Abstract is missing.
- Towards AI-Driven Software Development: Challenges and Lessons from the Field (Keynote)Eran Yahav. 1 [doi]
- Getting Outside the Bug Boxes (Keynote)Margaret Burnett. 2 [doi]
- A Four-Year Study of Student Contributions to OSS vs. OSS4SG with a Lightweight InterventionZihan Fang, Madeline Endres, Thomas Zimmermann 0001, Denae Ford, Westley Weimer, Kevin Leach, Yu Huang 0015. 3-15 [doi]
- Do CONTRIBUTING Files Provide Information about OSS Newcomers' Onboarding Barriers?Felipe Fronchetti, David C. Shepherd, Igor Wiese, Christoph Treude, Marco Aurélio Gerosa, Igor Steinmacher. 16-28 [doi]
- How Early Participation Determines Long-Term Sustained Activity in GitHub Projects?Wenxin Xiao, Hao He 0012, Weiwei Xu, Yuxia Zhang, Minghui Zhou 0001. 29-41 [doi]
- Matching Skills, Past Collaboration, and Limited Competition: Modeling When Open-Source Projects Attract ContributorsHongbo Fang, James D. Herbsleb, Bogdan Vasilescu. 42-54 [doi]
- Accelerating Continuous Integration with Parallel Batch TestingEmad Fallahzadeh, Amir Hossein Bavand, Peter C. Rigby. 55-67 [doi]
- DistXplore: Distribution-Guided Testing for Evaluating and Enhancing Deep Learning SystemsLongtian Wang, Xiaofei Xie, Xiaoning Du 0001, Meng Tian, Qing Guo 0005, Zheng Yang, Chao Shen 0001. 68-80 [doi]
- CAmpactor: A Novel and Effective Local Search Algorithm for Optimizing Pairwise Covering ArraysQiyuan Zhao, Chuan Luo, Shaowei Cai 0001, Wei Wu 0040, Jinkun Lin, Hongyu Zhang, Chunming Hu. 81-93 [doi]
- Design by Contract for Deep Learning APIsShibbir Ahmed, Sayem Mohammad Imtiaz, Syeda Khairunnesa Samantha, Breno Dantas Cruz, Hridesh Rajan. 94-106 [doi]
- Testing Coreference Resolution Systems without Labeled Test SetsJialun Cao, Yaojie Lu, Ming Wen 0001, Shing-Chi Cheung. 107-119 [doi]
- Neural-Based Test Oracle Generation: A Large-Scale Evaluation and Lessons LearnedSoneya Binta Hossain, Antonio Filieri, Matthew B. Dwyer, Sebastian G. Elbaum, Willem Visser. 120-132 [doi]
- Revisiting Neural Program Smoothing for FuzzingMaria-Irina Nicolae, Max Eisele, Andreas Zeller. 133-145 [doi]
- RAP-Gen: Retrieval-Augmented Patch Generation with CodeT5 for Automatic Program RepairWeishi Wang, Yue Wang 0034, Shafiq Joty, Steven C. H. Hoi. 146-158 [doi]
- From Leaks to Fixes: Automated Repairs for Resource Leak WarningsAkshay Utture, Jens Palsberg. 159-171 [doi]
- Copiloting the Copilots: Fusing Large Language Models with Completion Engines for Automated Program RepairYuxiang Wei 0003, Chunqiu Steven Xia, Lingming Zhang 0001. 172-184 [doi]
- SmartFix: Fixing Vulnerable Smart Contracts by Accelerating Generate-and-Verify Repair using Statistical ModelsSunbeom So, Hakjoo Oh. 185-197 [doi]
- Automatically Resolving Dependency-Conflict Building Failures via Behavior-Consistent Loosening of Library Version ConstraintsHuiyan Wang 0001, Shuguan Liu, Lingyu Zhang, Chang Xu. 198-210 [doi]
- On the Relationship between Code Verifiability and UnderstandabilityKobi Feldman, Martin Kellogg, Oscar Chaparro. 211-223 [doi]
- Towards Greener Yet Powerful Code Generation via Quantization: An Empirical StudyXiaokai Wei, Sujan Kumar Gonugondla, Shiqi Wang 0002, Wasi Uddin Ahmad, Baishakhi Ray, Haifeng Qian, Xiaopeng Li, Varun Kumar, Zijian Wang, Yuchen Tian, Qing Sun, Ben Athiwaratkun, Mingyue Shang, Murali Krishna Ramanathan, Parminder Bhatia, Bing Xiang. 224-236 [doi]
- Statfier: Automated Testing of Static Analyzers via Semantic-Preserving Program TransformationsHuaien Zhang, Yu Pei, Junjie Chen, Shin Hwei Tan. 237-249 [doi]
- Contextual Predictive Mutation TestingKush Jain, Uri Alon 0002, Alex Groce, Claire Le Goues. 250-261 [doi]
- µAkka: Mutation Testing for Actor Concurrency in Akka using Real-World BugsMohsen Moradi-Moghadam, Mehdi Bagherzadeh 0001, Raffi Khatchadourian, Hamid Bagheri. 262-274 [doi]
