Abstract is missing.
- Fine-grained, accurate and scalable source differencingJean-Rémy Falleri, Matias Martinez. [doi]
- BOMs Away! Inside the Minds of Stakeholders: A Comprehensive Study of Bills of Materials for Software SystemsTrevor Stalnaker, Nathan Wintersgill, Oscar Chaparro, Massimiliano Di Penta, Daniel M. Germán, Denys Poshyvanyk. [doi]
- Unveiling Memorization in Code ModelsZhou Yang 0003, Zhipeng Zhao, Chenyu Wang, Jieke Shi, Dongsun Kim 0001, DongGyun Han, David Lo 0001. [doi]
- Learning in the Wild: Towards Leveraging Unlabeled Data for Effectively Tuning Pre-trained Code ModelsShuzheng Gao, Wenxin Mao, Cuiyun Gao, Li Li 0029, Xing Hu 0008, Xin Xia 0001, Michael R. Lyu. [doi]
- RPG: Rust Library Fuzzing with Pool-based Fuzz Target Generation and Generic SupportZhiwu Xu 0001, Bohao Wu, Cheng Wen, Bin Zhang, Shengchao Qin, Mengda He. [doi]
- Demystifying and Detecting Misuses of Deep Learning APIsMoshi Wei, Nima Shiri Harzevili, Yuekai Huang, Jinqiu Yang 0001, Junjie Wang 0001, Song Wang 0009. [doi]
- Toward Improved Deep Learning-based Vulnerability DetectionAdriana Sejfia, Satyaki Das, Saad Shafiq, Nenad Medvidovic. [doi]
- The Classics Never Go Out of Style: An Empirical Study of Downgrades from the Bazel Build TechnologyMahmoud Alfadel, Shane McIntosh. [doi]
- How to Support ML End-User Programmers through a Conversational AgentEmily Judith Arteaga Garcia, João Felipe Nicolaci Pimentel, Zixuan Feng, Marco Aurélio Gerosa, Igor Steinmacher, Anita Sarma. [doi]
- Semantic-Enhanced Static Vulnerability Detection in Baseband FirmwareYiming Liu, Cen Zhang, Feng Li, Yeting Li, Jianhua Zhou, Jian Wang, Lanlan Zhan, Yang Liu 0003, Wei Huo. [doi]
- CERT: Finding Performance Issues in Database Systems Through the Lens of Cardinality EstimationJinsheng Ba, Manuel Rigger. [doi]
- Are Your Requests Your True Needs? Checking Excessive Data Collection in VPA AppFuman Xie, Chuan Yan, Mark Huasong Meng, Shao-Ming Teng, Yanjun Zhang, Guangdong Bai. [doi]
- A First Look at the Inheritance-Induced Redundant Test ExecutionDong Jae Kim, Jinqiu Yang 0001, Tse-Hsun Chen. [doi]
- Precise Sparse Abstract Execution via Cross-Domain InteractionXiao Cheng 0002, Jiawei Wang, Yulei Sui. [doi]
- GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program AnalysisYuqiang Sun 0001, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu 0003. [doi]
- High Expectations: An Observational Study of Programming and Cannabis IntoxicationWenxin He, Manasvi Parikh, Westley Weimer, Madeline Endres. [doi]
- Towards Causal Deep Learning for Vulnerability DetectionMd Mahbubur Rahman, Ira Ceka, Chengzhi Mao, Saikat Chakraborty, Baishakhi Ray, Wei Le. [doi]
- Unraveling the Drivers of Sense of Belonging in Software Delivery Teams: Insights from a Large-Scale SurveyBianca Trinkenreich, Marco Aurélio Gerosa, Igor Steinmacher. [doi]
- An Exploratory Investigation of Log Anomalies in Unmanned Aerial VehiclesDinghua Wang, Shuqing Li, Guanping Xiao, Yepang Liu 0001, Yulei Sui, Pinjia He, Michael R. Lyu. [doi]
- Analyzing and Debugging Normative Requirements via Satisfiability CheckingNick Feng, Lina Marsso, Sinem Getir Yaman, Yesugen Baatartogtokh, Reem Ayad, Victória Oldemburgo de Mello, Beverley A. Townsend, Isobel Standen, Ioannis Stefanakos, Calum Imrie, Genaína Nunes Rodrigues, Ana Cavalcanti 0001, Radu Calinescu, Marsha Chechik. [doi]
- Knowledge Graph Driven Inference Testing for Question Answering SoftwareJun Wang, Yanhui Li, Zhifei Chen, Lin Chen 0015, Xiaofang Zhang, Yuming Zhou. [doi]
- Out of Sight, Out of Mind: Better Automatic Vulnerability Repair by Broadening Input Ranges and SourcesXin Zhou, Kisub Kim, Bowen Xu, DongGyun Han, David Lo 0001. [doi]
- Property-Based Testing in PracticeHarrison Goldstein, Joseph W. Cutler, Daniel Dickstein, Benjamin C. Pierce, Andrew Head. [doi]
- Semantic GUI Scene Learning and Video Alignment for Detecting Duplicate Video-based Bug ReportsYanfu Yan, Nathan Cooper, Oscar Chaparro, Kevin Moran, Denys Poshyvanyk. [doi]
- Tensor-Aware Energy AccountingTimur Babakol, Yu David Liu. [doi]
- On Using GUI Interaction Data to Improve Text Retrieval-based Bug LocalizationJunayed Mahmud, Nadeeshan De Silva, Safwat Ali Khan, Seyed Hooman Mostafavi, S. M. Hasan Mansur 0001, Oscar Chaparro, Andrian Marcus, Kevin Moran. [doi]
- Coca: Improving and Explaining Graph Neural Network-Based Vulnerability Detection SystemsSicong Cao, Xiaobing Sun 0001, Xiaoxue Wu, David Lo 0001, Lili Bo, Bin Li 0006, Wei Liu 0010. [doi]
- LogShrink: Effective Log Compression by Leveraging Commonality and Variability of Log DataXiaoyun Li, Hongyu Zhang, Van-Hoang Le, Pengfei Chen 0002. [doi]
