Abstract is missing.
- Message from the ICSE 2023 Program Co-ChairsLori L. Pollock, Massimiliano Di Penta. [doi]
- Future Software for Life in Trusted FuturesSarah Pink. 1 [doi]
- Predicting Bugs by Monitoring Developers During Task ExecutionGennaro Laudato, Simone Scalabrino, Nicole Novielli, Filippo Lanubile, Rocco Oliveto. 1-13 [doi]
- The Road Toward Dependable AI Based SystemsPaolo Tonella. 2 [doi]
- Software Engineering as the Linchpin of Responsible AILiming Zhu 0001. 3-4 [doi]
- One Adapter for All Programming Languages? Adapter Tuning for Code Search and SummarizationDeze Wang, Boxing Chen, Shanshan Li 0001, Wei Luo, Shaoliang Peng, Wei Dong 0006, Xiangke Liao. 5-16 [doi]
- CCRep: Learning Code Change Representations via Pre-Trained Code Model and Query BackZhongxin Liu, Zhijie Tang, Xin Xia 0001, Xiaohu Yang 0001. 17-29 [doi]
- Keeping Pace with Ever-Increasing Data: Towards Continual Learning of Code Intelligence ModelsShuzheng Gao, Hongyu Zhang 0002, Cuiyun Gao, Chaozheng Wang. 30-42 [doi]
- Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input SpacesHaoxiang Jia, Ming Wen 0001, Zifan Xie, Xiaochen Guo, Rongxin Wu, Maolin Sun, Kang Chen, Hai Jin 0001. 43-55 [doi]
- JITfuzz: Coverage-guided Fuzzing for JVM Just-in-Time CompilersMingyuan Wu, Minghai Lu, Heming Cui, Junjie Chen 0003, Yuqun Zhang, Lingming Zhang 0001. 56-68 [doi]
- Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering InputsMaolin Sun, Yibiao Yang, Ming Wen 0001, Yongcong Wang, Yuming Zhou, Hai Jin 0001. 69-81 [doi]
- Regression Fuzzing for Deep Learning SystemsHanmo You, Zan Wang, Junjie Chen 0003, Shuang Liu 0007, Shuochuan Li. 82-94 [doi]
- Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF ReadersSuyue Guo, Xinyu Wan, Wei You, Bin Liang, Wenchang Shi, YiWei Zhang, Jianjun Huang 0001, Jian Zhang. 95-107 [doi]
- The untold story of code refactoring customizations in practiceDaniel Oliveira 0005, Wesley K. G. Assunção, Alessandro F. Garcia 0001, Ana Carla Bibiano, Márcie Ribeiro, Rohit Gheyi, Baldoino Fonseca. 108-120 [doi]
- Data Quality for Software Vulnerability DatasetsRoland Croft, Muhammad Ali Babar 0001, M. Mehdi Kholoosi. 121-133 [doi]
- Do code refactorings influence the merge effort?André Oliveira, Vânia Neves, Alexandre Plastino 0001, Ana Carla Bibiano, Alessandro F. Garcia 0001, Leonardo Murta 0001. 134-146 [doi]
- A Comprehensive Study of Real-World Bugs in Machine Learning Model OptimizationHao Guan, Ying Xiao, Jiaying Li, Yepang Liu 0001, Guangdong Bai. 147-158 [doi]
- Evaluating the Impact of Experimental Assumptions in Automated Fault LocalizationEzekiel O. Soremekun, Lukas Kirschner, Marcel Böhme, Mike Papadakis. 159-171 [doi]
- Locating Framework-specific Crashing Faults with Compact and Explainable Candidate SetJiwei Yan, Miaomiao Wang, Yepang Liu 0001, Jun Yan 0009, Long Zhang. 172-183 [doi]
- PExReport: Automatic Creation of Pruned Executable Cross-Project Failure ReportsSunzhou Huang, Xiaoyin Wang. 184-195 [doi]
- RAT: A Refactoring-Aware Traceability Model for Bug LocalizationFeifei Niu, Wesley K. G. Assunção, LiGuo Huang, Christoph Mayr-Dorn, JiDong Ge, Bin Luo 0003, Alexander Egyed. 196-207 [doi]
- How Do We Read Formal Claims? Eye-Tracking and the Cognition of Proofs about AlgorithmsHammad Ahmad, Zachary Karas, Kimberly Diaz, Amir Kamil, Jean-Baptiste Jeannin, Westley Weimer. 208-220 [doi]
- Which of My Assumptions are Unnecessary for Realizability and Why Should I Care?Rafi Shalom, Shahar Maoz. 221-232 [doi]
- UPCY: Safely Updating Outdated DependenciesAndreas Dann, Ben Hermann 0001, Eric Bodden. 233-244 [doi]
- APICAD: Augmenting API Misuse Detection through Specifications from Code and DocumentsXiaoke Wang, Lei Zhao. 245-256 [doi]
- Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic AnalysisSen Yang, Sen Chen, Lingling Fan 0003, Sihan Xu, Zhanwei Hui, Song Huang. 257-269 [doi]
- OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting FunctionsJiahui Wu, Zhengzi Xu, Wei Tang, Lyuye Zhang, Yueming Wu, Chengyue Liu, Kairan Sun, Lida Zhao, Yang Liu. 270-282 [doi]
- Smartmark: Software Watermarking Scheme for Smart ContractsTaeyoung Kim, Yunhee Jang, Chanjong Lee, Hyungjoon Koo, Hyoungshick Kim. 283-294 [doi]
