


default search action
39th ASE 2024: Sacramento, CA, USA
- Vladimir Filkov, Baishakhi Ray, Minghui Zhou:
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, ASE 2024, Sacramento, CA, USA, October 27 - November 1, 2024. ACM 2024, ISBN 979-8-4007-1248-7
Research Papers
- Ziyou Jiang
, Lin Shi
, Guowei Yang
, Qing Wang:
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code. 1-13 - Yujia Fan, Sinan Wang
, Zebang Fei
, Yao Qin
, Huaxuan Li, Yepang Liu
:
Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study. 14-26 - Rui Ren
, Jingbang Yang, Linxiao Yang
, Xinyue Gu
, Liang Sun
:
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice. 27-39 - Jaemin Hong
, Sukyoung Ryu
:
To Tag, or Not to Tag: Translating C's Unions to Rust's Tagged Unions. 40-52 - Yiheng Xiong
, Ting Su, Jue Wang
, Jingling Sun, Geguang Pu, Zhendong Su
:
General and Practical Property-based Testing for Android Apps. 53-64 - Xinyu Gao
, Yun Xiong, Deze Wang
, Zhenhan Guan
, Zejian Shi
, Haofen Wang
, Shanshan Li:
Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation. 65-77 - Markus Böck
, Michael Schröder
, Jürgen Cito:
Language-Agnostic Static Analysis of Probabilistic Programs. 78-90 - Shaoheng Cao
, Renyi Chen, Minxue Pan, Wenhua Yang, Xuandong Li:
Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents. 91-103 - Lanxin Yang
, Jinwei Xu
, He Zhang, Fanghao Wu, Jun Lyu
, Yue Li, Alberto Bacchelli
:
GPP: A Graph-Powered Prioritizer for Code Review Requests. 104-116 - Zhuo Su, Zehong Yu
, Dongyan Wang
, Wanli Chang, Bin Gu, Yu Jiang
:
Test Case Generation for Simulink Models using Model Fuzzing and State Solving. 117-128 - Tianyi Chen, Yanjie Jiang, Fu Fan
, Bo Liu
, Hui Liu
:
A Position-Aware Approach to Decomposing God Classes. 129-140 - Jinhao Dong, Jun Sun
, Yun Lin, Yedi Zhang
, Murong Ma
, Jin Song Dong
, Dan Hao
:
Revisiting the Conflict-Resolving Problem from a Semantic Perspective. 141-152 - Yi Xiao
, Van-Hoang Le
, Hongyu Zhang
:
Demonstration-Free: Towards More Practical Log Parsing with Large Language Models. 153-165 - Florian Eder
, Stefan Winter:
Efficient Detection of Test Interference in C Projects. 166-178 - Mengdan Fan, Wei Zhang
, Haiyan Zhao, Guangtai Liang, Zhi Jin
:
Detect Hidden Dependency to Untangle Commits. 179-190 - Jiawei Lu
, Haoye Wang
, Zhongxin Liu
, Keyu Liang
, Lingfeng Bao, Xiaohu Yang:
Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks. 191-203 - Mingyi Zhou
, Xiang Gao
, Xiao Chen
, Chunyang Chen
, John Grundy
, Li Li
:
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators. 204-215 - Cong Li
, Zhaogui Xu, Peng Di, Dongxia Wang
, Zheng Li, Qian Zheng:
Understanding Code Changes Practically with Small-Scale Language Models. 216-228 - Zhihong Sun
, Yao Wan, Jia Li, Hongyu Zhang
, Zhi Jin
, Ge Li, Chen Lyu:
Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates. 229-241 - Quan Zhang, Chijin Zhou
, Gwihwan Go, Binqi Zeng, Heyuan Shi
, Zichen Xu
, Yu Jiang
:
Imperceptible Content Poisoning in LLM-Powered Applications. 242-254 - Guoqing Bao
, Heng Shi, Chengyi Cui
, Yalin Zhang, Jianguo Yao:
UFront: Toward A Unified MLIR Frontend for Deep Learning. 255-267 - An Guo
, Yuan Zhou
, Haoxiang Tian
, Chunrong Fang
, Yunjian Sun, Weisong Sun
, Xinyu Gao
, Anh Tuan Luu
, Yang Liu
, Zhenyu Chen
:
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing. 268-280 - Chaozheng Wang
, Shuzheng Gao
, Cuiyun Gao, Wenxuan Wang, Chun Yong Chong
, Shan Gao, Michael R. Lyu
:
A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How. 281-293 - Nariyoshi Chida
, Tachio Terauchi
:
Repairing Regex-Dependent String Functions. 294-305 - Chenyang Yang
, Yining Hong
, Grace A. Lewis
, Tongshuang Wu
, Christian Kästner
:
What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing. 306-318 - David Kaindlstorfer
, Anastasia Isychev
, Valentin Wüstholz
, Maria Christakis
:
Interrogation Testing of Program Analyzers for Soundness and Precision Issues. 319-330 - Jingnan Zheng, Jiahao Liu, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, Tat-Seng Chua:
MaskDroid: Robust Android Malware Detection with Masked Graph Representations. 331-343 - Markus Fleischmann
, David Kaindlstorfer
, Anastasia Isychev
, Valentin Wüstholz
, Maria Christakis
:
Constraint-Based Test Oracles for Program Analyzers. 344-355 - Yichi Zhang, Zixi Liu, Yang Feng, Baowen Xu:
Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency. 356-366 - James Yoo
, Michael D. Ernst
, René Just
:
Verifying the Option Type with Rely-Guarantee Reasoning. 367-380 - Qi Zhan
, Xing Hu
, Xin Xia
, Shanping Li:
REACT: IR-Level Patch Presence Test for Binary. 381-392 - Yulun Wu, Ming Wen, Zeliang Yu
, Xiaochen Guo, Hai Jin:
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models. 393-405 - Guangyuan Wu, Weining Cao
, Yuan Yao, Hengfeng Wei
, Taolue Chen
, Xiaoxing Ma:
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference. 406-417 - Sumit Lahiri, Pankaj Kumar Kalita
, Akshay Kumar Chittora, Varun Vankudre, Subhajit Roy:
Program Synthesis Meets Visual What-Comes-Next Puzzles. 418-429 - Baijun Cheng, Cen Zhang