- A Large-Scale Survey on the Usability of AI Programming Assistants: Successes and ChallengesJenny T. Liang, Chenyang Yang 0002, Brad A. Myers. [doi]
- Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart ContractsMingyuan Huang, Jiachi Chen, Zigui Jiang, Zibin Zheng. [doi]
- VeRe: Verification Guided Synthesis for Repairing Deep Neural NetworksJianan Ma, Pengfei Yang, Jingyi Wang, Youcheng Sun, Cheng-Chao Huang, Zhen Wang. [doi]
- Traces of Memorisation in Large Language Models for CodeAli Al-Kaswan, Maliheh Izadi, Arie van Deursen. [doi]
- Towards Finding Accounting Errors in Smart ContractsBrian Zhang. [doi]
- Generating REST API Specifications through Static AnalysisRuikai Huang, Manish Motwani, Idel Martinez, Alessandro Orso. [doi]
- Deep Combination of CDCL(T) and Local Search for Satisfiability Modulo Non-Linear Integer Arithmetic TheoryXindi Zhang, Bohan Li 0002, Shaowei Cai 0001. [doi]
- S3C: Spatial Semantic Scene Coverage for Autonomous VehiclesTrey Woodlief, Felipe Toledo, Sebastian G. Elbaum, Matthew B. Dwyer. [doi]
- CoderEval: A Benchmark of Pragmatic Code Generation with Generative Pre-trained ModelsHao Yu, Bo Shen, Dezhi Ran, Jiaxin Zhang, Qi Zhang, Yuchi Ma, Guangtai Liang, Ying Li, Qianxiang Wang, Tao Xie. [doi]
- A Comprehensive Study of Learning-based Android Malware Detectors under Challenging EnvironmentsCuiying Gao, Gaozhun Huang, Heng Li 0005, Bang Wu, Yueming Wu, Wei Yuan. [doi]
- FuzzSlice: Pruning False Positives in Static Analysis Warnings through Function-Level FuzzingAniruddhan Murali, Noble Saji Mathews, Mahmoud Alfadel, Meiyappan Nagappan, Meng Xu. [doi]
- Data-Driven Evidence-Based Syntactic Sugar DesignDavid O'Brien, Robert Dyer 0001, Tien N. Nguyen, Hridesh Rajan. [doi]
- ROSInfer: Statically Inferring Behavioral Component Models for ROS-based Robotics SystemsTobias Dürschmid, Christopher Steven Timperley, David Garlan, Claire Le Goues. [doi]
- It's Not a Feature, It's a Bug: Fault-Tolerant Model Mining from Noisy DataFelix Wallner, Bernhard K. Aichernig, Christian Burghard. [doi]
- Hard to Read and Understand Pythonic Idioms? DeIdiom and Explain Them in Non-Idiomatic Equivalent CodeZejun Zhang, Zhenchang Xing, Dehai Zhao, Qinghua Lu 0001, Xiwei Xu 0001, Liming Zhu 0001. [doi]
- Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability DetectionBenjamin Steenhoek, Hongyang Gao, Wei Le. [doi]
- Constraint Based Program Repair for Persistent Memory BugsZunchen Huang, Chao Wang 0001. [doi]
- Hypertesting of Programs: Theoretical Foundation and Automated Test GenerationMichele Pasqua, Mariano Ceccato, Paolo Tonella. [doi]
- Trustworthy by DesignCarol J. Smith. [doi]
- On Extracting Specialized Code Abilities from Large Language Models: A Feasibility StudyZongjie Li, Chaozheng Wang, Pingchuan Ma 0004, Chaowei Liu, Shuai Wang 0011, Daoyuan Wu, Cuiyun Gao, Yang Liu 0003. [doi]
- FlashSyn: Flash Loan Attack Synthesis via Counter Example Driven ApproximationZhiyang Chen, Sidi Mohamed Beillahi, Fan Long. [doi]
- Empirical Study of the Docker Smells Impact on the Image SizeThomas Durieux. [doi]
- Curiosity-Driven Testing for Sequential Decision-Making ProcessJunda He, Zhou Yang 0003, Jieke Shi, Chengran Yang, Kisub Kim, Bowen Xu, Xin Zhou, David Lo 0001. [doi]
- Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior PreservationWenzhang Yang, Linhai Song, Yinxing Xue. [doi]
- PPT4J: Patch Presence Test for Java BinariesZhiyuan Pan, Xing Hu 0008, Xin Xia 0001, Xian Zhan, David Lo 0001, Xiaohu Yang 0001. [doi]
- Efficiently Trimming the Fat: Streamlining Software Dependencies with Java Reflection and Dependency AnalysisXiaohu Song, Ying Wang 0038, Xiao Cheng, Guangtai Liang, Qianxiang Wang, Zhiliang Zhu 0001. [doi]
- Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust ProgrammingMohan Cui, Shuran Sun, Hui Xu 0009, Yangfan Zhou. [doi]
- Learning and Repair of Deep Reinforcement Learning Policies from Fuzz-Testing DataMartin Tappler, Andrea Pferscher, Bernhard K. Aichernig, Bettina Könighofer. [doi]
- Concrete Constraint Guided Symbolic ExecutionYue Sun, Guowei Yang 0001, Shichao Lv, Zhi Li 0018, Limin Sun. [doi]
- Compiler-directed Migrating API Callsite of Client CodeHao Zhong 0001, Na Meng 0001. [doi]
- Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android AppsYongliang Chen, Ruoqin Tang, Chaoshun Zuo, Xiaokuan Zhang, Lei Xue 0001, Xiapu Luo, Qingchuan Zhao. [doi]
- Scaling Code Pattern Inference with Interactive What-If AnalysisHong Jin Kang, Kevin Wang, Miryung Kim. [doi]
- Resource Usage and Optimization Opportunities in Workflows of GitHub ActionsIslem Bouzenia, Michael Pradel. [doi]
- Semantic Analysis of Macro Usage for PortabilityBrent Pappas, Paul Gazzillo. [doi]