- Turn the Rudder: A Beacon of Reentrancy Detection for Smart Contracts on EthereumZibin Zheng, Neng Zhang 0001, Jianzhong Su, Zhijie Zhong, Mingxi Ye, Jiachi Chen. 295-306 [doi]
- BSHUNTER: Detecting and Tracing Defects of Bitcoin ScriptsPeilin Zheng, Xiapu Luo, Zibin Zheng. 307-318 [doi]
- Do I Belong? Modeling Sense of Virtual Community Among Linux Kernel ContributorsBianca Trinkenreich, Klaas-Jan Stol, Anita Sarma, Daniel M. Germán, Marco Aurélio Gerosa, Igor Steinmacher. 319-331 [doi]
- Comparison and Evaluation of Clone Detection Techniques with Different Code RepresentationsYuekun Wang, Yuhang Ye, Yueming Wu, Weiwei Zhang, Yinxing Xue, Yang Liu. 332-344 [doi]
- Learning Graph-based Code Representations for Source-level Functional Similarity DetectionJiahao Liu, Jun Zeng, Xiang Wang 0010, Zhenkai Liang. 345-357 [doi]
- The Smelly Eight: An Empirical Study on the Prevalence of Code Smells in Quantum ComputingQihong Chen, Rúben Câmara, José Campos, André Souto, Iftekhar Ahmed 0001. 358-370 [doi]
- Reachable Coverage: Estimating Saturation in FuzzingDanushka Liyanage, Marcel Böhme, Chakkrit Tantithamthavorn, Stephan Lipp. 371-383 [doi]
- Learning Seed-Adaptive Mutation Strategies for Greybox FuzzingMyungho Lee, Sooyoung Cha, Hakjoo Oh. 384-396 [doi]
- Improving Java Deserialization Gadget Chain Mining via Overriding-Guided Object GenerationSicong Cao, Xiaobing Sun, Xiaoxue Wu, Lili Bo, Bin Li 0006, Rongxin Wu, Wei Liu, Biao He, Yu Ouyang, Jiajia Li. 397-409 [doi]
- Evaluating and Improving Hybrid FuzzingLing Jiang, Hengchen Yuan, Mingyuan Wu, Lingming Zhang 0001, Yuqun Zhang. 410-422 [doi]
- Robustification of Behavioral Designs against Environmental DeviationsChangjian Zhang, Tarang Saluja, Rômulo Meira-Góes, Matthew L. Bolton, David Garlan, Eunsuk Kang. 423-434 [doi]
- A Qualitative Study on the Implementation Design Decisions of DevelopersJenny T. Liang, Maryam Arab, Minhyuk Ko, Amy J. Ko, Thomas D. LaToza. 435-447 [doi]
- BFTDETECTOR: Automatic Detection of Business Flow Tampering for Digital Content ServiceI Luk Kim, Weihang Wang 0001, Yonghwi Kwon 0001, Xiangyu Zhang 0001. 448-459 [doi]
- FedSlice: Protecting Federated Learning Models from Malicious Participants with Model SlicingZiqi Zhang, Yuanchun Li, Bingyan Liu, Yifeng Cai, Ding Li 0001, Yao Guo 0001, Xiangqun Chen. 460-472 [doi]
- PTPDroid: Detecting Violated User Privacy Disclosures to Third-Parties of Android AppsZeya Tan, Wei Song. 473-485 [doi]
- Adhere: Automated Detection and Repair of Intrusive AdsYutian Yan, Yunhui Zheng, Xinyue Liu, Nenad Medvidovic, Weihang Wang 0001. 486-498 [doi]
- Bad Snakes: Understanding and Improving Python Package Index Malware ScanningDuc Ly Vu, Zachary Newman, John Speed Meyers. 499-511 [doi]
- FedDebug: Systematic Debugging for Federated Learning ApplicationsWaris Gill, Ali Anwar 0001, Muhammad Ali Gulzar. 512-523 [doi]
- Practical and Efficient Model Extraction of Sentiment Analysis APIsWeibin Wu, Jianping Zhang, Victor Junqiu Wei, Xixian Chen, Zibin Zheng, Irwin King, Michael R. Lyu. 524-536 [doi]
- CrossCodeBench: Benchmarking Cross-Task Generalization of Source Code ModelsChangan Niu, Chuanyi Li, Vincent Ng 0001, Bin Luo 0003. 537-549 [doi]
- ECSTATIC: An Extensible Framework for Testing and Debugging Configurable Static AnalysisAustin Mordahl, Zenong Zhang, Dakota Soles, Shiyi Wei. 550-562 [doi]
- Responsibility in Context: On Applicability of Slicing in Semantic Regression AnalysisSahar Badihi, Khaled Ahmed 0004, Yi Li 0008, Julia Rubin. 563-575 [doi]
- Does the Stream API Benefit from Special Debugging Facilities? A Controlled Experiment on Loops and Streams with Specific DebuggersJan Reichl, Stefan Hanenberg, Volker Gruhn. 576-588 [doi]
- Fonte: Finding Bug Inducing Commits from FailuresGabin An, Jingun Hong, Naryeong Kim, Shin Yoo. 589-601 [doi]
- RepresentThemAll: A Universal Learning Representation of Bug ReportsSen Fang, Tao Zhang 0001, Youshuai Tan, He Jiang 0001, Xin Xia 0001, Xiaobing Sun 0001. 602-614 [doi]
- Demystifying Exploitable Bugs in Smart ContractsZhuo Zhang, Brian Zhang, Wen Xu, Zhiqiang Lin. 615-627 [doi]
