Abstract is missing.
- Message from the Chairs: ASE 2023Tegawendé F. Bissyandé, Jacques Klein, Christian Bird, Federica Sarro. [doi]
- CertPri: Certifiable Prioritization for Deep Neural Networks via Movement Cost in Feature SpaceHaibin Zheng, Jinyin Chen, Haibo Jin. 1-13 [doi]
- Nuances are the Key: Unlocking ChatGPT to Find Failure-Inducing Tests with Differential PromptingTsz On Li, Wenxi Zong, Yibo Wang, Haoye Tian, Ying Wang 0038, Shing-Chi Cheung, Jeff Kramer. 14-26 [doi]
- Robin: A Novel Method to Produce Robust Interpreters for Deep Learning-Based Code ClassifiersZhen Li, Ruqian Zhang, Deqing Zou, Ning Wang, Yating Li, Shouhuai Xu, Chen Chen, Hai Jin 0001. 27-39 [doi]
- The Devil is in the Tails: How Long-Tailed Code Distributions Impact Large Language ModelsXin Zhou, Kisub Kim, Bowen Xu, Jiakun Liu, DongGyun Han, David Lo 0001. 40-52 [doi]
- DeepScaler: Holistic Autoscaling for Microservices Based on Spatiotemporal GNN with Adaptive Graph LearningChunyang Meng, Shijie Song, Haogang Tong, Maolin Pan, Yang Yu 0027. 53-65 [doi]
- Twin Graph-Based Anomaly Detection via Attentive Multi-Modal Learning for Microservice SystemJun Huang 0003, Yang Yang, Hang Yu, Jianguo Li, Xiao Zheng. 66-78 [doi]
- Dynamic Graph Neural Networks-Based Alert Link Prediction for Online Service SystemsYiru Chen, Chenxi Zhang, Zhen Dong, Dingyu Yang, Xin Peng 0001, Jiayu Ou, Hong Yang, Zheshun Wu, Xiaojun Qu, Wei Li. 79-90 [doi]
- Vicious Cycles in Distributed Software SystemsShangshu Qian, Wen Fan, Lin Tan 0001, Yongle Zhang. 91-103 [doi]
- Fixing Privilege Escalations in Cloud Access Control with MaxSAT and Graph Neural NetworksYang Hu, Wenxi Wang, Sarfraz Khurshid, Kenneth L. McMillan, Mohit Tiwari. 104-115 [doi]
- Maat: Performance Metric Anomaly Anticipation for Cloud Services with Conditional DiffusionCheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su 0001, Michael R. Lyu. 116-128 [doi]
- Are They All Good? Studying Practitioners' Expectations on the Readability of Log MessagesZhenhao Li, An Ran Chen, Xing Hu, Xin Xia, Tse-Hsun Chen, Weiyi Shang. 129-140 [doi]
- LogOnline: A Semi-Supervised Log-Based Anomaly Detector Aided with Online Learning MechanismXuheng Wang, Jiaxing Song, Xu Zhang 0024, Junshu Tang, Weihe Gao, Qingwei Lin. 141-152 [doi]
- Repeated Builds During Code Review: An Empirical Study of the OpenStack CommunityRungroj Maipradit, Dong Wang, Patanamon Thongtanunam, Raula Gaikovina Kula, Yasutaka Kamei, Shane McIntosh. 153-165 [doi]
- An Empirical Study of Malicious Code In PyPI EcosystemWenbo Guo 0011, Zhengzi Xu, Chengwei Liu, Cheng Huang 0003, Yong Fang 0002, Yang Liu 0003. 166-177 [doi]
- Understanding and Remediating Open-Source License Incompatibilities in the PyPI EcosystemWeiwei Xu, Hao He 0012, Kai Gao, Minghui Zhou 0001. 178-190 [doi]
- Mitigating Persistence of Open-Source Vulnerabilities in Maven EcosystemLyuye Zhang, Chengwei Liu, Sen Chen, Zhengzi Xu, Lingling Fan 0003, Lida Zhao, Yiran Zhang, Yang Liu 0003. 191-203 [doi]
- Fork Entropy: Assessing the Diversity of Open Source Software Projects' ForksLiang Wang 0006, Zhiwen Zheng, Xiangchen Wu, Baihui Sang, Jierui Zhang, XianPing Tao. 204-216 [doi]
- EALink: An Efficient and Accurate Pre-Trained Framework for Issue-Commit Link RecoveryChenyuan Zhang, Yanlin Wang, Zhao Wei, Yong Xu, Juhong Wang, Hui Li 0057, Rongrong Ji. 217-229 [doi]
- ATOM: Automated Black-Box Testing of Multi-Label Image Classification SystemsShengyou Hu, Huayao Wu, Peng Wang, Jing Chang, Yongjun Tu, Xiu Jiang, Xintao Niu, Changhai Nie. 230-242 [doi]
- Generative Model-Based Testing on Decision-Making PoliciesZhuo Li, Xiongfei Wu, Derui Zhu, Mingfei Cheng, Siyuan Chen, Fuyuan Zhang, Xiaofei Xie, Lei Ma 0003, Jianjun Zhao 0001. 243-254 [doi]
- ESRO: Experience Assisted Service Reliability against OutagesSarthak Chakraborty, Shubham Agarwal, Shaddy Garg, Abhimanyu Sethia, Udit Narayan Pandey, Videh Aggarwal, Shiv Kumar Saini. 255-267 [doi]
- Prism: Revealing Hidden Functional Clusters from Massive Instances in Cloud SystemsJinyang Liu, Zhihan Jiang, Jiazhen Gu, Junjie Huang, Zhuangbin Chen, Cong Feng, Zengyin Yang, Yongqiang Yang, Michael R. Lyu. 268-280 [doi]