, Kailong Wang
, Ling Shi
, Yang Liu
, Haoyu Wang, Yao Guo, Ding Li, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. 430-442 - Luca Traini
, Federico Di Menna
, Vittorio Cortellessa
:
AI-driven Java Performance Testing: Balancing Result Quality with Testing Time. 443-454 - Yi Liu
, Junzhe Yu
, Huijia Sun
, Ling Shi
, Gelei Deng
, Yuqi Chen, Yang Liu
:
Efficient Detection of Toxic Prompts in Large Language Models. 455-467 - Jiuang Zhao
, Zitian Yang
, Li Zhang
, Xiaoli Lian
, Donghao Yang
, Xin Tan
:
DRMiner: Extracting Latent Design Rationale from Jira Issue Logs. 468-480 - Xinyu She
, Yanjie Zhao
, Haoyu Wang:
WaDec: Decompiling WebAssembly Using Large Language Model. 481-492 - Zhi Chen
, Lingxiao Jiang
:
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization. 493-505 - Dharun Anandayuvaraj
, Matthew Campbell
, Arav Tewari, James C. Davis
:
FAIL: Analyzing Software Failures from the News Using LLMs. 506-518 - Kexin Sun
, Yiding Ren
, Hongyu Kuang
, Hui Gao
, Xiaoxing Ma, Guoping Rong, Dong Shao
, He Zhang:
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects. 519-530 - Yifan Liao
, Ming Xu, Yun Lin, Xiwen Teoh
, Xiaofei Xie
, Ruitao Feng
, Frank Liaw
, Hongyu Zhang
, Jin Song Dong
:
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality. 531-543 - Zhiquan Huang
, Yuan Huang, Xiangping Chen
, Xiaocong Zhou
, Changlin Yang, Zibin Zheng:
An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation. 544-556 - Congying Xu, Songqiang Chen
, Jiarong Wu
, Shing-Chi Cheung
, Valerio Terragni
, Hengcheng Zhu
, Jialun Cao
:
MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing. 557-569 - Wei Liu, Ailun Yu
, Daoguang Zan
, Bo Shen, Wei Zhang
, Haiyan Zhao, Zhi Jin
, Qianxiang Wang:
GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph. 570-581 - Cong Wu, Jing Chen, Ziwei Wang
, Ruichao Liang
, Ruiying Du:
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models. 582-593 - Gichan Lee
, Hansae Ju
, Scott Uk-Jin Lee
:
NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers. 594-605 - Sicong Cao
, Xiaobing Sun
, Xiaoxue Wu, David Lo
, Lili Bo, Bin Li, Xiaolei Liu
, Xingwei Lin
, Wei Liu
:
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection. 606-618 - Vittoriano Muttillo, Claudio Di Sipio
, Riccardo Rubei
, Luca Berardinelli, MohammadHadi Dehghani
:
Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach. 619-630 - Wenzhang Yang
, Cuifeng Gao
, Xiaoyuan Liu
, Yuekang Li
, Yinxing Xue:
Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation. 631-642 - Zhibo Zhang
, Wuxia Bai, Yuxi Li
, Mark Huasong Meng
, Kailong Wang
, Ling Shi
, Li Li
, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. 643-655 - Xiao Yu
, Zexian Zhang, Feifei Niu
, Xing Hu
, Xin Xia
, John Grundy
:
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners' Perspective. 656-668 - Fang Liu, Zhenwei Liu, Qianhui Zhao
, Jing Jiang, Li Zhang
, Zian Sun, Ge Li, Zhongqi Li, Yuchi Ma:
FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments. 669-680 - Xinran Yu
, Chun Li
, Minxue Pan, Xuandong Li:
DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation. 681-693 - Yifan Xie
, Zhouyang Jia, Shanshan Li, Ying Wang, Jun Ma, Xiaoling Li, Haoran Liu, Ying Fu
, Xiangke Liao:
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera. 694-705 - Luan Pham
, Huong Ha, Hongyu Zhang
:
Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We? 706-715 - Guochang Li
, Chen Zhi
, Jialiang Chen, Junxiao Han
, Shuiguang Deng:
Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair. 719-731 - Mohammad Hossein Amini
, Shiva Nejati:
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems. 732-744 - Di Cui
, Jiaqi Wang, Qiangqiang Wang
, Peng Ji
, Minglang Qiao, Yutong Zhao
, Jingzhao Hu, Luqiao Wang, Qingshan Li:
Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network. 745-757 - Yihui Xu
, Yanhui Li, Jun Wang
, Xiaofang Zhang
:
Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing. 758-769 - Weilong Li
, Jintian Lu
, Ruizhi Xiao
, Pengfei Shao, Shuyuan Jin:
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection. 770-782 - Yue Li, He Zhang, Yuzhe Jin
, Zhong Ren
, Liming Dong
, Jun Lyu
, Lanxin Yang
, David Lo
, Dong Shao
:
An Explainable Automated Model for Measuring Software Engineer Contribution. 783-794 - Chao Hu, Yitian Chai, Hao Zhou, Fandong Meng
, Jie Zhou, Xiaodong Gu:
How Effectively Do Code Language Models Understand Poor-Readability Code? 795-806 - Dohyun Ryu, Giyeol Kim
, Daeun Lee
, Seongjin Kim
, Seungjin Bae
, Junghwan Rhee
, Taegyu Kim
:
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration. 807-818 - Yujie Liu
, Mingxuan Zhu
, Jinhao Dong, Junzhe Yu
, Dan Hao
:
Compiler Bug Isolation via Enhanced Test Program Mutation. 819-830 - Benedikt Schesch
, Ryan Featherman
, Kenneth J. Yang
, Ben R. Roberts
, Michael D. Ernst
:
Evaluation of Version Control Merge Tools. 831-83 - Jian Wang
, Shangqing Liu, Xiaofei Xie
, Yi Li
:
An Empirical Study to Evaluate AIGC Detectors on Code Content. 844-856 - Jialiang Wei