- Understanding and Detecting On-The-Fly Configuration BugsTeng Wang 0004, Zhouyang Jia, Shanshan Li 0001, Si Zheng, Yue Yu 0001, Erci Xu, Shaoliang Peng, Xiangke Liao. 628-639 [doi]
- Explaining Software Bugs Leveraging Code Structures in Neural Machine TranslationParvez Mahbub, Ohiduzzaman Shuvo, Mohammad Masudur Rahman 0001. 640-652 [doi]
- Is It Enough to Recommend Tasks to Newcomers? Understanding Mentoring on Good First IssuesXin Tan, Yiran Chen 0005, Haohua Wu, Minghui Zhou 0001, Li Zhang. 653-664 [doi]
- From Organizations to Individuals: Psychoactive Substance Use By Professional ProgrammersKaia Newman, Madeline Endres, Westley Weimer, Brittany Johnson. 665-677 [doi]
- On the Self-Governance and Episodic Changes in Apache Incubator Projects: An Empirical StudyLikang Yin, Xiyu Zhang, Vladimir Filkov. 678-689 [doi]
- Socio-Technical Anti-Patterns in Building ML-Enabled Software: Insights from Leaders on the ForefrontAlina Mailach, Norbert Siegmund. 690-702 [doi]
- Moving on from the Software Engineers' Gambit: An Approach to Support the Defense of Software Effort EstimatesPatrícia G. F. Matsubara, Igor Steinmacher, Bruno Gadelha, Tayana Conte. 703-715 [doi]
- Concrat: An Automatic C-to-Rust Lock API Translator for Concurrent ProgramsJaemin Hong, Sukyoung Ryu. 716-728 [doi]
- Triggers for Reactive Synthesis SpecificationsGal Amram, Dor Ma'ayan, Shahar Maoz, Or Pistiner, Jan Oliver Ringert. 729-741 [doi]
- Using Reactive Synthesis: An End-to-End Exploratory Case StudyDor Ma'ayan, Shahar Maoz. 742-754 [doi]
- Syntax and Domain Aware Model for Unsupervised Program TranslationFang Liu, Jia Li, Li Zhang. 755-767 [doi]
- Developer-Intent Driven Code Comment GenerationFangwen Mu, Xiao Chen 0015, Lin Shi 0006, Song Wang 0009, Qing Wang 0001. 768-780 [doi]
- Data Quality Matters: A Case Study of Obsolete Comment DetectionShengbin Xu, Yuan Yao 0001, Feng Xu 0007, Tianxiao Gu, Jingwei Xu 0001, Xiaoxing Ma. 781-793 [doi]
- Revisiting Learning-based Commit Message GenerationJinhao Dong, Yiling Lou, Dan Hao 0001, Lin Tan 0001. 794-805 [doi]
- Commit Message Matters: Investigating Impact and Evolution of Commit Message QualityJiawei Li, Iftekhar Ahmed 0001. 806-817 [doi]
- PILAR: Studying and Mitigating the Influence of Configurations on Log ParsingHetong Dai, Yiming Tang, Heng Li 0007, Weiyi Shang. 818-829 [doi]
- Did We Miss Something Important? Studying and Exploring Variable-Aware Log AbstractionZhenhao Li, Chuan Luo, Tse-Hsun Chen, Weiyi Shang, Shilin He, Qingwei Lin, Dongmei Zhang 0001. 830-842 [doi]
- On the Temporal Relations between Logging and CodeZishuo Ding, Yiming Tang, Yang Li, Heng Li 0007, Weiyi Shang. 843-854 [doi]
- How Do Developers' Profiles and Experiences Influence their Logging Practices? An Empirical Study of Industrial PractitionersGuoping Rong, Shenghui Gu, Haifeng Shen, He Zhang 0001, Hongyu Kuang. 855-867 [doi]
- When to Say What: Learning to Find Condition-Message InconsistenciesIslem Bouzenia, Michael Pradel. 868-880 [doi]
- SemParser: A Semantic Parser for Log AnalyticsYintong Huo, Yuxin Su 0001, Cheryl Lee, Michael R. Lyu. 881-893 [doi]
- Badge: Prioritizing UI Events with Hierarchical Multi-Armed Bandits for Automated UI TestingDezhi Ran, Hao Wang, Wenyu Wang, Tao Xie 0001. 894-905 [doi]
- Efficiency Matters: Speeding Up Automated Testing with GUI Rendering InferenceSidong Feng, Mulong Xie, Chunyang Chen. 906-918 [doi]
- CodaMosa: Escaping Coverage Plateaus in Test Generation with Pre-trained Large Language ModelsCaroline Lemieux, Jeevana Priya Inala, Shuvendu K. Lahiri, Siddhartha Sen 0001. 919-931 [doi]
- Taintmini: Detecting Flow of Sensitive Data in Mini-Programs with Static Taint AnalysisChao Wang, Ronny Ko, Yue Zhang, YuQing Yang, Zhiqiang Lin. 932-944 [doi]
- AChecker: Statically Detecting Smart Contract Access Control VulnerabilitiesAsem Ghaleb, Julia Rubin, Karthik Pattabiraman. 945-956 [doi]
- Fine-grained Commit-level Vulnerability Type Prediction by CWE Tree StructureShengyi Pan, Lingfeng Bao, Xin Xia 0001, David Lo 0001, Shanping Li. 957-969 [doi]
- Silent Vulnerable Dependency Alert Prediction with Vulnerability Key Aspect ExplanationJiamou Sun, Zhenchang Xing, Qinghua Lu 0001, Xiwei Xu 0001, Liming Zhu 0001, Thong Hoang, Dehai Zhao. 970-982 [doi]