- An Energy-Aware Approach to Design Self-Adaptive AI-based Applications on the EdgeAlessandro Tundo, Marco Mobilio, Shashikant Ilager, Ivona Brandic, Ezio Bartocci, Leonardo Mariani. 281-293 [doi]
- SmartCoCo: Checking Comment-Code Inconsistency in Smart Contracts via Constraint Propagation and BindingSicheng Hao 0001, Yuhong Nan, Zibin Zheng, Xiaohui Liu. 294-306 [doi]
- A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code ClusteringWentao Liang, Xiang Ling 0001, JingZheng Wu, Tianyue Luo, Yanjun Wu. 307-318 [doi]
- Merge-Replay: Efficient IFDS-Based Taint Analysis by Consolidating Equivalent Value FlowsYujiang Gui, Dongjie He, Jingling Xue. 319-331 [doi]
- Learning to Locate and Describe VulnerabilitiesJian Zhang, Shangqing Liu, Xu Wang 0007, Tianlin Li, Yang Liu 0003. 332-344 [doi]
- When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability DetectionXin-Cheng Wen, Xinchen Wang, Cuiyun Gao, Shaohua Wang, Yang Liu 0003, Zhaoquan Gu. 345-357 [doi]
- SCPatcher: Mining Crowd Security Discussions to Enrich Secure Coding PracticesZiyou Jiang, Lin Shi 0006, Guowei Yang 0001, Qing Wang 0001. 358-370 [doi]
- Causality-Aided Trade-Off Analysis for Machine Learning FairnessZhenlan Ji, Pingchuan Ma 0004, Shuai Wang 0011, Yanhui Li. 371-383 [doi]
- Cell2Doc: ML Pipeline for Generating Documentation in Computational NotebooksTamal Mondal, Scott Barnett, Akash Lal, Jyothi Vedurada. 384-396 [doi]
- An Empirical Study of Parameter-Efficient Fine-Tuning Methods for Pre-Trained Code ModelsJiaxing Liu, Chaofeng Sha, Xin Peng 0001. 397-408 [doi]
- CAT-LM Training Language Models on Aligned Code And TestsNikitha Rao, Kush Jain, Uri Alon 0002, Claire Le Goues, Vincent J. Hellendoorn. 409-420 [doi]
- Domain Adaptive Code Completion via Language Models and Decoupled Domain DatabasesZe Tang, JiDong Ge, Shangqing Liu, Tingwei Zhu, Tongtong Xu, LiGuo Huang, Bin Luo 0003. 421-433 [doi]
- CodeGen4Libs: A Two-Stage Approach for Library-Oriented Code GenerationMingwei Liu 0002, Tianyong Yang, Yiling Lou, Xueying Du, Ying Wang, Xin Peng 0001. 434-445 [doi]
- Adaptive REST API Testing with Reinforcement LearningMyeongSoo Kim, Saurabh Sinha, Alessandro Orso. 446-458 [doi]
- Increasing the Responsiveness of Web Applications by Introducing Lazy LoadingAlexi Turcotte, Satyajit Gokhale, Frank Tip. 459-470 [doi]
- Let's Chat to Find the APIs: Connecting Human, LLM and Knowledge Graph through AI ChainQing Huang, Zhenyu Wan, Zhenchang Xing, Changjing Wang, Jieshan Chen, Xiwei Xu 0001, Qinghua Lu 0001. 471-483 [doi]
- Software Entity Recognition with Noise-Robust LearningTai Nguyen 0005, Yifeng Di, Joohan Lee, Muhao Chen, Tianyi Zhang 0001. 484-496 [doi]
- AutoLog: A Log Sequence Synthesis Framework for Anomaly DetectionYintong Huo, Yichen Li, Yuxin Su 0001, Pinjia He, Zifan Xie, Michael R. Lyu. 497-509 [doi]
- ASTER: Automatic Speech Recognition System Accessibility Testing for StutterersYi Liu, Yuekang Li, Gelei Deng, Felix Juefei-Xu, Yao Du, Cen Zhang, Chengwei Liu, Yeting Li, Lei Ma 0003, Yang Liu 0003. 510-521 [doi]
- The Plastic Surgery Hypothesis in the Era of Large Language ModelsChunqiu Steven Xia, Yifeng Ding, Lingming Zhang 0001. 522-534 [doi]
- Gamma: Revisiting Template-Based Automated Program Repair Via Mask PredictionQuanjun Zhang, Chunrong Fang, Tongke Zhang, Bowen Yu, Weisong Sun, Zhenyu Chen 0001. 535-547 [doi]
- Contextuality of Code Representation LearningYi Li, Shaohua Wang 0002, Tien N. Nguyen. 548-559 [doi]
- On-the-fly Improving Performance of Deep Code Models via Input DenoisingZhao Tian, Junjie Chen 0003, Xiangyu Zhang. 560-572 [doi]
- Using Deep Learning to Automatically Improve Code ReadabilityAntonio Vitale, Valentina Piantadosi, Simone Scalabrino, Rocco Oliveto. 573-584 [doi]
- Towards Automatically Addressing Self-Admitted Technical Debt: How Far Are We?Antonio Mastropaolo, Massimiliano Di Penta, Gabriele Bavota. 585-597 [doi]
- An Integrated Program Analysis Framework for Graduate Courses in Programming Languages and Software EngineeringPrantik Chatterjee, Pankaj Kumar Kalita, Sumit Lahiri, Sujit Kumar Muduli, Vishal Singh, Gourav Takhar, Subhajit Roy 0001. 598-610 [doi]
