Abstract is missing.
- PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure CodeZiyou Jiang, Lin Shi 0006, Guowei Yang 0001, Qing Wang 0001. 1-13 [doi]
- Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory StudyYujia Fan, Sinan Wang, Zebang Fei, Yao Qin, Huaxuan Li, Yepang Liu 0001. 14-26 [doi]
- SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in MicroserviceRui Ren, Jingbang Yang, Linxiao Yang, Xinyue Gu, Liang Sun 0001. 27-39 [doi]
- To Tag, or Not to Tag: Translating C's Unions to Rust's Tagged UnionsJaemin Hong, Sukyoung Ryu. 40-52 [doi]
- General and Practical Property-based Testing for Android AppsYiheng Xiong, Ting Su 0001, Jue Wang, Jingling Sun, Geguang Pu, Zhendong Su 0001. 53-64 [doi]
- Preference-Guided Refactored Tuning for Retrieval Augmented Code GenerationXinyu Gao, Yun Xiong, Deze Wang, Zhenhan Guan, Zejian Shi, Haofen Wang, Shanshan Li 0001. 65-77 [doi]
- Language-Agnostic Static Analysis of Probabilistic ProgramsMarkus Böck, Michael Schröder 0005, Jürgen Cito. 78-90 [doi]
- Beyond Manual Modeling: Automating GUI Model Generation Using Design DocumentsShaoheng Cao, Renyi Chen, Minxue Pan, Wenhua Yang 0001, Xuandong Li. 91-103 [doi]
- GPP: A Graph-Powered Prioritizer for Code Review RequestsLanxin Yang, Jinwei Xu, He Zhang 0001, Fanghao Wu, Jun Lyu, Yue Li, Alberto Bacchelli. 104-116 [doi]
- Test Case Generation for Simulink Models using Model Fuzzing and State SolvingZhuo Su 0005, Zehong Yu, Dongyan Wang, Wanli Chang 0001, Bin Gu 0006, Yu Jiang 0001. 117-128 [doi]
- A Position-Aware Approach to Decomposing God ClassesTianyi Chen, Yanjie Jiang, Fu Fan, Bo Liu, Hui Liu 0003. 129-140 [doi]
- Revisiting the Conflict-Resolving Problem from a Semantic PerspectiveJinhao Dong, Jun Sun 0001, Yun Lin 0001, Yedi Zhang, Murong Ma, Jin Song Dong, Dan Hao 0001. 141-152 [doi]
- Demonstration-Free: Towards More Practical Log Parsing with Large Language ModelsYi Xiao, Van-Hoang Le, Hongyu Zhang 0002. 153-165 [doi]
- Efficient Detection of Test Interference in C ProjectsFlorian Eder, Stefan Winter 0001. 166-178 [doi]
- Detect Hidden Dependency to Untangle CommitsMengdan Fan, Wei Zhang 0004, Haiyan Zhao 0001, Guangtai Liang, Zhi Jin. 179-190 [doi]
- Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence TasksJiaWei Lu, Haoye Wang, Zhongxin Liu, Keyu Liang, Lingfeng Bao, Xiaohu Yang 0001. 191-203 [doi]
- DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL OperatorsMingyi Zhou, Xiang Gao 0012, Xiao Chen 0002, Chunyang Chen, John Grundy 0001, Li Li 0029. 204-215 [doi]
- Understanding Code Changes Practically with Small-Scale Language ModelsCong Li, Zhaogui Xu, Peng Di, Dongxia Wang 0002, Zheng Li, Qian Zheng. 216-228 [doi]
- Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code CandidatesZhihong Sun, Yao Wan 0001, Jia Li 0012, Hongyu Zhang 0002, Zhi Jin, Ge Li 0001, Chen Lyu. 229-241 [doi]
- Imperceptible Content Poisoning in LLM-Powered ApplicationsQuan Zhang, Chijin Zhou, Gwihwan Go, Binqi Zeng, Heyuan Shi, Zichen Xu 0001, Yu Jiang 0001. 242-254 [doi]
- UFront: Toward A Unified MLIR Frontend for Deep LearningGuoqing Bao, Heng Shi, Chengyi Cui, Yalin Zhang, Jianguo Yao. 255-267 [doi]
- SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving TestingAn Guo 0002, Yuan Zhou 0005, Haoxiang Tian, Chunrong Fang, Yunjian Sun, Weisong Sun, Xinyu Gao, Anh Tuan Luu, Yang Liu 0003, Zhenyu Chen 0001. 268-280 [doi]
- A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and HowChaozheng Wang, Shuzheng Gao, Cuiyun Gao, Wenxuan Wang 0001, Chun Yong Chong, Shan Gao, Michael R. Lyu. 281-293 [doi]
- Repairing Regex-Dependent String FunctionsNariyoshi Chida, Tachio Terauchi. 294-305 [doi]
- What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data SlicingChenyang Yang 0002, Yining Hong, Grace A. Lewis, Tongshuang Wu, Christian Kästner. 306-318 [doi]
- Interrogation Testing of Program Analyzers for Soundness and Precision IssuesDavid Kaindlstorfer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis. 319-330 [doi]
- MaskDroid: Robust Android Malware Detection with Masked Graph RepresentationsJingnan Zheng, Jiahao Liu, An Zhang 0003, Jun Zeng, Ziqi Yang, Zhenkai Liang, Tat-Seng Chua. 331-343 [doi]
- Constraint-Based Test Oracles for Program AnalyzersMarkus Fleischmann, David Kaindlstorfer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis. 344-355 [doi]
- Leveraging Large Language Model to Assist Detecting Rust Code Comment InconsistencyYichi Zhang, Zixi Liu, Yang Feng 0003, Baowen Xu. 356-366 [doi]
- Verifying the Option Type with Rely-Guarantee ReasoningJames Yoo, Michael D. Ernst, René Just. 367-380 [doi]
- REACT: IR-Level Patch Presence Test for BinaryQi Zhan, Xing Hu 0008, Xin Xia 0001, Shanping Li. 381-392 [doi]
- Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language ModelsYulun Wu, Ming Wen 0001, Zeliang Yu, Xiaochen Guo, Hai Jin 0001. 393-405 [doi]
- LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant InferenceGuangyuan Wu, Weining Cao, Yuan Yao 0001, Hengfeng Wei, Taolue Chen 0001, Xiaoxing Ma. 406-417 [doi]
- Program Synthesis Meets Visual What-Comes-Next PuzzlesSumit Lahiri, Pankaj Kumar Kalita, Akshay Kumar Chittora, Varun Vankudre, Subhajit Roy 0001. 418-429 [doi]
- Semantic-Enhanced Indirect Call Analysis with Large Language ModelsBaijun Cheng, Cen Zhang, Kailong Wang, Ling Shi, Yang Liu 0003, Haoyu Wang 0001, Yao Guo 0001, Ding Li 0001, Xiangqun Chen. 430-442 [doi]
