Dates
Tracks
Plenary

This program is tentative and subject to change.

You're viewing the program in a time zone which is different from your device's time zone change time zone

Wed 17 Jul

Displayed time zone: Brasilia, Distrito Federal, Brazil change

10:30 - 11:00
Coffee BreakSocial Events at Baobá 3
10:30
30m
Coffee break
Break
Social Events

11:00 - 12:30
11:00
18m
Talk
"The Law Doesn’t Work Like a Computer": Exploring Software Licensing Issues Faced by Legal PractitionersDistinguished Paper Award
Research Papers
Nathan Wintersgill William & Mary, Trevor Stalnaker William & Mary, Laura A. Heymann William & Mary, Oscar Chaparro William & Mary, Denys Poshyvanyk William & Mary
11:18
18m
Talk
AI-assisted Code Authoring at Scale: Fine-tuning, deploying, and mixed methods evaluation
Research Papers
Vijayaraghavan Murali Meta Platforms Inc., Chandra Sekhar Maddila Meta Platforms, Inc., Imad Ahmad Meta Platforms, Inc., Michael Bolin Meta Platforms, Inc., Daniel Cheng Meta Platforms Inc., Negar Ghorbani Meta Platforms Inc., Renuka Fernandez Meta Platforms, Inc., Nachiappan Nagappan Meta Platforms, Inc., Peter C Rigby Meta / Concordia University
11:36
18m
Talk
An Analysis of the Costs and Benefits of Autocomplete in IDEs
Research Papers
Shaokang Jiang University of California, San Diego, Michael Coblenz University of California, San Diego
Pre-print
11:54
18m
Talk
Shadows in the Interface: A Comprehensive Study on Dark Patterns
Research Papers
Liming Nie Nanyang Technological University, Yangyang Zhao Zhejiang Sci-Tech University, Chenglin Li Zhejiang Sci-Tech University, Xuqiong Luo Changsha University of Science and Technology, Yang Liu Nanyang Technological University
12:12
9m
Talk
Paths to Testing: Why Women Enter and Remain in Software Testing?
Industry Papers
Kleice Silva CESAR School, Ann Barcomb Department of Electrical and Software Engineering, Schulich School of Engineering, University of Calgary, Ronnie de Souza Santos University of Calgary
11:00 - 12:30
11:00
18m
Talk
A Transferability Study of Interpolation-Based Hardware Model Checking to Software VerificationDistinguished Paper Award
Research Papers
Dirk Beyer LMU Munich, Po-Chun Chien LMU Munich, Marek Jankola LMU Munich, Nian-Ze Lee LMU Munich
DOI Pre-print
11:18
9m
Talk
CoqPyt: Proof Navigation in Python in the Era of LLMs
Demonstrations
Pedro Carrott Imperial College London, Nuno Saavedra INESC-ID and IST, University of Lisbon, Kyle Thompson University of California, San Diego, Sorin Lerner University of California at San Diego, João F. Ferreira INESC-ID and IST, University of Lisbon, Emily First University of California, San Diego
DOI Pre-print
11:27
9m
Talk
How We Built Cedar: A Verification-Guided Approach
Industry Papers
Craig Disselkoen Amazon Web Services, Aaron Eline Amazon, Shaobo He Amazon Web Services, Kyle Headley Unaffiliated, MIchael Hicks Amazon, Kesha Hietala Amazon Web Services, John Kastner Amazon Web Services, Anwar Mamat University of Maryland, Matt McCutchen , Neha Rungta Amazon Web Services, Bhakti Shah University of Chicago, Emina Torlak Amazon Web Services, USA, Andrew Wells Amazon Web Services
11:36
18m
Talk
Mission Specification Patterns for Mobile Robots: Providing Support for Quantitative Properties
Journal First
Claudio Menghi University of Bergamo; McMaster University, Christos Tsigkanos University of Bern, Switzerland, Mehrnoosh Askarpour McMaster University, Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy, Gricel Vázquez University of York, UK, Radu Calinescu University of York, UK, Sergio García Volvo Cars Corporation, Sweden
11:54
18m
Talk
Rigorous Assessment of Model Inference Accuracy using Language Cardinality
Journal First
Donato Clun Imperial College London, Donghwan Shin University of Sheffield, Antonio Filieri AWS and Imperial College London, Domenico Bianculli University of Luxembourg
12:12
18m
Talk
Simulation-based Testing of Simulink Models with Test Sequence and Test Assessment Blocks
Journal First
Federico Formica McMaster University, Tony Fan McMaster University, Akshay Rajhans Mathworks, Vera Pantelic McMaster University, Mark Lawford McMaster University, Claudio Menghi University of Bergamo; McMaster University
11:00 - 12:30
Software Maintenance and Comprehension 1Research Papers / Ideas, Visions and Reflections / Demonstrations at Baobá 4
11:00
18m
Talk
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning
Research Papers
Xiaoling Zhang Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Zhengzi Xu Nanyang Technological University, shouguo yang Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, Zhi Li Institute of Information Engineering, Chinese Academy of Sciences, China, zhiqiang shi Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,, Limin Sun Institute of Information Engineering, Chinese Academy of Sciences, School of Cyber Security, University of Chinese Academy of Sciences,
DOI Pre-print
11:18
18m
Talk
Only diff is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language ModelDistinguished Paper Award
Research Papers
Jiawei Li University of California, Irvine, David Faragó Innoopract GmbH & QPR Technologies, Christian Petrov Innoopract GmbH, Iftekhar Ahmed University of California, Irvine
11:36
18m
Talk
Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations
Research Papers
Jun Lyu Nanjing University, Shanshan Li Software Institute, Nanjing University, He Zhang Nanjing University, Lanxin Yang Nanjing University, Bohan Liu Nanjing University, Manuel Rigger National University of Singapore
11:54
18m
Talk
Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example
Research Papers
Malinda Dilhara University of Colorado Boulder, Abhiram Bellur University of Colorado Boulder, Timofey Bryksin JetBrains Research, Danny Dig University of Colorado Boulder, JetBrains Research
Pre-print
12:12
9m
Talk
Variability-Aware Differencing with DiffDetective
Demonstrations
Paul Maximilian Bittner Paderborn University, Alexander Schultheiß Paderborn University, Benjamin Moosherr University of Ulm, Timo Kehrer University of Bern, Thomas Thüm Paderborn University
12:21
9m
Talk
From Models to Practice: Enhancing OSS Project Sustainability with Evidence-Based Advice
Ideas, Visions and Reflections
Nafiz Imtiaz Khan Department of Computer Science, University of California, Davis, Vladimir Filkov University of California at Davis, USA
11:00 - 12:30
Code Search and CompletionResearch Papers / Industry Papers at Baobá 6
11:00
18m
Talk
ClarifyGPT: A Framework for Enhancing LLM-based Code Generation via Requirements Clarification
Research Papers
Fangwen Mu Institute of Software, Chinese Academy of Sciences, Lin Shi Beihang University, Song Wang York University, Zhuohao Yu Institute of Software, Chinese Academy of Sciences, Binquan Zhang Beihang University, ChenXue Wang Institute of Software, Chinese Academy of Sciences, Shichao LIu Software IDE innovation Lab, Huawei Central Software Institute, Qing Wang Institute of Software, Chinese Academy of Sciences
11:18
18m
Talk
CodePlan: Repository-level Coding using LLMs and Planning
Research Papers
Ramakrishna Bairi Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Aditya Kanade Microsoft Research, India, Vageesh D C Microsoft Research, India, Arun Iyer Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua, B. Ashok Microsoft Research. India, Shashank Shet Microsoft Research. India
11:36
18m
Talk
An Empirical Study of Code Search in Intelligent Coding Assistant: Perceptions, Expectations, and Directions
Industry Papers
Chao Liu Chongqing University, Xindong Zhang Alibaba Cloud Computing Co. Ltd., Hongyu Zhang Chongqing University, Zhiyuan Wan Zhejiang University, Zhan Huang Chongqing University, Meng Yan Chongqing University
11:54
18m
Talk
DeciX: Explain Deep Learning Based Code Generation Applications
Research Papers
Simin Chen University of Texas at Dallas, Zexin Li University of California, Riverside, Wei Yang University of Texas at Dallas, Cong Liu University of California, Riverside
12:12
18m
Talk
IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion
Research Papers
Bolun Li Shandong Normal University, Zhihong Sun Shandong Normal University, Tao Huang Shandong Normal University, Hongyu Zhang Chongqing University, Yao Wan Huazhong University of Science and Technology, Chen Lyu Shandong Normal University, Ge Li Peking University, Zhi Jin Peking University
12:30 - 14:00
FSE Steering Committee MeetingSocial Events at Baobá 8
Chair(s): Abhik Roychoudhury National University of Singapore
12:30
90m
Meeting
FSE Steering Committee
Social Events

12:30 - 14:00
12:30
90m
Lunch
Lunch
Social Events

14:00 - 15:30
14:00
18m
Talk
An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation
Research Papers
Yibo He Key Lab of HCST (PKU), MOE; SCS, Peking University, China, Jiaming Huang Peking University, Hao Yu Peking University, Tao Xie Peking University
14:18
18m
Talk
Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Applications
Research Papers
Shuqing Li The Chinese University of Hong Kong, Cuiyun Gao Harbin Institute of Technology, Jianping Zhang The Chinese University of Hong Kong, Yujia Zhang Harbin Institute of Technology, Yepang Liu Southern University of Science and Technology, Jiazhen Gu The Chinese University of Hong Kong, Yun Peng The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print
14:36
18m
Talk
Decision Making for Managing Automotive Platforms: An Interview Survey on the Sate-of-Practice
Industry Papers
Philipp Zellmer Volkswagen AG & Harz University of Applied Sciences, Jacob Krüger Eindhoven University of Technology, Thomas Leich Harz University of Applied Sciences, Germany
14:54
18m
Talk
Evaluation framework for autonomous systems: the case of Programmable Electronic Medical Systems
Journal First
Andrea Bombarda University of Bergamo, Silvia Bonfanti University of Bergamo, Martina De Sanctis Gran Sasso Science Institute, Angelo Gargantini University of Bergamo, Patrizio Pelliccione Gran Sasso Science Institute, L'Aquila, Italy, Elvinia Riccobene Computer Science Dept., University of Milan, Patrizia Scandurra University of Bergamo, Italy
15:12
18m
Talk
Insights into Transitioning towards Electrics/Electronics Platform Management in the Automotive Industry
Industry Papers
Lennart Holsten Volkswagen AG & Harz University of Applied Sciences, Jacob Krüger Eindhoven University of Technology, Thomas Leich Harz University of Applied Sciences, Germany
14:00 - 15:30
14:00
18m
Talk
Test Input Prioritization for 3D Point Clouds
Journal First
Yinghua LI University of Luxembourg, Xueqi Dang University of Luxembourg, Lei Ma The University of Tokyo & University of Alberta, Jacques Klein University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg, Tegawendé F. Bissyandé University of Luxembourg
14:18
18m
Talk
Evaluating and Improving ChatGPT for Unit Test Generation
Research Papers
Zhiqiang Yuan Fudan University, Mingwei Liu Fudan University, Shiji Ding Fudan University, Kaixin Wang Fudan University, Yixuan Chen Fudan University, Xin Peng Fudan University, Yiling Lou Fudan University
14:36
18m
Talk
Bounding Random Test Set Size with Computational Learning Theory
Research Papers
Neil Walkinshaw The University of Sheffield, Michael Foster The University of Sheffield, José Miguel Rojas The University of Sheffield, Robert Hierons The University of Sheffield
14:54
18m
Talk
COSTELLO: Contrastive Testing for Embedding-based Large Language Model as a Service Embeddings
Research Papers
Weipeng Jiang Xi'an Jiaotong University, Juan Zhai University of Massachusetts, Amherst, Shiqing Ma University of Massachusetts, Amherst, Xiaoyu Zhang Xi'an Jiaotong University, Chao Shen Xi'an Jiaotong University
15:12
18m
Talk
FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution
Research Papers
Jaehan Yoon Sungkyunkwan University, Sooyoung Cha Sungkyunkwan University
14:00 - 15:30
Processes, Requirements, and ArchitectureIdeas, Visions and Reflections / Industry Papers / Journal First / Demonstrations at Baobá 4
14:00
18m
Talk
An LGPD Compliance Inspection Checklist to Assess IoT Solutions
Industry Papers
Ivonildo Pereira Gomes Neto Federal University of Pernambuco, João Mendes Federal University of Maranhão, Waldemar Pires Ferreira Neto Rural Federal University of Pernambuco, Luis Jorge Enrique Rivero Cabrejos Federal University of Maranhão, Brazil, Davi Viana Federal University of Maranhão, Sérgio Soares Universidade Federal de Pernambuco
14:18
18m
Talk
On the Usefulness of Automatically Generated Microservice Architectures
Journal First
Luiz Carvalho Pontifical Catholic University of Rio de Janeiro, Brazil, Thelma Elita Colanzi State University of Maringa, Brazil, Wesley Assunção North Carolina State University, Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Juliana Alves Pereira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Marcos Kalinowski Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello Federal University of Rio de Janeiro (UFRJ), Maria Julia de Lima Tecgraf Institute, Pontifical Catholic University of Rio de Janeiro, Brazil, Carlos Lucena Pontifical Catholic University of Rio de Janeiro, Brazil
14:36
18m
Talk
Automated Smell Detection and Recommendation in Natural Language Requirements
Journal First
Alvaro Veizaga University of Luxembourg, Seung Yeob Shin University of Luxembourg, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
14:54
9m
Talk
Supporting Early Architectural Decision-Making Through Tradeoff Analysis: A Study with Volvo Cars
Industry Papers
Karl Öqvist Chalmers | University of Gothenburg, Jacob Messinger Chalmers | University of Gothenburg, Rebekka Wohlrab Chalmers University of Technology
15:03
9m
Talk
AutoOffAB: Toward Automated Offline A/B Testing for Data-Driven Requirement Engineering
Ideas, Visions and Reflections
Jie JW Wu University of British Columbia (UBC)
Pre-print
15:12
9m
Talk
A Vision on Open Science for the Evolution of Software Engineering Research and Practice
Ideas, Visions and Reflections
Edson OliveiraJr State University of Maringá, Fernanda Madeiral Vrije Universiteit Amsterdam, Alcemir Rodrigues Santos State University of Piauí, Christina von Flach Federal University of Bahia, Sérgio Soares Universidade Federal de Pernambuco
Pre-print
15:21
9m
Talk
MicroKarta: Visualising Microservice Architectures
Demonstrations
Oscar Manglaras University of Adelaide, Alex Farkas University of Adelaide, Peter Fule Swordfish Computing, Christoph Treude Singapore Management University, Markus Wagner Monash University, Australia
14:00 - 15:30
14:00
18m
Talk
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-context Learning
Research Papers
Yubo Mai Zhejiang University, Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Xing Hu Zhejiang University, Lingfeng Bao Zhejiang University, Yu Liu Zhejiang University, JianLing Sun Zhejiang University
14:18
18m
Talk
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
Research Papers
Zian Su Purdue University, Xiangzhe Xu Purdue University, Ziyang Huang Purdue University, Zhuo Zhang Purdue University, Yapeng Ye Purdue University, Jianjun Huang Renmin University of China, Xiangyu Zhang Purdue University
14:36
18m
Talk
Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs
Research Papers
Yanfu Yan William & Mary, Nathan Cooper William & Mary, Kevin Moran University of Central Florida, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Denys Poshyvanyk William & Mary, Steve Rich Cisco Systems
14:54
18m
Talk
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation
Research Papers
Zhen Yang Shandong University, Fang Liu Beihang University, Zhongxing Yu Shandong University, Jacky Keung City University of Hong Kong, Jia Li Peking University, Shuo Liu City University of Hong Kong, Hong Yifan City University of Hong Kong, Xiaoxue Ma City University of Hong Kong, Zhi Jin Peking University, Ge Li Peking University
Pre-print
15:12
18m
Talk
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
Research Papers
Yuxi Li Huazhong University of Science and Technology, Yi Liu Nanyang Technological University, Gelei Deng Nanyang Technological University, Ying Zhang Virginia Tech, Wenjia Song Virginia Tech, Ling Shi Nanyang Technological University, Kailong Wang Huazhong University of Science and Technology, Yuekang Li The University of New South Wales, Yang Liu Nanyang Technological University, Haoyu Wang Huazhong University of Science and Technology
15:30 - 16:00
Coffee BreakSocial Events at Baobá 3
15:30
30m
Coffee break
Break
Social Events