- Reusing Deep Neural Network Models through Model Re-engineeringBinhang Qi, Hailong Sun 0001, Xiang Gao, Hongyu Zhang 0002, Zhaotian Li, Xudong Liu 0001. 983-994 [doi]
- PYEVOLVE: Automating Frequent Code Changes in Python ML SystemsMalinda Dilhara, Danny Dig, Ameya Ketkar. 995-1007 [doi]
- DeepArc: Modularizing Neural Networks for the Model MaintenanceXiaoning Ren, Yun Lin 0001, Yinxing Xue, Ruofan Liu, Jun Sun 0001, Zhiyong Feng 0002, Jin Song Dong. 1008-1019 [doi]
- Decomposing a Recurrent Neural Network into Modules for Enabling Reusability and ReplacementSayem Mohammad Imtiaz, Fraol Batole, Astha Singh, Rangeet Pan, Breno Dantas Cruz, Hridesh Rajan. 1020-1032 [doi]
- CHRONOS: Time-Aware Zero-Shot Identification of Libraries from Vulnerability ReportsYunbo Lyu, Thanh Le-Cong, Hong Jin Kang, Ratnadira Widyasari, Zhipeng Zhao, Xuan-Bach Dinh Le, Ming Li, David Lo 0001. 1033-1045 [doi]
- Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven EcosystemYulun Wu, Zeliang Yu, Ming Wen 0001, Qiang Li, Deqing Zou, Hai Jin 0001. 1046-1058 [doi]
- SecBench.js: An Executable Security Benchmark Suite for Server-Side JavaScriptMasudul Hasan Masud Bhuiyan, Adithya Srinivas Parthasarathy, Nikos Vasilakis, Michael Pradel, Cristian-Alexandru Staicu. 1059-1070 [doi]
- On Privacy Weaknesses and Vulnerabilities in Software SystemsPattaraporn Sangaroonsilp, Hoa Khanh Dam, Aditya Ghose. 1071-1083 [doi]
- Detecting Exception Handling Bugs in C++ ProgramsHao Zhang, Ji Luo, Mengze Hu, Jun Yan, Jian Zhang, Zongyan Qiu. 1084-1095 [doi]
- Learning to Boost Disjunctive Static Bug-FindersYoonseok Ko, Hakjoo Oh. 1097-1109 [doi]
- Detecting Isolation Bugs via Transaction Oracle ConstructionWensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song, Dong Wang, Yu Gao 0002, Wei Wang 0049, Jun Wei 0001, Lei Chen, Hanmo Wang, Hua Zhong 0001, Tao Huang 0001. 1123-1135 [doi]
- SmallRace: Static Race Detection for Dynamic Languages - A Case on SmalltalkSiwei Cui, Yifei Gao, Rainer Unterguggenberger, Wilfried Pichler, Sean Livingstone, Jeff Huang 0001. 1136-1147 [doi]
- "STILL AROUND": Experiences and Survival Strategies of Veteran Women Software DevelopersSterre van Breukelen, Ann Barcomb, Sebastian Baltes, Alexander Serebrenik. 1148-1160 [doi]
- When and Why Test Generators for Deep Learning Produce Invalid Inputs: an Empirical StudyVincenzo Riccio, Paolo Tonella. 1161-1173 [doi]
- Fuzzing Automatic Differentiation in Deep-Learning LibrariesChenyuan Yang, Yinlin Deng, Jiayi Yao, Yuxing Tu, Hanchi Li, Lingming Zhang 0001. 1174-1186 [doi]
- Lightweight Approaches to DNN Regression Error Reduction: An Uncertainty Alignment PerspectiveZenan Li, Maorun Zhang, Jingwei Xu 0001, Yuan Yao 0001, Chun Cao, Taolue Chen, Xiaoxing Ma, Jian Lu 0001. 1187-1199 [doi]
- Revisiting Neuron Coverage for DNN Testing: A Layer-Wise and Distribution-Aware CriterionYuanyuan Yuan, Qi Pang, Shuai Wang 0011. 1200-1212 [doi]
- Code Review of Build System Specifications: Prevalence, Purposes, Patterns, and PerceptionsMahtab Nejati, Mahmoud Alfadel, Shane McIntosh. 1213-1224 [doi]
- Better Automatic Program Repair by Using Bug Reports and Tests TogetherManish Motwani, Yuriy Brun. 1225-1237 [doi]
- CCTEST: Testing and Repairing Code Completion SystemsZongjie Li, Chaozheng Wang, Zhibo Liu, Haoxuan Wang, Dong Chen, Shuai Wang 0011, Cuiyun Gao. 1238-1250 [doi]
- KNOD: Domain Knowledge Distilled Tree Decoder for Automated Program RepairNan Jiang, Thibaud Lutellier, Yiling Lou, Lin Tan 0001, Dan Goldwasser, Xiangyu Zhang 0001. 1251-1263 [doi]
- Rete: Learning Namespace Representation for Program RepairNikhil Parasaram, Earl T. Barr, Sergey Mechtaev. 1264-1276 [doi]
- AI-based Question Answering Assistance for Analyzing Natural-language RequirementsSaad Ezzini, Sallam Abualhaija, Chetan Arora 0002, Mehrdad Sabetzadeh. 1277-1289 [doi]
- Strategies, Benefits and Challenges of App Store-inspired Requirements ElicitationAlessio Ferrari 0001, Paola Spoletini. 1290-1302 [doi]
- Data-driven Recurrent Set Learning For Non-termination AnalysisZhilei Han, Fei He. 1303-1315 [doi]