- TRIAD: Automated Traceability Recovery based on Biterm-enhanced Deduction of Transitive Links among ArtifactsHui Gao, Hongyu Kuang, Wesley K. G. Assunção, Christoph Mayr-Dorn, Guoping Rong, He Zhang 0001, Xiaoxing Ma, Alexander Egyed. [doi]
- Empirical Analysis of Vulnerabilities Life Cycle in Golang EcosystemJinchang Hu, Lyuye Zhang, Chengwei Liu, Sen Yang, Song Huang, Yang Liu 0003. [doi]
- "My GitHub Sponsors profile is live!" Investigating the Impact of Twitter/X Mentions on GitHub SponsorsYoumei Fan, Tao Xiao, Hideaki Hata, Christoph Treude, Kenichi Matsumoto. [doi]
- Co-Creation in Fully Remote Software TeamsVictoria Jackson, Rafael Prikladnicki, André van der Hoek. [doi]
- DEMISTIFY: Identifying On-device Machine Learning Models Stealing and Reuse Vulnerabilities in Mobile AppsPengcheng Ren, Chaoshun Zuo, Xiaofeng Liu, Wenrui Diao, Qingchuan Zhao, Shanqing Guo. [doi]
- Marco: A Stochastic Asynchronous Concolic ExplorerJie Hu, Yue Duan, Heng Yin 0001. [doi]
- Safeguarding DeFi Smart Contracts against Oracle DeviationsXun Deng, Sidi Mohamed Beillahi, Cyrus Minwalla, Han Du, Andreas G. Veneris, Fan Long. [doi]
- Reorder Pointer Flow in Sound Concurrency Bug PredictionYuqi Guo, Shihao Zhu, Yan Cai 0001, Liang He, Jian Zhang. [doi]
- Supporting Web-Based API Searches in the IDE Using SignaturesNick C. Bradley, Thomas Fritz 0001, Reid Holmes. [doi]
- Towards Reliable AI: Adequacy Metrics for Ensuring the Quality of System-level Testing of Autonomous VehiclesNeelofar, Aldeida Aleti. [doi]
- Raisin: Identifying Rare Sensitive Functions for Bug DetectionJianjun Huang 0001, Jianglei Nie, Yuanjun Gong, Wei You, Bin Liang 0002, Pan Bian. [doi]
- Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query TransformationYuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, Manuel Rigger. [doi]
- On Calibration of Pre-trained Code ModelsZhenhao Zhou, Chaofeng Sha, Xin Peng 0001. [doi]
- Predicting Performance and Accuracy of Mixed-Precision Programs for Precision TuningYutong Wang, Cindy Rubio-González. [doi]
- Exploring the Potential of ChatGPT in Automated Code Refinement: An Empirical StudyQi Guo, Junming Cao, Xiaofei Xie, Shangqing Liu, Xiaohong Li, Bihuan Chen 0001, Xin Peng 0001. [doi]
- PS3: Precise Patch Presence Test based on Semantic Symbolic SignatureQi Zhan, Xing Hu 0008, Zhiyang Li, Xin Xia 0001, David Lo 0001, Shanping Li. [doi]
- Language Models for Code Completion: A Practical EvaluationMaliheh Izadi, Jonathan Katzy, Tim van Dam, Marc Otten, Razvan Mihai Popescu, Arie van Deursen. [doi]
- SpecBCFuzz: Fuzzing LTL Solvers with Boundary ConditionsLuiz Carvalho, Renzo Degiovanni, Maxime Cordy, Nazareno Aguirre, Yves Le Traon, Mike Papadakis. [doi]
- Extrapolating Coverage Rate in Greybox FuzzingDanushka Liyanage, Seongmin Lee 0001, Chakkrit Tantithamthavorn, Marcel Böhme. [doi]
- ECFuzz: Effective Configuration Fuzzing for Large-Scale SystemsJunqiang Li, Senyi Li, Keyao Li, Falin Luo, Hongfang Yu, Shanshan Li, Xiang Li. [doi]
- Uncover the Premeditated Attacks: Detecting Exploitable Reentrancy Vulnerabilities by Identifying Attacker ContractsShuo Yang, Jiachi Chen, Mingyuan Huang, Zibin Zheng, Yuan Huang 0002. [doi]
- Trace-based Multi-Dimensional Root Cause Localization of Performance Issues in Microservice SystemsChenxi Zhang, Zhen Dong, Xin Peng 0001, Bicheng Zhang, Miao Chen. [doi]
- MAFT: Efficient Model-Agnostic Fairness Testing for Deep Neural Networks via Zero-Order Gradient SearchZhaohui Wang, Min Zhang, JingRan Yang, Bojie Shao, Min Zhang 0002. [doi]
- SCTrans: Constructing a Large Public Scenario Dataset for Simulation Testing of Autonomous Driving SystemsJiarun Dai, Bufan Gao, Mingyuan Luo, Zongan Huang, Zhongrui Li, Yuan Zhang, Min Yang. [doi]
- Programming Assistant for Exception Handling with CodeBERTYuchen Cai, Aashish Yadavally, Abhishek Mishra, Genesis Montejo, Tien N. Nguyen. [doi]
- EGFE: End-to-end Grouping of Fragmented Elements in UI Designs with Multimodal LearningLiuqing Chen, Yunnong Chen, Shuhong Xiao, Yaxuan Song, Lingyun Sun, Yankun Zhen, Tingting Zhou, Yanfang Chang. [doi]
- MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction UncertaintyHaodong Li, Guosheng Xu 0001, Liu Wang 0002, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang 0001. [doi]
- CIT4DNN: Generating Diverse and Rare Inputs for Neural Networks Using Latent Space Combinatorial TestingSwaroopa Dola, Rory McDaniel, Matthew B. Dwyer, Mary Lou Soffa. [doi]
- Characterizing Software Maintenance Meetings: Information Shared, Discussion Outcomes, and Information CapturedAdriana Meza Soria, Taylor Lopez, Elizabeth Seero, Negin Mashhadi, Emily Evans, Janet E. Burge, André van der Hoek. [doi]