16:00 - 18:00
16:00
18m
Talk
A Deep Dive into Large Language Models for Automated Bug Localization and Repair
Research Papers
Soneya Binta Hossain University of Virginia, Nan Jiang Purdue University, Qiang Zhou Amazon Web Services, Xiaopeng LI Amazon Web Services, Wen-Hao Chiang Amazon Web Services, Yingjun Lyu Amazon Web Services, Hoan Nguyen Amazon Web Services, Omer Tripp Amazon Web Services
DOI
16:18
18m
Talk
CORE: Resolving Code Quality Issues Using LLMs
Research Papers
Nalin Wadhwa Microsoft Research, India, Jui Pradhan Microsoft Research, India, Atharv Sonwane Microsoft Research, India, Surya Prakash Sahu Microsoft Research, India, Nagarajan Natarajan Microsoft Research India, Aditya Kanade Microsoft Research, India, Suresh Parthasarathy Microsoft Research, India, Sriram Rajamani Microsoft Research Indua
16:36
18m
Talk
Towards Effective Multi-Hunk Bug Repair: Detecting, Creating, Evaluating, and Understanding Indivisible Bugs
Research Papers
Qi Xin Wuhan University, Haojun Wu Wuhan University, Jinran Tang Wuhan University, Xinyu Liu Wuhan University, Steven P. Reiss Brown University, Jifeng Xuan Wuhan University
16:54
18m
Talk
ProveNFix: Temporal Property guided Program RepairDistinguished Paper Award
Research Papers
Yahui Song National University of Singapore, Xiang Gao Beihang University, Wenhua Li National University of Singapore, Wei-Ngan Chin National University of Singapore, Abhik Roychoudhury National University of Singapore
DOI Pre-print
17:12
18m
Talk
Towards AI-Assisted Synthesis of Verified Dafny Methods
Research Papers
Md Rakib Hossain Misu University of California Irvine, Crista Lopes University of California Irvine, Iris Ma University of California Irvine, James Noble Independent. Wellington, NZ
DOI Pre-print
17:30
9m
Talk
The Patch Overfitting Problem in Automated Program Repair: Practical Magnitude and a Baseline for Realistic Benchmarking
Ideas, Visions and Reflections
Justyna Petke University College London, Matias Martinez Universitat Politècnica de Catalunya (UPC), Maria Kechagia University College London, Aldeida Aleti Monash University, Federica Sarro University College London
17:39
9m
Talk
Execution-free program repair
Ideas, Visions and Reflections
Bertrand Meyer Constructor Institute Schaffhausen, Li Huang Constructor Institute Schaffhausen, Ilgiz Mustafin Constructor Institute, Manuel Oriol Constructor Institute Schaffhausen
17:48
9m
Talk
ConDefects: A Complementary Dataset to Address the Data Leakage Concern for LLM-based Fault Localization and Program Repair
Demonstrations
Yonghao Wu Beijing University of Chemical Technology, Zheng Li Beijing University of Chemical Technology, Jie M. Zhang King's College London, Yong Liu Beijing University of Chemical Technology
16:00 - 18:00
16:00
18m
Talk
Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers
Research Papers
Dongwei Xiao Hong Kong University of Science and Technology, Zhibo Liu The Hong Kong University of Science and Technology, Qi Pang Carnegie Mellon University, Shuai Wang The Hong Kong University of Science and Technology, Yichen LI Hong Kong University of Science and Technology
16:18
18m
Talk
Mobile Bug Report Reproduction via Global Search on the App UI Model
Research Papers
Zhaoxu Zhang University of Southern California, Fazle Mohammed Tawsif University of Southern California, Komei Ryu University of Southern California, Tingting Yu University of Connecticut, William G.J. Halfond University of Southern California
16:36
18m
Talk
FinHunter: Improved Search-based Test Generation for Structural Testing of FinTech Systems
Industry Papers
Xuanwen Ding East China Normal University, Qingshun Wang East China Normal University, Dan Liu East China Normal University, Lihua Xu New York University Shanghai, Jun Xiao Ant Group Co. Ltd., Bojun Zhang Ant Group Co. Ltd., Xue Li Ant Group Co. Ltd., Liang Dou East China Normal University, Liang He East China Normal University, Tao Xie Peking University
16:54
9m
Talk
Tests4Py: A Benchmark for System Testing
Demonstrations
Marius Smytzek CISPA Helmholtz Center for Information Security, Martin Eberlein Humboldt University of Berlin, Batuhan Serce CISPA Helmholtz Center for Information Security, Lars Grunske Humboldt-Universität zu Berlin, Andreas Zeller CISPA Helmholtz Center for Information Security
Pre-print Media Attached
17:03
9m
Talk
On Polyglot Program Testing
Ideas, Visions and Reflections
Philémon Houdaille DIVERSE Team, IRISA-INRIA, CNRS, Université Rennes 1, Djamel Eddine Khelladi CNRS, IRISA, University of Rennes, Benoit Combemale University of Rennes, Inria, CNRS, IRISA, Gunter Mussbacher McGill University
17:12
9m
Talk
Ctest4J: A Practical Configuration Testing Framework for Java
Demonstrations
Shuai Wang University of Illinois at Urbana-Champaign, Xinyu Lian University of Illinois at Urbana-Champaign, Qingyu Li University of Illinois at Urbana-Champaign, Darko Marinov University of Illinois at Urbana-Champaign, Tianyin Xu University of Illinois at Urbana-Champaign
17:21
9m
Talk
Predicting Test Results without Execution
Ideas, Visions and Reflections
Pre-print
17:30
9m
Talk
Py-holmes: Causal Testing for Deep Neural Networks in Python
Demonstrations
Wren McQueary George Mason University, sadia afrin mim George Mason University, Md Nishat Raihan George Mason University, Justin Smith Lafayette College, Brittany Johnson George Mason University
Pre-print
17:39
9m
Talk
AndroLog: Android Instrumentation and Code Coverage Analysis
Demonstrations
Jordan Samhi CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security
DOI Pre-print
17:48
9m
Talk
PathSpotter: Exploring Tested Paths to Discover Missing Tests
Demonstrations
Pre-print
16:00 - 18:00
16:00
18m
Talk
DyPyBench: A Benchmark of Executable Python Software
Research Papers
Islem BOUZENIA University of Stuttgart, Bajaj Piyush Krishan University of Stuttgart, Michael Pradel University of Stuttgart
16:18
18m
Talk
Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point SlicingDistinguished Paper Award
Research Papers
16:36
18m
Talk
PBE-based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software
Research Papers
Yoel Kim Kyungpook National University, Yunja Choi Kyungpook National University
Pre-print
16:54
18m
Talk
Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence LearningDistinguished Paper Award
Research Papers
Aashish Yadavally University of Texas at Dallas, Yi Li University of Texas at Dallas, Tien N. Nguyen University of Texas at Dallas
Pre-print
17:12
18m
Talk
Checking Complex Source Code-level Constraints using Runtime Verification
Industry Papers
Joshua Heneage Dawes University of Luxembourg, Domenico Bianculli University of Luxembourg
17:30
9m
Talk
XGuard: Detecting Inconsistency Behaviors of Crosschain Bridges
Demonstrations
Ke Wang Peking University, Yue Li Peking University, Che Wang Peking University, China, Jianbo Gao Peking University, Zhi Guan Peking University, Zhong Chen
17:39
9m
Talk
Rapid Taint Assisted Concolic Execution (TACE)
Demonstrations
Ridhi Jain Technology Innovation Institute (TII), Abu Dhabi, UAE, Norbert Tihanyi Technology Innovation Institute, Mthandazo Ndhlovu Technology Innovation Institute, Mohamed Amine Ferrag Technology Innovation Institute, Lucas C. Cordeiro University of Manchester, UK
17:48
9m
Talk
Verification of Programs with Common Fragments
Ideas, Visions and Reflections
Ivan Postolski University of Buenos Aires, Víctor Braberman ICC (UBA-CONICET), Diego Garbervetsky Departamento de Computación, FCEyN, UBA, Sebastian Uchitel Imperial College and University of Buenos Aires
16:00 - 18:00
16:00
18m
Talk
MonitorAssistant: Simplifying Cloud Service Monitoring via Large Language Models
Industry Papers
Zhaoyang Yu Tsinghua University, Minghua Ma Microsoft Research, Chaoyun Zhang Microsoft, Si Qin Microsoft Research, Yu Kang Microsoft Research, Chetan Bansal Microsoft Research, Saravan Rajmohan Microsoft, Yingnong Dang Microsoft Azure, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Dan Pei Tsinghua University, Qingwei Lin Microsoft, Dongmei Zhang Microsoft Research
16:18
18m
Talk
Code-Aware Prompting: A study of Coverage guided Test Generation in Regression Setting using LLM
Research Papers
Gabriel Ryan Columbia University, Siddhartha Jain AWS AI Labs, Mingyue Shang AWS AI Labs, Shiqi Wang AWS AI Labs, Xiaofei Ma AWS AI Labs, Murali Krishna Ramanathan AWS AI Labs, Baishakhi Ray Columbia University, New York; AWS AI Lab
16:36
18m
Talk
A Machine Learning-Based Error Mitigation Approach for Reliable Software Development on IBM’s Quantum Computers
Industry Papers
Asmar Muqeet Simula Research Laboratory and University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Tao Yue Beihang University, Paolo Arcaini National Institute of Informatics
16:54
18m
Talk
Multi-line AI-assisted Code Authoring
Industry Papers
Omer Dunay Meta Platforms, Inc., Daniel Cheng Meta Platforms Inc., Adam Tait Meta Platforms, Inc., Parth Thakkar Meta Platforms, Inc., Peter C Rigby Meta / Concordia University, Andy Chiu Meta Platforms, Inc., Imad Ahmad Meta Platforms, Inc., Arun Ganesan Meta Platforms, Inc., Chandra Sekhar Maddila Meta Platforms, Inc., Vijayaraghavan Murali Meta Platforms Inc., Ali Tayyebi Meta Platforms Inc., Nachiappan Nagappan Meta Platforms, Inc.
17:12
18m
Talk
Combating Missed Recalls in E-commerce Search: a CoT-prompting Testing Approach
Industry Papers
Shengnan Wu School of Computer Science, Fudan University, Yongxiang Hu Fudan University, Yingchuan Wang School of Computer Science, Fudan University, Jiazhen Gu The Chinese University of Hong Kong, Jin Meng Meituan Inc., Liujie Fan Meituan Inc., Zhongshi Luan Meituan Inc., Xin Wang Fudan University, Yangfan Zhou Fudan University
17:30
18m
Talk
An Empirically Grounded Path Forward for Scenario-based Testing of Autonomous Driving Systems
Industry Papers
Qunying Song Lund University, Emelie Engstrom Lund University, Per Runeson Lund University
17:48
9m
Talk
ChatUniTest: A Framework for LLM-based Test Generation
Demonstrations
Yinghao Chen Zhejiang University, Zehao Hu Zhejiang University, Chen Zhi Zhejiang University, Junxiao Han , Shuiguang Deng Zhejiang University; Alibaba-Zhejiang University Joint Institute of Frontier Technologies, Jianwei Yin Zhejiang University
16:00 - 18:00
Fault Diagnosis and Root Cause Analysis 1Research Papers / Industry Papers at Baobá 8
16:00
18m
Talk
A Quantitative and Qualitative Evaluation of LLM-based Explainable Fault Localization
Research Papers
Sungmin Kang Korea Advanced Institute of Science and Technology, Gabin An Korea Advanced Institute of Science and Technology, Shin Yoo Korea Advanced Institute of Science and Technology
Pre-print
16:18
18m
Talk
BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection
Research Papers
Luan Pham RMIT University, Huong Ha RMIT University, Hongyu Zhang Chongqing University
Pre-print
16:36
18m
Talk
Fault Diagnosis for Test Alarms in Microservices Through Multi-source Data
Industry Papers
Shenglin Zhang Nankai University, Jun Zhu Nankai University, Bowen Hao Nankai University, Yongqian Sun Nankai University, Xiaohui Nie CNIC, CAS, Jingwen Zhu Nankai University, Xilin Liu Huawei Cloud, Xiaoqian Li Huawei Cloud, Yuchi Ma Huawei Cloud Computing Technologies CO., LTD., Dan Pei Tsinghua University
16:54
18m
Talk
Costs and Benefits of Machine Learning Software Defect Prediction: Industrial Case Study
Industry Papers
Szymon Stradowski Wroclaw University of Science and Technology & NOKIA, Lech Madeyski Wroclaw University of Science and Technology
17:12
18m
Talk
Chain-of-Event: Interpretable Root Cause Analysis for Microservices through Automatically Learning Weighted Event Causal Graph
Industry Papers
Yao Zhenhe Tsinghua University, Changhua Pei Computer Network Information Center at Chinese Academy of Sciences, Wenxiao Chen Tsinghua University, Hanzhang Wang Walmart Global Tech, Liangfei Su eBay, USA, Huai Jiang eBay, USA, Zhe Xie Tsinghua University, Xiaohui Nie CNIC, CAS, Dan Pei Tsinghua University
17:30
18m
Talk
ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems
Research Papers
Guangba  Yu Sun Yat-sen University, Pengfei Chen Sun Yat-sen University, Zilong He Sun Yat-sen University, Qiuyu Yan Tencent, Yu Luo Tencent, Fangyuan Li Tencent, Zibin Zheng Sun Yat-sen University
DOI Pre-print
18:15 - 19:30
SIGSOFT Townhall SessionSocial Events at Plenary Hall
Chair(s): Thomas Zimmermann Microsoft Research
18:15
75m
Meeting
SIGSOFT Townhall Session
Social Events