, Anne-Lise Courbis, Thomas Lambolais, Binbin Xu, Pierre-Louis Bernard, Gérard Dray
, Walid Maalej:
Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach. 857-869 - Jialun Cao
, Zhiyong Chen
, Jiarong Wu
, Shing-Chi Cheung
, Chang Xu
:
JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models. 870-882 - Zhilin Li
, Xutong Ma
, Mengze Hu, Jun Yan
:
Detecting Element Accessing Bugs in C++ Sequence Containers. 883-894 - Jialuo Chen
, Jingyi Wang
, Xiyue Zhang
, Youcheng Sun
, Marta Kwiatkowska
, Jiming Chen, Peng Cheng
:
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection. 895-906 - Steven (Jiaxun) Tang
, Mingcan Xiang
, Yang Wang
, Bo Wu, Jianjun Chen, Tongping Liu:
Scaler: Efficient and Effective Cross Flow Analysis. 907-918 - Siyu Yu
, Yifan Wu
, Ying Li, Pinjia He:
Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing. 919-930 - Yongqi Han
, Qingfeng Du, Ying Huang
, Jiaqi Wu, Fulong Tian, Cheng He:
The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier. 931-943 - Yuanhong Lan
, Yifei Lu
, Minxue Pan, Xuandong Li:
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics. 944-956 - Yilun Wang
, Pengfei Chen
, Hui Dou
, Yiwen Zhang
, Guangba Yu
, Zilong He
, Haiyu Huang
:
FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows. 957-969 - Yinglong Zou
, Juan Zhai, Chunrong Fang
, Jiawei Liu
, Tao Zheng, Zhenyu Chen
:
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment. 970-981 - Xihao Zhang, Yi Song, Xiaoyuan Xie, Qi Xin, Chenliang Xing
:
Do not neglect what's on your hands: localizing software faults with exception trigger stream. 982-994 - Jiachi Chen
, Qingyuan Zhong
, Yanlin Wang
, Kaiwen Ning, Yongkun Liu, Zenan Xu, Zhe Zhao, Ting Chen, Zibin Zheng:
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code. 995-1006 - Zhenjiang Zhao
, Takahisa Toda, Takashi Kitamura:
Approximation-guided Fairness Testing through Discriminatory Space Analysis. 1007-1018 - Yin Wu
, Xiaofei Xie
, Chenyang Peng, Dijun Liu
, Hao Wu, Ming Fan, Ting Liu
, Haijun Wang:
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. 1019-1031 - Guilherme Cavalcanti
, Paulo Borba
, Leonardo dos Anjos, Jônatas Clementino:
Semistructured Merge with Language-Specific Syntactic Separators. 1032-1043 - Myungho Lee, Jiseong Bak
, Seokhyeon Moon, Yoonchan Jhi, Hakjoo Oh:
Effective Unit Test Generation for Java Null Pointer Exceptions. 1044-1056 - Yidan Wang
, Zhouruixing Zhu
, Qiuai Fu
, Yuchi Ma, Pinjia He:
MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data. 1057-1068 - Junwei Chen, Yueling Zhang, Lingfeng Zhang
, Min Zhang
, Chengcheng Wan
, Ting Su, Geguang Pu:
FIPSER: Improving Fairness Testing of DNN by Seed Prioritization. 1069-1081 - Zhongyi Wang
, Linyu Yang
, Mingshuai Chen
, Yixuan Bu
, Zhiyang Li
, Qiuye Wang
, Shengchao Qin
, Xiao Yi, Jianwei Yin:
Parf: Adaptive Parameter Refining for Abstract Interpretation. 1082-1093 - Zifan Xie
, Ming Wen, Zichao Wei
, Hai Jin:
Unveiling the Characteristics and Impact of Security Patch Evolution. 1094-1106 - Lei Tao
, Shenglin Zhang, Zedong Jia, Jinrui Sun, Minghua Ma
, Zhengdan Li, Yongqian Sun
, Canqun Yang, Yuzhi Zhang, Dan Pei:
Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization. 1107-1119 - Kallistos Weis
, Leopoldo Teixeira, Clemens Dubslaff
, Sven Apel
:
Blackbox Observability of Features and Feature Interactions. 1120-1132 - Yifan Zhao
, Yizhou Chen
, Zeyu Sun
, Qingyuan Liang
, Guoqing Wang
, Dan Hao
:
Spotting Code Mutation for Predictive Mutation Testing. 1133-1145 - Yiheng Huang
, Ruisi Wang
, Wen Zheng
, Zhuotong Zhou
, Susheng Wu, Shulin Ke, Bihuan Chen, Shan Gao, Xin Peng
:
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching. 1146-1158 - Xiaobing Sun
, Xingan Gao
, Sicong Cao
, Lili Bo, Xiaoxue Wu, Kaifeng Huang
:
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection. 1159-1170 - Feifei Li
, Xiao Chen
, Xi Xiao
, Xiaoyu Sun
, Chuan Chen
, Shaohua Wang, Jitao Han:
Incremental Context-free Grammar Inference in Black Box Settings. 1171-1182 - Yongqian Sun
, Binpeng Shi
, Mingyu Mao, Minghua Ma
, Sibo Xia
, Shenglin Zhang, Dan Pei:
ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems. 1183-1194 - Tobias Roth
, Julius Näumann, Dominik Helm
, Sven Keidel
, Mira Mezini
:
AXA: Cross-Language Analysis through Integration of Single-Language Analyses. 1195-1205 - Kisub Kim
, Jounghoon Kim
, Byeongjo Park, Dongsun Kim
, Chun Yong Chong
, Yuan Wang, Tiezhu Sun
, Daniel Tang
, Jacques Klein
, Tegawendé F. Bissyandé
:
DataRecipe - How to Cook the Data for CodeLLM? 1206-1218 - Jian Shen
, Zhong Li, Minxue Pan, Xuandong Li:
Prioritizing Test Inputs for DNNs Using Training Dynamics. 1219-1231 - Narges Khakpour
, Charilaos Skandylas
:
Compositional Security Analysis of Dynamic Component-based Systems. 1232-1244 - Zhong Li, Chong Zhang, Minxue Pan, Tian Zhang
, Xuandong Li:
AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models. 1245-1257 - Zejun Wang, Kaibo Liu
, Ge Li, Zhi Jin
:
HITS: High-coverage LLM-based Unit Test Generation via Method Slicing. 1258-1268 - Zirui Song
, Yutong Zhou, Shuaike Dong, Ke Zhang
