM T.J. Watson Research Center, Weihang WangUniversity at Buffalo, SUNY | ||
16:40 - 17:00 Talk | Summary-Based Symbolic Evaluation for Smart Contracts![]() Research Papers Yu FengUniversity of California, Santa Barbara, Emina TorlakUniversity of Washington, Rastislav BodikUniversity of Washington |
16:00 - 17:00: Model-Driven Development Research Papers / Journal-first Papers at Wombat Chair(s): Marianne HuchardLIRMM | |||
16:00 - 16:20 Talk | Synthesis-Based Resolution of Feature Interactions in Cyber-Physical Systems Research Papers Benjamin GaffordGrinnell College, Tobias DürschmidCarnegie Mellon University, Institute for Software Research, Gabriel A. MorenoCarnegie Mellon University, USA, Eunsuk KangCarnegie Mellon University, USA | ||
16:20 - 16:40 Talk | MoFuzz: A Fuzzer Suite for Testing Model-Driven Software Engineering Tools Research Papers Hoang Lam NguyenHumboldt-Universität zu Berlin, Nebras NassarPhilipps-Universität Marburg, Timo KehrerHumboldt-Universtität zu Berlin, Lars GrunskeHumboldt-Universität zu Berlin | ||
16:40 - 17:00 Talk | Characterization of Implied Scenarios as Families of Common Behavior Journal-first Papers Caio Batista de MeloUniversity of California, Irvine, André Luiz Fernandes CançadoUniversity of Brasília, Genaína Nunes RodriguesUniversity of Brasília Link to publication DOI Pre-print |
Accepted Papers
FAQs on Double Blind
If you have questions not answered below, please contact the program chairs at ase2020.research@gmail.com
Q: Why Double Blind?
There are many reasons for a submission track to employ a double-blind review process – not the least being the considerable number of requests to do so from the community. Over the past several years, this model has become an accepted practice at many Software Engineering conferences, and it is standard in many other communities as well. For more information on the motivation for double-blind reviewing, see Claire Le Goues’ blog post arguing in favor of double-blind review processes for Software Engineering conferences. See also a list of double-blind resources from Robert Feldt, as well as a more formal study of the subject by Moritz Beller and Alberto Bacchelli.
Q: How to prepare your paper for double-blind reviewing?
You must make every reasonable effort to honor the double-blind review process, but you do not need to guarantee that your identity is undiscoverable. The double-blind aspect of the review process is not to set up an adversarial identity-discovery process. Essentially, the guiding principle should be to maximize the number of people who could plausibly be authors, subject to the constraint that no change is made to any technical details of the work. Therefore, you should ensure that the reviewers are able to read and review your paper without needing to know who any of the authors are. Specifically, this involves at least adhering to the following three points:
- Omit all authors’ names and affiliations from the title page. If you have acknowledgments, do not mention any names or organizations. Take care not to inadvertently include this information in PDF metadata.
- Refer to your own work in the third person. You should not omit or change the names of your own previously published tools, approaches, or systems, because this would clearly compromise the review process; it would also violate the constraint that “no change is made to any technical details of the work”. Instead, refer to the authorship or provenance of tools, approaches, or systems in the third person, so that it is credible that another author could have written your paper.
- Take care with the use of supplementary material in the paper. Try to avoid relying on supplementary material that is impossible to properly anonymize, such as a companion technical report or thesis (see below), your personal website, or a YouTube channel. We do encourage the careful sharing of suitably anonymized code repositories and datasets, such as through an anonymous sharing links (doable via DropBox, for example) to a cleaned and anonymized GitHub repository. Check such data files and repositories carefully for any information that could reveal author identities. It is also possible to submit supplementary material with the paper, but again it is necessary to check the material carefully for anything that can reveal author identity.
Q: Can I disseminate a non-blinded version of my submitted work by discussing it with colleagues, giving talks, publishing it at arXiv, etc.?
You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. For example, you should not discuss your work specifically with members of the program committee, publicize your work on mailing lists or media that are widely shared and can reach the program committee, or post the submitted work on arXiv or a similar site immediately before or after submitting to the conference. One option is to make a tech report at your institution, which allows someone to cite the work, if need be, like arXiv, but doesn’t have the same degree of visibility.
Q: I published a previous version of my work on arXiv or as a tech report at my institution. Do I need to cite it, and if so how?
A paper on arXiv or a tech report is not a peer-reviewed publication. If the submission completely subsumes the previous version, then there is no need to cite the previous version at all. We explicitly discourage “anonymous” references (e.g., “[31] —Reference omitted for double-blind review—”: if the cited report is necessary for a reviewer to fully understand the submission, then the relevant material should either be included in the submission, cited in the third person, or provided as suitably anonymized supplementary material (such as an anonymized appendix) hosted anonymously. Note that reviewers are not obligated to review such previous material, however, and so you should strive to make your submissions as stand-alone as possible (regardless of the double-blind review process).
Q: I previously published an earlier version of this work elsewhere than arXiv. What should I do about citing that previous work? If the previous work is published in a peer-reviewed venue, then it should be cited, but in the third person so that it is not revealed that the cited work and the submitted paper share one or more authors. This would include posters, but only if the poster is accompanied by a paper in the conference proceedings. Posters that are not represented in the proceedings can be ignored.
Q: What about a PhD or master’s thesis?
It’s perfectly fine to publish work arising from a PhD or master’s degree, and there’s no need to cite it in a submission that is undergoing double-blind review because prior dissertation publication does not compromise novelty. In the final camera-ready version of the paper, please do cite the dissertation to acknowledge its contribution. In general, the guideline is that the author’s job is to ensure that the submission is readable and reviewable, without the reviewers needing to know the identities of the submission’s authors. You do not need to make it impossible for the reviewers to discover the authors’ identities. The referees will be trying hard not to discover the authors’ identities, so they will likely not be searching the web to check whether there is a tech report or other unpublished material related to this work.
This FAQ is based on guidelines for double-blind reviewing from ASE 2019 and ICSE 2019.