- AI-driven Java Performance Testing: Balancing Result Quality with Testing TimeLuca Traini, Federico Di Menna, Vittorio Cortellessa. 443-454 [doi]
- Efficient Detection of Toxic Prompts in Large Language ModelsYi Liu 0069, Junzhe Yu, Huijia Sun, Ling Shi, Gelei Deng, Yuqi Chen 0001, Yang Liu 0003. 455-467 [doi]
- DRMiner: Extracting Latent Design Rationale from Jira Issue LogsJiuang Zhao, Zitian Yang, Li Zhang 0029, Xiaoli Lian, Donghao Yang, Xin Tan 0003. 468-480 [doi]
- WaDec: Decompiling WebAssembly Using Large Language ModelXinyu She, Yanjie Zhao, Haoyu Wang 0001. 481-492 [doi]
- Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and MemorizationZhi Chen, Lingxiao Jiang. 493-505 [doi]
- FAIL: Analyzing Software Failures from the News Using LLMsDharun Anandayuvaraj, Matthew Campbell, Arav Tewari, James C. Davis 0001. 506-518 [doi]
- AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software ProjectsKexin Sun, Yiding Ren, Hongyu Kuang, Hui Gao, Xiaoxing Ma, Guoping Rong, Dong Shao, He Zhang 0001. 519-530 [doi]
- Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based NormalityYifan Liao, Ming Xu 0006, Yun Lin 0001, Xiwen Teoh, Xiaofei Xie, Ruitao Feng, Frank Liaw, Hongyu Zhang 0002, Jin Song Dong. 531-543 [doi]
- An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages GenerationZhiquan Huang, Yuan Huang 0002, Xiangping Chen, Xiaocong Zhou, Changlin Yang, Zibin Zheng. 544-556 [doi]
- MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic TestingCongying Xu, Songqiang Chen, Jiarong Wu, Shing-Chi Cheung, Valerio Terragni, Hengcheng Zhu 0001, Jialun Cao. 557-569 [doi]
- GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context GraphWei Liu, Ailun Yu, Daoguang Zan, Bo Shen, Wei Zhang 0004, Haiyan Zhao 0001, Zhi Jin, Qianxiang Wang. 570-581 [doi]
- Semantic Sleuth: Identifying Ponzi Contracts via Large Language ModelsCong Wu 0003, Jing Chen 0003, Ziwei Wang, Ruichao Liang, RuiYing Du. 582-593 [doi]
- NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern DevelopersGichan Lee, Hansae Ju, Scott Uk-Jin Lee. 594-605 [doi]
- Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability DetectionSicong Cao, Xiaobing Sun 0001, Xiaoxue Wu 0001, David Lo 0001, Lili Bo, Bin Li 0006, Xiaolei Liu 0001, Xingwei Lin, Wei Liu 0010. 606-618 [doi]
- Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning ApproachVittoriano Muttillo, Claudio Di Sipio, Riccardo Rubei, Luca Berardinelli, MohammadHadi Dehghani. 619-630 [doi]
- Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros GenerationWenzhang Yang, Cuifeng Gao, Xiaoyuan Liu, Yuekang Li, Yinxing Xue. 631-642 [doi]
- GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language ModelsZhibo Zhang, Wuxia Bai, Yuxi Li, Mark Huasong Meng, Kailong Wang, Ling Shi, Li Li 0029, Jun Wang, Haoyu Wang 0001. 643-655 [doi]
- What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners' PerspectiveXiao Yu 0008, Zexian Zhang, Feifei Niu, Xing Hu 0008, Xin Xia 0001, John Grundy 0001. 656-668 [doi]
- FastFixer: An Efficient and Effective Approach for Repairing Programming AssignmentsFang Liu 0032, Zhenwei Liu, Qianhui Zhao, Jing Jiang 0005, Li Zhang 0029, Zian Sun, Ge Li 0001, Zhongqi Li, Yuchi Ma. 669-680 [doi]
- DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented GenerationXinran Yu, Chun Li, Minxue Pan, Xuandong Li. 681-693 [doi]
- How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with HeraYifan Xie, Zhouyang Jia, Shanshan Li 0001, Ying Wang 0038, Jun Ma 0015, Xiaoling Li 0002, Haoran Liu, Ying Fu, Xiangke Liao. 694-705 [doi]
- Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We?Luan Pham, Huong Ha, Hongyu Zhang 0002. 706-715 [doi]
- Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program RepairGuochang Li, Chen Zhi, Jialiang Chen, Junxiao Han, ShuiGuang Deng. 719-731 [doi]
- Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving SystemsMohammad Hossein Amini, Shiva Nejati. 732-744 [doi]
- Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural NetworkDi Cui, Jiaqi Wang, Qiangqiang Wang, Peng Ji, Minglang Qiao, Yutong Zhao, Jingzhao Hu, Luqiao Wang, Qingshan Li. 745-757 [doi]
- Evaluating Terminology Translation in Machine Translation Systems via Metamorphic TestingYihui Xu, Yanhui Li, Jun Wang, Xiaofang Zhang. 758-769 [doi]
- RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity DetectionWeilong Li, Jintian Lu, Ruizhi Xiao, Pengfei Shao, Shuyuan Jin. 770-782 [doi]
- An Explainable Automated Model for Measuring Software Engineer ContributionYue Li, He Zhang 0001, Yuzhe Jin, Zhong Ren, Liming Dong 0001, Jun Lyu, Lanxin Yang, David Lo 0001, Dong Shao. 783-794 [doi]
- How Effectively Do Code Language Models Understand Poor-Readability Code?Chao Hu, Yitian Chai, Hao Zhou 0012, Fandong Meng, Jie Zhou 0016, Xiaodong Gu 0002. 795-806 [doi]
- Differential Fuzzing for Data Distribution Service Programs with Dynamic ConfigurationDohyun Ryu, Giyeol Kim, Daeun Lee, Seongjin Kim, Seungjin Bae, Junghwan Rhee, TaeGyu Kim. 807-818 [doi]
- Compiler Bug Isolation via Enhanced Test Program MutationYujie Liu, Mingxuan Zhu, Jinhao Dong, Junzhe Yu, Dan Hao 0001. 819-830 [doi]
- Evaluation of Version Control Merge ToolsBenedikt Schesch, Ryan Featherman, Kenneth J. Yang, Ben R. Roberts, Michael D. Ernst. 831-83 [doi]