- EvaCRC: Evaluating Code Review CommentsLanxin Yang, Jinwei Xu, Yifan Zhang, He Zhang, Alberto Bacchelli. 275-287 [doi]
- HyperDiff: Computing Source Code Diffs at ScaleQuentin Le Dilavrec, Djamel Eddine Khelladi, Arnaud Blouin, Jean-Marc Jézéquel. 288-299 [doi]
- Understanding Solidity Event Logging Practices in the WildLantian Li, Yejian Liang, Zhihao Liu, Zhongxing Yu. 300-312 [doi]
- An Automated Approach to Extracting Local VariablesXiaye Chi, Hui Liu, Guangjie Li, Weixiao Wang, Yunni Xia, Yanjie Jiang, Yuxia Zhang, Weixing Ji. 313-325 [doi]
- Statistical Reachability AnalysisSeongmin Lee 0009, Marcel Böhme. 326-337 [doi]
- PPR: Pairwise Program ReductionMengxiao Zhang, ZhenYang Xu, Yongqiang Tian 0001, Yu Jiang 0001, Chengnian Sun. 338-349 [doi]
- When Function Inlining Meets WebAssembly: Counterintuitive Impacts on Runtime PerformanceAlan Romano, Weihang Wang 0001. 350-362 [doi]
- Self-Supervised Query Reformulation for Code SearchYuetian Mao, Chengcheng Wan, Yuze Jiang, Xiaodong Gu 0002. 363-374 [doi]
- Natural Language to Code: How Far Are We?Shangwen Wang, Mingyang Geng, Bo Lin, Zhensu Sun, Ming Wen, Yepang Liu, Li Li, Tegawendé F. Bissyandé, Xiaoguang Mao. 375-387 [doi]
- Efficient Text-to-Code Retrieval with Cascaded Fast and Slow Transformer ModelsAkhilesh Deepak Gotmare, Junnan Li 0001, Shafiq Joty, Steven C. H. Hoi. 388-400 [doi]
- PEM: Representing Binary Program Semantics for Similarity Analysis via a Probabilistic Execution ModelXiangzhe Xu, Zhou Xuan, Shiwei Feng 0002, Siyuan Cheng, Yapeng Ye, Qingkai Shi, Guanhong Tao 0001, Le Yu, Zhuo Zhang 0002, Xiangyu Zhang 0001. 401-412 [doi]
- Hue: A User-Adaptive Parser for Hybrid LogsJunjielong Xu, Qiuai Fu, Zhouruixing Zhu, Yutong Cheng, Zhijing Li 0007, Yuchi Ma, Pinjia He. 413-424 [doi]
- Log Parsing with Generalization Ability under New Log TypesSiyu Yu, Yifan Wu, Zhijing Li 0007, Pinjia He, Ningjiang Chen, Changjian Liu. 425-437 [doi]
- Semantic DebuggingMartin Eberlein, Marius Smytzek, Dominic Steinhöfel, Lars Grunske, Andreas Zeller. 438-449 [doi]
- Demystifying Dependency Bugs in Deep Learning StackKaifeng Huang, Bihuan Chen 0001, Susheng Wu, Junming Cao, Lei Ma, Xin Peng 0001. 450-462 [doi]
- Can Machine Learning Pipelines Be Better Configured?Yibo Wang, Ying Wang, Tingwei Zhang, Yue Yu 0001, Shing-Chi Cheung, Hai Yu 0001, Zhiliang Zhu 0001. 463-475 [doi]
- Compatibility Issues in Deep Learning Systems: Problems and OpportunitiesJun Wang, Guanping Xiao, Shuai Zhang, Huashan Lei, Yepang Liu, Yulei Sui. 476-488 [doi]
- An Extensive Study on Adversarial Attack against Pre-trained Models of CodeXiaohu Du, Ming Wen 0001, Zichao Wei, Shangwen Wang, Hai Jin 0001. 489-501 [doi]
- Fix Fairness, Don't Ruin Accuracy: Performance Aware Fairness Repair using AutoMLGiang Nguyen, Sumon Biswas, Hridesh Rajan. 502-514 [doi]
- BiasAsker: Measuring the Bias in Conversational AI SystemYuxuan Wan, Wenxuan Wang, Pinjia He, Jiazhen Gu, Haonan Bai, Michael R. Lyu. 515-527 [doi]
- Pitfalls in Experiments with DNN4SE: An Analysis of the State of the PracticeSira Vegas, Sebastian G. Elbaum. 528-540 [doi]
- DecompoVision: Reliability Analysis of Machine Vision Components through Decomposition and ReuseBoyue Caroline Hu, Lina Marsso, Nikita Dvornik, Huakun Shen, Marsha Chechik. 541-552 [doi]
- Nezha: Interpretable Fine-Grained Root Causes Analysis for Microservices on Multi-modal Observability DataGuangba Yu, Pengfei Chen, Yufeng Li, Hongyang Chen, Xiaoyun Li, Zibin Zheng. 553-565 [doi]
- DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software SystemsZhiming Chen, Pengfei Chen, Peipei Wang, Guangba Yu, Zilong He, Genting Mai. 566-578 [doi]