- When Contracts Meets Crypto: Exploring Developers' Struggles with Ethereum Cryptographic APIsJiashuo Zhang, Jiachi Chen, Zhiyuan Wan, Ting Chen 0002, Jianbo Gao, Zhong Chen 0001. [doi]
- Fine-SE: Integrating Semantic Features and Expert Features for Software Effort EstimationYue Li, Zhong Ren, Zhiqi Wang, Lanxin Yang, Liming Dong 0001, Chenxing Zhong, He Zhang 0001. [doi]
- PyTy: Repairing Static Type Errors in PythonYiu Wai Chow, Luca Di Grazia, Michael Pradel. [doi]
- Automatically Detecting Reflow Accessibility Issues in Responsive Web PagesPaul T. Chiou, Robert Winn, Ali S. Alotaibi, William G. J. Halfond. [doi]
- FlakeSync: Automatically Repairing Async Flaky TestsShanto Rahman, August Shi. [doi]
- Deeply Reinforcing Android GUI Testing with Deep Reinforcement LearningYuanhong Lan, Yifei Lu, Zhong Li, Minxue Pan, Wenhua Yang 0001, Tian Zhang 0001, Xuandong Li. [doi]
- Large Language Models for Test-Free Fault LocalizationAidan Z. H. Yang, Claire Le Goues, Ruben Martins, Vincent J. Hellendoorn. [doi]
- Are Prompt Engineering and TODO Comments Friends or Foes? An Evaluation on GitHub CopilotDavid O'Brien, Sumon Biswas, Sayem Mohammad Imtiaz, Rabe Abdalkareem, Emad Shihab, Hridesh Rajan. [doi]
- JLeaks: A Featured Resource Leak Repository Collected From Hundreds of Open-Source Java ProjectsTianyang Liu, Weixing Ji, Xiaohui Dong, Wuhuang Yao, Yizhuo Wang, Hui Liu 0003, Haiyang Peng, Yuxuan Wang. [doi]
- ACAV: A Framework for Automatic Causality Analysis in Autonomous Vehicle Accident RecordingsHuijia Sun, Christopher M. Poskitt, Yang Sun 0008, Jun Sun 0001, Yuqi Chen 0001. [doi]
- Improving Smart Contract Security with Contrastive Learning-based Vulnerability DetectionYizhou Chen, Zeyu Sun 0004, Zhihao Gong, Dan Hao 0001. [doi]
- Recovering Trace Links Between Software Documentation And CodeJan Keim, Sophie Corallo, Dominik Fuchß, Tobias Hey, Tobias Telge, Anne Koziolek. [doi]
- An Empirical Study of Data Disruption by Ransomware AttacksYiwei Hou, Lihua Guo, Chijin Zhou, Yiwen Xu, Zijing Yin, Shanshan Li 0001, Chengnian Sun, Yu Jiang 0001. [doi]
- An Empirical Study on Noisy Label Learning for Program UnderstandingWenhan Wang, Yanzhou Li, Anran Li, Jian Zhang, Wei Ma, Yang Liu 0003. [doi]
- An Empirical Study on Oculus Virtual Reality Applications: Security and Privacy PerspectivesHanyang Guo, Hong-Ning Dai, Xiapu Luo, Zibin Zheng, Gengyang Xu, Fengliang He. [doi]
- Barriers for Students During Code Change ComprehensionJustin Middleton, John-Paul Ore, Kathryn T. Stolee. [doi]
- An Empirical Study on Low GPU Utilization of Deep Learning JobsYanjie Gao, Yichen He, Xinze Li, Bo Zhao, Haoxiang Lin, Yoyo Liang, Jing Zhong, Hongyu Zhang 0002, Jingzhou Wang, YongHua Zeng, Keli Gui, Jie Tong, Mao Yang. [doi]
- Where is it? Tracing the Vulnerability-relevant Files from Vulnerability ReportsJiamou Sun, Jieshan Chen, Zhenchang Xing, Qinghua Lu 0001, Xiwei Xu 0001, Liming Zhu 0001. [doi]
- Revisiting Android App CategorizationMarco Alecci, Jordan Samhi, Tegawendé F. Bissyandé, Jacques Klein. [doi]
- A User-centered Security Evaluation of CopilotOwura Asare, Meiyappan Nagappan, N. Asokan. [doi]
- On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural VulnerabilitiesZhen Li 0027, Ning Wang, Deqing Zou, Yating Li, Ruqian Zhang, Shouhuai Xu, Chao Zhang 0008, Hai Jin 0001. [doi]
- Automated Program Repair, What Is It Good For? Not Absolutely Nothing!Hadeel Eladawy, Claire Le Goues, Yuriy Brun. [doi]
- UniLog: Automatic Logging via LLM and In-Context LearningJunjielong Xu, Ziang Cui, Yuan Zhao, Xu Zhang, Shilin He, Pinjia He, Liqun Li, Yu Kang 0006, Qingwei Lin, Yingnong Dang, Saravan Rajmohan, Dongmei Zhang. [doi]
- REDriver: Runtime Enforcement for Autonomous VehiclesYang Sun 0008, Christopher M. Poskitt, Xiaodong Zhang 0014, Jun Sun 0001. [doi]
- Enabling Runtime Verification of Causal Discovery Algorithms with Automated Conditional Independence ReasoningPingchuan Ma 0004, Zhenlan Ji, Peisen Yao, Shuai Wang, Kui Ren 0001. [doi]
- Evaluating Code Summarization Techniques: A New Metric and an Empirical CharacterizationAntonio Mastropaolo, Matteo Ciniselli, Massimiliano Di Penta, Gabriele Bavota. [doi]
- Modularizing while Training: A New Paradigm for Modularizing DNN ModelsBinhang Qi, Hailong Sun 0001, Hongyu Zhang 0002, Ruobing Zhao, Xiang Gao. [doi]
- ModuleGuard: Understanding and Detecting Module Conflicts in Python EcosystemRuofan Zhu, Xingyu Wang, Chengwei Liu, Zhengzi Xu, Wenbo Shen, Rui Chang, Yang Liu 0003. [doi]
- VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability AnalysesYu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen 0001, Haipeng Cai. [doi]
- Inferring Data Preconditions from Deep Learning Models for Trustworthy Prediction in DeploymentShibbir Ahmed, Hongyang Gao, Hridesh Rajan. [doi]