Thu 18 Jul

Displayed time zone: Brasilia, Distrito Federal, Brazil change

10:30 - 11:00
Coffee BreakSocial Events at Baobá 3
10:30
30m
Coffee break
Break
Social Events

11:00 - 12:30
Human Aspects 2Research Papers at Baobá 1
11:00
18m
Talk
Can GPT-4 Replicate Empirical Software Engineering Research?
Research Papers
Jenny T. Liang Carnegie Mellon University, Carmen Badea Microsoft Research, Christian Bird Microsoft Research, Robert DeLine Microsoft Research, Denae Ford Microsoft Research, Nicole Forsgren Microsoft Research, Thomas Zimmermann Microsoft Research
Pre-print
11:18
18m
Talk
Do Code Generation Models Think Like Us? - A Study of Attention Alignment between Large Language Models and Human Programmers
Research Papers
Bonan Kou Purdue University, Shengmai Chen Purdue University, Zhijie Wang University of Alberta, Lei Ma The University of Tokyo & University of Alberta, Tianyi Zhang Purdue University
Pre-print
11:36
18m
Talk
Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion
Research Papers
Md Shamimur Rahman University of Saskatchewan, Canada, Zadia Codabux University of Saskatchewan, Chanchal K. Roy University of Saskatchewan, Canada
11:54
18m
Talk
Effective Teaching through Code Reviews: Patterns and Anti-Patterns
Research Papers
Anita Sarma Oregon State University, Nina Chen Google
12:12
18m
Talk
An empirical study on code review activity prediction in practice
Research Papers
Doriane Olewicki Queen's University, Sarra Habchi Ubisoft Montréal, Bram Adams Queen's University
Pre-print
11:00 - 12:30
Program Analysis and Performance 2Research Papers at Baobá 2
11:00
18m
Talk
Adapting Multi-objectivized Software Configuration Tuning
Research Papers
Tao Chen University of Birmingham, Miqing Li University of Birmingham
Pre-print
11:18
18m
Talk
Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions?
Research Papers
Madeline Endres University of Michgain, Sarah Fakhoury Microsoft Research, Saikat Chakraborty Microsoft Research, Shuvendu Lahiri Microsoft Research
11:36
18m
Talk
Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit
Research Papers
Matteo Paltenghi University of Stuttgart, Michael Pradel University of Stuttgart
Pre-print
11:54
18m
Talk
Abstraction-Aware Inference of Metamorphic Relations
Research Papers
Agustin Nolasco University of Rio Cuarto, Facundo Molina IMDEA Software Institute, Renzo Degiovanni Luxembourg Institute of Science and Technology, Alessandra Gorla IMDEA Software Institute, Diego Garbervetsky Departamento de Computación, FCEyN, UBA, Mike Papadakis University of Luxembourg, Sebastian Uchitel Imperial College and University of Buenos Aires, Nazareno Aguirre University of Rio Cuarto and CONICET, Marcelo F. Frias Dept. of Software Engineering Instituto Tecnológico de Buenos Aires
12:12
18m
Talk
Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning
Research Papers
Jingzhi Gong Loughborough University, Tao Chen University of Birmingham
Pre-print
11:00 - 12:30
11:00
18m
Talk
State Reconciliation Defects in Infrastructure as Code
Research Papers
Md Mahadi Hassan Auburn University, John Salvador Auburn University, Shubhra Kanti Karmaker Santu Auburn University, Akond Rahman Auburn University
Pre-print
11:18
18m
Talk
Understanding and Detecting Annotation-induced Faults of Static Analyzers
Research Papers
Huaien Zhang The Hong Kong Polytechnic University, Southern University of Science and Technology, Yu Pei The Hong Kong Polytechnic University, Shuyun Liang Southern University of Science and Technology, Shin Hwei Tan Concordia University
11:36
18m
Talk
Practitioners' Challenges and Perceptions of CI Build Failure Predictions at Atlassian
Industry Papers
Yang Hong Monash University, Kla Tantithamthavorn Monash University, Jirat Pasuksmit Atlassian, Patanamon Thongtanunam University of Melbourne, Arik Friedman Atlassian, Xing Zhao Atlassian, Anton Krasikov Atlassian
11:54
18m
Talk
What Makes a Code Review Useful to OpenDev Developers? An Empirical Investigation
Journal First
Asif Kamal Turzo Wayne State University, Amiangshu Bosu Wayne State University
12:12
9m
Talk
Reproducibility Debt: Challenges and Future Pathways
Ideas, Visions and Reflections
Zara Hassan Australian National University, Christoph Treude Singapore Management University, Michael Norrish Australian National University, Graham Williams Australian National University, Alex Potanin Australian National University
12:21
9m
Talk
Automating Issue Reporting in Software Testing: Lessons Learned from Using the Template Generator Tool
Industry Papers
Lennon Chaves SIDIA Institute of Science and Technology, Flávia Oliveira Sidia Institute of Science and Technology, Leonardo Tiago Sidia Institute of Science and Technology
11:00 - 12:30
Software Maintenance and Comprehension 2Research Papers at Baobá 6
11:00
18m
Talk
Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis
Research Papers
Georgios-Petros Drosos ETH Zurich, Thodoris Sotiropoulos ETH Zurich, Diomidis Spinellis Athens University of Economics and Business & Delft University of Technology, Dimitris Mitropoulos University of Athens
Pre-print
11:18
18m
Talk
Characterizing Python Library Migrations
Research Papers
Mohayeminul Islam University of Alberta, Ajay Jha North Dakota State University, Ildar Akhmetov Northeastern University, Sarah Nadi New York University Abu Dhabi, University of Alberta
11:36
18m
Talk
PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages
Research Papers
Kai Gao Peking University, Weiwei Xu Peking University, Wenhao Yang Peking University, Minghui Zhou Peking University
DOI Pre-print
11:54
18m
Talk
Refactoring to Pythonic Idioms: A Hybrid Knowledge-Driven Approach Leveraging Large Language Models
Research Papers
zejun zhang Australian National University, Zhenchang Xing CSIRO's Data61, Xiaoxue Ren Zhejiang University, Qinghua Lu Data61, CSIRO, Xiwei (Sherry) Xu Data61, CSIRO
12:12
18m
Talk
Dependency-Induced Waste in Continuous Integration: An Empirical Study of Unused Dependencies in the NPM Ecosystem
Research Papers
Nimmi Weeraddana University of Waterloo, Mahmoud Alfadel University of Waterloo, Shane McIntosh University of Waterloo
DOI Pre-print
12:30 - 14:00
FSE'25 PC MeetingSocial Events at Baobá 8
Chair(s): Denys Poshyvanyk William & Mary, Dongmei Zhang Microsoft Research
12:30
90m
Meeting
FSE'25 PC Meeting
Social Events