- Precise Data-Driven Approximation for Program Analysis via FuzzingNikhil Parasaram, Earl T. Barr, Sergey Mechtaev, Marcel Böhme. 611-623 [doi]
- Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability AnalysisChenghang Shi, Haofeng Li, Yulei Sui, Jie Lu, Lian Li 0002, Jingling Xue. 624-636 [doi]
- Contrastive Learning for API Aspect AnalysisG. M. Shahariar, Tahmid Hasan, Anindya Iqbal, Gias Uddin 0001. 637-648 [doi]
- PTDETECTOR: An Automated JavaScript Front-end Library DetectorXinyue Liu, Lukasz Ziarek. 649-660 [doi]
- Revealing Performance Issues in Server-Side WebAssembly Runtimes Via Differential TestingShuyao Jiang, Ruiying Zeng, Zihao Rao, Jiazhen Gu, Yangfan Zhou, Michael R. Lyu. 661-672 [doi]
- Demystifying Template-Based Invariant Generation for Bit-Vector ProgramsPeisen Yao, Jingyu Ke, Jiahui Sun, Hongfei Fu 0001, Rongxin Wu, Kui Ren 0001. 673-685 [doi]
- EndWatch: A Practical Method for Detecting Non-Termination in Real-World SoftwareYao Zhang, Xiaofei Xie, Yi Li 0008, Sen Chen, Cen Zhang, Xiaohong Li 0001. 686-697 [doi]
- Symbolic Fixpoint Algorithms for Logical LTL GamesStanly Samuel, Deepak D'Souza, Raghavan Komondoor. 698-709 [doi]
- Delving into Commit-Issue Correlation to Enhance Commit Message Generation ModelsLiran Wang, Xunzhu Tang, Yichen He, Changyu Ren, Shuhua Shi, Chaoran Yan, Zhoujun Li 0001. 710-722 [doi]
- From Commit Message Generation to History-Aware Commit Message CompletionAleksandra Eliseeva, Yaroslav Sokolov, Egor Bogomolov, Yaroslav Golubev, Danny Dig, Timofey Bryksin. 723-735 [doi]
- Automatic Generation and Reuse of Precise Library Summaries for Object-Sensitive Pointer AnalysisJingbo Lu, Dongjie He, Wei Li, Yaoqing Gao, Jingling Xue. 736-747 [doi]
- Generating Variable Explanations via Zero-shot Prompt LearningChong Wang, Yiling Lou, Junwei Liu, Xin Peng 0001. 748-760 [doi]
- What Makes Good In-Context Demonstrations for Code Intelligence Tasks with LLMs?Shuzheng Gao, Xin-Cheng Wen, Cuiyun Gao, Wenxuan Wang, Hongyu Zhang 0002, Michael R. Lyu. 761-773 [doi]
- HexT5: Unified Pre-Training for Stripped Binary Code Information InferenceJiaqi Xiong, Guoqiang Chen, Kejiang Chen, Han Gao, Shaoyin Cheng, Weiming Zhang 0001. 774-786 [doi]
- LiSum: Open Source Software License Summarization with Multi-Task LearningLinyu Li, Sihan Xu, Yang Liu 0003, Ya Gao, Xiangrui Cai, Jiarun Wu, Wenli Song, Zheli Liu. 787-799 [doi]
- Personalized First Issue Recommender for Newcomers in Open Source ProjectsWenxin Xiao, Jingyue Li, Hao He 0012, Ruiqiao Qiu, Minghui Zhou 0001. 800-812 [doi]
- Understanding and Enhancing Issue Prioritization in GitHubYingying He, Wenhua Yang 0001, Minxue Pan, Yasir Hussain, Yu Zhou 0010. 813-824 [doi]
- Who is the Real Hero? Measuring Developer Contribution via Multi-Dimensional Data IntegrationYuqiang Sun, Zhengzi Xu, Chengwei Liu, Yiran Zhang, Yang Liu 0003. 825-836 [doi]
- To Share, or Not to Share: Exploring Test-Case Reusability in Fork EcosystemsMukelabai Mukelabai, Christoph Derks, Jacob Krüger, Thorsten Berger. 837-849 [doi]
- Code Difference Guided Adversarial Example Generation for Deep Code ModelsZhao Tian, Junjie Chen, Zhi Jin. 850-862 [doi]
- iASTMapper: An Iterative Similarity-Based Abstract Syntax Tree Mapping AlgorithmNeng Zhang 0001, Qinde Chen, Zibin Zheng, Ying Zou 0001. 863-874 [doi]
- 3: Zero-Shot Cross-Language Code Clone DetectionJia Li, Chongyang Tao, Zhi Jin, Fang Liu 0032, Jia Li, Ge Li 0001. 875-887 [doi]
- Persisting and Reusing Results of Static Program Analyses on a Large ScaleJohannes Düsing, Ben Hermann 0001. 888-900 [doi]
- Optimizing Continuous Development by Detecting and Preventing Unnecessary Content GenerationTalank Baral, Shanto Rahman, Bala Naren Chanumolu, Basak Balci, Tuna Tuncer, August Shi, Wing Lam. 901-913 [doi]
- DCLINK: Bridging Data Constraint Changes and Implementations in FinTech SystemsWensheng Tang, Chengpeng Wang, Peisen Yao, Rongxin Wu, Xianjin Fu, Gang Fan, Charles Zhang. 914-925 [doi]
- Systematically Detecting Packet Validation Vulnerabilities in Embedded Network StacksPaschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis 0001. 926-938 [doi]