, Kehuan Zhang:
TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning. 1269-1281 - Junjie Huang
, Daya Guo
, Chenglong Wang
, Jiazhen Gu
, Shuai Lu
, Jeevana Priya Inala
, Cong Yan
, Jianfeng Gao
, Nan Duan
, Michael R. Lyu
:
Contextualized Data-Wrangling Code Generation in Computational Notebooks. 1282-1294 - Yingying Wang
, Sarah Bornais
, Julia Rubin
:
Microservice Decomposition Techniques: An Independent Tool Comparison. 1295-1307 - Muzi Qu, Jie Liu
, Liangyi Kang, Shuai Wang, Dan Ye, Tao Huang:
Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code. 1308-1318 - Huan Zhang
, Wei Cheng
, Yuhan Wu
, Wei Hu
:
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven Refinement. 1319-1331 - Chico Sundermann
, Jacob Loth, Thomas Thüm
:
Efficient Slicing of Feature Models via Projected d-DNNF Compilation. 1332-1344 - Di Wu
, Fangwen Mu
, Lin Shi
, Zhaoqiang Guo
, Kui Liu
, Weiguang Zhuang, Yuqi Zhong
, Li Zhang
:
iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring. 1345-1357 - Wenkai Li, Xiaoqi Li
, Zongwei Li
, Yuqing Zhang
:
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts. 1358-1369 - Chuan Yan
, Ruomai Ren
, Mark Huasong Meng
, Liuhuo Wan
, Tian Yang Ooi
, Guangdong Bai
:
Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security. 1370-1382 - Davide Corradini
, Zeno Montolli, Michele Pasqua, Mariano Ceccato
:
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning. 1383-1394 - Muhammad A. A. Pirzada
, Giles Reger
, Ahmed Bhayat
, Lucas C. Cordeiro
:
LLM-Generated Invariants for Bounded Model Checking Without Loop Unrolling. 1395-1407 - Zongze Jiang
, Ming Wen, Jialun Cao
, Xuanhua Shi, Hai Jin:
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation. 1408-1420 - Mahtab Nejati
, Mahmoud Alfadel
, Shane McIntosh:
Understanding the Implications of Changes to Build Systems. 1421-1433 - Igor Wodiany
, Antoniu Pop, Mikel Luján:
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries. 1434-1446 - Susheng Wu, Ruisi Wang
, Kaifeng Huang
, Yiheng Cao
, Wenyan Song, Zhuotong Zhou
, Yiheng Huang
, Bihuan Chen, Xin Peng
:
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities. 1447-1459 - Xueyang Li
, Guozhu Meng, Shangqing Liu, Lu Xiang, Kun Sun, Kai Chen, Xiapu Luo
, Yang Liu
:
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models. 1460-1471 - Lili Bo, Wangjie Ji, Xiaobing Sun
, Ting Zhang
, Xiaoxue Wu, Ying Wei:
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT. 1472-1483 - Yangsen Wang
, Yizhou Chen
, Yifan Zhao
, Zhihao Gong, Junjie Chen, Dan Hao
:
Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training. 1484-1496 - Shuncheng Tang, Zhenya Zhang
, Jixiang Zhou, Lei Lei, Yuan Zhou
, Yinxing Xue:
LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language Models. 1497-1508 - Minghai Lu
, Benjamin Delaware
, Tianyi Zhang:
Proof Automation with Large Language Models. 1509-1520 - Nick Feng, Lina Marsso
, Marsha Chechik
:
Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects. 1521-1532 - Yanzhou Mu
, Juan Zhai, Chunrong Fang
, Xiang Chen
, Zhixiang Cao, Peiran Yang
, Yinglong Zou
, Tao Zheng, Zhenyu Chen
:
DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation. 1533-1544 - Ming Zhu, Mohimenul Karim
, Ismini Lourentzou
, Daphne Yao
:
Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data. 1545-1556 - Guofeng Zhang
, Luyao Liu, Zhenbang Chen
, Ji Wang:
Hybrid Regression Test Selection by Integrating File and Method Dependences. 1557-1569 - Haijun Wang, Yurui Hu, Hao Wu, Dijun Liu
, Chenyang Peng, Yin Wu
, Ming Fan, Ting Liu
:
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. 1570-1582 - Noble Saji Mathews
, Meiyappan Nagappan
:
Test-Driven Development and LLM-based Code Generation. 1583-1594 - Ming Fan, Jifei Shi
, Yin Wang
, Le Yu
, Xicheng Zhang, Haijun Wang, Wuxia Jin
, Ting Liu
:
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps. 1595-1606 - Lin Yang
, Chen Yang
, Shutao Gao, Weijing Wang
, Bo Wang
, Qihao Zhu, Xiao Chu, Jianyi Zhou
, Guangtai Liang, Qianxiang Wang, Junjie Chen:
On the Evaluation of Large Language Models in Unit Test Generation. 1607-1619 - Shiwei Feng
, Yapeng Ye
, Qingkai Shi, Zhiyuan Cheng
, Xiangzhe Xu
, Siyuan Cheng
, Hongjun Choi, Xiangyu Zhang:
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation. 1620-1632 - Zhuotong Zhou
, Yongzhuo Yang, Susheng Wu, Yiheng Huang
, Bihuan Chen, Xin Peng
:
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing. 1633-1644 - Sunny Shree
, Krishna Khadka
, Yu Lei
, Raghu N. Kacker, D. Richard Kuhn:
Constructing Surrogate Models in Machine Learning Using Combinatorial Testing and Active Learning. 1645-1654 - Mingyang Yin, Yutaro Kashiwa, Keheliya Gallaba
, Mahmoud Alfadel
, Yasutaka Kamei, Shane McIntosh:
Developer-Applied Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns. 1655-1666 - Yin Wang
, Ming Fan, Hao Zhou
, Haijun Wang, Wuxia Jin
, Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang
, Deqiang Han, Ting Liu:
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs. 1667-1679 - Shenglin Zhang, Yuhe Ji