12:30 - 14:00
12:30
90m
Lunch
Lunch
Social Events

14:00 - 15:30
14:00
18m
Talk
Harnessing Neuron Stability to Improve DNN Verification
Research Papers
Hai Duong George Mason University, Dong Xu University of Virginia, ThanhVu Nguyen George Mason University, Matthew B Dwyer University of Virginia
14:18
18m
Talk
MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions
Research Papers
Ying Xiao Southern University of Science and Technology, Jie M. Zhang King's College London, Yepang Liu Southern University of Science and Technology, Mohammad Reza Mousavi King's College London, Sicen Liu Southern University of Science and Technology, Dingyuan Xue Southern University of Science and Technology
14:36
9m
Talk
Using Run-time Information to Enhance Static Analysis of Machine Learning Code in Notebooks
Ideas, Visions and Reflections
Yiran Wang Linköping University, José Antonio Hernández López Linkoping University, Ulf Nilsson Linköping University, Daniel Varro Linköping University / McGill University
14:45
9m
Talk
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications
Ideas, Visions and Reflections
Quan Zhang Tsinghua University, Binqi Zeng Central South University, Chijin Zhou Tsinghua University, Gwihwan Go Tsinghua University, Heyuan Shi Central South University, Yu Jiang Tsinghua University
14:54
18m
Talk
DeepGD: A Multi-Objective Black-Box Test Selection Approach for Deep Neural Networks
Journal First
Zohreh Aghababaeyan The School of EECS, University of Ottawa, Manel Abdellatif Software and Information Technology Engineering Department, École de Technologie Supérieure, Mahboubeh Dadkhah The School of EECS, University of Ottawa, Lionel Briand University of Ottawa, Canada; Lero centre, University of Limerick, Ireland
15:12
9m
Talk
ModelFoundry: A Tool for DNN Modularization and On-demand Model Reuse Inspired by the Wisdom of Software Engineering
Demonstrations
Xiaohan Bi Beihang University, Ruobing Zhao Beihang University, Binhang Qi Beihang University, Hailong Sun Beihang University, Xiang Gao Beihang University, Yue Yu National University of Defense Technology, Xiaojun Liang PengCheng Lab
14:00 - 15:30
14:00
18m
Talk
Investigating Documented Privacy Changes in Android OS
Research Papers
Chuan Yan University of Queensland, Mark Huasong Meng National University of Singapore, Fuman Xie University of Queensland, Guangdong Bai University of Queensland
14:18
9m
Talk
A Preliminary Study on the Privacy Concerns of Using IP Addresses in Log Data
Ideas, Visions and Reflections
Issam Sedki Concordia University
14:27
9m
Talk
Personal Data-Less Personalized Software Applications
Ideas, Visions and Reflections
Sana Belguith University of Bristol, Inah Omoronyia University of Bristol, Ruzanna Chitchyan University of Bristol
14:36
18m
Talk
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-coded Credentials
Research Papers
Yizhan Huang The Chinese University of Hong Kong, Yichen LI The Chinese University of Hong Kong, Weibin Wu Sun Yat-sen University, Jianping Zhang The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
14:54
18m
Talk
Unveil the Mystery of Critical Software Vulnerabilities
Industry Papers
Shengyi Pan Zhejiang University, Lingfeng Bao Zhejiang University, Jiayuan Zhou Huawei, Xing Hu Zhejiang University, Xin Xia Huawei Technologies, Shanping Li Zhejiang University
15:12
9m
Talk
AgraBOT: Accelerating Third-Party Security Risk Management in Enterprise Setting
Industry Papers
Mert Toslali IBM Research, Edward Snible IBM Research, Jing Chen IBM Research, Alan Cha IBM Research, USA, Sandeep Singh IBM, Michael Kalantar IBM Research, Srinivasan Parthasarathy IBM Research
14:00 - 15:30
14:00
18m
Talk
Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications
Research Papers
Dhanushka Jayasuriya University of Auckland, Valerio Terragni University of Auckland, Jens Dietrich Victoria University of Wellington, Kelly Blincoe University of Auckland
14:18
18m
Talk
How Well Industry-level Cause Bisection Works in Real-world - A Study on Linux Kernel
Industry Papers
Kangzheng Gu Fudan University, Yuan Zhang Fudan University, Jiajun Cao Fudan University, Xin Tan Fudan University, Min Yang Fudan University
14:36
18m
Talk
Analyzing the BizDev Interface in an Enterprise Context: A Case of Developers Acting in Business
Journal First
Breno de França UNICAMP, Caique Moreira Instituto de Computação - Universidade Estadual de Campinas, Tayana Conte Universidade Federal do Amazonas
14:54
18m
Talk
Silent Bugs in Deep Learning Frameworks: An Empirical Study of Keras and TensorFlow
Journal First
Florian Tambon Polytechnique Montréal, Amin Nikanjam École Polytechnique de Montréal, Le An Polytechnique Montreal, Foutse Khomh Polytechnique Montréal, Giuliano Antoniol Polytechnique Montréal
Link to publication DOI Authorizer link
15:12
18m
Talk
AROMA: Automatic Reproduction of Maven Artifacts
Research Papers
Mehdi Keshani Delft University of Technology, Tudor-Gabriel Velican Delft University of Technology, Gideon Bot Delft University of Technology, Sebastian Proksch Delft University of Technology
14:00 - 15:30
Software Maintenance and Comprehension 3Research Papers / Journal First at Baobá 6
14:00
18m
Talk
Revealing Software Development Work Patterns with PR-Issue Graph Topologies
Research Papers
Cleidson de Souza Federal University of Pará, Brazil, Emilie Ma University of British Columbia, Jesse Wong University of British Columbia, Dongwook Yoon University of British Columbia, Ivan Beschastnikh University of British Columbia
14:18
18m
Talk
Using acceptance tests to predict merge conflict risk
Journal First
Thaís Rocha UFAPE - Universidade Federal do Agreste de Pernambuco, Paulo Borba Federal University of Pernambuco
14:36
18m
Talk
Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions
Research Papers
Tao Xiao Nara Institute of Science and Technology, Hideaki Hata Shinshu University, Christoph Treude Singapore Management University, Kenichi Matsumoto Nara Institute of Science and Technology
Pre-print Media Attached
14:54
18m
Talk
SimLLM: Measuring Semantic Similarity in Code Summaries Using a Large Language Model-Based Approach
Research Papers
Xin Jin Meta, Zhiqiang Lin The Ohio State University
15:12
18m
Talk
Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations
Research Papers
David Broneske DZHW Hannover, Germany, Sebastian Kittan Otto-von-Guericke Unviersity Magdeburg, Germany, Jacob Krüger Eindhoven University of Technology
15:30 - 16:00
Coffee BreakSocial Events at Baobá 3
15:30
30m
Coffee break
Break
Social Events

16:00 - 18:00
16:00
18m
Talk
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models
Research Papers
Yan Wang Central University of Finance and Economics, Xiaoning Li Central University of Finance and Economics, Tien N. Nguyen University of Texas at Dallas, Shaohua Wang Central University of Finance and Economics, Chao Ni School of Software Technology, Zhejiang University, Ling Ding Central University of Finance and Economics
16:18
18m
Talk
On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software
Research Papers
Ophir Carmel The Hebrew University of Jerusalem, Guy Katz The Hebrew University of Jerusalem
16:36
9m
Talk
GAISSALabel: A tool for energy labeling of ML models
Demonstrations
Pau Duran Universitat Politècnica de Catalunya (UPC), Joel Castaño Fernández Universitat Politècnica de Catalunya (UPC), Cristina Gómez Universitat Politècnica de Catalunya, Silverio Martínez-Fernández UPC-BarcelonaTech
Link to publication Pre-print
16:45
9m
Talk
Decide: Knowledge-based Version Incompatibility Detection in Deep Learning Stacks
Demonstrations
Zihan Zhou The University of Hong Kong, Zhongkai Zhao National University of Singapore, Bonan Kou Purdue University, Tianyi Zhang Purdue University
16:54
18m
Talk
Test input prioritization for Machine Learning Classifiers
Journal First
Xueqi Dang University of Luxembourg, Yinghua LI University of Luxembourg, Mike Papadakis University of Luxembourg, Jacques Klein University of Luxembourg, Tegawendé F. Bissyandé University of Luxembourg, Yves Le Traon University of Luxembourg, Luxembourg
17:12
18m
Talk
How Far Are We with Automated Machine Learning? Characterization and Challenges of AutoML Toolkits
Journal First
Md Abdullah Al Alamin University of Calgary, Gias Uddin York University, Canada
16:00 - 18:00
16:00
18m
Talk
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators
Research Papers
Jinyin Chen Zhejiang University of Technology, Chengyu Jia Zhejiang University of Technology, Yunjie Yan Zhejiang University of Technology, Jie Ge Zhejiang University of Technology, haibin zheng Zhejiang University of Technology, Yao Cheng TÜV SÜD Asia Pacific Pte. Ltd.
16:18
18m
Talk
Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles
Research Papers
weigang he East China Normal University / University of Technology Sydney, Peng Di Ant Group, Mengli Ming East China Normal University, Chengyu Zhang ETH Zurich, Ting Su East China Normal University, Shijie Li Ant Group, Yulei Sui UNSW
16:36
18m
Talk
Search-based Software Testing Driven by Automatically Generated and Manually Defined Fitness Functions
Journal First
Federico Formica McMaster University, Tony Fan McMaster University, Claudio Menghi University of Bergamo; McMaster University
16:54
9m
Talk
Monitoring the Execution of 14K Tests: Methods Tend to Have One Path that Is Significantly More Executed
Ideas, Visions and Reflections
Pre-print
17:03
9m
Talk
MineCPP: Mining Bug Fix Pairs and Their Structures
Demonstrations
Sai Krishna Avula IIT Gandhinagar, Shouvick Mondal IIT Gandhinagar, India
DOI Pre-print Media Attached
17:12
9m
Talk
ExLi : An Inline-Test Generation Tool for Java
Demonstrations
Yu Liu University of Texas at Austin, Aditya Thimmaiah The University of Texas at Austin, Owolabi Legunsen Cornell University, Milos Gligoric The University of Texas at Austin
17:21
9m
Talk
Testing Learning-Enabled Cyber-Physical Systems with Large-Language Models: A Formal Approach
Ideas, Visions and Reflections
Xi Zheng Macquarie University, Aloysius K. Mok University of Texas at Austin, Ruzica Piskac Yale University, Yong Jae Lee University of Wisconsin Madison, Bhaskar Krishnamachari University of Southern California, Dakai Zhu The University of Texas at San Antonio, Oleg Sokolsky University of Pennsylvania, USA, Insup Lee University of Pennsylvania
17:30
9m
Talk
Test Polarity: Detecting Positive and Negative Tests
Ideas, Visions and Reflections
Pre-print
17:39
9m
Talk
ATheNA-S: a Testing Tool for Simulink Models Driven by Software Requirements and Domain Expertise
Demonstrations
Federico Formica McMaster University, Mohammad Mahdi Mahboob McMaster University, Mehrnoosh Askarpour McMaster University, Claudio Menghi University of Bergamo; McMaster University
16:00 - 18:00
Log Analysis and DebuggingResearch Papers / Industry Papers at Baobá 4
16:00
18m
Talk
Go Static: Contextualized Logging Statement Generation
Research Papers
Yichen LI The Chinese University of Hong Kong, Yintong Huo The Chinese University of Hong Kong, Renyi Zhong The Chinese University of Hong Kong, Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu The Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Jiazhen Gu The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Michael Lyu The Chinese University of Hong Kong
16:18
18m
Talk
DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing
Research Papers
Sabaat Haroon Virginia tech, Chris Brown Virginia Tech, Muhammad Ali Gulzar Virginia Tech
16:36
18m
Talk
DTD: Comprehensive and Scalable Testing for Debuggers
Research Papers
Hongyi Lu Southern University of Science and Technology/Hong Kong University of Science and Technology, Zhibo Liu The Hong Kong University of Science and Technology, Shuai Wang The Hong Kong University of Science and Technology, Fengwei Zhang Southern University of Science and Technology
16:54
9m
Talk
Decoding Anomalies! Unraveling Operational Challenges in Human-in-the-Loop Anomaly Validation
Industry Papers
Dong Jae Kim Concordia University, Dong Jae Kim Concordia University, Tse-Hsun (Peter) Chen Concordia University, Dong Jae Kim Concordia University, Dong Jae Kim Concordia University, Dong Jae Kim Concordia University, Dong Jae Kim Concordia University
17:03
18m
Talk
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques
Research Papers
Max Landauer AIT Austrian Institute of Technology, Florian Skopik AIT Austrian Institute of Technology, Markus Wurzenberger AIT Austrian Institute of Technology
17:21
18m
Research paper
LILAC: Log Parsing using LLMs with Adaptive Parsing Cache
Research Papers
Zhihan Jiang The Chinese University of Hong Kong, Jinyang Liu The Chinese University of Hong Kong, Zhuangbin Chen School of Software Engineering, Sun Yat-sen University, Yichen LI The Chinese University of Hong Kong, Junjie Huang The Chinese University of Hong Kong, Yintong Huo The Chinese University of Hong Kong, Pinjia He Chinese University of Hong Kong, Shenzhen, Jiazhen Gu The Chinese University of Hong Kong, Michael Lyu The Chinese University of Hong Kong
DOI Pre-print
17:39
18m
Talk
TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime StateDistinguished Paper Award
Research Papers
Haiyu Huang Sun Yat-sen University, Xiaoyu Zhang HUAWEI CLOUD COMPUTING TECHNOLOGIES CO. LTD., Pengfei Chen Sun Yat-sen University, Zilong He Sun Yat-sen University, Zhiming Chen Sun Yat-sen University, Guangba  Yu Sun Yat-sen University, Hongyang Chen Sun Yat-sen University, Chen Sun Huawei
Pre-print
16:00 - 18:00
16:00
18m
Talk
Rethinking Software Engineering in the Era of Foundation Models
Industry Papers
Ahmed E. Hassan Queen’s University, Dayi Lin Centre for Software Excellence, Huawei Canada, Gopi Krishnan Rajbahadur Centre for Software Excellence, Huawei, Canada, Keheliya Gallaba Centre for Software Excellence, Huawei Canada, Filipe Cogo Centre for Software Excellence, Huawei Canada, Boyuan Chen Centre for Software Excellence, Huawei Canada, Haoxiang Zhang Huawei, Kishanthan Thangarajah Centre for Software Excellence, Huawei Canada, Gustavo Oliva Centre for Software Excellence, Huawei Canada, Jiahuei (Justina) Lin Centre for Software Excellence, Huawei Canada, Wali Mohammad Abdullah Centre for Software Excellence, Huawei Canada, Zhen Ming (Jack) Jiang York University
16:18
18m
Talk
LM-PACE: Confidence Estimation by Large Language Models for Effective Root Causing of Cloud Incidents
Industry Papers
Shizhuo Zhang University of Illinois Urbana-Champaign, Xuchao Zhang Microsoft, Chetan Bansal Microsoft Research, Pedro Las-Casas Microsoft, Rodrigo Fonseca Microsoft Research, Saravan Rajmohan Microsoft
16:36
18m
Talk
Application of Quantum Extreme Learning Machines for QoS Prediction of Elevators' Software in an Industrial Context
Industry Papers
Xinyi Wang Simula Research Laboratory and University of Oslo, Shaukat Ali Simula Research Laboratory and Oslo Metropolitan University, Aitor Arrieta Mondragon University, Paolo Arcaini National Institute of Informatics , Maite Arratibel Orona
16:54
18m
Talk
X-lifecycle Learning for Cloud Incident Management using LLMs
Industry Papers
Drishti Goel Microsoft, Fiza Husain Microsoft, Aditya Kumar Singh Microsoft, Supriyo Ghosh Microsoft, Anjaly Parayil Microsoft, Chetan Bansal Microsoft Research, Xuchao Zhang Microsoft, Saravan Rajmohan Microsoft
17:12
18m
Talk
Neat: Mobile App Layout Similarity Comparison based on Graph Convolutional Networks
Industry Papers
Zhu Tao ByteDance, Yongqiang Gao ByteDance, Jiayi Qi ByteDance, Chao Peng ByteDance, China, Qinyun Wu Bytedance Ltd., Xiang Chen ByteDance, Ping Yang Bytedance Network Technology
17:30
18m
Talk
Transformers and Meta-Tokenization in Sentiment Analysis for Software Engineering
Journal First
Nathan Cassee Eindhoven University of Technology, Andrei Agaronian Eindhoven University of Technology, Eleni Constantinou University of Cyprus, Nicole Novielli University of Bari, Alexander Serebrenik Eindhoven University of Technology
17:48
9m
Talk
EM-Assist: Safe automated ExtractMethod refactoring with LLMs
Demonstrations
Dorin Pomian University of Colorado Boulder, Abhiram Bellur University of Colorado Boulder, Malinda Dilhara University of Colorado Boulder, Zarina Kurbatova JetBrains Research, Egor Bogomolov JetBrains Research, Andrey Sokolov JetBrains Research, Timofey Bryksin JetBrains Research, Danny Dig University of Colorado Boulder, JetBrains Research
Pre-print
16:00 - 18:00
16:00
18m
Talk
Dodrio: Parallelizing Taint Analysis Based Fuzzing via Redundancy-Free Scheduling
Industry Papers
Jie Liang , Mingzhe Wang Tsinghua University, Chijin Zhou Tsinghua University, Zhiyong Wu Tsinghua University, China, Jianzhong Liu ShanghaiTech University, Yu Jiang Tsinghua University
16:18
18m
Talk
Evolutionary Generative Fuzzing for Differential Testing of the Kotlin Compiler
Industry Papers
Călin Georgescu Delft University of Technology, Mitchell Olsthoorn Delft University of Technology, Pouria Derakhshanfar JetBrains Research, Marat Akhin JetBrains Research, Annibale Panichella Delft University of Technology
16:36
18m
Talk
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
Research Papers
Tae Eun Kim KAIST, Jaeseung Choi Sogang University, Seongjae Im KAIST, Kihong Heo KAIST, Sang Kil Cha KAIST
16:54
9m
Talk
When Fuzzing Meets LLMs: Challenges and Opportunities
Ideas, Visions and Reflections
Yu Jiang Tsinghua University, Jie Liang , Fuchen Ma Tsinghua University, Yuanliang Chen Tsinghua University, Chijin Zhou Tsinghua University, Yuheng Shen Tsinghua University, Zhiyong Wu Tsinghua University, China, Jingzhou Fu Tsinghua University, Mingzhe Wang Tsinghua University, Shanshan Li National University of Defense Technology, Quan Zhang Tsinghua University
Pre-print
17:03
9m
Talk
Look Ma, No Input Samples! Mining Input Grammars from Code with Symbolic Parsing
Ideas, Visions and Reflections
Leon Bettscheider CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security
17:12
9m
Talk
VinJ: An Automated Tool for Large-Scale Software Vulnerability Data Generation
Demonstrations
Yu Nong Washington State University, Haoran Yang Washington State University, Feng Chen University of Texas at Dallas, Haipeng Cai Washington State University
DOI Pre-print Media Attached
17:21
9m
Talk
ASAC: A Benchmark for Algorithm Synthesis
Demonstrations
Zhao Zhang Peking University, Yican Sun Peking University, Ruyi Ji Peking University, Siyuan Li Peking University, Xuanyu Peng Peking University, Zhechong Huang Peking University, Sizhe Li Peking University, Tianran Zhu Peking University, Yingfei Xiong Peking University
17:30
18m
Talk
The Human Side of Fuzzing: Challenges Faced by Developers During Fuzzing Activities
Journal First
Olivier Nourry Kyushu University, Yutaro Kashiwa Nara Institute of Science and Technology, Bin Lin Radboud University, Gabriele Bavota Software Institute @ Università della Svizzera Italiana, Michele Lanza Software Institute - USI, Lugano, Yasutaka Kamei Kyushu University