- Pre-training Code Representation with Semantic Flow Graph for Effective Bug LocalizationYali Du 0008, Zhongxing Yu. 579-591 [doi]
- Automata-Based Trace Analysis for Aiding Diagnosing GUI Testing Tools for AndroidEnze Ma, Shan Huang, Weigang He, Ting Su 0001, Jue Wang, Huiyu Liu, Geguang Pu, Zhendong Su 0001. 592-604 [doi]
- A Practical Human Labeling Method for Online Just-in-Time Software Defect PredictionLiyan Song, Leandro L. Minku, Cong Teng, Xin Yao 0001. 605-617 [doi]
- Flow Experience in Software EngineeringSaima Ritonummi, Valtteri Siitonen, Markus Salo, Henri Pirkkalainen, Anu Sivunen. 618-630 [doi]
- Building and Sustaining Ethnically, Racially, and Gender Diverse Software Engineering Teams: A Study at GoogleElla Dagan, Anita Sarma, Alison Chang, Sarah D'Angelo, Jill Dicker, Emerson R. Murphy-Hill. 631-643 [doi]
- Towards Automated Detection of Unethical Behavior in Open-Source Software ProjectsHsu Myat Win, Haibo Wang, Shin Hwei Tan. 644-656 [doi]
- NeuRI: Diversifying DNN Generation via Inductive Rule InferenceJiawei Liu 0004, Jinjun Peng, Yuyao Wang, Lingming Zhang 0001. 657-669 [doi]
- Heterogeneous Testing for Coverage Profilers Empowered with Debugging SupportYibiao Yang, Maolin Sun, Yang Wang, Qingyang Li, Ming Wen 0001, Yuming Zhou. 670-681 [doi]
- Outage-Watch: Early Prediction of Outages using Extreme Event RegularizerShubham Agarwal, Sarthak Chakraborty, Shaddy Garg, Sumit Bisht, Chahat Jain, Ashritha Gonuguntla, Shiv Kumar Saini. 682-694 [doi]
- Multilingual Code Co-evolution using Large Language ModelsJiyang Zhang 0003, Pengyu Nie 0001, Junyi Jessy Li, Milos Gligoric 0001. 695-707 [doi]
- Knowledge-Based Version Incompatibility Detection for Deep LearningZhongkai Zhao, Bonan Kou, Mohamed Yilmaz Ibrahim, Muhao Chen, Tianyi Zhang 0001. 708-719 [doi]
- Statistical Type Inference for Incomplete ProgramsYaohui Peng, Jing Xie, Qiongling Yang, Hanwen Guo, Qingan Li, Jingling Xue, Mengting Yuan. 720-732 [doi]
- OOM-Guard: Towards Improving the Ergonomics of Rust OOM Handling via a Reservation-Based ApproachChengjun Chen, Zhicong Zhang, Hongliang Tian, Shoumeng Yan, Hui Xu 0009. 733-744 [doi]
- DeepInfer: Deep Type Inference from Smart Contract BytecodeKunsong Zhao, Zihao Li, Jianfeng Li, He Ye, Xiapu Luo, Ting Chen. 745-757 [doi]
- DeMinify: Neural Variable Name Recovery and Type InferenceYi Li, Aashish Yadavally, Jiaxing Zhang, Shaohua Wang 0002, Tien N. Nguyen. 758-770 [doi]
- Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads ModelDeqing Zou, Siyue Feng, Yueming Wu, Wenqi Suo, Hai Jin 0001. 771-783 [doi]
- Gitor: Scalable Code Clone Detection by Building Global Sample GraphJunjie Shan, Shihan Dou, Yueming Wu, Hairu Wu, Yang Liu. 784-795 [doi]
- Demystifying the Composition and Code Reuse in Solidity Smart ContractsKairan Sun, Zhengzi Xu, Chengwei Liu, Kaixuan Li, Yang Liu. 796-807 [doi]
- Scalable Program Clone Search through Spectral AnalysisTristan Benoit, Jean-Yves Marion, Sébastien Bardin. 808-820 [doi]
- A Highly Scalable, Hybrid, Cross-Platform Timing Analysis Framework Providing Accurate Differential Throughput Estimation via Instruction-Level TracingMin-Yih Hsu, Felicitas Hetzelt, David Gens, Michael Maitland, Michael Franz. 821-831 [doi]
- Discovering Parallelisms in Python ProgramsSiwei Wei, Guyang Song, Senlin Zhu, Ruoyi Ruan, Shihao Zhu, Yan Cai 0001. 832-844 [doi]
- IoPV: On Inconsistent Option Performance VariationsJinfu Chen 0002, Zishuo Ding, Yiming Tang, Mohammed Sayagh, Heng Li 0007, Bram Adams, Weiyi Shang. 845-857 [doi]
- Predicting Software Performance with Divide-and-LearnJingzhi Gong, Tao Chen 0001. 858-870 [doi]
- Benchmarking Robustness of AI-Enabled Multi-sensor Fusion Systems: Challenges and OpportunitiesXinyu Gao, Zhijie Wang, Yang Feng, Lei Ma 0003, Zhenyu Chen 0001, Baowen Xu. 871-882 [doi]