- WADIFF: A Differential Testing Framework for WebAssembly RuntimesShiYao Zhou, Muhui Jiang, Weimin Chen, Hao Zhou, Haoyu Wang 0001, Xiapu Luo. 939-950 [doi]
- VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut CoverageXiaoyin Wang, Tahmid Rafi, Na Meng 0001. 951-962 [doi]
- Fast and Reliable Program Synthesis via User InteractionYanju Chen, Chenglong Wang, Xinyu Wang, Osbert Bastani, Yu Feng 0001. 963-975 [doi]
- From Misuse to Mastery: Enhancing Code Generation with Knowledge-Driven AI ChainingXiaoxue Ren, Xinyuan Ye, Dehai Zhao, Zhenchang Xing, Xiaohu Yang 0001. 976-987 [doi]
- Generative Type Inference for PythonYun Peng, Chaozheng Wang, Wenxuan Wang, Cuiyun Gao, Michael R. Lyu. 988-999 [doi]
- Compiler Auto-Tuning via Critical Flag SelectionMingxuan Zhu, Dan Hao 0001. 1000-1011 [doi]
- A Comparative Study of Transformer-Based Neural Text Representation Techniques on Bug TriagingAtish Kumar Dipongkor, Kevin Moran. 1012-1023 [doi]
- Neural SZZ AlgorithmLingxiao Tang, Lingfeng Bao, Xin Xia 0001, Zhongdong Huang. 1024-1035 [doi]
- How to Train Your Neural Bug Detector: Artificial vs Real BugsCedric Richter, Heike Wehrheim. 1036-1048 [doi]
- Detection of Java Basic Thread Misuses Based on Static Event AnalysisBaoquan Cui, Miaomiao Wang, Chi Zhang, Jiwei Yan, Jun Yan 0009, Jian Zhang 0001. 1049-1060 [doi]
- FLUX: Finding Bugs with LLVM IR Based Unit Test CrossoversEric Liu, Shengjie Xu, David Lie. 1061-1072 [doi]
- A Comprehensive Study on Code Clones in Automated Driving SoftwareRan Mo, Yingjie Jiang, Wenjing Zhan, Dongyu Wang, Zengyang Li. 1073-1085 [doi]
- Detecting Smart Home Automation Application Interferences with Domain KnowledgeTao Wang 0030, Wei Chen 0018, Liwei Liu, Guoquan Wu, Jun Wei 0001, Tao Huang 0001. 1086-1097 [doi]
- Bridging the Gap Between Academia and Industry in Machine Learning Software Defect Prediction: Thirteen ConsiderationsSzymon Stradowski, Lech Madeyski. 1098-1110 [doi]
- Identify and Update Test Cases When Production Code Changes: A Transformer-Based ApproachXing Hu 0008, Zhuang Liu, Xin Xia 0001, Zhongxin Liu, Tongtong Xu, Xiaohu Yang 0001. 1111-1122 [doi]
- Revisiting and Improving Retrieval-Augmented Deep Assertion GenerationWeifeng Sun, Hongyan Li, Meng Yan 0001, Yan Lei, Hongyu Zhang. 1123-1135 [doi]
- LEAP: Efficient and Automated Test Method for NLP SoftwareMingxuan Xiao, Yan Xiao 0002, Hai Dong, Shunhui Ji, Pengcheng Zhang. 1136-1148 [doi]
- QuraTest: Integrating Quantum Specific Features in Quantum Program TestingJiaming Ye, Shangzhou Xia, Fuyuan Zhang, Paolo Arcaini, Lei Ma 0003, Jianjun Zhao 0001, Fuyuki Ishikawa. 1149-1161 [doi]
- An Empirical Study on Fine-Tuning Large Language Models of Code for Automated Program RepairKai Huang, Xiangxin Meng, Jian Zhang, Yang Liu 0003, Wenjie Wang, Shuhao Li, Yuqing Zhang. 1162-1174 [doi]
- Leakpair: Proactive Repairing of Memory Leaks in Single Page Web ApplicationsArooba Shahoor, Askar Yeltayuly Khamit, Jooyong Yi, Dongsun Kim. 1175-1187 [doi]
- Automated Fixing of Web UI Tests via Iterative Element MatchingYuanzhang Lin, Guoyao Wen, Xiang Gao. 1188-1199 [doi]
- OrdinalFix: Fixing Compilation Errors via Shortest-Path CFL ReachabilityWenjie Zhang 0007, Guancheng Wang 0001, Junjie Chen 0003, Yingfei Xiong 0001, Yong Liu, Lu Zhang 0023. 1200-1211 [doi]
- Enhancing Malware Detection for Android Apps: Detecting Fine-Granularity Malicious ComponentsZhijie Liu, Liang Feng Zhang, Yutian Tang. 1212-1224 [doi]
- Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph EmbeddingVikas Kumar Malviya, Yan Naing Tun, Chee Wei Leow, Ailys Tee Xynyn, Lwin Khin Shar, Lingxiao Jiang. 1225-1237 [doi]
- How Android Apps Break the Data Minimization Principle: An Empirical StudyShaokun Zhang, Hanwen Lei, Yuanpeng Wang, Ding Li, Yao Guo 0001, Xiangqun Chen. 1238-1250 [doi]
- Scene-Driven Exploration and GUI Modeling for Android AppsXiangyu Zhang, Lingling Fan 0003, Sen Chen, Yucheng Su, Boyuan Li. 1251-1262 [doi]
- Expediting Neural Network Verification via Network ReductionYuyi Zhong, Ruiwei Wang, Siau-Cheng Khoo. 1263-1275 [doi]
- HOBAT: Batch Verification for Homogeneous Structural Neural NetworksJingyang Li, Guoqiang Li 0001. 1276-1287 [doi]