- Finding XPath Bugs in XML Document Processors via Differential TestingShuxin Li, Manuel Rigger. [doi]
- Block-based Programming for Two-Armed Robots: A Comparative StudyFelipe Fronchetti, Nico Ritschel, Logan Schorr, Chandler Barfield, Gabriella Chang, Rodrigo Spinola, Reid Holmes, David C. Shepherd. [doi]
- Identifying Affected Libraries and Their Ecosystems for Open Source Software VulnerabilitiesSusheng Wu, Wenyan Song, Kaifeng Huang, Bihuan Chen 0001, Xin Peng 0001. [doi]
- Uncovering the Causes of Emotions in Software Developer Communication Using Zero-shot LLMsMia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski. [doi]
- Kind Controllers and Fast Heuristics for Non-Well-Separated GR(1) SpecificationsAriel Gorenstein, Shahar Maoz, Jan Oliver Ringert. [doi]
- "I tend to view ads almost like a pestilence": On the Accessibility Implications of Mobile Ads for Blind UsersZiyao He, Syed Fatiul Huq, Sam Malek. [doi]
- Detecting Automatic Software Plagiarism via Token Sequence NormalizationTimur Saglam, Moritz Brödel, Larissa Schmid, Sebastian Hahner. [doi]
- A Study on the Pythonic Functional Constructs' UnderstandabilityCyrine Zid, Fiorella Zampetti, Giuliano Antoniol, Massimiliano Di Penta. [doi]
- Streamlining Java Programming: Uncovering Well-Formed Idioms with IdioMineYanming Yang, Xing Hu 0008, Xin Xia 0001, David Lo 0001, Xiaohu Yang 0001. [doi]
- BinAug: Enhancing Binary Similarity Analysis with Low-Cost Input RepairingWai-Kin Wong, Huaijin Wang, Zongjie Li, Shuai Wang. [doi]
- Large Language Models are Few-Shot Summarizers: Multi-Intent Comment Generation via In-Context LearningMingyang Geng, Shangwen Wang, Dezun Dong, Haotian Wang 0001, Ge Li 0001, Zhi Jin, Xiaoguang Mao, Xiangke Liao. [doi]
- Symbol-Specific Sparsification of Interprocedural Distributive Environment ProblemsKadiray Karakaya, Eric Bodden. [doi]
- Software Engineering Research in a World with Generative Artificial IntelligenceMartin C. Rinard. [doi]
- DocFlow: Extracting Taint Specifications from Software DocumentationMarcos Tileria, Jorge Blasco, Santanu Kumar Dash 0001. [doi]
- ReClues: Representing and indexing failures in parallel debugging with program variablesYi Song, Xihao Zhang, Xiaoyuan Xie, Quanming Liu, Ruizhi Gao, Chenliang Xing. [doi]
- RUNNER: Responsible UNfair NEuron Repair for Enhancing Deep Neural Network FairnessTianlin Li, Yue Cao, Jian Zhang, Shiqian Zhao, Yihao Huang 0001, Aishan Liu, Qing Guo, Yang Liu. [doi]
- DivLog: Log Parsing with Prompt Enhanced In-Context LearningJunjielong Xu, Ruichun Yang, Yintong Huo, Chengyu Zhang 0001, Pinjia He. [doi]
- Prism: Decomposing Program Semantics for Code Clone Detection through CompilationHaoran Li, Siqian Wang, Weihong Quan, Xiaoli Gong, Huayou Su, Jin Zhang 0003. [doi]
- Towards More Practical Automation of Vulnerability AssessmentShengyi Pan, Lingfeng Bao, Jiayuan Zhou, Xing Hu 0008, Xin Xia 0001, Shanping Li. [doi]
- Ripples of a Mutation - An Empirical Study of Propagation Effects in Mutation TestingHang Du, Vijay Krishna Palepu, James A. Jones. [doi]
- Are We There Yet? Unraveling the State-of-the-Art Smart Contract FuzzersShuohan Wu, Zihao Li 0001, Luyi Yan, Weimin Chen, Muhui Jiang, Chenxu Wang, Xiapu Luo, Hao Zhou. [doi]
- DeepSample: DNN sampling-based testing for operational accuracy assessmentAntonio Guerriero, Roberto Pietrantuono, Stefano Russo 0001. [doi]
- Pre-training by Predicting Program Dependencies for Vulnerability Analysis TasksZhongxin Liu, Zhijie Tang, Junwei Zhang, Xin Xia 0001, Xiaohu Yang 0001. [doi]
- LibvDiff: Library Version Difference Guided OSS Version Identification in BinariesChaopeng Dong, Siyuan Li, Shouguo Yang, Yang Xiao 0011, Yongpan Wang, Hong Li, Zhi Li, Limin Sun. [doi]
- Fuzz4All: Universal Fuzzing with Large Language ModelsChunqiu Steven Xia, Matteo Paltenghi, Jia Le Tian, Michael Pradel, Lingming Zhang 0001. [doi]
- A Theory of Scientific Programming EfficacyElizaveta Pertseva, Melinda Chang, Ulia Zaman, Michael Coblenz. [doi]
- LibAlchemy: A Two-Layer Persistent Summary Design for Taming Third-Party Libraries in Static Bug-Finding SystemsRongxin Wu, Yuxuan He, Jiafeng Huang, Chengpeng Wang, Wensheng Tang, Qingkai Shi, Xiao Xiao 0003, Charles Zhang 0001. [doi]
- Large Language Models are Edge-Case Generators: Crafting Unusual Programs for Fuzzing Deep Learning LibrariesYinlin Deng, Chunqiu Steven Xia, Chenyuan Yang, Shizhuo Dylan Zhang, Shujing Yang, Lingming Zhang 0001. [doi]
- Make LLM a Testing Expert: Bringing Human-like Interaction to Mobile GUI Testing via Functionality-aware DecisionsZhe Liu 0025, Chunyang Chen, Junjie Wang 0001, Mengzhuo Chen, Boyu Wu, Xing Che, Dandan Wang, Qing Wang 0001. [doi]