, Jiaqi Luan
, Xiaohui Nie
, Ziang Chen
, Minghua Ma
, Yongqian Sun
, Dan Pei:
End-to-End AutoML for Unsupervised Log Anomaly Detection. 1680-1692 - Mouxiang Chen
, Zhongxin Liu
, He Tao, Yusu Hong, David Lo
, Xin Xia
, Jianling Sun:
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests. 1693-1705 - Jiuang Zhao
, Donghao Yang
, Li Zhang
, Xiaoli Lian
, Zitian Yang
, Fang Liu:
Enhancing Automated Program Repair with Solution Design. 1706-1718 - Youngjae Kim, Yechan Park, Seungheon Han
, Jooyong Yi:
Enhancing the Efficiency of Automated Program Repair via Greybox Analysis. 1719-1731 - Yu Zhao
, Lina Gong
, Zhiqiu Huang, Yongwei Wang
, Mingqiang Wei, Fei Wu:
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection? 1732-1744 - Elvan Kula
, Arie van Deursen
, Georgios Gousios
:
Context-Aware Automated Sprint Plan Generation for Agile Software Development. 1745-1756 - Chengpeng Li
, Abdelrahman Baz
, August Shi:
Reducing Test Runtime by Transforming Test Fixtures. 1757-1769 - Huan Xie
, Yan Lei, Maojin Li, Meng Yan
, Sheng Zhang:
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection. 1770-1782 - Md Shafiuzzaman, Achintya Desai, Laboni Sarker
, Tevfik Bultan
:
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation. 1783-1794 - Zunchen Huang
, Srivatsan Ravi
, Chao Wang
:
Discovering Likely Program Invariants for Persistent Memory. 1795-1807 - Wonseok Oh
, Hakjoo Oh:
Towards Effective Static Type-Error Detection for Python. 1808-1820 - Syeda Mashal Abbas Zaidi, Shahpar Khan, Parjanya Vyas, Yousra Aafer:
A Longitudinal Analysis Of Replicas in the Wild Wild Android. 1821-1833 - Damien Jaime
, Pascal Poizat, Joyce El Haddad
, Thomas Degueule
:
Balancing the Quality and Cost of Updating Dependencies. 1834-1845 - Fengjuan Gao, Hongyu Chen
, Yuewei Zhou, Ke Wang:
Shoot Yourself in the Foot - Efficient Code Causes Inefficiency in Compiler Optimizations. 1846-1857 - Dominic Troppmann
, Aurore Fass
, Cristian-Alexandru Staicu
:
Typed and Confused: Studying the Unexpected Dangers of Gradual Typing. 1858-1870 - Jingtao Xia, Junrui Liu
, Nicholas Brown
, Yanju Chen
, Yu Feng
:
Refinement Types for Visualization. 1871-1881 - Jiale Amber Wang, Kaiyuan Wang, Pengyu Nie
:
Efficient Incremental Code Coverage Analysis for Regression Test Suites. 1882-1894 - Jia Feng, Jiachen Liu, Cuiyun Gao, Chun Yong Chong
, Chaozheng Wang
, Shan Gao, Xin Xia
:
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code. 1895-1906 - Yali Du
, Hui Sun
, Ming Li:
A Joint Learning Model with Variational Interaction for Multilingual Program Translation. 1907-1918 - Zifan Xie
, Ming Wen, Tinghan Li, Yiding Zhu, Qinsheng Hou
, Hai Jin:
How Does Code Optimization Impact Third-party Library Detection for Android Applications? 1919-1931 - Jian Zhang, Chong Wang, Anran Li, Wenhan Wang, Tianlin Li, Yang Liu:
VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair. 1932-1944
Industry Showcase
- Martin Schäf
, Berk Çirisci
, Linghui Luo
, Muhammad Numair Mansur, Omer Tripp, Daniel Sanchez, Qiang Zhou
, Muhammad Bilal Zafar:
Understanding Developer-Analyzer Interactions in Code Reviews. 1945-1955 - Arthur Vitui
, Tse-Hsun Chen
:
MLOLET - Machine Learning Optimized Load and Endurance Testing: An industrial experience report. 1956-1966 - Lei Liao, Junjie Wang
, Zhensheng Xu
, Fangwen Mu
, Yukun Yang:
Vehicle Domain-Specific Language: Unifying Modeling and Code Generation for Low-Code Automotive Development. 1967-1972 - Sidong Feng
, Haochuan Lu, Jianqin Jiang, Ting Xiong, Likun Huang
, Yinglin Liang
, Xiaoqin Li, Yuetang Deng, Aldeida Aleti
:
Enabling Cost-Effective UI Automation Testing with Retrieval-Based LLMs: A Case Study in WeChat. 1973-1978 - Guillaume Haben
, Sarra Habchi
, John Micco, Mark Harman
, Mike Papadakis
, Maxime Cordy, Yves Le Traon
:
The Importance of Accounting for Execution Failures when Predicting Test Flakiness. 1979-1989 - Xinyi Zheng
, Chen Wei
, Shenao Wang
, Yanjie Zhao
, Peiming Gao
, Yuanchao Zhang
, Kailong Wang
, Haoyu Wang
:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. 1990-2001 - Shinobu Saito
, Yukako Iimura, Emad Aghayi, Thomas D. LaToza
:
How many pomodoros do professional engineers need to complete a microtask of programming? 2002-2012 - Yifan Wang
, Pierre Bourhis, Romain Rouvoy
, Patrick Royer
:
Challenges & Opportunities in Automating DBMS: A Qualitative Study. 2013-2023 - Man Zhang, Andrea Arcuri
, Piyun Teng, Kaiming Xue, Wenhao Wang:
Seeding and Mocking in White-Box Fuzzing Enterprise RPC APIs: An Industrial Case Study. 2024-2034 - Shiyan Peng
, Yuan Zhang
, Jiarun Dai
, Yue Gu
, Zhuoxiang Shen
, Jingcheng Liu, Lin Wang, Yong Chen, Yu Qin, Lei Ai, Xianfeng Lu, Min Yang:
Applying Fuzz Driver Generation to Native C/C++ Libraries of OEM Android Framework: Obstacles and Solutions. 2035-2040 - Lei Liu
, So Hasegawa
, Shailaja Keyur Sampat
, Maria Xenochristou, Wei-Peng Chen
, Takashi Kato
, Taisei Kakibuchi, Tatsuya Asai:
AutoDW: Automatic Data Wrangling Leveraging Large Language Models. 2041-2052 - Haoyu Liao
, Jianmei Guo
, Bo Huang
, Yujie Han, Dingyu Yang