- Compiling Parallel Symbolic Execution with ContinuationsGuannan Wei 0001, Songlin Jia, RuiQi Gao, Haotian Deng, Shangyin Tan, Oliver Bracevac, Tiark Rompf. 1316-1328 [doi]
- Verifying Data Constraint Equivalence in FinTech SystemsChengpeng Wang, Gang Fan, Peisen Yao, Fuxiong Pan, Charles Zhang. 1329-1341 [doi]
- Tolerate Control-Flow Changes for Sound Data Race PredictionShihao Zhu, Yuqi Guo, Long Zhang, Yan Cai 0001. 1342-1354 [doi]
- Fill in the Blank: Context-aware Automated Text Input Generation for Mobile GUI TestingZhe Liu 0025, Chunyang Chen, Junjie Wang 0001, Xing Che, Yuekai Huang, Jun Hu, Qing Wang 0001. 1355-1367 [doi]
- Detecting Dialog-Related Keyboard Navigation Failures in Web ApplicationsPaul T. Chiou, Ali S. Alotaibi, William G. J. Halfond. 1368-1380 [doi]
- Columbus: Android App Testing Through Systematic Callback ExplorationPriyanka Bose, Dipanjan Das 0002, Saastha Vasan, Sebastiano Mariani, Ilya Grishchenko, Andrea Continella, Antonio Bianchi, Christopher Kruegel, Giovanni Vigna. 1381-1392 [doi]
- GameRTS: A Regression Testing Framework for Video GamesJiongchi Yu, Yuechen Wu, Xiaofei Xie, Wei Le, Lei Ma 0003, Yingfeng Chen, Jingyu Hu, Fan Zhang. 1393-1404 [doi]
- Autonomy Is An Acquired Taste: Exploring Developer Preferences for GitHub BotsAmir Ghorbani, Nathan Cassee, derek robinson, Adam Alami, Neil A. Ernst, Alexander Serebrenik, Andrzej Wasowski. 1405-1417 [doi]
- Flexible and Optimal Dependency Management via Max-SMTDonald Pinckney, Federico Cassano, Arjun Guha, Jonathan Bell 0001, Massimiliano Culpo, Todd Gamblin. 1418-1429 [doi]
- Impact of Code Language Models on Automated Program RepairNan Jiang, Kevin Liu, Thibaud Lutellier, Lin Tan 0001. 1430-1442 [doi]
- Tare: Type-Aware Neural Program RepairQihao Zhu, Zeyu Sun 0004, Wenjie Zhang, Yingfei Xiong 0001, Lu Zhang 0023. 1443-1455 [doi]
- Template-based Neural Program RepairXiangxin Meng, Xu Wang 0007, Hongyu Zhang 0002, Hailong Sun 0001, Xudong Liu 0001, Chunming Hu. 1456-1468 [doi]
- Automated Repair of Programs from Large Language ModelsZhiyu Fan, Xiang Gao 0012, Martin Mirchev, Abhik Roychoudhury, Shin Hwei Tan. 1469-1481 [doi]
- Automated Program Repair in the Era of Large Pre-trained Language ModelsChunqiu Steven Xia, Yuxiang Wei 0003, Lingming Zhang 0001. 1482-1494 [doi]
- Faster or Slower? Performance Mystery of Python Idioms Unveiled with Empirical EvidenceZejun Zhang, Zhenchang Xing, Xin Xia 0001, Xiwei Xu 0001, Liming Zhu 0001, Qinghua Lu 0001. 1495-1507 [doi]
- Testability Refactoring in Pull Requests: Patterns and TrendsPavel Reich, Walid Maalei. 1508-1519 [doi]
- Usability-Oriented Design of Liquid Types for JavaCatarina Gamboa, Paulo Canelas, Christopher Steven Timperley, Alcides Fonseca. 1520-1532 [doi]
- Towards Understanding Fairness and its Composition in Ensemble Machine LearningUsman Gohar, Sumon Biswas, Hridesh Rajan. 1533-1545 [doi]
- Fairify: Fairness Verification of Neural NetworksSumon Biswas, Hridesh Rajan. 1546-1558 [doi]
- Leveraging Feature Bias for Scalable Misprediction Explanation of Machine Learning ModelsJiri Gesi, Xinyun Shen, Yunfan Geng, Qihong Chen, Iftekhar Ahmed 0001. 1559-1570 [doi]
- Information-Theoretic Testing and Debugging of Fairness Defects in Deep Neural NetworksVerya Monjezi, Ashutosh Trivedi 0001, Gang Tan, Saeid Tizpaz Niari. 1571-1582 [doi]
- Demystifying Privacy Policy of Third-Party Libraries in Mobile AppsKaifa Zhao, Xian Zhan, Le Yu 0002, ShiYao Zhou, Hao Zhou, Xiapu Luo, Haoyu Wang 0001, Yepang Liu 0001. 1583-1595 [doi]
- Cross-Domain Requirements Linking via Adversarial-based Domain AdaptationZhiyuan Chang, Mingyang Li, Qing Wang 0001, Shoubin Li, Junjie Wang 0001. 1596-1608 [doi]
- On-Demand Security Requirements Synthesis with Relational Generative Adversarial NetworksViktoria Koscinski, Sara Hashemi, Mehdi Mirakhorli. 1609-1621 [doi]
- Measuring Secure Coding Practice and Culture: A Finger Pointing at the Moon is not the MoonIta Ryan, Utz Roedig, Klaas-Jan Stol. 1622-1634 [doi]
- What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie A. Williams. 1635-1647 [doi]