- Translation Validation for JIT Compiler in the V8 JavaScript EngineSeungwan Kwon, Jaeseong Kwon, Wooseok Kang, Juneyoung Lee, Kihong Heo. [doi]
- Sedar: Obtaining High-Quality Seeds for DBMS Fuzzing via Cross-DBMS SQL TransferJingzhou Fu, Jie Liang 0006, Zhiyong Wu, Yu Jiang 0001. [doi]
- LLMParser: An Exploratory Study on Using Large Language Models for Log ParsingZeyang Ma, An Ran Chen, Dong Jae Kim, Tse-Hsun Chen, Shaowei Wang 0002. [doi]
- Practical Program Repair via Preference-based Ensemble StrategyWenkang Zhong, Chuanyi Li, Kui Liu 0001, Tongtong Xu, JiDong Ge, Tegawendé F. Bissyandé, Bin Luo 0003, Vincent Ng 0001. [doi]
- ITER: Iterative Neural Repair for Multi-Location PatchesHe Ye, Martin Monperrus. [doi]
- Challenges and Opportunities in Model Checking Large-scale Distributed SystemsRupak Majumdar. [doi]
- Understanding Transaction Bugs in Database SystemsZiyu Cui, Wensheng Dou, Yu Gao 0002, Dong Wang, Jiansen Song, Yingying Zheng, Tao Wang, Rui Yang, Kang Xu, Yixin Hu, Jun Wei 0001, Tao Huang 0001. [doi]
- A Framework For Inferring Properties of User-Defined FunctionsXinyu Liu, Joy Arulraj, Alessandro Orso. [doi]
- Fairness Improvement with Multiple Protected Attributes: How Far Are We?Zhenpeng Chen, Jie M. Zhang, Federica Sarro, Mark Harman. [doi]
- SCVHunter: Smart Contract Vulnerability Detection Based on Heterogeneous Graph Attention NetworkFeng Luo, Ruijie Luo, Ting Chen 0002, Ao Qiao, Zheyuan He, Shuwei Song, Yu Jiang 0001, Sixing Li. [doi]
- Context-Aware Name Recommendation for Field RenamingChunhao Dong, Yanjie Jiang, Nan Niu, Yuxia Zhang, Hui Liu 0003. [doi]
- FuzzInMem: Fuzzing Programs via In-memory StructuresXuwei Liu, Wei You, Yapeng Ye, Zhuo Zhang 0002, Jianjun Huang 0001, Xiangyu Zhang 0001. [doi]
- Breaking the Flow: A Study of Interruptions During Software Engineering ActivitiesYimeng Ma, Yu Huang 0015, Kevin Leach. [doi]
- Exploiting Library Vulnerability via Migration Based Automating Test GenerationZirui Chen, Xing Hu 0008, Xin Xia 0001, Yi Gao, Tongtong Xu, David Lo 0001, Xiaohu Yang 0001. [doi]
- GrammarT5: Grammar-Integrated Pretrained Encoder-Decoder Neural Model for CodeQihao Zhu, Qingyuan Liang, Zeyu Sun 0004, Yingfei Xiong 0001, Lu Zhang 0023, Shengyu Cheng. [doi]
- PrettySmart: Detecting Permission Re-delegation Vulnerability for Token Behaviors in Smart ContractsZhijie Zhong, Zibin Zheng, Hong-Ning Dai, Qing Xue, Junjia Chen, Yuhong Nan. [doi]
- Causal Relationships and Programming Outcomes: A Transcranial Magnetic Stimulation ExperimentHammad Ahmad, Madeline Endres, Kaia Newman, Priscila Santiesteban, Emma Shedden, Westley Weimer. [doi]
- Testing the Limits: Unusual Text Inputs Generation for Mobile App Crash Detection with Large Language ModelZhe Liu 0025, Chunyang Chen, Junjie Wang 0001, Mengzhuo Chen, Boyu Wu, Zhilin Tian, Yuekai Huang, Jun Hu, Qing Wang 0001. [doi]
- Demystifying Compiler Unstable Feature Usage and Impacts in the Rust EcosystemChenghao Li, Yifei Wu, Wenbo Shen, Zichen Zhao, Rui Chang, Chengwei Liu, Yang Liu, Kui Ren 0001. [doi]
- On the Helpfulness of Answering Developer Questions on Discord with Similar Conversations and Posts from the PastAlexander Lill, André N. Meyer, Thomas Fritz 0001. [doi]
- Using an LLM to Help With Code UnderstandingDaye Nam, Andrew Macvean, Vincent J. Hellendoorn, Bogdan Vasilescu, Brad A. Myers. [doi]
- Exploring Experiences with Automated Program Repair in PracticeFairuz Nawer Meem, Justin Smith 0001, Brittany Johnson. [doi]
- Predicting open source contributor turnover from value-related discussions: An analysis of GitHub issuesJack Jamieson, Naomi Yamashita, Eureka Foong. [doi]
- How do Developers Talk about GitHub Actions? Evidence from Online Software Development CommunityYang Zhang, Yiwen Wu, Tingting Chen, Tao Wang, Hui Liu, Huaimin Wang. [doi]
- CNEPS: A Precise Approach for Examining Dependencies among Third-Party C/C++ Open-Source ComponentsYoonjong Na, Seunghoon Woo, Joomyeong Lee, Heejo Lee. [doi]
- FAIR: Flow Type-Aware Pre-Training of Compiler Intermediate RepresentationsChangan Niu, Chuanyi Li, Vincent Ng 0001, David Lo 0001, Bin Luo 0003. [doi]
- Out of Context: How important is Local Context in Neural Program Repair?Julian Aron Prenner, Romain Robbes. [doi]
- Smart Contract and DeFi Security Tools: Do They Meet the Needs of Practitioners?Stefanos Chaliasos, Marcos Antonios Charalambous, Liyi Zhou, Rafaila Galanopoulou, Arthur Gervais, Dimitris Mitropoulos, Benjamin Livshits. [doi]
- DSFM: Enhancing Functional Code Clone Detection with Deep Subtree InteractionsZhiwei Xu, Shaohua Qiang, Dinghong Song, Min Zhou 0001, Hai Wan, Xibin Zhao, Ping Luo, Hongyu Zhang 0002. [doi]