, Kai Shi, Jonathan Ding, Guoyao Xu, Guodong Yang, Liping Zhang
:
DeployFix: Dynamic Repair of Software Deployment Failures via Constraint Solving. 2053-2064 - Haonan Zhang
, Lizhi Liao
, Zishuo Ding, Weiyi Shang, Nidhi Narula, Catalin Sporea, Andrei Toma
, Sarah Sajedi
:
Towards a Robust Waiting Strategy for Web GUI Testing for an Industrial Software System. 2065-2076 - Shivali Agarwal
, Hiroaki Nakamura, Rami Katan:
Experience Report on Applying Program Analysis Techniques for Mainframe Application Understanding. 2077-2086 - Jian Zhao
, Shenao Wang
, Yanjie Zhao
, Xinyi Hou, Kailong Wang
, Peiming Gao
, Yuanchao Zhang, Chen Wei
, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. 2087-2098 - Zikan Dong
, Yanjie Zhao
, Tianming Liu
, Chao Wang
, Guosheng Xu, Guoai Xu, Lin Zhang, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. 2099-2109 - Stefan Alexander van Heijningen
, Theo Wiik, Francisco Gomes de Oliveira Neto
, Gregory Gay
, Kim Viggedal, David Friberg
:
Integrating Mutation Testing Into Developer Workflow: An Industrial Case Study. 2110-2120 - Dino Distefano
, Matteo Marescotti, Cons Åhs
, Sopot Cela
, Gabriela Cunha Sampaio, Radu Grigore, Ákos Hajdu, Timotej Kapus, Ke Mao, Thibault Suzanne:
Enhancing Compositional Static Analysis with Dynamic Analysis. 2121-2129 - Asmar Muqeet
, Shaukat Ali
, Paolo Arcaini
:
Quantum Program Testing Through Commuting Pauli Strings on IBM's Quantum Computers. 2130-2141 - Christian Gilbertson
, Reed Milewicz
, Eric Berquist, Aaron Brundage
, John Engelmann, Brian Evans, Nicholas Francis, Ernest Friedman-Hill
, Samuel Grayson
, Evan Harvey
, Eric Ho, Edward Hoffman, Kevin Irick, Anagha Krishna, Aaron Moreno, Joshua B. Teves:
Towards Long-Term Scientific Model Sustainment at Sandia National Laboratories. 2142-2147 - Priyam Sahoo
, Saurabh Pujar, Ganesh Nalawade, Richard Genhardt, Louis Mandel
, Luca Buratti
:
Ansible Lightspeed: A Code Generation Service for IT Automation. 2148-2158 - Heyuan Shi
, Shijun Chen, Runzhe Wang, Yuhan Chen, Weibo Zhang
, Qiang Zhang, Yuheng Shen, Xiaohai Shi, Chao Hu
, Yu Jiang
:
Industry Practice of Directed Kernel Fuzzing for Open-source Linux Distribution. 2159-2169 - Zhixing Xu
, Shengjian Guo
, Oksana Tkachuk, Saeed Nejati
, Niloofar Razavi, George Argyros:
Cloud Resource Protection via Automated Security Property Reasoning. 2170-2175 - Liu Wang
, Haoyu Wang, Tao Zhang
, Haitao Xu
, Guozhu Meng, Peiming Gao
, Chen Wei
, Yi Wang
:
Android Malware Family Labeling: Perspectives from the Industry. 2176-2186 - Dmytro Humeniuk
, Houssem Ben Braiek, Thomas Reid, Foutse Khomh:
In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators. 2187-2198
New Ideas and Emerging Results (NIER)
- Sriteja Kummita
, Zenong Zhang
, Eric Bodden
, Shiyi Wei:
Visualizing and Understanding the Internals of Fuzzing. 2199-2204 - Sébastien Gios
, Charles-Henry Bertrand Van Ouytsel
, Mark Diamantino Caribé
, Axel Legay:
A vision on a methodology for the application of an Intrusion Detection System for satellites. 2205-2209 - Elijah Kayode Adejumo
, Brittany Johnson:
Towards Leveraging LLMs for Reducing Open Source Onboarding Information Overload. 2210-2214 - Omar I. Al-Bataineh:
Automated Repair of Multi-fault Programs: Obstacles, Approaches, and Prospects. 2215-2219 - Omar I. Al-Bataineh:
A Formal Treatment of Performance Bugs. 2220-2224 - Yuanlin Li
, Zhiwei Xu
, Min Zhou
, Hai Wan, Xibin Zhao:
Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network. 2225-2229 - Beiqi Zhang, Peng Liang, Qiong Feng
, Yujia Fu, Zengyang Li:
Copilot-in-the-Loop: Fixing Code Smells in Copilot-Generated Python Code using Copilot. 2230-2234 - Luqiao Wang, Yangtao Zhou
, Huiying Zhuang
, Qingshan Li, Di Cui
, Yutong Zhao
, Lu Wang
:
Unity Is Strength: Collaborative LLM-Based Agents for Code Reviewer Recommendation. 2235-2239 - Mojtaba Eshghie
, Cyrille Artho:
Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs. 2240-2248 - Zheng Zhao, Hongxiang Jiang, Ran Zhao, Bing He:
Emergence of A Novel Domain Expert: A Generative AI-based Framework for Software Function Point Analysis. 2245-2250 - Aakash Sorathiya
, Gouri Ginde
:
Towards Extracting Ethical Concerns-related Software Requirements from App Reviews. 2251-2255 - Jobayer Ahmmed
, Myra B. Cohen
, Paul Gazzillo
:
Towards Automated Configuration Documentation. 2256-2261 - Usman Gohar
, Michael C. Hunter, Robyn R. Lutz
, Myra B. Cohen
:
CoDefeater: Using LLMs To Find Defeaters in Assurance Cases. 2262-2267 - Chi Zhang
, Zifan Wang, Ruoshi Zhao
, Ravi Mangal, Matt Fredrikson
, Limin Jia
, Corina S. Pasareanu:
Attacks and Defenses for Large Language Models on Coding Tasks. 2268-2272 - Abdelrahman Baz
, Minchao Huang
, August Shi:
Prioritizing Tests for Improved Runtime. 2273-2278 - Chao Peng
, Qinyun Wu, Jiangchao Liu
, Jierui Liu, Bo Jiang, Mengqian Xu, Yinghao Wang, Xia Liu, Ping Yang
:
RepoSim: Evaluating Prompt Strategies for Code Completion via User Behavior Simulation. 2279-2283 - Takashi Kitamura, Sousuke Amasaki, Jun Inoue, Yoshinao Isobe, Takahisa Toda:
Toward Individual Fairness Testing with Data Validity. 2284-2288 - Hala Abdelkader, Jean-Guy Schneider
, Mohamed Abdelrazek, Priya Rani, Rajesh Vasa
:
Towards Robust ML-enabled Software Systems: Detecting Out-of-Distribution data using Gini Coefficients. 2289-2293 - Mohamad Fazelnia
, Mehdi Mirakhorli
, Hamid Bagheri:
Translation Titans, Reasoning Challenges: Satisfiability-Aided Language Models for Detecting Conflicting Requirements. 2294-2298 - Diganta Mukhopadhyay, Sanaa Siddiqui
, Hrishikesh Karmarkar
, Kumar Madhukar
, Guy Katz
:
Learning DNN Abstractions using Gradient Descent. 2299-2303 - Sunzhou Huang
, Xiaoyin Wang
:
Build Issue Resolution from the Perspective of Non-Contributors. 2304-2308 - Quentin Capdepon
, Nicolas Hlad, Benoît Verhaeghe
, Abdelhak-Djamel Seriai:
Assessing the feasibility of Micro frontend architecture in native mobile app development. 2309-2313 - Luciano Baresi
, Matteo Camilli
, Tommaso Dolci
, Giovanni Quattrocchi:
A Conceptual Framework for Quality Assurance of LLM-based Socio-critical Systems. 2314-2318 - Yueming Wu
, Chengwei Liu
, Zhengzi Xu, Lyuye Zhang, Yiran Zhang
, Zhiling Zhu
, Yang Liu
:
The Software Genome Project: Unraveling Software Through Genetic Principles. 2319-2323 - Ilya Kosorukov
, Daniel Blackwell
, David Clark
, Myra B. Cohen
, Justyna Petke
:
Mining for Mutation Operators for Reduction of Information Flow Control Violations. 2324-2328 - Xinyi Hou, Yanjie Zhao
, Shenao Wang
, Haoyu Wang:
GPTZoo: A Large-scale Dataset of GPTs for the Research Community. 2329-2333
DEMONSTRATION SESSION: Tool Demonstrations
- Bonan Ruan
, Jiahao Liu
, Weibo Zhao
, Zhenkai Liang:
VulZoo: A Comprehensive Vulnerability Intelligence Dataset. 2334-2337 - Mahja Sarschar, Gefei Zhang
, Annika Nowak:
PACGBI: A Pipeline for Automated Code Generation from Backlog Items. 2338-2341 - Marius Smytzek
, Martin Eberlein
, Kai Werk, Lars Grunske
, Andreas Zeller
:
FixKit: A Program Repair Collection for Python. 2342-2345 - Moritz Mock
, Jorge Melegati
, Max Kretschmann
, Nicolás E. Díaz Ferreyra
, Barbara Russo
:
MADE-WIC: Multiple Annotated Datasets for Exploring Weaknesses In Code. 2346-2349 - Che Wang
, Jiashuo Zhang, Jianbo Gao
, Libin Xia
, Zhi Guan, Zhong Chen:
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts. 2350-2353 - Kristian Kolthoff
, Christian Bartelt
, Simone Paolo Ponzetto, Kurt Schneider
:
Self-Elicitation of Requirements with Automated GUI Prototyping. 2354-2357 - Bohan Zhang
, Ankit Agrawal
:
DroneWiS: Automated Simulation Testing of small Unmanned Aerial System in Realistic Windy Conditions. 2358-2361 - Jana Chadt, Christoph Hochrainer
, Valentin Wüstholz, Maria Christakis:
Olympia: Fuzzer Benchmarking for Solidity. 2362-2365 - Orlando Amaral Cejas
, Sallam Abualhaija
, Lionel C. Briand
:
CompAi: A Tool for GDPR Completeness Checking of Privacy Policies using Artificial Intelligence. 2366-2369 - Qiong Feng
, Xiaotian Ma
, Huan Ji
, Wei Song
, Peng Liang:
Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor. 2370-2373 - Mengzhen Li
, Mattia Fazzini:
ARUS: A Tool for Automatically Removing Unnecessary Stubbings from Test Suites. 2374-2377 - Mojtaba Eshghie
, Cyrille Artho, Hans Stammler
, Wolfgang Ahrendt
, Thomas T. Hildebrandt
, Gerardo Schneider
:
HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts. 2378-2381 - Andrei Kozyrev
, Gleb Solovev
, Nikita Khramov
, Anton Podkopaev
:
CoqPilot, a plugin for LLM-based generation of proofs. 2382-2385 - Dirk Beyer
, Po-Chun Chien
, Marek Jankola
:
BenchCloud: A Platform for Scalable Performance Benchmarking. 2386-2389 - Florian Sihler
, Matthias Tichy
:
flowR: A Static Program Slicer for R. 2390-2393 - Jia Xu
, Weilin Du, Xiao Liu
, Xuejun Li
:
LLM4Workflow: An LLM-based Automated Workflow Model Generation Tool. 2394-2398 - Zhiyang Chen
, Ye Liu
, Sidi Mohamed Beillahi, Yi Li
, Fan Long
:
OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond. 2399-2402 - Runlin Liu
, Yuhang Lin, Yunge Hu
, Zhe Zhang, Xiang Gao
:
LLM-Based Java Concurrent Program to ArkTS Converter. 2403-2406 - Sahar Badihi
, Sami Nourji
, Julia Rubin
:
Slicer4D: A Slicing-based Debugger for Java. 2407-2410 - Yige Chen
, Sinan Wang
, Yida Tao, Yepang Liu
:
Model-based GUI Testing For HarmonyOS Apps. 2411-2414 - Atul Kumar, Diptikalyan Saha, Toshiaki Yasue
, Kohichi Ono, Saravanan Krishnan
, Sandeep Hans, Fumiko Satoh, Gerald Mitchell
, Sachin Kumar:
Automated Validation of COBOL to Java Transformation. 2415-2418 - Thomas Lemberger
, Henrik Wachowitz
:
CoVeriTeam GUI: A No-Code Approach to Cooperative Software Verification. 2419-2422
Student Research Competition
- Chenhao Cui
:
Finding Performance Issues in Rust Projects. 2423-2425 - Hongyu Chen
:
Efficient Code Causes Inefficiency in Compiler Optimizations. 2426-2428 - Atish Kumar Dipongkor
:
Can Large Language Models Comprehend Code Stylometry? 2429-2431 - Ramsha Ali:
Mining and Recommending Mobile App Features using Data-driven Analytics. 2432-2434 - Zihao Rao:
Semi-Automated Verification of Interior Unsafe Code Encapsulation in Real-World Rust Systems. 2435-2437