- Automated Testing and Improvement of Named Entity Recognition SystemsBoxi Yu, Yiyan Hu, Qiuyang Mang, Wenhan Hu, Pinjia He. 883-894 [doi]
- The EarlyBIRD Catches the Bug: On Exploiting Early Layers of Encoder Models for More Efficient Code ClassificationAnastasiia Grishina, Max Hort, Leon Moonen. 895-907 [doi]
- Deep Learning Based Feature Envy Detection Boosted by Real-World ExamplesBo Liu, Hui Liu, Guangjie Li, Nan Niu, Zimao Xu, Yifan Wang, Yunni Xia, Yuxia Zhang, Yanjie Jiang. 908-920 [doi]
- Comparison and Evaluation on Static Application Security Testing (SAST) Tools for JavaKaixuan Li, Sen Chen, Lingling Fan, Ruitao Feng, Han Liu, Chengwei Liu, Yang Liu, Yixiang Chen. 921-933 [doi]
- Input-Driven Dynamic Program Debloating for Code-Reuse Attack MitigationXiaoke Wang, Tao Hui, Lei Zhao, Yueqiang Cheng. 934-946 [doi]
- TransRacer: Function Dependence-Guided Transaction Race Detection for Smart ContractsChenyang Ma, Wei Song, Jeff Huang. 947-959 [doi]
- Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java ProjectsLida Zhao, Sen Chen, Zhengzi Xu, Chengwei Liu, Lyuye Zhang, Jiahui Wu, Jun Sun, Yang Liu. 960-972 [doi]
- DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep ClassifiersXiangLin Yang, Yun Lin 0001, Yifan Zhang, Linpeng Huang, Jin Song Dong, Hong Mei 0001. 973-985 [doi]
- Mining Resource-Operation Knowledge to Support Resource Leak DetectionChong Wang, Yiling Lou, Xin Peng 0001, Jianan Liu, Baihan Zou. 986-998 [doi]
- TransMap: Pinpointing Mistakes in Neural Code TranslationBo Wang, Ruishi Li, Mingkai Li, Prateek Saxena. 999-1011 [doi]
- Dynamic Prediction of Delays in Software Projects using Delay Patterns and Bayesian ModelingElvan Kula, Eric Greuter, Arie van Deursen, Georgios Gousios. 1012-1023 [doi]
- Commit-Level, Neural Vulnerability Detection and AssessmentYi Li, Aashish Yadavally, Jiaxing Zhang, Shaohua Wang, Tien N. Nguyen. 1024-1036 [doi]
- Enhancing Coverage-Guided Fuzzing via Phantom ProgramMingyuan Wu, Kunqiu Chen, Qi Luo, Jiahong Xiang, Ji Qi, Junjie Chen, Heming Cui, Yuqun Zhang. 1037-1049 [doi]
- Co-dependence Aware Fuzzing for Dataflow-Based Big Data AnalyticsAhmad Humayun, Miryung Kim, Muhammad Ali Gulzar. 1050-1061 [doi]
- SJFuzz: Seed and Mutator Scheduling for JVM FuzzingMingyuan Wu, Yicheng Ouyang, Minghai Lu, Junjie Chen, Yingquan Zhao, Heming Cui, Guowei Yang 0001, Yuqun Zhang. 1062-1074 [doi]
- Metamong: Detecting Render-Update Bugs in Web Browsers through FuzzingSuhwan Song, Byoungyoung Lee. 1075-1087 [doi]
- Property-Based Fuzzing for Finding Data Manipulation Errors in Android AppsJingling Sun, Ting Su 0001, Jiayi Jiang, Jue Wang, Geguang Pu, Zhendong Su 0001. 1088-1100 [doi]
- Leveraging Hardware Probes and Optimizations for Accelerating Fuzz Testing of Heterogeneous ApplicationsJiyuan Wang, Qian Zhang, Hongbo Rong, Guoqing Harry Xu, Miryung Kim. 1101-1113 [doi]
- NaNofuzz: A Usable Tool for Automatic Test GenerationMatthew C. Davis, Sangheon Choi, Sam Estep, Brad A. Myers, Joshua Sunshine. 1114-1126 [doi]
- A Generative and Mutational Approach for Synthesizing Bug-Exposing Test Cases to Guide Compiler FuzzingGuixin Ye, Tianmin Hu, Zhanyong Tang, Zhenye Fan, Shin Hwei Tan, Bo Zhang, Wenxiang Qian, Zheng Wang 0001. 1127-1139 [doi]
- State Merging with Quantifiers in Symbolic ExecutionDavid Trabish, Noam Rinetzky, Sharon Shoham, Vaibhav Sharma. 1140-1152 [doi]
- Detecting Atomicity Violations in Interrupt-Driven Programs via Interruption Points Selecting and Delayed ISR-TriggeringBin Yu, Cong Tian, Hengrui Xing, Zuchao Yang, Jie Su, Xu Lu 0003, Jiyu Yang, Liang Zhao, Xiaofeng Li, Zhenhua Duan. 1153-1164 [doi]
- Engineering a Formally Verified Automated Bug FinderArthur Correnson, Dominic Steinhöfel. 1165-1176 [doi]