- An Empirical Study to Evaluate AIGC Detectors on Code ContentJian Wang 0067, Shangqing Liu, Xiaofei Xie, Yi Li 0008. 844-856 [doi]
- Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based ApproachJialiang Wei, Anne-lise Courbis, Thomas Lambolais, Binbin Xu 0002, Pierre-Louis Bernard, Gérard Dray, Walid Maalej. 857-869 [doi]
- JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language ModelsJialun Cao, Zhiyong Chen, Jiarong Wu, Shing-Chi Cheung, Chang Xu 0001. 870-882 [doi]
- Detecting Element Accessing Bugs in C++ Sequence ContainersZhilin Li, Xutong Ma, Mengze Hu, Jun Yan. 883-894 [doi]
- FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature SelectionJialuo Chen, Jingyi Wang 0004, Xiyue Zhang, Youcheng Sun, Marta Kwiatkowska, Jiming Chen 0001, Peng Cheng 0001. 895-906 [doi]
- Scaler: Efficient and Effective Cross Flow AnalysisSteven (Jiaxun) Tang, Mingcan Xiang, Yang Wang 0009, Bo Wu 0002, Jianjun Chen 0001, Tongping Liu. 907-918 [doi]
- Unlocking the Power of Numbers: Log Compression via Numeric Token ParsingSiyu Yu, Yifan Wu, Ying Li 0012, Pinjia He. 919-930 [doi]
- The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small ClassifierYongqi Han, Qingfeng Du, Ying Huang, JiaQi Wu, Fulong Tian, Cheng He. 931-943 [doi]
- Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing MetricsYuanhong Lan, Yifei Lu, Minxue Pan, Xuandong Li. 944-956 [doi]
- FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless WorkflowsYilun Wang, Pengfei Chen 0002, Hui Dou, Yiwen Zhang 0001, Guangba Yu, Zilong He, Haiyu Huang. 957-969 [doi]
- Mutation-Based Deep Learning Framework Testing Method in JavaScript EnvironmentYinglong Zou, Juan Zhai, Chunrong Fang, Jiawei Liu, Tao Zheng, Zhenyu Chen 0001. 970-981 [doi]
- Do not neglect what's on your hands: localizing software faults with exception trigger streamXihao Zhang, Yi Song, Xiaoyuan Xie, Qi Xin, Chenliang Xing. 982-994 [doi]
- RMCBench: Benchmarking Large Language Models' Resistance to Malicious CodeJiachi Chen, Qingyuan Zhong, Yanlin Wang 0001, Kaiwen Ning, Yongkun Liu, Zenan Xu, Zhe Zhao 0006, Ting Chen 0002, Zibin Zheng. 995-1006 [doi]
- Approximation-guided Fairness Testing through Discriminatory Space AnalysisZhenjiang Zhao, Takahisa Toda, Takashi Kitamura 0001. 1007-1018 [doi]
- AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static AnalysisYin Wu, Xiaofei Xie, Chenyang Peng, Dijun Liu, Hao Wu, Ming Fan 0002, Ting Liu 0002, Haijun Wang. 1019-1031 [doi]
- Semistructured Merge with Language-Specific Syntactic SeparatorsGuilherme Cavalcanti, Paulo Borba, Leonardo dos Anjos, Jônatas Clementino. 1032-1043 [doi]
- Effective Unit Test Generation for Java Null Pointer ExceptionsMyungho Lee, Jiseong Bak, Seokhyeon Moon, Yoonchan Jhi, Hakjoo Oh. 1044-1056 [doi]
- MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal DataYidan Wang, Zhouruixing Zhu, Qiuai Fu, Yuchi Ma, Pinjia He. 1057-1068 [doi]
- FIPSER: Improving Fairness Testing of DNN by Seed PrioritizationJunwei Chen, Yueling Zhang, LingFeng Zhang, Min Zhang, Chengcheng Wan 0001, Ting Su 0001, Geguang Pu. 1069-1081 [doi]
- Parf: Adaptive Parameter Refining for Abstract InterpretationZhongyi Wang, Linyu Yang, Mingshuai Chen, Yixuan Bu, Zhiyang Li, Qiuye Wang, Shengchao Qin, Xiao Yi, Jianwei Yin. 1082-1093 [doi]
- Unveiling the Characteristics and Impact of Security Patch EvolutionZifan Xie, Ming Wen 0001, Zichao Wei, Hai Jin 0001. 1094-1106 [doi]
- Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive OptimizationLei Tao, Shenglin Zhang, Zedong Jia, Jinrui Sun, Minghua Ma, Zhengdan Li, Yongqian Sun, Canqun Yang, Yuzhi Zhang, Dan Pei. 1107-1119 [doi]
- Blackbox Observability of Features and Feature InteractionsKallistos Weis, Leopoldo Teixeira, Clemens Dubslaff, Sven Apel. 1120-1132 [doi]
- Spotting Code Mutation for Predictive Mutation TestingYifan Zhao, Yizhou Chen, Zeyu Sun 0004, Qingyuan Liang, Guoqing Wang, Dan Hao 0001. 1133-1145 [doi]
- SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and MatchingYiheng Huang, Ruisi Wang, Wen Zheng, Zhuotong Zhou, Susheng Wu, Shulin Ke, Bihuan Chen 0001, Shan Gao, Xin Peng 0001. 1146-1158 [doi]
- 1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package DetectionXiaobing Sun 0001, Xingan Gao, Sicong Cao, Lili Bo, Xiaoxue Wu 0001, Kaifeng Huang 0001. 1159-1170 [doi]
- Incremental Context-free Grammar Inference in Black Box SettingsFeifei Li, Xiao Chen 0002, Xi Xiao, Xiaoyu Sun 0002, Chuan Chen, Shaohua Wang 0002, Jitao Han. 1171-1182 [doi]
- ART: A Unified Unsupervised Framework for Incident Management in Microservice SystemsYongqian Sun, Binpeng Shi, Mingyu Mao, Minghua Ma, Sibo Xia, Shenglin Zhang, Dan Pei. 1183-1194 [doi]
- AXA: Cross-Language Analysis through Integration of Single-Language AnalysesTobias Roth, Julius Näumann, Dominik Helm, Sven Keidel, Mira Mezini. 1195-1205 [doi]
- DataRecipe - How to Cook the Data for CodeLLM?Kisub Kim, Jounghoon Kim, Byeongjo Park, Dongsun Kim 0001, Chun Yong Chong, Yuan Wang, Tiezhu Sun, Daniel Tang, Jacques Klein, Tegawendé F. Bissyandé. 1206-1218 [doi]
- Prioritizing Test Inputs for DNNs Using Training DynamicsJian Shen, Zhong Li, Minxue Pan, Xuandong Li. 1219-1231 [doi]
- Compositional Security Analysis of Dynamic Component-based SystemsNarges Khakpour, Charilaos Skandylas. 1232-1244 [doi]
- AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code ModelsZhong Li, Chong Zhang, Minxue Pan, Tian Zhang 0001, Xuandong Li. 1245-1257 [doi]
- HITS: High-coverage LLM-based Unit Test Generation via Method SlicingZejun Wang, Kaibo Liu, Ge Li 0001, Zhi Jin. 1258-1268 [doi]
- TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot LearningZirui Song, Yutong Zhou, Shuaike Dong, Ke Zhang, Kehuan Zhang. 1269-1281 [doi]
- Contextualized Data-Wrangling Code Generation in Computational NotebooksJunjie Huang 0008, Daya Guo, Chenglong Wang, Jiazhen Gu, Shuai Lu, Jeevana Priya Inala, Cong Yan, Jianfeng Gao 0001, Nan Duan, Michael R. Lyu. 1282-1294 [doi]
- Microservice Decomposition Techniques: An Independent Tool ComparisonYingying Wang, Sarah Bornais, Julia Rubin. 1295-1307 [doi]
- Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance CodeMuzi Qu, Jie Liu 0008, Liangyi Kang, Shuai Wang, Dan Ye 0004, Tao Huang 0001. 1308-1318 [doi]
- A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven RefinementHuan Zhang, Wei Cheng, Yuhan Wu, Wei Hu 0007. 1319-1331 [doi]
- Efficient Slicing of Feature Models via Projected d-DNNF CompilationChico Sundermann, Jacob Loth, Thomas Thüm. 1332-1344 [doi]
- iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and RefactoringDi Wu, Fangwen Mu, Lin Shi 0006, Zhaoqiang Guo, Kui Liu 0001, Weiguang Zhuang, Yuqi Zhong, Li Zhang 0029. 1345-1357 [doi]
- COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart ContractsWenkai Li, Xiaoqi Li 0001, Zongwei Li, Yuqing Zhang 0001. 1358-1369 [doi]
- Exploring ChatGPT App Ecosystem: Distribution, Deployment and SecurityChuan Yan, Ruomai Ren, Mark Huasong Meng, Liuhuo Wan, Tian Yang Ooi, Guangdong Bai. 1370-1382 [doi]
- DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement LearningDavide Corradini, Zeno Montolli, Michele Pasqua, Mariano Ceccato. 1383-1394 [doi]
- LLM-Generated Invariants for Bounded Model Checking Without Loop UnrollingMuhammad A. A. Pirzada, Giles Reger, Ahmed Bhayat, Lucas C. Cordeiro. 1395-1407 [doi]
- Towards Understanding the Effectiveness of Large Language Models on Directed Test Input GenerationZongze Jiang, Ming Wen 0001, Jialun Cao, Xuanhua Shi, Hai Jin 0001. 1408-1420 [doi]
- Understanding the Implications of Changes to Build SystemsMahtab Nejati, Mahmoud Alfadel, Shane McIntosh. 1421-1433 [doi]
- LeanBin: Harnessing Lifting and Recompilation to Debloat BinariesIgor Wodiany, Antoniu Pop, Mikel Luján. 1434-1446 [doi]
- Vision: Identifying Affected Library Versions for Open Source Software VulnerabilitiesSusheng Wu, Ruisi Wang, Kaifeng Huang 0001, Yiheng Cao, Wenyan Song, Zhuotong Zhou, Yiheng Huang, Bihuan Chen 0001, Xin Peng 0001. 1447-1459 [doi]
- Attribution-guided Adversarial Code Prompt Generation for Code Completion ModelsXueyang Li, Guozhu Meng, Shangqing Liu, Lu Xiang, Kun Sun, Kai Chen 0012, Xiapu Luo, Yang Liu 0003. 1460-1471 [doi]
- ChatBR: Automated assessment and improvement of bug report quality using ChatGPTLili Bo, Wangjie Ji, Xiaobing Sun 0001, Ting Zhang 0011, Xiaoxue Wu 0001, Ying Wei 0012. 1472-1483 [doi]
- Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial TrainingYangsen Wang, Yizhou Chen, Yifan Zhao, Zhihao Gong, Junjie Chen 0003, Dan Hao 0001. 1484-1496 [doi]
- LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language ModelsShuncheng Tang, Zhenya Zhang, Jixiang Zhou, Lei Lei, Yuan Zhou 0005, Yinxing Xue. 1497-1508 [doi]
- Proof Automation with Large Language ModelsMinghai Lu, Benjamin Delaware, Tianyi Zhang 0001. 1509-1520 [doi]
- Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational ObjectsNick Feng, Lina Marsso, Marsha Chechik. 1521-1532 [doi]
- DevMuT: Testing Deep Learning Framework via Developer Expertise-Based MutationYanzhou Mu, Juan Zhai, Chunrong Fang, Xiang Chen 0005, Zhixiang Cao, Peiran Yang, Yinglong Zou, Tao Zheng, Zhenyu Chen 0001. 1533-1544 [doi]
- Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code DataMing Zhu 0015, Mohimenul Karim, Ismini Lourentzou, Daphne Yao. 1545-1556 [doi]
- Hybrid Regression Test Selection by Integrating File and Method DependencesGuofeng Zhang 0005, Luyao Liu, Zhenbang Chen, Ji Wang 0001. 1557-1569 [doi]
- Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart ContractsHaijun Wang, Yurui Hu, Hao Wu, Dijun Liu, Chenyang Peng, Yin Wu, Ming Fan 0002, Ting Liu 0002. 1570-1582 [doi]
- Test-Driven Development and LLM-based Code GenerationNoble Saji Mathews, Meiyappan Nagappan. 1583-1594 [doi]
- Giving without Notifying: Assessing Compliance of Data Transmission in Android AppsMing Fan 0002, Jifei Shi, Yin Wang, Le Yu 0002, Xicheng Zhang, Haijun Wang, Wuxia Jin, Ting Liu 0002. 1595-1606 [doi]
- On the Evaluation of Large Language Models in Unit Test GenerationLin Yang, Chen Yang, Shutao Gao, Weijing Wang, Bo Wang 0050, Qihao Zhu, Xiao Chu, Jianyi Zhou, Guangtai Liang, Qianxiang Wang, Junjie Chen 0003. 1607-1619 [doi]
- ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutationShiwei Feng 0002, Yapeng Ye, Qingkai Shi, Zhiyuan Cheng 0010, Xiangzhe Xu, Siyuan Cheng 0005, Hongjun Choi, Xiangyu Zhang 0001. 1620-1632 [doi]
- Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed FuzzingZhuotong Zhou, Yongzhuo Yang, Susheng Wu, Yiheng Huang, Bihuan Chen 0001, Xin Peng 0001. 1633-1644 [doi]