Fri 19 Jul

Displayed time zone: Brasilia, Distrito Federal, Brazil change

10:30 - 11:00
Coffee BreakSocial Events at Baobá 3
10:30
30m
Coffee break
Break
Social Events

11:00 - 12:30
11:00
18m
Talk
Exploring Hybrid Work Realities: A Case Study with Software Professionals From Underrepresented Groups
Industry Papers
Ronnie de Souza Santos University of Calgary, Cleyton Magalhaes Universidade Federal Rural de Pernambuco, Robson T. de Souza Santos UNINASSAU, Jorge Correia-Neto Universidade Federal Rural de Pernambuco
11:18
18m
Talk
Rocks Coding, Not Development–A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks
Research Papers
Wei Wang Beijing University of Posts and Telecommunications, Huilong Ning Beijing University of Posts and Telecommunications, Gaowei Zhang Beijing University of Posts and Telecommunications, Libo Liu School of Computing and Information Systems, University of Melbourne, Yi Wang Beijing University of Posts and Telecommunications
11:36
18m
Talk
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice
Research Papers
Ranim Khojah Chalmers | University of Gothenburg, Mazen Mohamad Chalmers | RISE - Research Institutes of Sweden, Philipp Leitner Chalmers | University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg
11:54
18m
Talk
How to Gain Commit Rights in Modern Top Open Source Communities?
Research Papers
Xin Tan Beihang University, Yan Gong Beihang University, Geyu Huang Beihang University, Haohua Wu Beihang University, Li Zhang Beihang University
DOI Pre-print
12:12
18m
Talk
How does Simulation-based Testing for Self-driving Cars match Human Perception?
Research Papers
Christian Birchler Zurich University of Applied Sciences & University of Bern, Tanzil Kombarabettu Mohammed University of Zurich, Pooja Rani University of Zurich, Teodora Nechita Zurich University of Applied Sciences, Timo Kehrer University of Bern, Sebastiano Panichella Zurich University of Applied Sciences
11:00 - 12:30
11:00
18m
Talk
Partial Solution Based Constraint Solving Cache in Symbolic Execution
Research Papers
Ziqi Shuai School of Computer, National University of Defense Technology, China, Zhenbang Chen School of Computer, National University of Defense Technology, China, Kelin Ma School of Computer, National University of Defense Technology, China, Kunlin Liu School of Computer, National University of Defense Technology, China, Yufeng Zhang Hunan University, Jun Sun School of Information Systems, Singapore Management University, Singapore, Ji Wang School of Computer, National University of Defense Technology, China
Pre-print
11:18
18m
Talk
Java JIT Testing with Template Extraction
Research Papers
Zhiqiang Zang The University of Texas at Austin, Fu-Yao Yu The University of Texas at Austin, Aditya Thimmaiah The University of Texas at Austin, August Shi The University of Texas at Austin, Milos Gligoric The University of Texas at Austin
11:36
18m
Talk
Natural Symbolic Execution-based Testing for Big Data Analytics
Research Papers
Yaoxuan Wu UCLA, Ahmad Humayun Virginia Tech, Muhammad Ali Gulzar Virginia Tech, Miryung Kim UCLA and Amazon Web Services
Pre-print
11:54
18m
Talk
MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems
Research Papers
Xiaoyan Zhu Zhejiang Sci-Tech University, Mingyue Jiang Zhejiang Sci-Tech University, Xiao-Yi Zhang University of Science and Technology Beijing, Liming Nie Nanyang Technological University, Zuohua Ding Zhejiang Sci-Tech University
12:12
18m
Talk
Property-based Testing for Validating User Privacy-Related Functionalities in Social Media Apps
Industry Papers
Jingling Sun University of Electronic Science and Technology of China, Ting Su East China Normal University, Jun Sun School of Information Systems, Singapore Management University, Singapore, Jianwen Li East China Normal University, China, Mengfei Wang ByteDance, Geguang Pu East China Normal University, China
11:00 - 12:30
11:00
18m
Talk
Come for syntax, stay for speed, understand defects: An Empirical Study of Defects in Julia Programs
Journal First
Akond Rahman Auburn University, Dibyendu Brinto Bose Graduate Student, Raunak Shakya Mineral Worths, Rahul Pandita GitHub, Inc.
Link to publication DOI Authorizer link Pre-print
11:18
18m
Talk
Understanding Developers' Discussions and Perceptions on Non-Functional Requirements: The Case of the Spring EcosystemDistinguished Paper Award
Research Papers
Anderson Oliveira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), João Lucas Correia Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Wesley Assunção North Carolina State University, Juliana Alves Pereira Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Rafael de Mello Federal University of Rio de Janeiro (UFRJ), Daniel Coutinho Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Caio Barbosa Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Paulo Vítor C. F. Libório Pontifical Catholic University of Rio de Janeiro (PUC-Rio), Alessandro Garcia Pontifical Catholic University of Rio de Janeiro (PUC-Rio)
DOI Pre-print
11:36
18m
Talk
Leveraging Large Language Models for the Auto-remediation of Microservice Applications - An Experimental Study
Industry Papers
Komal Sarda York University, Zakeya Namrud York University, Marin Litoiu York University, Canada, Larisa Shwartz IBM T.J. Watson Research, Ian Watts IBM Canada
11:54
18m
Talk
An Empirical Study of Task Infections in Ansible Scripts
Journal First
Akond Rahman Auburn University, Dibyendu Brinto Bose Graduate Student, Yue Zhang Auburn University, Rahul Pandita GitHub, Inc.
Link to publication Authorizer link Pre-print
12:12
9m
Talk
Automated End-to-End Dynamic Taint Analysis for WhatsApp
Industry Papers
11:00 - 12:30
11:00
18m
Talk
Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge DistillationDistinguished Paper Award
Research Papers
Oussama Ben Sghaier DIRO, Université de Montréal, Houari Sahraoui DIRO, Université de Montréal
11:18
18m
Talk
Learning to Detect and Localize Multilingual Bugs
Research Papers
Haoran Yang Washington State University, Yu Nong Washington State University, Tao Zhang Macau University of Science and Technology, Xiapu Luo The Hong Kong Polytechnic University, Haipeng Cai Washington State University
DOI Pre-print
11:36
18m
Talk
Mining Action Rules for Defect Reduction Planning
Research Papers
Khouloud Oueslati Polytechnique Montréal, Canada, Gabriel Laberge Polytechnique Montréal, Canada, Maxime Lamothe Polytechnique Montreal, Foutse Khomh Polytechnique Montréal
11:54
18m
Talk
Predicting Failures of Autoscaling Distributed Applications
Research Papers
Giovanni Denaro University of Milano - Bicocca, Noura El Moussa USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Rahim Heydarov USI Università della Svizzera Italiana, Francesco Lomio SIT Schaffhausen Institute of Technology, Mauro Pezze USI Università della Svizzera Italiana & SIT Schaffhausen Institute of Technology, Ketai Qiu USI Università della Svizzera Italiana
DOI Pre-print
12:12
18m
Talk
RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction
Research Papers
Gengyi Sun University of Waterloo, Sarra Habchi Ubisoft Montréal, Shane McIntosh University of Waterloo
12:30 - 14:00
12:30
90m
Lunch
Lunch
Social Events