- Speeding up SMT Solving via Compiler OptimizationBenjamin Mikek, Qirun Zhang. 1177-1189 [doi]
- Semantic Test Repair for Web ApplicationsXiaofang Qi, Xiang Qian, Yanhui Li. 1190-1202 [doi]
- A Large-Scale Empirical Review of Patch Correctness Checking ApproachesJun Yang, Yuehan Wang, Yiling Lou, Ming Wen 0001, Lingming Zhang 0001. 1203-1215 [doi]
- Program Repair Guided by Datalog-Defined Static AnalysisYu Liu, Sergey Mechtaev, Pavle Subotic, Abhik Roychoudhury. 1216-1228 [doi]
- Baldur: Whole-Proof Generation and Repair with Large Language ModelsEmily First, Markus N. Rabe, Talia Ringer, Yuriy Brun. 1229-1241 [doi]
- KG4CraSolver: Recommending Crash Solutions via Knowledge GraphXueying Du, Yiling Lou, Mingwei Liu, Xin Peng 0001, Tianyong Yang. 1242-1254 [doi]
- Automated and Context-Aware Repair of Color-Related Accessibility Issues for Android AppsYuxin Zhang, Sen Chen, Lingling Fan 0003, Chunyang Chen, Xiaohong Li 0001. 1255-1267 [doi]
- A Case Study of Developer Bots: Motivations, Perceptions, and ChallengesSumit Asthana, Hitesh Sajnani, Elena Voyloshnikova, Birendra Acharya, Kim Herzig. 1268-1280 [doi]
- "We Feel Like We're Winging It: " A Study on Navigating Open-Source Dependency AbandonmentCourtney Miller, Christian Kästner, Bogdan Vasilescu. 1281-1293 [doi]
- How Practitioners Expect Code Completion?Chaozheng Wang, Junhao Hu, Cuiyun Gao, Yu Jin, Tao Xie 0001, Hailiang Huang, Zhenyu Lei, Yuetang Deng. 1294-1306 [doi]
- Code Coverage Criteria for Asynchronous ProgramsMohammad Ganji, Saba Alimadadi, Frank Tip. 1307-1319 [doi]
- API-Knowledge Aware Search-Based Software Testing: Where, What, and HowXiaoxue Ren, Xinyuan Ye, Yun Lin, Zhenchang Xing, Shuqing Li, Michael R. Lyu. 1320-1332 [doi]
- EtherDiffer: Differential Testing on RPC Services of Ethereum NodesShinhae Kim, Sungjae Hwang. 1333-1344 [doi]
- Dynamic Data Fault Localization for Deep Neural NetworksYining Yin, Yang Feng 0003, Shihao Weng, Zixi Liu, Yuan Yao, Yichi Zhang, Zhihong Zhao, Zhenyu Chen 0001. 1345-1357 [doi]
- Understanding the Bug Characteristics and Fix Strategies of Federated Learning SystemsXiaohu Du, Xiao Chen, Jialun Cao, Ming Wen 0001, Shing-Chi Cheung, Hai Jin 0001. 1358-1370 [doi]
- Learning Program Semantics for Vulnerability Detection via Vulnerability-Specific Inter-procedural SlicingBozhi Wu, Shangqing Liu, Yang Xiao, Zhiming Li, Jun Sun, Shang-Wei Lin 0001. 1371-1383 [doi]
- DeepRover: A Query-Efficient Blackbox Attack for Deep Neural NetworksFuyuan Zhang, Xinwen Hu, Lei Ma 0003, Jianjun Zhao 0001. 1384-1394 [doi]
- Practical Inference of Nullability TypesNima Karimipour, Justin Pham, Lazaro Clapp, Manu Sridharan. 1395-1406 [doi]
- LibKit: Detecting Third-Party Libraries in iOS AppsDaniel Domínguez-Álvarez, Alejandro de la Cruz, Alessandra Gorla, Juan Caballero. 1407-1418 [doi]
- FunProbe: Probing Functions from Binary Code through Probabilistic AnalysisSoomin Kim 0002, Hyungseok Kim 0002, Sang Kil Cha. 1419-1430 [doi]
- BigDataflow: A Distributed Interprocedural Dataflow Analysis FrameworkZewen Sun, Duanchen Xu, Yiyu Zhang, Yun Qi, Yueyang Wang, Zhiqiang Zuo 0002, Zhaokang Wang, Yue Li 0006, Xuandong Li, Qingda Lu, Wenwen Peng, Shengjian Guo. 1431-1443 [doi]
- Understanding the Topics and Challenges of GPU Programming by Classifying and Analyzing Stack Overflow PostsWenhua Yang 0001, Chong Zhang, Minxue Pan. 1444-1456 [doi]
- Software Architecture in Practice: Challenges and OpportunitiesZhiyuan Wan, Yun Zhang, Xin Xia 0001, Yi Jiang, David Lo 0001. 1457-1469 [doi]
- On the Usage of Continual Learning for Out-of-Distribution Generalization in Pre-trained Language Models of CodeMartin Weyssow, Xin Zhou, Kisub Kim, David Lo 0001, Houari A. Sahraoui. 1470-1482 [doi]