- SMT Solver Validation Empowered by Large Pre-Trained Language ModelsMaolin Sun, Yibiao Yang, Yang Wang, Ming Wen 0001, Haoxiang Jia, Yuming Zhou. 1288-1300 [doi]
- Mutation-based Fault Localization of Deep Neural NetworksAli Ghanbari 0001, Deepak-George Thomas, Muhammad Arbab Arshad, Hridesh Rajan. 1301-1313 [doi]
- An Intentional Forgetting-Driven Self-Healing Method for Deep Reinforcement Learning SystemsAhmed Haj Yahmed, Rached Bouchoucha, Houssem Ben Braiek, Foutse Khomh. 1314-1325 [doi]
- AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian OptimizationLwin Khin Shar, Arda Goknil, Erik Johannes Husom, Sagar Sen, Yan Naing Tun, Kisub Kim. 1326-1338 [doi]
- An Image is Worth a Thousand Toxic Words: A Metamorphic Testing Framework for Content Moderation SoftwareWenxuan Wang, Jingyuan Huang, Jen-Tse Huang, Chang Chen, Jiazhen Gu, Pinjia He, Michael R. Lyu. 1339-1351 [doi]
- CoMSA: A Modeling-Driven Sampling Approach for Configuration Performance TestingYuanjie Xia, Zishuo Ding, Weiyi Shang. 1352-1363 [doi]
- Effective Concurrency Testing for Go via Directional Primitive-Constrained Interleaving ExplorationZongze Jiang, Ming Wen 0001, Yixin Yang, Chao Peng 0002, Ping Yang, Hai Jin 0001. 1364-1376 [doi]
- Fuzzing for CPS Mutation TestingJaekwon Lee, Enrico Viganò, Oscar Cornejo, Fabrizio Pastore, Lionel C. Briand. 1377-1389 [doi]
- ReuNify: A Step Towards Whole Program Analysis for React Native Android AppsYonghui Liu, Xiao Chen 0002, Pei Liu, John Grundy 0001, Chunyang Chen, Li Li 0029. 1390-1402 [doi]
- Wemint:Tainting Sensitive Data Leaks in WeChat Mini-ProgramsShi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang 0001. 1403-1415 [doi]
- Vision-Based Widget Mapping for Test Migration Across Mobile Platforms: Are We There Yet?Ruihua Ji, Tingwei Zhu, Xiaoqing Zhu, Chunyang Chen, Minxue Pan, Tian Zhang 0001. 1416-1428 [doi]
- Detecting Memory Errors in Python Native Code by Tracking Object Lifecycle with Reference CountXutong Ma, Jiwei Yan, Hao Zhang, Jun Yan 0009, Jian Zhang 0001. 1429-1440 [doi]
- Eiffel: Inferring Input Ranges of Significant Floating-point Errors via Polynomial ExtrapolationZuoyan Zhang, Bei Zhou, Jiangwei Hao, Hongru Yang, Mengqi Cui, Yuchang Zhou, Guanghui Song, Fei Li, Jinchen Xu, Jie Zhao 0002. 1441-1453 [doi]
- Perfce: Performance Debugging on Databases with Chaos Engineering-Enhanced Causality AnalysisZhenlan Ji, Pingchuan Ma 0004, Shuai Wang 0011. 1454-1466 [doi]
- Information Retrieval-Based Fault Localization for Concurrent ProgramsShuai Shao, Tingting Yu. 1467-1479 [doi]
- The MAP Metric in Information Retrieval Fault LocalizationThomas Hirsch, Birgit Hofer. 1480-1491 [doi]
- Improving Code Extraction from Coding Screencasts Using a Code-Aware Encoder-Decoder ModelAbdulkarim Malkadi, Ahmad Tayeb, Sonia Haiduc. 1492-1504 [doi]
- InfeRE: Step-by-Step Regex Generation via Chain of InferenceShuai Zhang, Xiaodong Gu 0002, Yuting Chen, Beijun Shen. 1505-1515 [doi]
- MELT: Mining Effective Lightweight Transformations from Pull RequestsDaniel Ramos, Hailie Mitchell, Inês Lynce, Vasco M. Manquinho, Ruben Martins, Claire Le Goues. 1516-1528 [doi]
- On the Evaluation of Neural Code Translation: Taxonomy and BenchmarkMingsheng Jiao, Tingrui Yu, Xuan Li, Guanjie Qiu, Xiaodong Gu 0002, Beijun Shen. 1529-1541 [doi]
- Pluggable Type Inference for FreeMartin Kellogg, Daniel Daskiewicz, Loi Ngo Duc Nguyen, Muyeed Ahmed, Michael D. Ernst. 1542-1554 [doi]
- MLIRSmith: Random Program Generation for Fuzzing MLIR Compiler InfrastructureHaoyu Wang, Junjie Chen 0003, Chuyue Xie, Shuang Liu 0007, Zan Wang, Qingchao Shen, Yingquan Zhao. 1555-1566 [doi]
- Thunderkaller: Profiling and Improving the Performance of SyzkallerYang Lan, Di Jin, Zhun Wang, Wende Tan, Zheyu Ma, Chao Zhang 0008. 1567-1578 [doi]
- PhyFu: Fuzzing Modern Physics Simulation EnginesDongwei Xiao, Zhibo Liu, Shuai Wang. 1579-1591 [doi]
- NaturalFuzz: Natural Input Generation for Big Data AnalyticsAhmad Humayun, Yaoxuan Wu, Miryung Kim, Muhammad Ali Gulzar. 1592-1603 [doi]
- A Large-Scale Empirical Study on Semantic Versioning in Golang EcosystemWenke Li, Feng Wu, Cai Fu, Fan Zhou. 1604-1614 [doi]