14:00 - 15:30
Program Analysis and Performance 3Research Papers at Baobá 1
14:00
18m
Talk
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings
Research Papers
Zirui Song The Chinese University of Hong Kong, Jiongyi Chen National University of Defense Technology, Kehuan Zhang The Chinese University of Hong Kong
14:18
18m
Talk
Active Monitoring Mechanism for Control-based Self-Adaptive Systems
Research Papers
Yi Qin State Key Laboratory for Novel Software Technology, Nanjing University, Yanxiang Tong State Key Laboratory for Novel Software Technology, Nanjing University, Yifei Xu State Key Laboratory for Novel Software Technology, Nanjing University, Chun Cao State Key Laboratory for Novel Software Technology, Nanjing University, Xiaoxing Ma State Key Laboratory for Novel Software Technology, Nanjing University
14:36
18m
Talk
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs
Research Papers
Haoran Liu National University of Defense technology, Zhouyang Jia National University of Defense Technology, Shanshan Li National University of Defense Technology, Yan Lei Chongqing University, Yue Yu National University of Defense Technology, Yu Jiang Tsinghua university, Xiaoguang Mao National University of Defense Technology, Liao Xiangke National University of Defense Technology
14:54
18m
Talk
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization
Research Papers
Chengpeng Wang The Hong Kong University of Science and Technology, Jipeng Zhang The Hong Kong University of Science and Technology, Rongxin Wu School of Informatics, Xiamen University, Charles Zhang The Hong Kong University of Science and Technology
15:12
18m
Talk
Decomposing Software Verification Using Distributed Summary Synthesis
Research Papers
Dirk Beyer LMU Munich, Matthias Kettl LMU Munich, Thomas Lemberger LMU Munich
14:00 - 15:30
Fault Diagnosis and Root Cause Analysis 2Industry Papers / Research Papers at Baobá 2
14:00
18m
Talk
Exploring LLM-based Agents for Root Cause Analysis
Industry Papers
Devjeet Roy Washington State University, Xuchao Zhang Microsoft, Rashi Bhave Microsoft Research, Chetan Bansal Microsoft Research, Pedro Las-Casas Microsoft, Rodrigo Fonseca Microsoft Research, Saravan Rajmohan Microsoft
14:18
18m
Talk
Illuminating the Gray Zone: Non-Intrusive Gray Failure Localization in Server Operating Systems
Industry Papers
Shenglin Zhang Nankai University, Yongxin Zhao Nankai University, Xiao Xiong Nankai University, Yongqian Sun Nankai University, Xiaohui Nie CNIC, CAS, Jiacheng Zhang Nankai University, Fenglai Wang Huawei Technologies Ltd., Xian Zheng Huawei Technologies Ltd., Yuzhi Zhang Nankai University, Dan Pei Tsinghua University
14:36
18m
Talk
Towards Better Graph Neural Network-based Fault Localization Through Enhanced Code Representation
Research Papers
Md Nakhla Rafi Concordia University, Dong Jae Kim Concordia University, An Ran Chen University of Alberta, Tse-Hsun (Peter) Chen Concordia University, Shaowei Wang Department of Computer Science, University of Manitoba, Canada
14:54
18m
Talk
Easy over Hard: A Simple Baseline for Test Failures Causes Prediction
Industry Papers
Zhipeng Gao Shanghai Institute for Advanced Study - Zhejiang University, Zhipeng Xue , Xing Hu Zhejiang University, Weiyi Shang University of Waterloo, Xin Xia Huawei Technologies
15:12
18m
Talk
Automated Root Causing of Cloud Incidents using In-Context Learning with GPT-4
Industry Papers
Xuchao Zhang Microsoft, Supriyo Ghosh Microsoft, Chetan Bansal Microsoft Research, Rujia Wang Microsoft, Minghua Ma Microsoft Research, Yu Kang Microsoft Research, Saravan Rajmohan Microsoft
14:00 - 15:30
Security and Privacy 2Industry Papers / Research Papers at Baobá 4
14:00
18m
Talk
Demystifying Invariant Effectiveness for Securing Smart Contracts
Research Papers
Zhiyang Chen University of Toronto, Ye Liu Nanyang Technological University, Sidi Mohamed Beillahi University of Toronto, Yi Li Nanyang Technological University, Fan Long University of Toronto
14:18
18m
Talk
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?Distinguished Paper Award
Research Papers
Kaixuan Li East China Normal University, Yue Xue Metatrust Labs, Sen Chen Tianjin University, Han Liu East China Normal University, Kairan Sun Nanyang Technological University, Ming Hu Singapore Management University, Haijun Wang Xi'an Jiaotong University, Yang Liu Nanyang Technological University, Yixiang Chen East China Normal University
Pre-print
14:36
18m
Talk
On the Contents and Utility of IoT Cybersecurity Guidelines
Research Papers
Jesse Chen University of Arizona, Dharun Anandayuvaraj Purdue University, James C. Davis Purdue University, Sazzadur Rahaman University of Arizona
DOI Pre-print
14:54
18m
Talk
PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models
Research Papers
Simin Chen University of Texas at Dallas, XiaoNing Feng Taiyuan University of Technology, Xiaohong Han Taiyuan University of Technology, Cong Liu University of California, Riverside, Wei Yang University of Texas at Dallas
15:12
18m
Talk
CVECenter: Industry Practice of Automated Vulnerability Management for Linux Distribution Community
Industry Papers
Jing Luo Central South University, Heyuan Shi Central South University, Yongchao Zhang Alibaba, Runzhe Wang Alibaba Group, Yuheng Shen Tsinghua University, Yuao Chen Alibaba, Rongkai Liu Central South University, Xiaohai Shi Alibaba Group, Chao Hu Central South University, Yu Jiang Tsinghua University
14:00 - 15:30
14:00
18m
Talk
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization
Research Papers
Yifan Zhang Vanderbilt University, Jiliang Li Vanderbilt University, Zachary Karas Vanderbilt University, Aakash Bansal University of Notre Dame, Toby Jia-Jun Li University of Notre Dame, Collin McMillan University of Notre Dame, Kevin Leach Vanderbilt University, Yu Huang Vanderbilt University
14:18
18m
Talk
Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code Using Deep Neural Networks
Research Papers
Tarek Alakmeh University of Zurich, David Reich University of Potsdam, Lena Jäger University of Zurich, Thomas Fritz University of Zurich
DOI Pre-print
14:36
18m
Talk
R2I: A Relative Readability Metric for Decompiled Code
Research Papers
Haeun Eom Sungkyunkwan University, Dohee Kim Sungkyunkwan University, Sori Lim Sungkyunkwan University, Hyungjoon Koo Sungkyunkwan University, Sungjae Hwang Sungkyunkwan University
14:54
9m
Talk
CognitIDE: An IDE Plugin for Mapping Physiological Measurements to Source Code
Demonstrations
Fabian Stolp Hasso Plattner Institute, University of Potsdam, Malte Stellmacher Hasso Plattner Institute, University of Potsdam, Bert Arnrich Hasso Plattner Institute, University of Potsdam
15:03
9m
Talk
The lion, the ecologist and the plankton: a classification of species in multi-bot ecosystems
Ideas, Visions and Reflections
Dimitrios Platis Neat, Linda Erlenhov Chalmers | University of Gothenburg, Francisco Gomes de Oliveira Neto Chalmers | University of Gothenburg
15:12
18m
Talk
S.C.A.L.E: a CO2-aware Scheduler for OpenShift at ING
Industry Papers
Jurriaan Den Toonder TU Delft & ING, Paul Braakman ING, Thomas Durieux TU Delft
15:30 - 16:00
Coffee BreakSocial Events at Baobá 3
15:30
30m
Coffee break
Break
Social Events

Not scheduled yet

Not scheduled yet
Talk
Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times
Research Papers
Necip Fazıl Yıldıran University of Central Florida, Jeho Oh The University of Texas at Austin, Julia Lawall Inria, Paul Gazzillo University of Central Florida
Not scheduled yet
Talk
Syntax Is All You Need: A Universal-Language Approach to Mutant Generation
Research Papers
Sourav Deb Northern Arizona University, Kush Jain Carnegie Mellon University, Rijnard van Tonder Mysten Labs, Inc., Claire Le Goues Carnegie Mellon University, Alex Groce Northern Arizona University
Not scheduled yet
Talk
JIT-Smart: A Multi-Task Learning Framework for Just-In-Time Defect Prediction and Localization
Research Papers
Xiangping Chen Sun Yat-sen University, Furen Xu Sun Yat-sen University, Yuan Huang Sun Yat-sen University, Neng Zhang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University
Not scheduled yet
Talk
CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models
Research Papers
Qilin Zhou City University of Hong Kong, Zhengyuan Wei City University of Hong Kong, Haipeng Wang City University of Hong Kong, Bo Jiang Beihang University, Wing-Kwong Chan City University of Hong Kong
Not scheduled yet
Talk
DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises
Research Papers
Daoguang Zan Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Ailun Yu Peking University, Bo Shen Huawei Technologies Co., Ltd, Bei Chen Independent Researcher, Wei Li Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yongshun Gong Shandong University, Xiaolin Chen Institute of Software Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yafen Yao Huawei Technologies Co., Ltd, Weihua Luo Funcun-wuyou Technologies Co., Ltd, Bei Guan Institute of Software Chinese Academy of Sciences, Yan Liu Independent Researcher, Yongji Wang Institute of Software Chinese Academy of Sciences, Qianxiang Wang Huawei Technologies Co., Ltd, Lizhen Cui Shandong University
Not scheduled yet
Talk
Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems
Research Papers
Yuntianyi Chen University of California, Irvine, Yuqi Huai University of California, Irvine, Shilong Li University of California, Irvine, Changnam Hong University of California, Irvine, Joshua Garcia University of California, Irvine
DOI
Not scheduled yet
Talk
Semi-Supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules
Research Papers
Shengcheng Yu Nanjing University, Chunrong Fang Nanjing University, Quanjun Zhang Nanjing University, Mingzhe Du Nanjing University, Jia Liu Nanjing University, Zhenyu Chen Nanjing University
Not scheduled yet
Talk
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis
Research Papers
Zeqin Liao Sun Yat-sen University, Henglong Liang Sun Yat-sen University, Yuhong Nan Sun Yat-sen University, Sicheng Hao Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Juan Zhai University of Massachusetts, Amherst, Jiajing Wu Sun Yat-sen University
Not scheduled yet
Talk
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers
Research Papers
Changwei Zou UNSW Sydney, Dongjie He UNSW Sydney, Yulei Sui UNSW, Jingling Xue UNSW Sydney
Not scheduled yet
Talk
BRF: Fuzzing the eBPF runtime
Research Papers
Hsin-Wei Hung UC Irvine, Ardalan Amiri Sani UC Irvine
Not scheduled yet
Talk
A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories
Research Papers
Farbod Farhour Concordia University, Ahmad Abdellatif University of Calgary, Essam Mansour Concordia University, Emad Shihab Concordia University
Not scheduled yet
Talk
LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking
Research Papers
Yongzheng Xie University of Adelaide, Hongyu Zhang Chongqing University, Muhammad Ali Babar School of Computer Science, The University of Adelaide
Not scheduled yet
Talk
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Research Papers
Luwei Cai ShanghaiTech University, Fu Song State Key Laboratory of Computer Science and Institute of Software, Chinese Academy of Sciences., Taolue Chen Birkbeck, University of London
Not scheduled yet
Talk
Evolutionary Multi-Objective Optimization for Contextual Adversarial Example Generation
Research Papers
Shasha Zhou University of Exeter, Mingyu Huang University of Electronic Science and Technology of China, Ke Li University of Exeter, Yanan Sun Sichuan University
Not scheduled yet
Talk
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile ApplicationsDistinguished Paper Award
Research Papers
Keke Lian Fudan University, Lei Zhang Fudan University, Guangliang Yang Fudan University, Shuo Mao Fudan University, Xinjie Wang Fudan University, Yuan Zhang Fudan University, Min Yang Fudan University
Not scheduled yet
Talk
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection
Research Papers
Shihan Dou Fudan University, Yueming Wu Nanyang Technological University, Haoxiang Jia Huazhong University of Science and Technology, Yuhao Zhou Fudan University, Yang Liu Nanyang Technological University
Not scheduled yet
Talk
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts
Research Papers
Zexu Wang Sun Yat-sen University, Jiachi Chen Sun Yat-sen University, Yanlin Wang Sun Yat-sen University, Zibin Zheng Sun Yat-sen University, Yu Zhang Harbin Institute of Technology, Weizhe Zhang Harbin Institute of Technology