- Grace: Language Models Meet Code EditsPriyanshu Gupta, Avishree Khare, Yasharth Bajpai, Saikat Chakraborty, Sumit Gulwani, Aditya Kanade, Arjun Radhakrishna, Gustavo Soares, Ashish Tiwari 0001. 1483-1495 [doi]
- Recommending Analogical APIs via Knowledge Graph EmbeddingMingwei Liu 0002, Yanjun Yang, Yiling Lou, Xin Peng 0001, Zhong Zhou, Xueying Du, Tianyong Yang. 1496-1508 [doi]
- CCT5: A Code-Change-Oriented Pre-trained ModelBo Lin, Shangwen Wang, Zhongxin Liu, Yepang Liu 0001, Xin Xia 0001, Xiaoguang Mao. 1509-1521 [doi]
- LExecutor: Learning-Guided ExecutionBeatriz Souza, Michael Pradel. 1522-1534 [doi]
- Software Architecture Recovery with Information FusionYiran Zhang, Zhengzi Xu, Chengwei Liu, Hongxu Chen 0001, Jianwen Sun, Dong Qiu, Yang Liu. 1535-1547 [doi]
- Evaluating Transfer Learning for Simplifying GitHub READMEsHaoyu Gao, Christoph Treude, Mansooreh Zahedi. 1548-1560 [doi]
- CodeMark: Imperceptible Watermarking for Code Datasets against Neural Code Completion ModelsZhensu Sun, Xiaoning Du 0001, Fu Song, Li Li 0029. 1561-1572 [doi]
- Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware DetectorsRuoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal. 1573-1585 [doi]
- Crystallizer: A Hybrid Path Analysis Framework to Aid in Uncovering Deserialization VulnerabilitiesPrashast Srivastava, Flavio Toffalini, Kostyantyn Vorobyov, François Gauthier 0001, Antonio Bianchi, Mathias Payer. 1586-1597 [doi]
- ViaLin: Path-Aware Dynamic Taint Analysis for AndroidKhaled Ahmed 0004, Yingying Wang, Mieszko Lis, Julia Rubin. 1598-1610 [doi]
- Distinguishing Look-Alike Innocent and Vulnerable Code by Subtle Semantic Representation Learning and ExplanationChao Ni 0001, Xin Yin, Kaiwen Yang, Dehai Zhao, Zhenchang Xing, Xin Xia 0001. 1611-1622 [doi]
- A Unified Framework for Mini-game Testing: Experience on WeChatChaozheng Wang, Haochuan Lu, Cuiyun Gao, Zongjie Li, Ting Xiong, Yuetang Deng. 1623-1634 [doi]
- Beyond Sharing: Conflict-Aware Multivariate Time Series Anomaly DetectionHaotian Si, Changhua Pei, Zhihan Li, Yadong Zhao, Jingjing Li, Haiming Zhang, Zulong Diao, Jianhui Li, Gaogang Xie, Dan Pei. 1635-1645 [doi]
- InferFix: End-to-End Program Repair with LLMsMatthew Jin, Syed Shahriar, Michele Tufano, Xin Shi, Shuai Lu, Neel Sundaresan, Alexey Svyatkovskiy. 1646-1656 [doi]
- Assess and Summarize: Improve Outage Understanding with Large Language ModelsPengxiang Jin, Shenglin Zhang, Minghua Ma, Haozhe Li, Yu Kang 0006, Liqun Li, Yudong Liu, Bo Qiao 0001, Chaoyun Zhang, Pu Zhao 0004, Shilin He, Federica Sarro, Yingnong Dang, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang 0001. 1657-1668 [doi]
- Understanding Hackers' Work: An Empirical Study of Offensive Security PractitionersAndreas Happe, Jürgen Cito. 1669-1680 [doi]
- Towards Efficient Record and Replay: A Case Study in WeChatSidong Feng, Haochuan Lu, Ting Xiong, Yuetang Deng, Chunyang Chen. 1681-1692 [doi]
- Last Diff Analyzer: Multi-language Automated Approver for Behavior-Preserving Code RevisionsYuxin Wang, Adam Welc, Lazaro Clapp, Lingchao Chen. 1693-1704 [doi]
- Dead Code Removal at Meta: Automatically Deleting Millions of Lines of Code and Petabytes of Deprecated DataWill Shackleton, Katriel Cohn-Gordon, Peter C. Rigby, Rui Abreu 0001, James Gill, Nachiappan Nagappan, Karim Nakad, Ioannis Papagiannis, Luke Petre, Giorgi Megreli, Patrick Riggs, James Saindon. 1705-1715 [doi]
- Incrementalizing Production CodeQL AnalysesTamás Szabó. 1716-1726 [doi]
- xASTNN: Improved Code Representations for Industrial PracticeZhiwei Xu, Min Zhou, Xibin Zhao, Yang Chen, Xi Cheng, Hongyu Zhang. 1727-1738 [doi]