- Automated Software Entity Matching Between Successive VersionsBo Liu, Hui Liu 0003, Nan Niu, Yuxia Zhang, Guangjie Li, Yanjie Jiang. 1615-1627 [doi]
- Where to Go Now? Finding Alternatives for Declining Packages in the npm EcosystemSuhaib Mujahid, Diego Elias Costa 0001, Rabe Abdalkareem, Emad Shihab. 1628-1639 [doi]
- ConfTainter: Static Taint Analysis For Configuration OptionsTeng Wang 0004, Haochen He, Xiaodong Liu 0004, Shanshan Li 0001, Zhouyang Jia, Yu Jiang, Qing Liao 0001, Wang Li 0003. 1640-1651 [doi]
- Merge Conflict Resolution: Classification or Generation?Jinhao Dong, Qihao Zhu, Zeyu Sun 0004, Yiling Lou, Dan Hao 0001. 1652-1663 [doi]
- DeFiWarder: Protecting DeFi Apps from Token Leaking VulnerabilitiesJianzhong Su, Xingwei Lin, Zhiyuan Fang, Zhirong Zhu, Jiachi Chen, Zibin Zheng, Wei Lv, Jiashui Wang. 1664-1675 [doi]
- VD-Guard: DMA Guided Fuzzing for Hypervisor Virtual DeviceYuwei Liu, Siqi Chen, Yuchong Xie, Yanhao Wang, Libo Chen, Bin Wang, Yingming Zeng, Zhi Xue, Purui Su. 1676-1687 [doi]
- Towards Autonomous Testing Agents via Conversational Large Language ModelsRobert Feldt, Sungmin Kang, Juyeon Yoon, Shin Yoo. 1688-1693 [doi]
- Semantic Data Augmentation for Deep Learning Testing Using Generative AISondess Missaoui, Simos Gerasimou, Nicholas Matragkas. 1694-1698 [doi]
- Log Parsing: How Far Can ChatGPT Go?Van-Hoang Le, Hongyu Zhang 0002. 1699-1704 [doi]
- Automating Bias Testing of LLMsSergio Morales, Robert Clarisó, Jordi Cabot. 1705-1707 [doi]
- MUTEN: Mutant-Based Ensembles for Boosting Gradient-Based Adversarial AttackQiang Hu, Yuejun Guo 0001, Maxime Cordy, Mike Papadakis, Yves Le Traon. 1708-1712 [doi]
- Are We Ready to Embrace Generative AI for Software Q&A?Bowen Xu, Thanh-Dat Nguyen, Thanh Le-Cong, Thong Hoang, Jiakun Liu, Kisub Kim, Chen Gong 0005, Changan Niu, Chenyu Wang, Xuan-Bach Dinh Le, David Lo 0001. 1713-1717 [doi]
- Towards a Knowledge Base of Common Sustainability Weaknesses in Green Software DevelopmentPriyavanshi Pathania, Rohit Mehra, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden. 1718-1720 [doi]
- Towards Self-Adaptive Machine Learning-Enabled Systems Through QoS-Aware Model SwitchingShubham Kulkarni, Arya Marda, Karthik Vaidhyanathan. 1721-1725 [doi]
- Evolve the Model Universe of a System UniverseTao Yue 0002, Shaukat Ali 0001. 1726-1731 [doi]
- Modeling Programmer Attention as Scanpath PredictionAakash Bansal, Chia-Yi Su, Zachary Karas, Yifan Zhang, Yu Huang 0015, Toby Jia-Jun Li, Collin McMillan. 1732-1736 [doi]
- On Automated Assistants for Software Development: The Role of LLMsMira Leung, Gail Murphy. 1737-1741 [doi]
- Better Patching Using LLM Prompting, via Self-ConsistencyToufique Ahmed, Premkumar T. Devanbu. 1742-1746 [doi]
- Live Programming for Finite Model FindersAllison Sullivan. 1747-1752 [doi]
- Characterizing Flaky Tests in Node.js ApplicationsXiaoning Chang, Zheheng Liang, Guoquan Wu, Yu Gao 0002, Wei Chen 0018, Jun Wei 0001, Zhenyue Long, Lei Cui, Tao Huang 0001. 1753-1755 [doi]
- PSMT: Satisfiability Modulo Theories Meets Probability DistributionFuqi Jia, Rui Han, Xutong Ma, Baoquan Cui, Minghao Liu 0001, Pei Huang 0002, Feifei Ma, Jian Zhang 0001. 1756-1760 [doi]
- SAT-Verifiable LTL Satisfiability Checking via Graph Representation LearningWeilin Luo, Yuhang Zheng, Rongzhen Ye, Hai Wan, Jianfeng Du, Pingjia Liang, Polong Chen. 1761-1765 [doi]
- PURLTL: Mining LTL Specification from Imperfect Traces in TestingBo Peng, Pingjia Liang, Tingchen Han, Weilin Luo, Jianfeng Du, Hai Wan, Rongzhen Ye, Yuhang Zheng. 1766-1770 [doi]
- Enhancing Code Safety in Quantum Intermediate RepresentationJunjie Luo 0005, Jianjun Zhao 0001. 1771-1775 [doi]
- Towards a Formal Framework for Normative Requirements ElicitationNick Feng, Lina Marsso, Sinem Getir Yaman, Beverley Townsend, Ana Cavalcanti 0001, Radu Calinescu, Marsha Chechik. 1776-1780 [doi]
- Hot Patching Hot Fixes: Reflection and PerspectivesCarol Hanna, Justyna Petke. 1781-1786 [doi]
- Symbolic Verification of Fuzzy Logic ModelsSiang Zhao, Zhongyang Li, Zhenbang Chen, Ji Wang. 1787-1789 [doi]
- A Majority Invariant Approach to Patch Robustness Certification for Deep Learning ModelsQilin Zhou, Zhengyuan Wei, Haipeng Wang 0005, W. K. Chan 0001. 1790-1794 [doi]