POSTER SESSION: Posters
- Yoli Shavit
, Kathy Razmadze, Gary Mataev, Hanan Shteingart
, Eitan Zahavi, Zachi Binshtock:
SemantiLog: Log-based Anomaly Detection with Semantic Similarity. 2438-2439 - Andrea Lops
, Fedelucio Narducci
, Azzurra Ragone
, Michelantonio Trizio:
AgoneTest: Automated creation and assessment of Unit tests leveraging Large Language Models. 2440-2441 - Tao Wang
, Wei Chen, Liwei Liu
, Guoquan Wu, Jun Wei
, Tao Huang:
Match Word with Deed: Maintaining Consistency for IoT Systems with Behavior Models. 2442-2443 - Haitao Zhang, Jing Wang
, Ziyue Wang, Ziyi Zhao, Zhuo Cheng
:
A Pixel-Level Explainable Approach of Convolutional Neural Networks and Its Application. 2444-2445 - Uwe Gropengießer
, Julian Liphardt
, Michael Matthé
, Max Mühlhäuser
:
Feature Model Slicing for Real-time Selection of Mission-critical Edge Applicaiton. 2446-2447 - Yang Luo, Richard Yu, Fajun Zhang, Ling Liang, Yongqiang Xiong:
Bridging Gaps in LLM Code Translation: Reducing Errors with Call Graphs and Bridged Debuggers. 2448-2449 - Yonghao Long
, Yuanyuan Chen
, Xiangping Chen
:
GUI Test Repair Based on Test-Extension. 2450-2451 - Laboni Sarker
, Tevfik Bultan
:
Quantitative Symbolic Non-Equivalence Analysis. 2452-2453 - Ruixue Li, Bin Yu
, Xu Lu
, Lei Ke
, Jiawei Chen, Zixuan Yuan, Jingxian Wang
, Cong Tian, Yansong Dong:
Detecting Atomicity Violations for Interrupt-driven Programs via Systematic Scheduling and Prefix-directed Feedback. 2454-2455 - Yiyun Chen, Fuxiang Chen, Mijung Kim, Fatemeh H. Fard
:
Studying Versioning in Stack Overflow. 2456-2457 - Xiaofan Liu
, Xunjin Zheng, Cai Fu, Xiaoheng Xie
, Peng Di:
GrayDuck: The Sword of Damocles for Duck Typing in Dynamic Language Deserialization. 2458-2459 - Björn Karthein
, Cristian-Alexandru Staicu
, Andreas Zeller
:
A Generalized Approach for Solving Web Form Constraints. 2460-2461 - Yanchun Sun, Jiawei Wu, Xiaohan Zhao, Haizhou Xu, Sihan Wang, Jiaqi Zhang, Ye Zhu, Gang Huang:
Automatically Deriving Developers' Technical Expertise from the GitHub Social Network. 2462-2463 - Wendkûuni C. Ouédraogo, Abdoul Kader Kaboré
, Haoye Tian
, Yewei Song
, Anil Koyuncu, Jacques Klein
, David Lo
, Tegawendé F. Bissyandé
:
LLMs and Prompting for Unit Test Generation: A Large-Scale Evaluation. 2464-2465 - Ming Liang
, Xiaoheng Xie
, Gehao Zhang, Xunjin Zheng, Peng Di, Wei Jiang, Hongwei Chen, Chengpeng Wang
, Gang Fan:
RepoGenix: Dual Context-Aided Repository-Level Code Completion with Language Models. 2466-2467 - Mashal Afzal Memon
, Marco Autili
, Gianluca Filippone
, Gian Luca Scoccia
, Paola Inverardi
:
A High-level Architecture of an Automated Context-aware Ethics-based Negotiation Approach. 2468-2469 - Sohee Park
, Ryeonggu Kwon
, Gihwon Kwon:
Assessing Open Source Software Survivability using Kaplan-Meier Survival Function and Polynomial Regression. 2470-2471 - Mojtaba Mostafavi Ghahfarokhi, Hamed Jahantigh, Sepehr Kianiangolafshani, Ashkan Khademian, Alireza Asadi
, Abbas Heydarnoori
:
Can Code Metrics Enhance Documentation Generation for Computational Notebooks? 2472-2473 - Micheline Bénédicte Moumoula
, Abdoul Kader Kaboré
, Jacques Klein
, Tegawendé F. Bissyandé
:
Cross-lingual Code Clone Detection: When LLMs Fail Short Against Embedding-based Classifier. 2474-2475 - Konrad Cinkusz
, Jaroslaw A. Chudziak
:
Towards LLM-augmented multiagent systems for agile software engineering. 2476-2477 - Yang Yue
, Yi Wang
, David F. Redmiles
:
IdeoRate: Towards a Semi-automated Assessment Methodology for OSS Ideologies. 2478-2479 - Daniel Ogenrwot
, John Businge
:
PatchTrack: Analyzing ChatGPT's Impact on Software Patch Decision-Making in Pull Requests. 2480-2481 - Wenkai Li, Zhijie Liu, Xiaoqi Li
, Sen Nie:
Detecting Malicious Accounts in Web3 through Transaction Graph. 2482-2483 - Zhiyuan Chen
, Soham Sanjay Deo, Poorna Chander Reddy Puttaparthi
, Yiming Tang
, Xueling Zhang
, Weiyi Shang:
From Logging to Leakage: A Study of Privacy Leakage in Android App Logs. 2484-2485 - Hieu Huynh
, Quoc-Tri Le, Tien N. Nguyen, Vu Nguyen
:
Using LLM for Mining and Testing Constraints in API Testing. 2486-2487 - Khubaib Amjad Alam
, Ramsha Ali, Zyena Kamran
, Sabeen Fatima, Irum Inayat:
A Data-driven Approach for Mining Software Features based on Similar App Descriptions and User Reviews Analysis. 2488-2489
Doctoral Symposium
- Florian Sihler
:
Improving the Comprehension of R Programs by Hybrid Dataflow Analysis. 2490-2493 - Yangruibo Ding
:
Semantic-aware Source Code Modeling. 2494-2497 - Simin Sun:
Enhancing Software Design and Developer Experience Via LLMs. 2498-2501 - Bachir Bendrissou
:
Syntactic Resilience in Greybox Fuzzing: Automated Error Recovery. 2502-2505 - Alexis Butler
:
Software Supply Chain Risk: Characterization, Measurement & Attenuation. 2506-2509 - Zhiyuan Chen
:
A Comprehensive Study of Privacy Leakage Vulnerability in Android App Logs. 2510-2513 - Vikram Nitin
:
Using AI to Automate the Modernization of Legacy Software Applications. 2514-2517

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.