- From Point-wise to Group-wise: A Fast and Accurate Microservice Trace Anomaly Detection ApproachZhe Xie, Changhua Pei, Wanxue Li, Huai Jiang, Liangfei Su, Jianhui Li, Gaogang Xie, Dan Pei. 1739-1749 [doi]
- STEAM: Observability-Preserving Trace SamplingShilin He, Botao Feng, Liqun Li, Xu Zhang, Yu Kang 0006, Qingwei Lin, Saravan Rajmohan, Dongmei Zhang 0001. 1750-1761 [doi]
- TraceDiag: Adaptive, Interpretable, and Efficient Root Cause Analysis on Large-Scale Microservice SystemsRuomeng Ding, Chaoyun Zhang, Lu Wang, Yong Xu, Minghua Ma, Xiaomin Wu, Meng Zhang, Qingjun Chen, Xin Gao, Xuedong Gao, Hao Fan, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang. 1762-1773 [doi]
- Triggering Modes in Spectrum-Based Multi-location Fault LocalizationTung Dao, Na Meng 0001, ThanhVu Nguyen. 1774-1785 [doi]
- Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget PerceptionYongxiang Hu, Jiazhen Gu, Shuqing Hu, Yu Zhang, WenJie Tian, Shiyu Guo, Chaoyi Chen, Yangfan Zhou. 1786-1797 [doi]
- MuRS: Mutant Ranking and Suppression using Identifier TemplatesZimin Chen, Malgorzata Salawa, Manushree Vijayvergiya, Goran Petrovic, Marko Ivankovic, René Just. 1798-1808 [doi]
- Modeling the Centrality of Developer Output with Software Supply ChainsAudris Mockus, Peter C. Rigby, Rui Abreu 0001, Parth Suresh, Yifen Chen, Nachiappan Nagappan. 1809-1819 [doi]
- On-Premise AIOps Infrastructure for a Software Editor SME: An Experience ReportAnes Bendimerad, Youcef Remil, Romain Mathonat, Mehdi Kaytoue. 1820-1831 [doi]
- C³: Code Clone-Based Identification of Duplicated ComponentsYanming Yang, Ying Zou, Xing Hu, David Lo 0001, Chao Ni 0001, John C. Grundy, Xin Xia 0001. 1832-1843 [doi]
- AdaptivePaste: Intelligent Copy-Paste in IDEXiaoyu Liu, Jinu Jang, Neel Sundaresan, Miltiadis Allamanis, Alexey Svyatkovskiy. 1844-1854 [doi]
- Adapting Performance Analytic Techniques in a Real-World Database-Centric System: An Industrial Experience ReportLizhi Liao, Heng Li 0007, Weiyi Shang, Catalin Sporea, Andrei Toma, Sarah Sajedi. 1855-1866 [doi]
- KDDT: Knowledge Distillation-Empowered Digital Twin for Anomaly DetectionQingHua Xu, Shaukat Ali 0001, Tao Yue 0002, Zaimovic Nedim, Inderjeet Singh. 1867-1878 [doi]
- AG3: Automated Game GUI Text Glitch Detection Based on Computer VisionXiaoyun Liang, Jiayi Qi, Yongqiang Gao, Chao Peng, Ping Yang. 1879-1890 [doi]
- Detection Is Better Than Cure: A Cloud Incidents PerspectiveVaibhav Ganatra, Anjaly Parayil, Supriyo Ghosh, Yu Kang, Minghua Ma, Chetan Bansal, Suman Nath, Jonathan Mace. 1891-1902 [doi]
- PropProof: Free Model-Checking Harnesses from PBTYoshiki Takashima. 1903-1913 [doi]
- LightF3: A Lightweight Fully-Process Formal Framework for Automated Verifying Railway Interlocking SystemsYibo Dong, Xiaoyu Zhang, Yicong Xu, Chang Cai, Yu Chen, Weikai Miao, Jianwen Li, Geguang Pu. 1914-1925 [doi]
- BFSig: Leveraging File Significance in Bus Factor EstimationVahid Haratian, Mikhail Evtikhiev, Pouria Derakhshanfar, Eray Tüzün, Vladimir Kovalenko. 1926-1936 [doi]
- Automated Test Generation for Medical Rules Web Services: A Case Study at the Cancer Registry of NorwayChristoph Laaber, Tao Yue 0002, Shaukat Ali 0001, Thomas Schwitalla, Jan Nygård. 1937-1948 [doi]
- Test Case Generation for Drivability Requirements of an Automotive Cruise Controller: An Experience with an Industrial SimulatorFederico Formica, Nicholas Petrunti, Lucas Bruck, Vera Pantelic, Mark Lawford, Claudio Menghi. 1949-1960 [doi]
- Prioritizing Natural Language Test Cases Based on Highly-Used Game FeaturesMarkos Viggiato, Dale Paas, Cor-Paul Bezemer. 1961-1972 [doi]
- EvoCLINICAL: Evolving Cyber-Cyber Digital Twin with Active Transfer Learning for Automated Cancer Registry SystemChengjie Lu, QingHua Xu, Tao Yue 0002, Shaukat Ali 0001, Thomas Schwitalla, Jan Nygård. 1973-1984 [doi]