- Constructing Surrogate Models in Machine Learning Using Combinatorial Testing and Active LearningSunny Shree, Krishna Khadka, Yu Lei 0001, Raghu N. Kacker, D. Richard Kuhn. 1645-1654 [doi]
- Developer-Applied Accelerations in Continuous Integration: A Detection Approach and Catalog of PatternsMingyang Yin, Yutaro Kashiwa, Keheliya Gallaba, Mahmoud Alfadel, Yasutaka Kamei, Shane McIntosh. 1655-1666 [doi]
- MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-ProgramsYin Wang, Ming Fan 0002, Hao Zhou 0009, Haijun Wang, Wuxia Jin, Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang 0030, Deqiang Han, Ting Liu 0002. 1667-1679 [doi]
- End-to-End AutoML for Unsupervised Log Anomaly DetectionShenglin Zhang, Yuhe Ji, Jiaqi Luan, Xiaohui Nie, Ziang Chen, Minghua Ma, Yongqian Sun, Dan Pei. 1680-1692 [doi]
- B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible TestsMouxiang Chen, Zhongxin Liu, He Tao, Yusu Hong, David Lo 0001, Xin Xia 0001, Jianling Sun. 1693-1705 [doi]
- Enhancing Automated Program Repair with Solution DesignJiuang Zhao, Donghao Yang, Li Zhang 0029, Xiaoli Lian, Zitian Yang, Fang Liu 0032. 1706-1718 [doi]
- Enhancing the Efficiency of Automated Program Repair via Greybox AnalysisYoungjae Kim, Yechan Park, Seungheon Han, Jooyong Yi. 1719-1731 [doi]
- Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection?Yu Zhao, Lina Gong, Zhiqiu Huang, Yongwei Wang, Mingqiang Wei, Fei Wu 0001. 1732-1744 [doi]
- Context-Aware Automated Sprint Plan Generation for Agile Software DevelopmentElvan Kula, Arie van Deursen, Georgios Gousios. 1745-1756 [doi]
- Reducing Test Runtime by Transforming Test FixturesChengpeng Li, Abdelrahman Baz, August Shi. 1757-1769 [doi]
- Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness DetectionHuan Xie, Yan Lei, Maojin Li, Meng Yan 0001, Sheng Zhang. 1770-1782 [doi]
- STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature GenerationMd Shafiuzzaman, Achintya Desai, Laboni Sarker, Tevfik Bultan. 1783-1794 [doi]
- Discovering Likely Program Invariants for Persistent MemoryZunchen Huang, Srivatsan Ravi, Chao Wang 0001. 1795-1807 [doi]
- Towards Effective Static Type-Error Detection for PythonWonseok Oh, Hakjoo Oh. 1808-1820 [doi]
- A Longitudinal Analysis Of Replicas in the Wild Wild AndroidSyeda Mashal Abbas Zaidi, Shahpar Khan, Parjanya Vyas, Yousra Aafer. 1821-1833 [doi]
- Balancing the Quality and Cost of Updating DependenciesDamien Jaime, Pascal Poizat, Joyce El Haddad, Thomas Degueule. 1834-1845 [doi]
- Shoot Yourself in the Foot - Efficient Code Causes Inefficiency in Compiler OptimizationsFengjuan Gao, Hongyu Chen, Yuewei Zhou, Ke Wang. 1846-1857 [doi]
- Typed and Confused: Studying the Unexpected Dangers of Gradual TypingDominic Troppmann, Aurore Fass, Cristian-Alexandru Staicu. 1858-1870 [doi]
- Refinement Types for VisualizationJingtao Xia, Junrui Liu, Nicholas Brown, Yanju Chen, Yu Feng 0001. 1871-1881 [doi]
- Efficient Incremental Code Coverage Analysis for Regression Test SuitesJiale Amber Wang, Kaiyuan Wang, Pengyu Nie 0001. 1882-1894 [doi]
- ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex CodeJia Feng, Jiachen Liu, Cuiyun Gao, Chun Yong Chong, Chaozheng Wang, Shan Gao, Xin Xia 0001. 1895-1906 [doi]
- A Joint Learning Model with Variational Interaction for Multilingual Program TranslationYali Du 0002, Hui Sun 0003, Ming Li 0005. 1907-1918 [doi]
- How Does Code Optimization Impact Third-party Library Detection for Android Applications?Zifan Xie, Ming Wen 0001, Tinghan Li, Yiding Zhu, Qinsheng Hou, Hai Jin 0001. 1919-1931 [doi]
- VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability RepairJian Zhang 0001, Chong Wang, Anran Li, Wenhan Wang, Tianlin Li, Yang Liu 0003. 1932-1944 [doi]
- Understanding Developer-Analyzer Interactions in Code ReviewsMartin Schäf, Berk Çirisci, Linghui Luo, Muhammad Numair Mansur, Omer Tripp, Daniel Sanchez, Qiang Zhou, Muhammad Bilal Zafar. 1945-1955 [doi]
- MLOLET - Machine Learning Optimized Load and Endurance Testing: An industrial experience reportArthur Vitui, Tse-Hsun Chen. 1956-1966 [doi]
- Vehicle Domain-Specific Language: Unifying Modeling and Code Generation for Low-Code Automotive DevelopmentLei Liao, Junjie Wang 0001, Zhensheng Xu, Fangwen Mu, Yukun Yang. 1967-1972 [doi]
- Enabling Cost-Effective UI Automation Testing with Retrieval-Based LLMs: A Case Study in WeChatSidong Feng, Haochuan Lu, Jianqin Jiang, Ting Xiong, Likun Huang, Yinglin Liang, Xiaoqin Li, Yuetang Deng, Aldeida Aleti. 1973-1978 [doi]
- The Importance of Accounting for Execution Failures when Predicting Test FlakinessGuillaume Haben, Sarra Habchi, John Micco, Mark Harman, Mike Papadakis, Maxime Cordy, Yves Le Traon. 1979-1989 [doi]
- Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry EnvironmentsXinyi Zheng, Chen Wei, Shenao Wang 0001, Yanjie Zhao, Peiming Gao, Yuanchao Zhang, Kailong Wang, Haoyu Wang 0001. 1990-2001 [doi]
- How many pomodoros do professional engineers need to complete a microtask of programming?Shinobu Saito, Yukako Iimura, Emad Aghayi, Thomas D. LaToza. 2002-2012 [doi]
- Challenges & Opportunities in Automating DBMS: A Qualitative StudyYifan Wang, Pierre Bourhis, Romain Rouvoy, Patrick Royer. 2013-2023 [doi]
- Seeding and Mocking in White-Box Fuzzing Enterprise RPC APIs: An Industrial Case StudyMan Zhang 0001, Andrea Arcuri, Piyun Teng, Kaiming Xue, Wenhao Wang. 2024-2034 [doi]