- Lejacon: A Lightweight and Efficient Approach to Java Confidential Computing on SGXXinyuan Miao, Ziyi Lin, Shaojun Wang, Lei Yu, Sanhong Li, Zihan Wang, Pengbo Nie, Yuting Chen, Beijun Shen, He Jiang 0001. 1648-1660 [doi]
- Keyword Extraction From Specification Documents for Planning Security MechanismsJeffy Jahfar Poozhithara, Hazeline U. Asuncion, Brent Lagesse. 1661-1673 [doi]
- Dependency Facade: The Coupling and Conflicts between Android Framework and Its CustomizationWuxia Jin, Yitong Dai, Jianguo Zheng, Yu Qu, Ming Fan 0002, Zhenyu Huang, Dezhi Huang, Ting Liu 0002. 1674-1686 [doi]
- Test Selection for Unified Regression TestingShuai Wang, Xinyu Lian, Darko Marinov, Tianyin Xu. 1687-1699 [doi]
- ATM: Black-box Test Case Minimization based on Test Code Similarity and Evolutionary SearchRongqi Pan, Taher Ahmed Ghaleb, Lionel C. Briand. 1700-1711 [doi]
- Measuring and Mitigating Gaps in Structural TestingSoneya Binta Hossain, Matthew B. Dwyer, Sebastian G. Elbaum, Anh Nguyen-Tuong. 1712-1723 [doi]
- Heterogeneous Anomaly Detection for Software Systems via Semi-supervised Cross-modal AttentionCheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su 0001, Yongqiang Yang, Michael R. Lyu. 1724-1736 [doi]
- Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language ModelsToufique Ahmed, Supriyo Ghosh, Chetan Bansal, Thomas Zimmermann 0001, Xuchao Zhang, Saravan Rajmohan. 1737-1749 [doi]
- Eadro: An End-to-End Troubleshooting Framework for Microservices on Multi-source DataCheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su 0001, Michael R. Lyu. 1750-1762 [doi]
- LogReducer: Identify and Reduce Log Hotspots in Kernel on the FlyGuangba Yu, Pengfei Chen 0002, Pairui Li, Tianjun Weng, Haibing Zheng, Yuetang Deng, Zibin Zheng. 1763-1775 [doi]
- Aries: Efficient Testing of Deep Neural Networks via Labeling-Free Accuracy EstimationQiang Hu, Yuejun Guo 0001, Xiaofei Xie, Maxime Cordy, Mike Papadakis, Lei Ma 0003, Yves Le Traon. 1776-1787 [doi]
- CC: Causality-Aware Coverage Criterion for Deep Neural NetworksZhenlan Ji, Pingchuan Ma 0004, Yuanyuan Yuan, Shuai Wang 0011. 1788-1800 [doi]
- Balancing Effectiveness and Flakiness of Non-Deterministic Machine Learning TestsChunqiu Steven Xia, Saikat Dutta 0001, Sasa Misailovic, Darko Marinov, Lingming Zhang 0001. 1801-1813 [doi]
- Many-Objective Reinforcement Learning for Online Testing of DNN-Enabled SystemsFitash Ul Haq, Donghwan Shin 0001, Lionel C. Briand. 1814-1826 [doi]
- Reliability Assurance for Deep Neural Network Architectures Against Numerical DefectsLinyi Li, Yuhao Zhang, Luyao Ren, Yingfei Xiong 0001, Tao Xie 0001. 1827-1839 [doi]
- Demystifying Issues, Challenges, and Solutions for Multilingual Software DevelopmentHaoran Yang, Weile Lian, Shaowei Wang, Haipeng Cai. 1840-1852 [doi]
- Automated Summarization of Stack Overflow PostsBonan Kou, Muhao Chen, Tianyi Zhang 0001. 1853-1865 [doi]
- Semi-Automatic, Inline and Collaborative Web Page Code CurationsRoy Rutishauser, André A. Meyer, Reid Holmes, Thomas Fritz 0001. 1866-1877 [doi]
- Identifying Key Classes for Initial Software Comprehension: Can We Do It Better?Weifeng Pan 0001, Xin Du, Ming Hua 0003, Dae-Kyoo Kim, Zijiang Yang 0006. 1878-1889 [doi]
- Improving API Knowledge Discovery with ML: A Case Study of Comparable API MethodsDaye Nam, Brad A. Myers, Bogdan Vasilescu, Vincent J. Hellendoorn. 1890-1906 [doi]
- Evidence Profiles for Validity Threats in Program Comprehension ExperimentsMarvin Muñoz Barón, Marvin Wyrich, Daniel Graziotin, Stefan Wagner 0001. 1907-1919 [doi]
- Developers' Visuo-spatial Mental Model and Program ComprehensionAbir Bouraffa, Gian-Luca Fuhrmann, Walid Maalej. 1920-1932 [doi]
- Two Sides of the Same Coin: Exploiting the Impact of Identifiers in Neural Code ComprehensionShuzheng Gao, Cuiyun Gao, Chaozheng Wang, Jun Sun 0001, David Lo 0001, Yue Yu. 1933-1945 [doi]
- SeeHow: Workflow Extraction from Programming Screencasts through Action-Aware Video AnalyticsDehai Zhao, Zhenchang Xing, Xin Xia 0001, Deheng Ye, Xiwei Xu 0001, Liming Zhu 0001. 1946-1957 [doi]
- AidUI: Toward Automated Recognition of Dark Patterns in User InterfacesS. M. Hasan Mansur 0001, Sabiha Salma, Damilola Awofisayo, Kevin Moran. 1958-1970 [doi]