- Do Automatic Test Generation Tools Generate Flaky Tests?Martin Gruber, Muhammad Firhard Roslan, Owain Parry, Fabian Scharnböck, Phil McMinn, Gordon Fraser 0001. [doi]
- Strengthening Supply Chain Security with Fine-grained Safe Patch IdentificationChanghua Luo, Wei Meng 0001, Shuai Wang 0011. [doi]
- MotorEase: Automated Detection of Motor Impairment Accessibility Issues in Mobile App UIsArun Krishna Vajjala, S. M. Hasan Mansur 0001, Justin Jose, Kevin Moran. [doi]
- How Far Are We? The Triumphs and Trials of Generative AI in Learning Software EngineeringRudrajit Choudhuri, Dylan Liu, Igor Steinmacher, Marco Aurélio Gerosa, Anita Sarma. [doi]
- Automatic Semantic Augmentation of Language Model Prompts (for Code Summarization)Toufique Ahmed, Kunal Suresh Pai, Premkumar T. Devanbu, Earl T. Barr. [doi]
- CrashTranslator: Automatically Reproducing Mobile Application Crashes Directly from Stack TraceYuchao Huang, Junjie Wang, Zhe Liu, Yawen Wang, Song Wang 0009, Chunyang Chen, Yuanzhe Hu, Qing Wang. [doi]
- TRACED: Execution-aware Pre-training for Source CodeYangruibo Ding, Benjamin Steenhoek, Kexin Pei, Gail E. Kaiser, Wei Le, Baishakhi Ray. [doi]
- MiniMon: Minimizing Android Applications with Intelligent Monitoring-Based DebloatingJiakun Liu, Zicheng Zhang, Xing Hu 0008, Ferdian Thung, Shahar Maoz, Debin Gao, Eran Toch, Zhipeng Zhao, David Lo 0001. [doi]
- KnowLog: Knowledge Enhanced Pre-trained Language Model for Log UnderstandingLipeng Ma, Weidong Yang, Bo Xu, Sihang Jiang, Ben Fei, Jiaqing Liang, Mingjie Zhou, Yanghua Xiao. [doi]
- Less is More? An Empirical Study on Configuration Issues in Python PyPI EcosystemYun Peng, Ruida Hu, Ruoke Wang, Cuiyun Gao, Shuqing Li, Michael R. Lyu. [doi]
- Prompting Is All You Need: Automated Android Bug Replay with Large Language ModelsSidong Feng, Chunyang Chen. [doi]
- ChatGPT-Resistant Screening Instrument for Identifying Non-ProgrammersRaphael Serafini, Clemens Otto, Stefan Albert Horstmann, Alena Naiakshina. [doi]
- Investigating White-Box Attacks for On-Device ModelsMingyi Zhou, Xiang Gao 0012, Jing Wu, Kui Liu 0001, Hailong Sun 0001, Li Li 0029. [doi]
- How Are Paid and Volunteer Open Source Developers Different? A Study of the Rust ProjectYuxia Zhang, Mian Qin, Klaas-Jan Stol, Minghui Zhou 0001, Hui Liu 0003. [doi]
- Domain Knowledge Matters: Improving Prompts with Fix Templates for Repairing Python Type ErrorsYun Peng, Shuzheng Gao, Cuiyun Gao, Yintong Huo, Michael R. Lyu. [doi]
- Evaluating Large Language Models in Class-Level Code GenerationXueying Du, Mingwei Liu 0002, Kaixin Wang, Hanlin Wang, Junwei Liu, Yixuan Chen 0012, Jiayi Feng, Chaofeng Sha, Xin Peng 0001, Yiling Lou. [doi]
- EDEFuzz: A Web API Fuzzer for Excessive Data ExposuresLianglu Pan, Shaanan Cohney, Toby Murray, Van-Thuan Pham. [doi]
- Testing Graph Database Systems via Equivalent Query RewritingQiuyang Mang, Aoyang Fang, Boxi Yu, Hanfei Chen, Pinjia He. [doi]
- Development in times of hype: How freelancers explore Generative AI?Mateusz Dolata, Norbert Lange, Gerhard Schwabe. [doi]
- Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone DetectionSiyue Feng, Wenqi Suo, Yueming Wu, Deqing Zou, Yang Liu 0003, Hai Jin 0001. [doi]
- Verifying Declarative Smart ContractsHaoxian Chen 0001, Lan Lu, Brendan Massey, Yuepeng Wang 0001, Boon Thau Loo. [doi]
- When Neural Code Completion Models Size up the Situation: Attaining Cheaper and Faster Completion through Dynamic Model InferenceZhensu Sun, Xiaoning Du 0001, Fu Song, Shangwen Wang, Li Li 0029. [doi]
- Lost in Translation: A Study of Bugs Introduced by Large Language Models while Translating CodeRangeet Pan, Ali Reza Ibrahimzada, Rahul Krishna, Divya Sankar, Lambert Pouguem Wassi, Michele Merler, Boris Sobolev, Raju Pavuluri, Saurabh Sinha, Reyhaneh Jabbarvand. [doi]
- Enhancing Exploratory Testing by Large Language Model and Knowledge GraphYanqi Su, Dianshu Liao, Zhenchang Xing, Qing Huang, Mulong Xie, Qinghua Lu 0001, Xiwei Xu 0001. [doi]
- Practical Non-Intrusive GUI Exploration Testing with Visual-based Robotic ArmsShengcheng Yu, Chunrong Fang, Mingzhe Du, Yuchen Ling, Zhenyu Chen 0001, Zhendong Su 0001. [doi]
- RogueOne: Detecting Rogue Updates via Differential Data-flow Analysis Using Trust DomainsRaphael J. Sofaer, Yaniv David, Mingqing Kang, Jianjia Yu, Yinzhi Cao, Junfeng Yang, Jason Nieh. [doi]
- PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)Ruichao Liang, Jing Chen, Kun He 0008, Yueming Wu, Gelei Deng, RuiYing Du, Cong Wu 0003. [doi]
- Learning-based Widget Matching for Migrating GUI Test CasesYakun Zhang, Wenjie Zhang 0007, Dezhi Ran, Qihao Zhu, Chengfeng Dou, Dan Hao 0001, Tao Xie 0001, Lu Zhang 0023. [doi]