- Applying Fuzz Driver Generation to Native C/C++ Libraries of OEM Android Framework: Obstacles and SolutionsShiyan Peng, Yuan Zhang 0009, Jiarun Dai, Yue Gu, Zhuoxiang Shen, Jingcheng Liu, Lin Wang, Yong Chen, Yu Qin, Lei Ai, Xianfeng Lu, Min Yang 0002. 2035-2040 [doi]
- AutoDW: Automatic Data Wrangling Leveraging Large Language ModelsLei Liu, So Hasegawa, Shailaja Keyur Sampat, Maria Xenochristou, Wei-Peng Chen, Takashi Kato, Taisei Kakibuchi, Tatsuya Asai. 2041-2052 [doi]
- DeployFix: Dynamic Repair of Software Deployment Failures via Constraint SolvingHaoyu Liao, Jianmei Guo, Bo Huang 0002, Yujie Han, Dingyu Yang, Kai Shi 0006, Jonathan Ding, Guoyao Xu, Guodong Yang, Liping Zhang. 2053-2064 [doi]
- Towards a Robust Waiting Strategy for Web GUI Testing for an Industrial Software SystemHaonan Zhang, Lizhi Liao, Zishuo Ding, Weiyi Shang, Nidhi Narula, Catalin Sporea, Andrei Toma, Sarah Sajedi. 2065-2076 [doi]
- Experience Report on Applying Program Analysis Techniques for Mainframe Application UnderstandingShivali Agarwal, Hiroaki Nakamura, Rami Katan. 2077-2086 [doi]
- Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model HubsJian Zhao, Shenao Wang 0001, Yanjie Zhao, Xinyi Hou, Kailong Wang, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang 0001. 2087-2098 [doi]
- Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android AppsZikan Dong, Yanjie Zhao, Tianming Liu 0002, Chao Wang 0097, Guosheng Xu 0001, Guoai Xu, Lin Zhang, Haoyu Wang 0001. 2099-2109 [doi]
- Integrating Mutation Testing Into Developer Workflow: An Industrial Case StudyStefan Alexander van Heijningen, Theo Wiik, Francisco Gomes de Oliveira Neto, Gregory Gay 0002, Kim Viggedal, David Friberg. 2110-2120 [doi]
- Enhancing Compositional Static Analysis with Dynamic AnalysisDino Distefano, Matteo Marescotti, Cons Åhs, Sopot Cela, Gabriela Cunha Sampaio, Radu Grigore, Ákos Hajdu, Timotej Kapus, Ke Mao, Thibault Suzanne. 2121-2129 [doi]
- Quantum Program Testing Through Commuting Pauli Strings on IBM's Quantum ComputersAsmar Muqeet, Shaukat Ali 0001, Paolo Arcaini. 2130-2141 [doi]
- Towards Long-Term Scientific Model Sustainment at Sandia National LaboratoriesChristian Gilbertson, Reed Milewicz, Eric Berquist, Aaron Brundage, John Engelmann, Brian Evans, Nicholas Francis, Ernest Friedman-Hill, Samuel Grayson, Evan Harvey, Eric Ho, Edward Hoffman, Kevin Irick, Anagha Krishna, Aaron Moreno, Joshua B. Teves. 2142-2147 [doi]
- Ansible Lightspeed: A Code Generation Service for IT AutomationPriyam Sahoo, Saurabh Pujar, Ganesh Nalawade, Richard Genhardt, Louis Mandel, Luca Buratti. 2148-2158 [doi]
- Industry Practice of Directed Kernel Fuzzing for Open-source Linux DistributionHeyuan Shi, Shijun Chen, Runzhe Wang, Yuhan Chen, Weibo Zhang, Qiang Zhang, Yuheng Shen, Xiaohai Shi, Chao Hu, Yu Jiang 0001. 2159-2169 [doi]
- Cloud Resource Protection via Automated Security Property ReasoningZhixing Xu, Shengjian Guo, Oksana Tkachuk, Saeed Nejati, Niloofar Razavi, George Argyros. 2170-2175 [doi]
- Android Malware Family Labeling: Perspectives from the IndustryLiu Wang 0002, Haoyu Wang 0001, Tao Zhang 0001, Haitao Xu 0002, Guozhu Meng, Peiming Gao, Chen Wei, Yi Wang 0013. 2176-2186 [doi]
- In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic ManipulatorsDmytro Humeniuk, Houssem Ben Braiek, Thomas Reid, Foutse Khomh. 2187-2198 [doi]
- Visualizing and Understanding the Internals of FuzzingSriteja Kummita, Zenong Zhang, Eric Bodden, Shiyi Wei. 2199-2204 [doi]
- A vision on a methodology for the application of an Intrusion Detection System for satellitesSébastien Gios, Charles-Henry Bertrand Van Ouytsel, Mark Diamantino Caribé, Axel Legay. 2205-2209 [doi]
- Towards Leveraging LLMs for Reducing Open Source Onboarding Information OverloadElijah Kayode Adejumo, Brittany Johnson. 2210-2214 [doi]
- Automated Repair of Multi-fault Programs: Obstacles, Approaches, and ProspectsOmar I. Al-Bataineh. 2215-2219 [doi]
- A Formal Treatment of Performance BugsOmar I. Al-Bataineh. 2220-2224 [doi]
- Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural NetworkYuanlin Li, Zhiwei Xu, Min Zhou 0001, Hai Wan, Xibin Zhao. 2225-2229 [doi]
- Copilot-in-the-Loop: Fixing Code Smells in Copilot-Generated Python Code using CopilotBeiqi Zhang, Peng Liang 0001, Qiong Feng, Yujia Fu, Zengyang Li. 2230-2234 [doi]
- Unity Is Strength: Collaborative LLM-Based Agents for Code Reviewer RecommendationLuqiao Wang, Yangtao Zhou, Huiying Zhuang, Qingshan Li, Di Cui, Yutong Zhao, Lu Wang 0014. 2235-2239 [doi]
- Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMsMojtaba Eshghie, Cyrille Artho. 2240-2248 [doi]
- Emergence of A Novel Domain Expert: A Generative AI-based Framework for Software Function Point AnalysisZheng Zhao, Hongxiang Jiang, Ran Zhao, Bing He. 2245-2250 [doi]
- Towards Extracting Ethical Concerns-related Software Requirements from App ReviewsAakash Sorathiya, Gouri Ginde. 2251-2255 [doi]
- Towards Automated Configuration DocumentationJobayer Ahmmed, Myra B. Cohen, Paul Gazzillo. 2256-2261 [doi]
- CoDefeater: Using LLMs To Find Defeaters in Assurance CasesUsman Gohar, Michael C. Hunter, Robyn R. Lutz, Myra B. Cohen. 2262-2267 [doi]
- Attacks and Defenses for Large Language Models on Coding TasksChi Zhang, Zifan Wang 0001, Ruoshi Zhao, Ravi Mangal, Matt Fredrikson, Limin Jia 0001, Corina S. Pasareanu. 2268-2272 [doi]