- Fault Localization for Buggy Deep Learning Framework Conversions in Image RecognitionNikolaos Louloudakis, Perry Gibson, José Cano 0001, Ajitha Rajan. 1795-1799 [doi]
- Towards Safe Automated Refactoring of Imperative Deep Learning Programs to Graph ExecutionRaffi Khatchadourian, Tatiana Castro Vélez, Mehdi Bagherzadeh 0001, Nan Jia, Anita Raja. 1800-1802 [doi]
- Scalable Industrial Control System Analysis via XAI-Based Gray-Box FuzzingJustin Kur, Jingshu Chen, Jun Huang. 1803-1807 [doi]
- Predicting Compilation Resources for Adaptive Build in an Industrial SettingJunhao Hu, Chaozheng Wang, Hailiang Huang, Huang Luo, Yu Jin, Yuetang Deng, Tao Xie 0001. 1808-1813 [doi]
- Open Source Software Tools for Data Management and Deep Model Training AutomationUmut Tirasoglu, Abdussamet Türker, Adnan Ekici, Hayri Yigit, Yusuf Enes Bölükbasi, Toygar Akgün. 1814-1818 [doi]
- RocketHA: A High Availability Design Paradigm for Distributed Log-Based Storage SystemJuntao Ji, Rongtong Jin, Yubao Fu, Yinyou Gu, Tsung-Han Tsai, Qingshan Lin. 1819-1824 [doi]
- Assessing the Impact of Refactoring Energy-Inefficient Code Patterns on Software Sustainability: An Industry Case StudyRohit Mehra, Priyavanshi Pathania, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder, Adam P. Burden. 1825-1827 [doi]
- Green AI Quotient: Assessing Greenness of AI-based software and the way forwardSamarth Sikand, Vibhu Saujanya Sharma, Vikrant Kaulgud, Sanjay Podder. 1828-1833 [doi]
- Challenges of Accurate and Efficient AutoMLSwarnava Dey, Avik Ghose, Soumik Das. 1834-1839 [doi]
- Zero-Config Fuzzing for MicroservicesWei Wang, Andrei Benea, Franjo Ivancic. 1840-1845 [doi]
- Smart Prompt Advisor: Multi-Objective Prompt Framework for Consistency and Best PracticesKanchanjot Kaur Phokela, Samarth Sikand, Kapil Singi, Kuntal Dey, Vibhu Saujanya Sharma, Vikrant Kaulgud. 1846-1848 [doi]
- Improving Design Reviews at GoogleCelal Ziftci, Ben Greenberg. 1849-1854 [doi]
- Software Engineering Using Autonomous Agents: Are We There Yet?Samdyuti Suri, Sankar Narayan Das, Kapil Singi, Kuntal Dey, Vibhu Saujanya Sharma, Vikrant Kaulgud. 1855-1857 [doi]
- Government Mobile Apps: Analysing Citizen Feedback via App ReviewsTooba Aamir, Mohan Baruwal Chhetri, M. A. P. Chamikara, Marthie Grobler. 1858-1863 [doi]
- Coding and Debugging by Separating Secret Code Toward Secure Remote DevelopmentShinobu Saito. 1864-1869 [doi]
- An Industrial Practice for Securing Android Apps in the Banking DomainVikas Kumar Malviya, Phong Phan, Yan Naing Tun, Albert Ching, Lwin Khin Shar. 1870-1875 [doi]
- ACWRecommender: A Tool for Validating Actionable Warnings with Weak SupervisionZhipeng Xue, Zhipeng Gao, Xing Hu 0008, Shanping Li. 1876-1880 [doi]
- An Automated and Flexible Multilingual Bug-Fix Dataset Construction SystemWenkang Zhong, Chuanyi Li, Yunfei Zhang, Ziwen Ge, Jingyu Wang, JiDong Ge, Bin Luo 0003. 1881-1886 [doi]
- A Closer Look at Different Difficulty Levels Code Generation Abilities of ChatGPTDapeng Yan, Zhipeng Gao, Zhiming Liu 0001. 1887-1898 [doi]
- PreciseBugCollector: Extensible, Executable and Precise Bug-Fix Collection: Solution for Challenge 8: Automating Precise Data Collection for Code Snippets with Bugs, Fixes, Locations, and TypesHe Ye, Zimin Chen, Claire Le Goues. 1899-1910 [doi]
- Function-Level Vulnerability Detection Through Fusing Multi-Modal KnowledgeChao Ni 0001, Xinrong Guo, Yan Zhu, Xiaodan Xu, Xiaohu Yang 0001. 1911-1918 [doi]
- BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History MiningXuezhi Song, Yijian Wu, Junming Cao, Bihuan Chen 0001, Yun Lin 0001, Zhengjie Lu, Dingji Wang, Xin Peng 0001. 1919-1929 [doi]
- RPCover: Recovering gRPC Dependency in Multilingual ProjectsAoyang Fang, Ruiyu Zhou, Xiaoying Tang, Pinjia He. 1930-1939 [doi]
- VALAR: Streamlining Alarm Ranking in Static Analysis with Value-Flow Assisted Active LearningPengcheng Liu, Yifei Lu, Wenhua Yang 0001, Minxue Pan. 1940-1951 [doi]
- REEF: A Framework for Collecting Real-World Vulnerabilities and FixesChaozheng Wang, Zongjie Li, Yun Pena, Shuzheng Gao, Sirong Chen, Shuai Wang, Cuiyun Gao, Michael R. Lyu. 1952-1962 [doi]