Accepted Papers

Title
Abstraction-Aware Inference of Metamorphic Relations
Research Papers
A Critical Review of Common Log Data Sets Used for Evaluation of Sequence-based Anomaly Detection Techniques
Research Papers
Active Monitoring Mechanism for Control-based Self-Adaptive Systems
Research Papers
Adapting Multi-objectivized Software Configuration Tuning
Research Papers
Pre-print
A Deep Dive into Large Language Models for Automated Bug Localization and Repair
Research Papers
DOI
AI-assisted Code Authoring at Scale: Fine-tuning, deploying, and mixed methods evaluation
Research Papers
A Miss Is as Good as A Mile: Metamorphic Testing for Deep Learning Operators
Research Papers
Analyzing Quantum Programs with LintQ: A Static Analysis Framework for Qiskit
Research Papers
Pre-print
An Analysis of the Costs and Benefits of Autocomplete in IDEs
Research Papers
Pre-print
An empirical study on code review activity prediction in practice
Research Papers
Pre-print
An Empirical Study on Focal Methods in Deep-Learning-Based Approaches for Assertion Generation
Research Papers
A Quantitative and Qualitative Evaluation of LLM-based Explainable Fault Localization
Research Papers
Pre-print
Are Human Rules Necessary? Generating Reusable APIs with CoT Reasoning and In-context Learning
Research Papers
AROMA: Automatic Reproduction of Maven Artifacts
Research Papers
A Transferability Study of Interpolation-Based Hardware Model Checking to Software VerificationDistinguished Paper Award
Research Papers
DOI Pre-print
A Weak Supervision-Based Approach to Improve Chatbots for Code Repositories
Research Papers
BARO: Robust Root Cause Analysis for Microservices via Multivariate Bayesian Online Change Point Detection
Research Papers
Pre-print
Beyond Code Generation: An Observational Study of ChatGPT Usage in Software Engineering Practice
Research Papers
Bin2Summary: Beyond Function Name Prediction in Stripped Binaries with Functionality-specific Code Embeddings
Research Papers
Bloat beneath Python's Scales: A Fine-Grained Inter-Project Dependency Analysis
Research Papers
Pre-print
Bounding Random Test Set Size with Computational Learning Theory
Research Papers
BRF: Fuzzing the eBPF runtime
Research Papers
Can GPT-4 Replicate Empirical Software Engineering Research?
Research Papers
Pre-print
Can Large Language Models Transform Natural Language Intent into Formal Method Postconditions?
Research Papers
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection
Research Papers
ChangeRCA: Finding Root Causes from Software Changes in Large Online Systems
Research Papers
DOI Pre-print
Characterizing Python Library Migrations
Research Papers
ClarifyGPT: A Framework for Enhancing LLM-based Code Generation via Requirements Clarification
Research Papers
CodeArt: Better Code Models by Attention Regularization When Symbols Are Lacking
Research Papers
Code-Aware Prompting: A study of Coverage guided Test Generation in Regression Setting using LLM
Research Papers
CodePlan: Repository-level Coding using LLMs and Planning
Research Papers
Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile ApplicationsDistinguished Paper Award
Research Papers
CORE: Resolving Code Quality Issues Using LLMs
Research Papers
COSTELLO: Contrastive Testing for Embedding-based Large Language Model as a Service Embeddings
Research Papers
CrossCert: A Cross-Checking Detection Approach to Patch Robustness Certification for Deep Learning Models
Research Papers
Cut to the Chase: An Error-Oriented Approach to Detect Error-Handling Bugs
Research Papers
DAInfer: Inferring API Aliasing Specifications from Library Documentation via Neurosymbolic Optimization
Research Papers
DeciX: Explain Deep Learning Based Code Generation Applications
Research Papers
Decomposing Software Verification Using Distributed Summary Synthesis
Research Papers
Demystifying Invariant Effectiveness for Securing Smart Contracts
Research Papers
Dependency-Induced Waste in Continuous Integration: An Empirical Study of Unused Dependencies in the NPM Ecosystem
Research Papers
DOI Pre-print
DeSQL: Interactive Debugging of SQL in Data-Intensive Scalable Computing
Research Papers
DiffCoder: Enhancing Large Language Model on API Invocation via Analogical Code Exercises
Research Papers
Do Code Generation Models Think Like Us? - A Study of Attention Alignment between Large Language Models and Human Programmers
Research Papers
Pre-print
Do Words Have Power? Understanding and Fostering Civility in Code Review Discussion
Research Papers
DTD: Comprehensive and Scalable Testing for Debuggers
Research Papers
DyPyBench: A Benchmark of Executable Python Software
Research Papers
Effective Teaching through Code Reviews: Patterns and Anti-Patterns
Research Papers
Efficiently Detecting Reentrancy Vulnerabilities in Complex Smart Contracts
Research Papers
Enhancing Code Understanding for Impact Analysis by Combining Transformers and Program Dependence Graphs
Research Papers
Enhancing Function Name Prediction using Votes-Based Name Tokenization and Multi-Task Learning
Research Papers
DOI Pre-print
Evaluating and Improving ChatGPT for Unit Test Generation
Research Papers
Evaluating Directed Fuzzers: Are We Heading in the Right Direction?
Research Papers
Evolutionary Multi-Objective Optimization for Contextual Adversarial Example Generation
Research Papers
Exploring and Unleashing the Power of Large Language Models in Automated Code Translation
Research Papers
Pre-print
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization
Research Papers
Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point SlicingDistinguished Paper Award
Research Papers
FeatMaker: Automated Feature Engineering for Search Strategy of Symbolic Execution
Research Papers
Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles
Research Papers
Generative AI for Pull Request Descriptions: Adoption, Impact, and Developer Interventions
Research Papers
Pre-print Media Attached
Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection
Research Papers
Go Static: Contextualized Logging Statement Generation
Research Papers
Harnessing Neuron Stability to Improve DNN Verification
Research Papers
How does Simulation-based Testing for Self-driving Cars match Human Perception?
Research Papers
How to Gain Commit Rights in Modern Top Open Source Communities?
Research Papers
DOI Pre-print
Improving the Learning of Code Review Successive Tasks with Cross-Task Knowledge DistillationDistinguished Paper Award
Research Papers
Investigating Documented Privacy Changes in Android OS
Research Papers
IRCoCo: Immediate Rewards-Guided Deep Reinforcement Learning for Code Completion
Research Papers
Java JIT Testing with Template Extraction
Research Papers
JIT-Smart: A Multi-Task Learning Framework for Just-In-Time Defect Prediction and Localization
Research Papers
Learning to Detect and Localize Multilingual Bugs
Research Papers
DOI Pre-print
Less Cybersickness, Please: Demystifying and Detecting Stereoscopic Visual Inconsistencies in Virtual Reality Applications
Research Papers
DOI Pre-print
LILAC: Log Parsing using LLMs with Adaptive Parsing Cache
Research Papers
DOI Pre-print
LogSD: Detecting Anomalies from System Logs through Self-supervised Learning and Frequency-based Masking
Research Papers
Maximizing Patch Coverage for Testing of Highly-Configurable Software without Exploding Build Times
Research Papers
Metamorphic Testing of Secure Multi-Party Computation (MPC) Compilers
Research Papers
Mining Action Rules for Defect Reduction Planning
Research Papers
MirrorFair: Fixing Fairness Bugs in Machine Learning Software via Counterfactual Predictions
Research Papers
Misconfiguration Software Testing for Failure Emergence in Autonomous Driving Systems
Research Papers
DOI
Mobile Bug Report Reproduction via Global Search on the App UI Model
Research Papers
MTAS: A Reference-Free Approach for Evaluating Abstractive Summarization Systems
Research Papers
Natural Is The Best: Model-Agnostic Code Simplification for Pre-trained Large Language Models
Research Papers
Natural Symbolic Execution-based Testing for Big Data Analytics
Research Papers
Pre-print
Only diff is Not Enough: Generating Commit Messages Leveraging Reasoning and Action of Large Language ModelDistinguished Paper Award
Research Papers
On Reducing Undesirable Behavior in Deep-Reinforcement-Learning-Based Software
Research Papers
On the Contents and Utility of IoT Cybersecurity Guidelines
Research Papers
DOI Pre-print
Partial Solution Based Constraint Solving Cache in Symbolic Execution
Research Papers
Pre-print
PBE-based Selective Abstraction and Refinement for Efficient Property Falsification of Embedded Software
Research Papers
Pre-print
PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models
Research Papers
Predicting Code Comprehension: A Novel Approach to Align Human Gaze with Code Using Deep Neural Networks
Research Papers
DOI Pre-print
Predicting Configuration Performance in Multiple Environments with Sequential Meta-Learning
Research Papers
Pre-print
Predicting Failures of Autoscaling Distributed Applications
Research Papers
DOI Pre-print
Predictive Program Slicing via Execution Knowledge-Guided Dynamic Dependence LearningDistinguished Paper Award
Research Papers
Pre-print
ProveNFix: Temporal Property guided Program RepairDistinguished Paper Award
Research Papers
DOI Pre-print
PyRadar: Towards Automatically Retrieving and Validating Source Code Repository Information for PyPI Packages
Research Papers
DOI Pre-print
R2I: A Relative Readability Metric for Decompiled Code
Research Papers
RavenBuild: Context, Relevance, and Dependency Aware Build Outcome Prediction
Research Papers
Refactoring to Pythonic Idioms: A Hybrid Knowledge-Driven Approach Leveraging Large Language Models
Research Papers
Revealing Software Development Work Patterns with PR-Issue Graph Topologies
Research Papers
Rocks Coding, Not Development–A Human-Centric, Experimental Evaluation of LLM-Supported SE Tasks
Research Papers
Semi-Supervised Crowdsourced Test Report Clustering via Screenshot-Text Binding Rules
Research Papers
Shadows in the Interface: A Comprehensive Study on Dark Patterns
Research Papers
Sharing Software-Evolution Datasets: Practices, Challenges, and Recommendations
Research Papers
SimLLM: Measuring Semantic Similarity in Code Summaries Using a Large Language Model-Based Approach
Research Papers
SmartAxe: Detecting Cross-Chain Vulnerabilities in Bridge Smart Contracts via Fine-Grained Static Analysis
Research Papers
State Reconciliation Defects in Infrastructure as Code
Research Papers
Pre-print
Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We?Distinguished Paper Award
Research Papers
Pre-print
Syntax Is All You Need: A Universal-Language Approach to Mutant Generation
Research Papers
"The Law Doesn’t Work Like a Computer": Exploring Software Licensing Issues Faced by Legal PractitionersDistinguished Paper Award
Research Papers
TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers
Research Papers
Towards AI-Assisted Synthesis of Verified Dafny Methods
Research Papers
DOI Pre-print
Towards Better Graph Neural Network-based Fault Localization Through Enhanced Code Representation
Research Papers
Towards Effective Multi-Hunk Bug Repair: Detecting, Creating, Evaluating, and Understanding Indivisible Bugs
Research Papers
Towards Efficient Build Ordering for Incremental Builds with Multiple Configurations
Research Papers
Towards Efficient Verification of Constant-Time Cryptographic Implementations
Research Papers
TraStrainer: Adaptive Sampling for Distributed Traces with System Runtime StateDistinguished Paper Award
Research Papers
Pre-print
Understanding and Detecting Annotation-induced Faults of Static Analyzers
Research Papers
Understanding Developers' Discussions and Perceptions on Non-Functional Requirements: The Case of the Spring EcosystemDistinguished Paper Award
Research Papers
DOI Pre-print
Understanding the Impact of APIs Behavioral Breaking Changes on Client Applications
Research Papers
Unprecedented Code Change Automation: The Fusion of LLMs and Transformation by Example
Research Papers
Pre-print
Your Code Secret Belongs to Me: Neural Code Completion Tools Can Memorize Hard-coded Credentials
Research Papers

Call for Papers

We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research.

Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems are also welcome, as well as replication papers. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call.

NEW THIS YEAR #1: The inaugural Proceedings of the ACM on Software Engineering (PACMSE) Issue FSE 2024 seeks contributions through submissions in this track. Accepted papers will be invited for presentation at FSE 2024. Approval has been granted by ACM in late July. PACMSE will be the only proceedings where accepted research track papers will be published. Please check the FAQ for details.

NEW THIS YEAR #2: The steering committee has decided that the conference name will be changed to ACM International Conference on the Foundations of Software Engineering (FSE). In this transition year, we may still use the old and new names interchangeably on the conference webpage.

NEW THIS YEAR #3: Based on the coordination among FSE, ICSE, and ASE steering committees, the FSE conference and submission dates have been moved a few months early. The intention is for this schedule to remain stable in the years ahead and the conference and submission deadlines of the three large general software engineering conferences to be spread out throughout the year. This change however means that the submission deadline of FSE 2024 (late September 2023) will be before the days ESEC/FSE 2023 will be held (December 2023).

NEW THIS YEAR #4: Submissions must follow the "ACM Policy on Authorship" released April 20, 2023, which contains policy regarding the use of Generative AI tools and technologies, such as ChatGPT. Please also check the ACM FAQ which describes in what situations generative AI tools can be used (with or without acknowledgement).

Tracks

This CFP refers to the Research Track of FSE. For the remaining tracks, please check the specific calls on the website:

HOW TO SUBMIT

At the time of submission, each paper should have no more than 18 pages for all text and figures, plus 4 pages for references, using the following templates: Latex or Word (Mac) or Word (Windows). Authors using LaTeX should use the sample-acmsmall-conf.tex file (found in the samples folder of the acmart package) with the acmsmall option. We also strongly encourage the use of the review, screen, and anonymous options as well. In sum, you want to use: \documentclass[acmsmall,screen,review,anonymous]{acmart}. Papers may be submitted using numeric citations, but final versions of accepted papers must use the author-year format for citations. It is a single-column page layout. Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the FSE 2024 submission site:

https://fse2024.hotcrp.com

Each submission will be reviewed by at least three members of the program committee. The review process is that the initial output can be accept, reject or major revision. When the initial output of the three reviews is major revision, authors will have an opportunity to address the reviewers’ requests during a 6 week major revision period. Such requests may include additional experiments or new analyses of existing results; major rewriting of algorithms and explanations; clarifications, better scoping, and improved motivations. The revised submission must be accompanied by a response letter, where the authors explain how they addressed each concern expressed by the reviewers. The same reviewers who requested major revisions will then assess whether the revised submission satisfies their requests adequately.

Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation (if relevant), quality of presentation, and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The program committee as a whole will make final decisions about which submissions to accept for publication.

In addition to declaring the topics which are relevant for their submissions, authors will be asked to declare the research methods employed in their submissions. This will enable us to ensure reviewer expertise both for research methods and topics. For full definitions of the research methods, see the SIGSOFT Empirical Standards.

Double-Anonymous Review Process

In order to ensure the fairness of the reviewing process, the FSE 2024 Research Papers Track will employ a double-anonymous review process, where external reviewers do not know the identity of authors, and authors do not know the identity of external reviewers. The papers submitted must not reveal the authors’ identities in any way:

  • Authors should leave out author names and affiliations from the body of their submission.
  • Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
  • Authors should not include URLs to author-revealing sites (tools, datasets). Authors are still encouraged to follow open science principles and submit replication packages, see more details on the open science policy below.
  • Authors should anonymize author-revealing company names but instead provide general characteristics of the organizations involved needed to understand the context of the paper.
  • Authors should ensure that paper acknowledgements do not reveal the origin of their work.
  • While authors have the right to upload preprints on ArXiV or similar sites, they should avoid specifying that the manuscript was submitted to FSE 2024.
  • During review, authors should not publicly use the submission title.

The double-anonymous process used this year is “heavy”, i.e., the paper anonymity will be maintained during all reviewing and discussion periods. In case of major revision, authors must therefore maintain anonymity in their response letter and must provide no additional information that could be author-revealing.