- Prioritizing Tests for Improved RuntimeAbdelrahman Baz, Minchao Huang, August Shi. 2273-2278 [doi]
- RepoSim: Evaluating Prompt Strategies for Code Completion via User Behavior SimulationChao Peng 0002, Qinyun Wu, Jiangchao Liu, Jierui Liu, Bo Jiang, Mengqian Xu, Yinghao Wang, Xia Liu, Ping Yang. 2279-2283 [doi]
- Toward Individual Fairness Testing with Data ValidityTakashi Kitamura 0001, Sousuke Amasaki, Jun Inoue 0001, Yoshinao Isobe, Takahisa Toda. 2284-2288 [doi]
- Towards Robust ML-enabled Software Systems: Detecting Out-of-Distribution data using Gini CoefficientsHala Abdelkader, Jean-Guy Schneider, Mohamed Abdelrazek 0001, Priya Rani, Rajesh Vasa. 2289-2293 [doi]
- Translation Titans, Reasoning Challenges: Satisfiability-Aided Language Models for Detecting Conflicting RequirementsMohamad Fazelnia, Mehdi Mirakhorli, Hamid Bagheri. 2294-2298 [doi]
- Learning DNN Abstractions using Gradient DescentDiganta Mukhopadhyay, Sanaa Siddiqui, Hrishikesh Karmarkar, Kumar Madhukar, Guy Katz. 2299-2303 [doi]
- Build Issue Resolution from the Perspective of Non-ContributorsSunzhou Huang, Xiaoyin Wang. 2304-2308 [doi]
- Assessing the feasibility of Micro frontend architecture in native mobile app developmentQuentin Capdepon, Nicolas Hlad, Benoît Verhaeghe, Abdelhak-Djamel Seriai. 2309-2313 [doi]
- A Conceptual Framework for Quality Assurance of LLM-based Socio-critical SystemsLuciano Baresi, Matteo Camilli, Tommaso Dolci, Giovanni Quattrocchi. 2314-2318 [doi]
- The Software Genome Project: Unraveling Software Through Genetic PrinciplesYueming Wu 0001, Chengwei Liu, Zhengzi Xu, Lyuye Zhang, Yiran Zhang, Zhiling Zhu, Yang Liu 0003. 2319-2323 [doi]
- Mining for Mutation Operators for Reduction of Information Flow Control ViolationsIlya Kosorukov, Daniel Blackwell, David Clark 0001, Myra B. Cohen, Justyna Petke. 2324-2328 [doi]
- GPTZoo: A Large-scale Dataset of GPTs for the Research CommunityXinyi Hou, Yanjie Zhao, Shenao Wang 0001, Haoyu Wang 0001. 2329-2333 [doi]
- VulZoo: A Comprehensive Vulnerability Intelligence DatasetBonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang. 2334-2337 [doi]
- PACGBI: A Pipeline for Automated Code Generation from Backlog ItemsMahja Sarschar, Gefei Zhang, Annika Nowak. 2338-2341 [doi]
- FixKit: A Program Repair Collection for PythonMarius Smytzek, Martin Eberlein, Kai Werk, Lars Grunske, Andreas Zeller. 2342-2345 [doi]
- MADE-WIC: Multiple Annotated Datasets for Exploring Weaknesses In CodeMoritz Mock, Jorge Melegati, Max Kretschmann, Nicolás E. Díaz Ferreyra, Barbara Russo. 2346-2349 [doi]
- ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart ContractsChe Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen 0001. 2350-2353 [doi]
- Self-Elicitation of Requirements with Automated GUI PrototypingKristian Kolthoff, Christian Bartelt, Simone Paolo Ponzetto, Kurt Schneider. 2354-2357 [doi]
- DroneWiS: Automated Simulation Testing of small Unmanned Aerial System in Realistic Windy ConditionsBohan Zhang, Ankit Agrawal 0002. 2358-2361 [doi]
- Olympia: Fuzzer Benchmarking for SolidityJana Chadt, Christoph Hochrainer, Valentin Wüstholz, Maria Christakis. 2362-2365 [doi]
- CompAi: A Tool for GDPR Completeness Checking of Privacy Policies using Artificial IntelligenceOrlando Amaral Cejas, Sallam Abualhaija, Lionel C. Briand. 2366-2369 [doi]
- Depends-Kotlin: A Cross-Language Kotlin Dependency ExtractorQiong Feng, Xiaotian Ma, Huan Ji, Wei Song 0003, Peng Liang 0001. 2370-2373 [doi]
- ARUS: A Tool for Automatically Removing Unnecessary Stubbings from Test SuitesMengzhen Li, Mattia Fazzini. 2374-2377 [doi]
- HighGuard: Cross-Chain Business Logic Monitoring of Smart ContractsMojtaba Eshghie, Cyrille Artho, Hans Stammler, Wolfgang Ahrendt, Thomas T. Hildebrandt, Gerardo Schneider. 2378-2381 [doi]
- CoqPilot, a plugin for LLM-based generation of proofsAndrei Kozyrev, Gleb Solovev, Nikita Khramov, Anton Podkopaev. 2382-2385 [doi]
- BenchCloud: A Platform for Scalable Performance BenchmarkingDirk Beyer 0001, Po-Chun Chien, Marek Jankola. 2386-2389 [doi]
- flowR: A Static Program Slicer for RFlorian Sihler, Matthias Tichy. 2390-2393 [doi]
- LLM4Workflow: An LLM-based Automated Workflow Model Generation ToolJia Xu 0010, Weilin Du, Xiao Liu 0004, Xuejun Li 0001. 2394-2398 [doi]
- OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and BeyondZhiyang Chen 0004, Ye Liu 0012, Sidi Mohamed Beillahi, Yi Li 0008, Fan Long. 2399-2402 [doi]
- LLM-Based Java Concurrent Program to ArkTS ConverterRunlin Liu, Yuhang Lin, Yunge Hu, Zhe Zhang, Xiang Gao 0012. 2403-2406 [doi]
- Slicer4D: A Slicing-based Debugger for JavaSahar Badihi, Sami Nourji, Julia Rubin. 2407-2410 [doi]
- Model-based GUI Testing For HarmonyOS AppsYige Chen, Sinan Wang, Yida Tao, Yepang Liu 0001. 2411-2414 [doi]
- Automated Validation of COBOL to Java TransformationAtul Kumar 0002, Diptikalyan Saha, Toshiaki Yasue, Kohichi Ono, Saravanan Krishnan, Sandeep Hans, Fumiko Satoh, Gerald Mitchell, Sachin Kumar. 2415-2418 [doi]
- CoVeriTeam GUI: A No-Code Approach to Cooperative Software VerificationThomas Lemberger 0002, Henrik Wachowitz. 2419-2422 [doi]
- Finding Performance Issues in Rust ProjectsChenhao Cui. 2423-2425 [doi]
- Efficient Code Causes Inefficiency in Compiler OptimizationsHongyu Chen. 2426-2428 [doi]
- Can Large Language Models Comprehend Code Stylometry?Atish Kumar Dipongkor. 2429-2431 [doi]