- NuzzleBug: Debugging Block-Based Programs in ScratchAdina Deiner, Gordon Fraser 0001. [doi]
- Unveiling the Life Cycle of User Feedback: Best Practices from Software PractitionersZe Shi Li, Nowshin Nawar Arony, Kezia Devathasan, Manish Sihag, Neil A. Ernst, Daniela E. Damian. [doi]
- Mozi: Discovering DBMS Bugs via Configuration-Based Equivalent TransformationJie Liang 0006, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Chengnian Sun, Yu Jiang 0001. [doi]
- CSChecker: Revisiting GDPR and CCPA Compliance of Cookie Banners on the WebMingxue Zhang 0001, Wei Meng 0001, You Zhou, Kui Ren 0001. [doi]
- Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability PredictionHuanting Wang, Zhanyong Tang, Shin Hwei Tan, Jie Wang, Yuzhe Liu, Hejun Fang, Chunwei Xia, Zheng Wang 0001. [doi]
- Fast Deterministic Black-box Context-free Grammar InferenceMohammad Rifat Arefin, Suraj Shetiya, Zili Wang, Christoph Csallner. [doi]
- Cross-Inlining Binary Function Similarity DetectionAng Jia, Ming Fan 0002, Xi Xu, Wuxia Jin, Haijun Wang, Ting Liu 0002. [doi]
- Optimistic Prediction of Synchronization-Reversal Data RacesZheng Shi, Umang Mathur 0001, Andreas Pavlogiannis. [doi]
- Toward Automatically Completing GitHub WorkflowsAntonio Mastropaolo, Fiorella Zampetti, Gabriele Bavota, Massimiliano Di Penta. [doi]
- MetaLog: Generalizable Cross-System Anomaly Detection from Logs with Meta-LearningChenyangguang Zhang, Tong Jia, Guopeng Shen, Pinyan Zhu, Ying Li 0012. [doi]
- BinaryAI: Binary Software Composition Analysis via Intelligent Binary Source Code MatchingLing Jiang, Junwen An, Huihui Huang, Qiyi Tang 0003, Sen Nie, Shi Wu, Yuqun Zhang. [doi]
- Shedding Light on Software Engineering-specific Metaphors and IdiomsMia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski. [doi]
- ChatGPT Incorrectness Detection in Software ReviewsMinaoar Hossain Tanzil, Junaed Younus Khan, Gias Uddin 0001. [doi]
- Code Search is All You Need? Improving Code Suggestions with Code SearchJunKai Chen, Xing Hu 0008, Zhenhao Li, Cuiyun Gao, Xin Xia 0001, David Lo 0001. [doi]
- DeepLSH: Deep Locality-Sensitive Hash Learning for Fast and Efficient Near-Duplicate Crash Report DetectionYoucef Remil, Anes Bendimerad, Romain Mathonat, Chedy Raïssi, Mehdi Kaytoue. [doi]
- Novelty Begets Popularity, But Curbs Participation - A Macroscopic View of the Python Open-Source EcosystemHongbo Fang, James D. Herbsleb, Bogdan Vasilescu. [doi]
- MUT: Human-in-the-Loop Unit Test MigrationYi Gao, Xing Hu 0008, Tongtong Xu, Xin Xia 0001, David Lo 0001, Xiaohu Yang 0001. [doi]
- Comprehensive Semantic Repair of Obsolete GUI Test Scripts for Mobile ApplicationsShaoheng Cao, Minxue Pan, Yu Pei 0001, Wenhua Yang 0001, Tian Zhang 0001, Linzhang Wang, Xuandong Li. [doi]
- Mining Pull Requests to Detect Process Anomalies in Open Source Software DevelopmentBohan Liu, He Zhang 0001, Weigang Ma, Hongyu Kuang, Yi Yang, Jinwei Xu, Shan Gao, Jian Gao. [doi]
- Scalable Relational Analysis via Relational Bound PropagationClay Stevens, Hamid Bagheri. [doi]
- MultiTest: Physical-Aware Object Insertion for Testing Multi-sensor Fusion Perception SystemsXinyu Gao, Zhijie Wang, Yang Feng 0003, Lei Ma 0003, Zhenyu Chen 0001, Baowen Xu. [doi]
- ReFAIR: Toward a Context-Aware Recommender for Fairness Requirements EngineeringCarmine Ferrara, Francesco Casillo, Carmine Gravino, Andrea De Lucia, Fabio Palomba. [doi]
- Deep Learning or Classical Machine Learning? An Empirical Study on Log-Based Anomaly DetectionBoxi Yu, Jiayi Yao, Qiuai Fu, Zhiqing Zhong, Haotian Xie, Yaoliang Wu, Yuchi Ma, Pinjia He. [doi]
- Improving Testing Behavior by Gamifying IntelliJPhilipp Straubinger, Gordon Fraser 0001. [doi]
- Xpert: Empowering Incident Management with Query Recommendations via Large Language ModelsYuxuan Jiang, Chaoyun Zhang, Shilin He, Zhihao Yang, Minghua Ma, Si-qin, Yu Kang 0006, Yingnong Dang, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang 0001. [doi]
- Object Graph ProgrammingAditya Thimmaiah, Leonidas Lampropoulos, Christopher J. Rossbach, Milos Gligoric 0001. [doi]
- GenderMag Improves Discoverability in the Field, Especially for Women: An Multi-Year Case Study of Suggest Edit, a Code Review FeatureEmerson R. Murphy-Hill, Alberto Elizondo, Ambar Murillo, Marian Harbach, Bogdan Vasilescu, Delphine Carlson, Florian Dessloch. [doi]
- PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python CodeWuxia Jin, Shuo Xu, Dawei Chen, Jiajun He, Dinghong Zhong, Ming Fan 0002, Hongxu Chen, Huijia Zhang, Ting Liu 0002. [doi]
- MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware DetectionShuai He, Cai Fu, Hong Hu 0004, Jiahe Chen, Jianqiang Lv, Shuai Jiang. [doi]
- Crossover in Parametric FuzzingKatherine Hough, Jonathan Bell 0001. [doi]