- Potential Solutions to Challenges in C Program Repair: A Practical PerspectiveJifeng Xuan, Qi Xin, Liqian Chen, Xiaoguang Mao. 1963-1968 [doi]
- Minecraft: Automated Mining of Software Bug Fixes with Precise Code ContextSai Krishna Avula, Venkatesh Vobbilisetti, Shouvick Mondal. 1969-1979 [doi]
- Unifying Defect Prediction, Categorization, and Repair by Multi-Task Deep LearningChao Ni 0001, Kaiwen Yang, Yan Zhu, Xiang Chen 0005, Xiaohu Yang 0001. 1980-1992 [doi]
- MalWuKong: Towards Fast, Accurate, and Multilingual Detection of Malicious Code Poisoning in OSS Supply ChainsNingke Li, Shenao Wang, Mingxi Feng, Kailong Wang, Meizhen Wang, Haoyu Wang 0001. 1993-2005 [doi]
- CiD4HMOS: A Solution to HarmonyOS Compatibility IssuesTianzhi Ma, Yanjie Zhao, Li Li 0029, Liang Liu. 2006-2017 [doi]
- Bus Factor ExplorerEgor Klimov, Muhammad Umair Ahmed, Nikolai Sviridov, Pouria Derakhshanfar, Eray Tüzuü, Vladimir Kovalenko. 2018-2021 [doi]
- EXPRESS 2.0: An Intelligent Service Management Framework for AIoT Systems in the EdgeJia Xu 0010, Xiao Liu, Wuzhen Pan, Xuejun Li, Aiting Yao, Yun Yang 0001. 2022-2025 [doi]
- RJoules: An Energy Measurement Tool for RRajrupa Chattaraj, Sridhar Chimalakonda. 2026-2029 [doi]
- ArduinoProg: Towards Automating Arduino ProgrammingImam Nur Bani Yusuf, Diyanah Binte Abdul Jamal, Lingxiao Jiang. 2030-2033 [doi]
- BUGSC++: A Highly Usable Real World Defect Benchmark for C/C++Gabin An, Minhyuk Kwon, Kyunghwa Choi, Jooyong Yi, Shin Yoo. 2034-2037 [doi]
- ExpressAPR: Efficient Patch Validation for Java Automated Program Repair SystemsYuan-an Xiao, Chenyang Yang, Bo Wang 0050, Yingfei Xiong 0001. 2038-2041 [doi]
- Polyglot Code Smell Detection for Infrastructure as Code with GLITCHNuno Saavedra, João Gonçalves, Miguel Henriques, João F. Ferreira 0001, Alexandra Mendes. 2042-2045 [doi]
- NRAgo: Solving SMT(NRA) Formulas with Gradient-Based OptimizationMinghao Liu 0001, Kunhang Lv, Pei Huang 0002, Rui Han, Fuqi Jia, Yu Zhang, Feifei Ma, Jian Zhang 0001. 2046-2049 [doi]
- CPA-DF: A Tool for Configurable Interval Analysis to Boost Program VerificationDirk Beyer 0001, Po-Chun Chien, Nian-Ze Lee. 2050-2053 [doi]
- COMEX: A Tool for Generating Customized Source Code RepresentationsDebeshee Das, Noble Saji Mathews, Alex Mathai, Srikanth Tamilselvam, Kranthi Sedamaki, Sridhar Chimalakonda, Atul Kumar 0002. 2054-2057 [doi]
- TEASER: Simulation-Based CAN Bus Regression Testing for Self-Driving Cars SoftwareChristian Birchler, Cyrill Rohrbach, Hyeongkyun Kim, Alessio Gambi, Tianhai Liu, Jens Horneber, Timo Kehrer, Sebastiano Panichella. 2058-2061 [doi]
- Provengo: A Tool Suite for Scenario Driven Model-Based TestingMichael Bar-Sinai, Achiya Elyasaf, Gera Weiss, Yeshayahu Weiss. 2062-2065 [doi]
- QuCAT: A Combinatorial Testing Tool for Quantum SoftwareXinyi Wang, Paolo Arcaini, Tao Yue 0002, Shaukat Ali 0001. 2066-2069 [doi]
- ICTDroid: Parameter-Aware Combinatorial Testing for Components of Android AppsShixin Zhang, Shanna Li, Xi Deng, Jiwei Yan, Jun Yan 0009. 2070-2073 [doi]
- LIV: Loop-Invariant Validation Using Straight-Line ProgramsDirk Beyer 0001, Martin Spiessl. 2074-2077 [doi]
- cegar-pt: A Tool for Abstraction by Program TransformationDirk Beyer 0001, Marian Lingsch Rosenfeld, Martin Spiessl. 2078-2081 [doi]
- DroneReqValidator: Facilitating High Fidelity Simulation Testing for Uncrewed Aerial Systems DevelopersBohan Zhang, Yashaswini Shivalingaiah, Ankit Agrawal 0002. 2082-2085 [doi]
- MUT4SLX: Fast Mutant Generation for SimulinkHalil Ibrahim Ceylan, Onur Kilinççeker, Mutlu Beyazit, Serge Demeyer. 2086-2089 [doi]
- AutoDebloater: Automated Android App DebloatingJiakun Liu, Xing Hu 0008, Ferdian Thung, Shahar Maoz, Eran Toch, Debin Gao, David Lo 0001. 2090-2093 [doi]
- SpecFuzzer: A Tool for Inferring Class Specifications via Grammar-Based FuzzingFacundo Molina, Marcelo d'Amorim, Nazareno Aguirre. 2094-2097 [doi]
- Compsuite: A Dataset of Java Library Upgrade Incompatibility IssuesXiuFeng Xu, Chenguang Zhu 0002, Yi Li 0008. 2098-2101 [doi]
- SmartBugs 2.0: An Execution Framework for Weakness Detection in Ethereum Smart ContractsMonika Di Angelo, Thomas Durieux, João F. Ferreira 0001, Gernot Salzer. 2102-2105 [doi]