To facilitate double-anonymous reviewing, we recommend the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification. If the authors have uploaded to arXiv or similar, they should avoid specifying that the manuscript was submitted to FSE 2024.

Authors with further questions on double-anonymous reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-anonymous review process will be desk-rejected.

Submission Policies

The authors must follow the “ACM Policy on Authorship” released April 20, 2023 and its accompanying FAQ including the following points:

  • “Generative AI tools and technologies, such as ChatGPT, may not be listed as authors of an ACM published Work. The use of generative AI tools and technologies to create content is permitted but must be fully disclosed in the Work. For example, the authors could include the following statement in the Acknowledgements section of the Work: ChatGPT was utilized to generate sections of this Work, including text, tables, graphs, code, data, citations, etc.). If you are uncertain about the need to disclose the use of a particular tool, err on the side of caution, and include a disclosure in the acknowledgements section of the Work.”

  • “If you are using generative AI software tools to edit and improve the quality of your existing text in much the same way you would use a typing assistant like Grammarly to improve spelling, grammar, punctuation, clarity, engagement or to use a basic word processing system to correct spelling or grammar, it is not necessary to disclose such usage of these tools in your Work.”

Please read the full policy and FAQ.

Papers submitted for consideration to FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.

To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.

All publications are subject to the ACM Author Representations policy.

By submitting your article to an ACM Publication, you are hereby acknowledging that you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.

Alleged violations to any of the above policies will be reported to ACM for further investigation and may result in a full retraction of your paper, in addition to other potential penalties, as per the ACM Publications Policies.

Please ensure that you and your co-authors obtain an ORCID ID, so you can complete the publishing process if your paper is accepted. ACM has been involved in ORCID from the start and they have recently made a commitment to collect ORCID IDs from all published authors. ACM is committed to improve author discoverability, ensure proper attribution and contribute to ongoing community efforts around name normalization; your ORCID ID will help in these efforts.

The authors of accepted papers are invited and strongly encouraged to attend the conference to present their work. Attendance at the event is not mandatory for publication. Authors also have the option of not presenting their work at the conference, in which case they do not need to register.

Important Dates

All dates are 23:59:59 AoE (UTC-12h)

  • Paper registration: Thursday, September 21, 2023 (to register a paper, paper title, abstract, author list, and some additional metadata are required; title and abstract must contain sufficient information for effective bidding; registrations containing empty or generic title and abstract may be dropped)
  • Full paper submission: Thursday, September 28, 2023
  • Author response: December 11-13, 2023 (3-day period)
  • Initial notification: Tuesday, January 23, 2024 (long discussion period due to year-end holidays)
  • Camera ready (directly accepted papers): Tuesday, February 20, 2024
  • Revised manuscript submissions (major revisions only): Tuesday, March 5, 2024
  • Final notification for major revisions: Tuesday, April 16, 2024
  • Camera ready (accepted major revision papers): Tuesday, May 14, 2024

The official publication date is the date the journal issue is made available in the ACM Digital Library. This date may be as early as July 1, 2024. The official publication date affects the deadline for any patent filings related to published work.

Open Science Policy

The research track of FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.

Upon submission to the research track, authors are asked to make a replication package available to the program committee (via upload of supplemental material or a link to a private or public repository) or to comment on why this is not possible or desirable. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. We ask authors to provide a supporting statement on the availability of a replication package (or lack thereof) in their submitted papers in a section named Data Availability after the Conclusion section. Be careful that such statements continue to maintain author anonymity. For more details, see the FSE open science policy.

Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate FSE’24 artifact evaluation committee.

Topics of Interest

Topics of interest include, but are not limited to:

  • Artificial intelligence and machine learning for software engineering
  • Autonomic computing
  • Debugging and fault localization
  • Dependability, safety, and reliability
  • Distributed and collaborative software engineering
  • Embedded software, safety-critical systems, and cyber-physical systems
  • Empirical software engineering
  • Human and social aspects of software engineering
  • Human-computer interaction
  • Mining software repositories
  • Mobile development
  • Model checking
  • Model-driven engineering
  • Parallel, distributed, and concurrent systems
  • Performance engineering
  • Program analysis
  • Program comprehension
  • Program repair
  • Program synthesis
  • Programming languages
  • Recommendation systems
  • Requirements engineering
  • Search-based software engineering
  • Services, components, and cloud
  • Software architectures
  • Software engineering education
  • Software engineering for machine learning and artificial intelligence
  • Software evolution
  • Software processes
  • Software security
  • Software testing
  • Software traceability
  • Symbolic execution
  • Tools and environments

FAQ on Review Process: Major Revisions, Open Science Policy, Double-Anonymous Reviewing

PACMSE Proceedings

Q: What paper format shall we follow for FSE 2024?

A: Papers accepted by the technical track of FSE 2024 will be published in the inaugural journal issue of the Proceedings of the ACM on Software Engineering (PACMSE). Approval has been granted by ACM in late July. Please check the Research Paper How to Submit section for details.

Q: How would the inaugural PACMSE journal affect FSE 2024?

A: FSE will be published in the inaugural PACMSE journal following the recent practices of other communities such as PACMPL (PLDI, POPL, OOPSLA, etc.), PACMHCI, PACMMOD, PACMNET, etc.

Identity: FSE papers will be published in a dedicated issue of PACMSE, with FSE as the issue name. This means that FSE papers will keep their identity!

Paper format: The paper format will follow the ACM’s requirement. This is a switch from the traditional FSE two-column format to this new PACMSE single-column format. However, the amount of content should remain more or less the same: the FSE 2024’s 18 page limit in the singe-column format maps roughly to the old single-column of 10 pages.

Review process: FSE already has a major-revision cycle in 2023 and 2024, which maps neatly onto PACMSE’s requirements for two rounds of reviews, so there are no PACMSE-related changes here.

Conference presentations: FSE 2024’s move to PACMSE changes how the proceedings are published. All accepted papers will still be guaranteed presentation delivery at the conference in the usual way.

Policy on Authorship (e.g., regarding ChatGPT)

Q: What is the policy on Authorship, especially considering the the use of Generative AI tools and technologies, such as ChatGPT?

A: Submissions must follow the “ACM Policy on Authorship” released April 20, 2023, which contains policy regarding the use of Generative AI tools and technologies, such as ChatGPT. Please also check the ACM FAQ which describes in what situations generative AI tools can be used (with or without acknowledgement).

Major Revision Process

Q: Why is FSE allowing major revisions?

A: SE conferences are currently forced to reject papers that include valuable material, but would need major changes to become acceptable for conference presentation, because major revisions cannot be accommodated in the current review process. By supporting only a binary outcome, conferences force reviewers to decide between rejection and acceptance even in borderline cases that would be better judged after a round of major revision. This can cause additional reviewing burden for the community (the paper is resubmitted to another venue with new reviewers) and inconsistency for the authors (the new reviewers have different opinions). We hope by allowing major revisions to both increase the acceptance rate of FSE and to help reduce these current problems with the reviewing process.

For Authors

Q: If my paper receives major revisions, what happens next?

A: The meta-review will clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. Authors of these papers are granted 6 weeks to implement the requested changes. In addition to the revised paper, authors are asked to submit a response letter that explains how each required change was implemented. If any change was not implemented, authors can explain why. The same reviewers will then review the revised paper and make their final (binary) decision. Authors can also choose to withdraw their submission if they wish.

Q: Will major revision become the default decision causing initial acceptance rates to drop?

A: This is not the intention: reviewers are instructed to accept all papers that would have been accepted when major revision was not an available outcome.

For Reviewers

Q: When shall I recommend major revision for a paper?

A: Major revision should not become the default choice for borderline papers and should be used only if without major revisions the paper would be rejected, while a properly done major revision, which addresses the reviewers’ concerns, could make the paper acceptable for publication; if the requested changes are doable in 6 weeks and are implementable within the page limit; if the requested changes are strictly necessary for paper acceptance (i.e., not just nice-to-have features); if the requested changes require recheck (i.e., reviewers cannot trust the authors to implement them directly in the camera ready).

Q: When shall I recommend rejection instead of major revision?

A: Rejection is a more appropriate outcome than major revision if the requested additions/changes are not implementable in 6 weeks; if the contribution is very narrow or not relevant to the SE audience, and it cannot be retargeted in 6 weeks; if the methodology is flawed and cannot be fixed in 6 weeks; if results are unconvincing, the paper does not seem to improve the state of the art much, and new convincing results are unlikely to be available after 6 weeks of further experiments; if the customary benchmark used in the community was ignored and cannot be adopted and compared to in 6 weeks.

Q: When shall I recommend acceptance instead of major revision?

A: We do not want major revision to become the primary pathway for acceptance. We should continue to trust the authors to make minor changes to the submissions in the camera ready version. Acceptance is preferable if the requested additions/changes are nice to have features, not mandatory for the acceptability of the work; if minor improvements of the text are needed; if minor clarifications requested by the reviewers should be incorporated; if important but not critical references should be added and discussed; if discussion of results could be improved, but the current one is already sufficient.

Q: What is the difference between major revision and shepherding?

A: Major revision is not shepherding. While shepherding typically focuses on important but minor changes, which can be specified in an operational way and can be checked quite easily and quickly by reviewers, major revisions require major changes (although doable in 6 weeks), which means the instructions for the authors cannot be completely operational and the check will need to go deeply into the new content delivered by the paper. Hence, while the expectation for shepherded papers is that most of them will be accepted once the requested changes are implemented, this is not necessarily the case with major revisions.

Q: Is there a quota of papers that can have major revision as outcome? A: As there is no quota for the accepted papers, there is also no quota for major revisions. However, we expect that thanks to major revisions we will be able to eventually accept 10-15% more papers, while keeping the quality bar absolutely unchanged.

Q: What shall I write in the meta-review of a paper with major revision outcome?

A: With the possibility of a major revision outcome, meta-reviews become extremely important. The meta-review should clearly and explicitly list all major changes required by the reviewers to make the paper acceptable for publication. The meta-review should act as a contract between reviewers and authors, such that when all required changes are properly made, the paper is accepted. In this respect, the listed changes should be extremely clear, precise, and implementable.

Review Process

For Authors

Q: Can I withdraw my paper?

A: Yes, papers can be withdrawn at any time using HotCRP.

Q: Is appendix or other supplemental materials allowed?

A: The main submission file must follow the page limit. Any supplemental materials including appendix and replication packages must be submitted separately under “Supplemental Material”. Program Committee members can review supplemental materials but are not obligated to review them.

For Reviewers

Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?

A: Contact the Program Co-Chairs, who will download the material on your behalf and make it available to you.

Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?

A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Co-Chairs, especially since additional reviewers might have a different set of conflicts of interest.

Open Science Policy

Q: What is the FSE 2024 open science policy and how can I follow it?

A: Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:

  • make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
  • include in the paper an explanation as to why this is not possible or desirable; and
  • indicate if they intend to make their data publicly available upon acceptance. This information should be provided in the submitted papers in a section named Data Availability after the Conclusion section. For more details, see the FSE open science policy.

Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?

A: To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site. Instructions are provided in the FSE open science policy.

Double-Anonymous Reviewing (DAR)

Q: Why are you using double-anonymous reviewing?

A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.

Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.

A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.

For Authors

Q: What exactly do I have to do to anonymize my paper?

A: Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors.

Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?

A: On the submission site, there will be an option to submit supplementary material along with your main paper. You can also share supplementary material in a private or publicly shared repository (preferred). This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-anonymous guidelines. See instructions on the FSE open science policy.

Q: My submission is based on code available in a public repository. How do I deal with this?

A: Making your code publicly available is not incompatible with double-anonymous reviewing. You can create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy. Authors wanting to share GitHub repositories may want to look into using https://anonymous.4open.science/ which is an open source tool that helps you to quickly double-anonymize your repository.

Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission? A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Co-Chairs.

Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?

A: No. But we recommend you do not use the same title for your FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.

Q: Am I allowed to post my (non-anonymized) paper on my web page or arXiv?

A: You can discuss and present your work that is under submission at small meetings (e.g., job talks, visits to research labs, a Dagstuhl or Shonan meeting), but you should avoid broadly advertising it in a way that reaches the reviewers even if they are not searching for it. Whenever possible, please avoid posting your manuscript on public archives (e.g, ArXiV) before or during the submission period. Would you still prefer to do so, carefully avoid adding to the manuscript any reference to FSE 2024 (e.g., using footnotes saying “Submitted to FSE 2024”).

Q: Can I give a talk about my work while it is under review? How do I handle social media?

A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are grey areas and trade-offs; we cannot describe every possible scenario.

Things you may do:

  • Put your submission on your home page.
  • Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
  • Present your work at professional meetings, job interviews, etc.
  • Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.

Things you should not do:

  • Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
  • Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
  • Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.

Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.

Q: Will the fact that FSE is double-anonymous have an impact on handling conflicts of interest?

A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Call for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.

For Reviewers

Q: What should I do if I learn the authors’ identity? What should I do if a prospective FSE author contacts me and asks to visit my institution? A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Co-Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgement.

Q: How do we handle potential conflicts of interest since I cannot see the author names?

A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.

Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?

A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.


The above guidelines are partly based on the PLDI FAQ on double-anonymous reviewing and the ICSE 2023 guidelines on double-anonymous submissions.