- Mining and Recommending Mobile App Features using Data-driven AnalyticsRamsha Ali. 2432-2434 [doi]
- Semi-Automated Verification of Interior Unsafe Code Encapsulation in Real-World Rust SystemsZihao Rao. 2435-2437 [doi]
- SemantiLog: Log-based Anomaly Detection with Semantic SimilarityYoli Shavit, Kathy Razmadze, Gary Mataev, Hanan Shteingart, Eitan Zahavi, Zachi Binshtock. 2438-2439 [doi]
- AgoneTest: Automated creation and assessment of Unit tests leveraging Large Language ModelsAndrea Lops, Fedelucio Narducci, Azzurra Ragone, Michelantonio Trizio. 2440-2441 [doi]
- Match Word with Deed: Maintaining Consistency for IoT Systems with Behavior ModelsTao Wang 0030, Wei Chen 0018, Liwei Liu, Guoquan Wu, Jun Wei 0001, Tao Huang 0001. 2442-2443 [doi]
- A Pixel-Level Explainable Approach of Convolutional Neural Networks and Its ApplicationHaitao Zhang, Jing Wang, Ziyue Wang, Ziyi Zhao, Zhuo Cheng. 2444-2445 [doi]
- Feature Model Slicing for Real-time Selection of Mission-critical Edge ApplicaitonUwe Gropengießer, Julian Liphardt, Michael Matthé, Max Mühlhäuser. 2446-2447 [doi]
- Bridging Gaps in LLM Code Translation: Reducing Errors with Call Graphs and Bridged DebuggersYang Luo, Richard Yu, Fajun Zhang, Ling Liang, Yongqiang Xiong. 2448-2449 [doi]
- GUI Test Repair Based on Test-ExtensionYonghao Long, Yuanyuan Chen, Xiangping Chen. 2450-2451 [doi]
- Quantitative Symbolic Non-Equivalence AnalysisLaboni Sarker, Tevfik Bultan. 2452-2453 [doi]
- Detecting Atomicity Violations for Interrupt-driven Programs via Systematic Scheduling and Prefix-directed FeedbackRuixue Li, Bin Yu 0008, Xu Lu 0003, Lei Ke, Jiawei Chen, Zixuan Yuan, Jingxian Wang, Cong Tian, Yansong Dong. 2454-2455 [doi]
- Studying Versioning in Stack OverflowYiyun Chen, Fuxiang Chen, Mijung Kim, Fatemeh H. Fard. 2456-2457 [doi]
- GrayDuck: The Sword of Damocles for Duck Typing in Dynamic Language DeserializationXiaofan Liu, Xunjin Zheng, Cai Fu, Xiaoheng Xie, Peng Di. 2458-2459 [doi]
- A Generalized Approach for Solving Web Form ConstraintsBjörn Karthein, Cristian-Alexandru Staicu, Andreas Zeller. 2460-2461 [doi]
- Automatically Deriving Developers' Technical Expertise from the GitHub Social NetworkYanchun Sun, Jiawei Wu, Xiaohan Zhao, Haizhou Xu, Sihan Wang, Jiaqi Zhang, Ye Zhu 0002, Gang Huang 0001. 2462-2463 [doi]
- LLMs and Prompting for Unit Test Generation: A Large-Scale EvaluationWendkûuni C. Ouédraogo, Abdoul Kader Kaboré, Haoye Tian, Yewei Song, Anil Koyuncu, Jacques Klein, David Lo 0001, Tegawendé F. Bissyandé. 2464-2465 [doi]
- RepoGenix: Dual Context-Aided Repository-Level Code Completion with Language ModelsMing Liang, Xiaoheng Xie, Gehao Zhang, Xunjin Zheng, Peng Di, Wei Jiang 0011, Hongwei Chen, Chengpeng Wang, Gang Fan. 2466-2467 [doi]
- A High-level Architecture of an Automated Context-aware Ethics-based Negotiation ApproachMashal Afzal Memon, Marco Autili, Gianluca Filippone, Gian Luca Scoccia, Paola Inverardi. 2468-2469 [doi]
- Assessing Open Source Software Survivability using Kaplan-Meier Survival Function and Polynomial RegressionSohee Park, Ryeonggu Kwon, Gihwon Kwon. 2470-2471 [doi]
- Can Code Metrics Enhance Documentation Generation for Computational Notebooks?Mojtaba Mostafavi Ghahfarokhi, Hamed Jahantigh, Sepehr Kianiangolafshani, Ashkan Khademian, Alireza Asadi, Abbas Heydarnoori. 2472-2473 [doi]
- Cross-lingual Code Clone Detection: When LLMs Fail Short Against Embedding-based ClassifierMicheline Bénédicte Moumoula, Abdoul Kader Kaboré, Jacques Klein, Tegawendé F. Bissyandé. 2474-2475 [doi]
- Towards LLM-augmented multiagent systems for agile software engineeringKonrad Cinkusz, Jaroslaw A. Chudziak. 2476-2477 [doi]
- IdeoRate: Towards a Semi-automated Assessment Methodology for OSS IdeologiesYang Yue 0003, Yi Wang 0013, David F. Redmiles. 2478-2479 [doi]
- PatchTrack: Analyzing ChatGPT's Impact on Software Patch Decision-Making in Pull RequestsDaniel Ogenrwot, John Businge. 2480-2481 [doi]
- Detecting Malicious Accounts in Web3 through Transaction GraphWenkai Li, Zhijie Liu, Xiaoqi Li 0001, Sen Nie. 2482-2483 [doi]
- From Logging to Leakage: A Study of Privacy Leakage in Android App LogsZhiyuan Chen, Soham Sanjay Deo, Poorna Chander Reddy Puttaparthi, Yiming Tang 0002, Xueling Zhang, Weiyi Shang. 2484-2485 [doi]
- Using LLM for Mining and Testing Constraints in API TestingHieu Huynh, Quoc-Tri Le, Tien N. Nguyen, Vu Nguyen 0003. 2486-2487 [doi]
- A Data-driven Approach for Mining Software Features based on Similar App Descriptions and User Reviews AnalysisKhubaib Amjad Alam, Ramsha Ali, Zyena Kamran, Sabeen Fatima, Irum Inayat. 2488-2489 [doi]
- Improving the Comprehension of R Programs by Hybrid Dataflow AnalysisFlorian Sihler. 2490-2493 [doi]
- Semantic-aware Source Code ModelingYangruibo Ding. 2494-2497 [doi]
- Enhancing Software Design and Developer Experience Via LLMsSimin Sun. 2498-2501 [doi]
- Syntactic Resilience in Greybox Fuzzing: Automated Error RecoveryBachir Bendrissou. 2502-2505 [doi]
- Software Supply Chain Risk: Characterization, Measurement & AttenuationAlexis Butler. 2506-2509 [doi]
- A Comprehensive Study of Privacy Leakage Vulnerability in Android App LogsZhiyuan Chen. 2510-2513 [doi]
- Using AI to Automate the Modernization of Legacy Software ApplicationsVikram Nitin. 2514-2517 [doi]