- Carving UI Tests to Generate API Tests and API SpecificationRahulkrishna Yandrapally, Saurabh Sinha, Rachel Tzoref-Brill, Ali Mesbah 0001. 1971-1982 [doi]
- Ex pede Herculem: Augmenting Activity Transition Graph for Apps via Graph Convolution NetworkZhe Liu 0025, Chunyang Chen, Junjie Wang 0001, Yuhui Su, Yuekai Huang, Jun Hu, Qing Wang 0001. 1983-1995 [doi]
- Sustainability is Stratified: Toward a Better Theory of Sustainable Software EngineeringSean McGuire, Erin Schultz, Bimpe Ayoola, Paul Ralph. 1996-2008 [doi]
- DLInfer: Deep Learning with Static Slicing for Python Type InferenceYanyan Yan, Yang Feng 0003, Hongcheng Fan, Baowen Xu. 2009-2021 [doi]
- ViolationTracker: Building Precise Histories for Static Analysis ViolationsPing Yu, Yijian Wu, Xin Peng 0001, Jiahan Peng, Jian Zhang, Peicheng Xie, Wenyun Zhao. 2022-2034 [doi]
- Compiler Test-Program Generation via Memoized Configuration SearchJunjie Chen 0003, Chenyao Suo, Jiajun Jiang, Peiqi Chen, Xingjian Li. 2035-2047 [doi]
- Generating Test Databases for Database-Backed ApplicationsCong Yan, Suman Nath, Shan Lu 0001. 2048-2059 [doi]
- Testing Database Engines via Query Plan GuidanceJinsheng Ba, Manuel Rigger. 2060-2071 [doi]
- Testing Database Systems via Differential Query ExecutionJiansen Song, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang 0049, Jun Wei 0001, Hua Zhong 0001, Tao Huang 0001. 2072-2084 [doi]
- Analysing the Impact of Workloads on Modeling the Performance of Configurable Software SystemsStefan Mühlbauer, Florian Sattler, Christian Kaltenecker, Johannes Dorn, Sven Apel, Norbert Siegmund. 2085-2097 [doi]
- Twins or False Friends? A Study on Energy Consumption and Performance of Configurable SoftwareMax Weber, Christian Kaltenecker, Florian Sattler, Sven Apel, Norbert Siegmund. 2098-2110 [doi]
- Learning Deep Semantics for Test CompletionPengyu Nie 0001, Rahul Banerjee, Junyi Jessy Li, Raymond J. Mooney, Milos Gligoric 0001. 2111-2123 [doi]
- SkCoder: A Sketch-based Approach for Automatic Code GenerationJia Li, Yongmin Li, Ge Li 0001, Zhi Jin, Yiyang Hao, Xing Hu 0008. 2124-2135 [doi]
- An Empirical Comparison of Pre-Trained Models of Source CodeChangan Niu, Chuanyi Li, Vincent Ng 0001, Dongxiao Chen, JiDong Ge, Bin Luo 0003. 2136-2148 [doi]
- On the Robustness of Code Generation Techniques: An Empirical Study on GitHub CopilotAntonio Mastropaolo, Luca Pascarella, Emanuela Guglielmi, Matteo Ciniselli, Simone Scalabrino, Rocco Oliveto, Gabriele Bavota. 2149-2160 [doi]
- Source Code Recommender Systems: The Practitioners' PerspectiveMatteo Ciniselli, Luca Pascarella, Emad Aghajani, Simone Scalabrino, Rocco Oliveto, Gabriele Bavota. 2161-2172 [doi]
- Safe Low-Level Code Without Overhead is PracticalSolal Pirelli, George Candea. 2173-2184 [doi]
- Sibyl: Improving Software Engineering Tools with SMT SelectionWill Leeson, Matthew B. Dwyer, Antonio Filieri. 2185-2197 [doi]
- CoCoSoDa: Effective Contrastive Learning for Code SearchEnsheng Shi, Yanlin Wang 0001, Wenchao Gu, Lun Du, Hongyu Zhang 0002, Shi Han, Dongmei Zhang 0001, Hongbin Sun 0001. 2198-2210 [doi]
- Coverage Guided Fault Injection for Cloud SystemsYu Gao 0002, Wensheng Dou, Dong Wang, Wenhan Feng, Jun Wei 0001, Hua Zhong 0001, Tao Huang 0001. 2211-2223 [doi]
- Diver: Oracle-Guided SMT Solver Testing with Unrestricted Random MutationsJongwook Kim, Sunbeom So, Hakjoo Oh. 2224-2236 [doi]
- An Empirical Study of Deep Learning Models for Vulnerability DetectionBenjamin Steenhoek, Md Mahbubur Rahman, Richard Jiles, Wei Le. 2237-2248 [doi]
- DeepVD: Toward Class-Separation Features for Neural Network Vulnerability DetectionWenbo Wang, Tien N. Nguyen, Shaohua Wang 0002, Yi Li, Jiyuan Zhang, Aashish Yadavally. 2249-2261 [doi]
- Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph ModelBin Yuan, Yifan Lu, Yilin Fang, Yueming Wu, Deqing Zou, Zhen Li, Zhi Li, Hai Jin 0001. 2262-2274 [doi]
- Vulnerability Detection with Graph Simplification and Enhanced Graph Representation LearningXin-Cheng Wen, Yupan Chen, Cuiyun Gao, Hongyu Zhang 0002, Jie M. Zhang, Qing Liao 0001. 2275-2286 [doi]
- Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays!Xu Yang, Shaowei Wang, Yi Li, Shaohua Wang. 2287-2298 [doi]
- Incident-aware Duplicate Ticket Aggregation for Cloud SystemsJinyang Liu, Shilin He, Zhuangbin Chen, Liqun Li, Yu Kang, Xu Zhang, Pinjia He, Hongyu Zhang 0002, Qingwei Lin, Zhangwei Xu, Saravan Rajmohan, Dongmei Zhang 0001, Michael R. Lyu. 2299-2311 [doi]
- Large Language Models are Few-shot Testers: Exploring LLM-based General Bug ReproductionSungmin Kang, Juyeon Yoon, Shin Yoo. 2312-2323 [doi]
- On the Reproducibility of Software Defect DatasetsHao-Nan Zhu, Cindy Rubio-González. 2324-2335 [doi]
- Context-aware Bug Reproduction for Mobile AppsYuchao Huang, Junjie Wang 0001, Zhe Liu 0025, Song Wang 0009, Chunyang Chen, Mingyang Li, Qing Wang 0001. 2336-2348 [doi]
- Read It, Don't Watch It: Captioning Bug Recordings AutomaticallySidong Feng, Mulong Xie, Yinxing Xue, Chunyang Chen. 2349-2361 [doi]
- Duetcs: Code Style Transfer through Generation and RetrievalBinger Chen, Ziawasch Abedjan. 2362-2373 [doi]
- On the Applicability of Language Models to Block-Based ProgramsElisabeth Griebl, Benedikt Fein, Florian Obermüller, Gordon Fraser 0001, René Just. 2374-2386 [doi]
- MTTM: Metamorphic Testing for Textual Content Moderation SoftwareWenxuan Wang, Jen-Tse Huang, Weibin Wu, Jianping Zhang, Yizhan Huang, Shuqing Li, Pinjia He, Michael R. Lyu. 2387-2399 [doi]
- Metamorphic Shader Fusion for Testing Graphics Shader CompilersDongwei Xiao, Zhibo Liu, Shuai Wang. 2400-2412 [doi]
- MorphQ: Metamorphic Testing of the Qiskit Quantum Computing PlatformMatteo Paltenghi, Michael Pradel. 2413-2424 [doi]
- Automating Code-Related Tasks Through Transformers: The Impact of Pre-trainingRosalia Tufano, Luca Pascarella, Gabriele Bavota. 2425-2437 [doi]
- Log Parsing with Prompt-based Few-shot LearningVan-Hoang Le, Hongyu Zhang 0002. 2438-2449 [doi]
- Retrieval-Based Prompt Selection for Code-Related Few-Shot LearningNoor Nashid, Mifta Sintaha, Ali Mesbah 0001. 2450-2462 [doi]
- An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model RegistryWenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis 0001. 2463-2475 [doi]
- ContraBERT: Enhancing Code Pre-trained Models via Contrastive LearningShangqing Liu, Bozhi Wu, Xiaofei Xie, Guozhu Meng, Yang Liu 0003. 2476-2487 [doi]
- DStream: A Streaming-Based Highly Parallel IFDS FrameworkXizao Wang, Zhiqiang Zuo 0002, Lei Bu, Jianhua Zhao. 2488-2500 [doi]
- (Partial) Program Dependence LearningAashish Yadavally, Tien N. Nguyen, Wenbo Wang, Shaohua Wang 0002. 2501-2513 [doi]
- MirrorTaint: Practical Non-intrusive Dynamic Taint Tracking for JVM-based Microservice SystemsYicheng Ouyang, Kailai Shao, Kunqiu Chen, Ruobing Shen, Chao Chen, Mingze Xu, Yuqun Zhang, Lingming Zhang 0001. 2514-2526 [doi]
- VULGEN: Realistic Vulnerability Generation Via Pattern Mining and Deep LearningYu Nong, Yuzhe Ou, Michael Pradel, Feng Chen 0001, Haipeng Cai. 2527-2539 [doi]
- Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java ProjectsLyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan 0003, Lida Zhao, Jiahui Wu, Yang Liu. 2540-2552 [doi]
- Automated Black-Box Testing of Mass Assignment Vulnerabilities in RESTful APIsDavide Corradini, Michele Pasqua, Mariano Ceccato. 2553-2564 [doi]
- CoLeFunDa: Explainable Silent Vulnerability Fix IdentificationJiayuan Zhou, Michael Pacheco, Jinfu Chen 0002, Xing Hu 0008, Xin Xia 0001, David Lo 0001, Ahmed E. Hassan. 2565-2577 [doi]
- Finding Causally Different Tests for an Industrial Control SystemChristopher M. Poskitt, Yuqi Chen 0001, Jun Sun 0001, Yu Jiang 0001. 2578-2590 [doi]
- Doppelgänger Test Generation for Revealing Bugs in Autonomous Driving SoftwareYuqi Huai, Yuntianyi Chen, Sumaya Almanee, Tuan Ngo, Xiang Liao, Ziwen Wan, Qi Alfred Chen, Joshua Garcia. 2591-2603 [doi]
- Generating Realistic and Diverse Tests for LiDAR-Based Perception SystemsGarrett Christian, Trey Woodlief, Sebastian G. Elbaum. 2604-2616 [doi]
- Rules of Engagement: Why and How Companies Participate in OSSMariam Guizani, Aileen Abril Castro-Guzman, Anita Sarma, Igor Steinmacher. 2617-2629 [doi]
- An Empirical Study on Software Bill of Materials: Where We Stand and the Road AheadBoming Xia, Tingting Bi, Zhenchang Xing, Qinghua Lu 0001, Liming Zhu 0001. 2630-2642 [doi]