- Compositional Taint Analysis for Enforcing Security Policies at ScaleSubarno Banerjee, Siwei Cui, Michael Emmi, Antonio Filieri, Liana Hadarean, Peixuan Li, Linghui Luo, Goran Piskachev, Nicolás Rosner, Aritra Sengupta, Omer Tripp, Jingbo Wang. 1985-1996 [doi]
- A Multidimensional Analysis of Bug Density in SAP HANAJulian Reck, Thomas Bach, Jan Stoess. 1997-2007 [doi]
- Ownership in the Hands of Accountability at Brightsquid: A Case Study and a Developer SurveyUmme Ayman Koana, Francis Chew, Chris Carlson, Maleknaz Nayebi. 2008-2019 [doi]
- Rotten Green Tests in Google TestPaul Robinson. 2020-2025 [doi]
- Issue Report Validation in an Industrial ContextEthem Utku Aktas, Ebru Cakmak, Mete Inan, Cemal Yilmaz. 2026-2031 [doi]
- On the Dual Nature of Necessity in Use of Rust Unsafe CodeYuchen Zhang, Ashish Kundu, Georgios Portokalidis, Jun Xu. 2032-2037 [doi]
- Analyzing Microservice Connectivity with KubesondeJacopo Bufalino, Mario Di Francesco, Tuomas Aura. 2038-2043 [doi]
- Testing Real-World Healthcare IoT Application: Experiences and Lessons LearnedHassan Sartaj, Shaukat Ali 0001, Tao Yue 0002, Kjetil Moberg. 2044-2049 [doi]
- Diffusion-Based Time Series Data Imputation for Cloud Failure Prediction at Microsoft 365Fangkai Yang, Wenjie Yin, Lu Wang, Tianci Li, Pu Zhao 0004, Bo Liu, Paul Wang, Bo Qiao 0001, Yudong Liu, Mårten Björkman, Saravan Rajmohan, Qingwei Lin, Dongmei Zhang 0001. 2050-2055 [doi]
- The Most Agile Teams Are the Most Disciplined: On Scaling out Agile DevelopmentZheng Li 0001, Austen Rainer. 2056-2061 [doi]
- Contribution-Based Firing of Developers?Vincenzo Orrei, Marco Raglianti, Csaba Nagy 0001, Michele Lanza. 2062-2066 [doi]
- Keeping Mutation Test Suites Consistent and Relevant with Long-Standing MutantsMilos Ojdanic, Mike Papadakis, Mark Harman. 2067-2071 [doi]
- Towards Top-Down Automated Development in Limited Scopes: A Neuro-Symbolic Framework from Expressibles to ExecutablesJian Gu, Harald C. Gall. 2072-2076 [doi]
- Lessons from the Long Tail: Analysing Unsafe Dependency Updates across Software EcosystemsSupatsara Wattanakriengkrai, Raula Gaikovina Kula, Christoph Treude, Kenichi Matsumoto. 2077-2081 [doi]
- Getting pwn'd by AI: Penetration Testing with Large Language ModelsAndreas Happe, Jürgen Cito. 2082-2086 [doi]
- Towards Feature-Based Analysis of the Machine Learning Development LifecycleBoyue Caroline Hu, Marsha Chechik. 2087-2091 [doi]
- Exploring Moral Principles Exhibited in OSS: A Case Study on GitHub Heated IssuesRamtin Ehsani, Rezvaneh Rezapour, Preetha Chatterjee. 2092-2096 [doi]
- Towards Understanding Emotions in Informal Developer Interactions: A Gitter Chat StudyAmirali Sajadi, Kostadin Damevski, Preetha Chatterjee. 2097-2101 [doi]
- Towards Strengthening Formal Specifications with Mutation Model CheckingMaxime Cordy, Sami Lazreg, Axel Legay, Pierre-Yves Schobbens. 2102-2106 [doi]
- Assisting Static Analysis with Large Language Models: A ChatGPT ExperimentHaonan Li, Yu Hao 0006, Yizhuo Zhai, Zhiyun Qian. 2107-2111 [doi]
- Reflecting on the Use of the Policy-Process-Product Theory in Empirical Software EngineeringKelechi G. Kalu, Taylor R. Schorlemmer, Sophie Chen, Kyle A. Robinson, Erik Kocinare, James C. Davis 0001. 2112-2116 [doi]
- A Vision on Intentions in Software EngineeringJacob Krüger, Yi Li, Chenguang Zhu 0002, Marsha Chechik, Thorsten Berger, Julia Rubin. 2117-2121 [doi]
- Deeper Notions of Correctness in Image-Based DNNs: Lifting Properties from Pixel to EntitiesFelipe Toledo, David Shriver, Sebastian G. Elbaum, Matthew B. Dwyer. 2122-2126 [doi]
- LazyCow: A Lightweight Crowdsourced Testing Tool for Taming Android FragmentationXiaoyu Sun 0002, Xiao Chen, Yonghui Liu, John C. Grundy, Li Li 0029. 2127-2131 [doi]
- npm-follower: A Complete Dataset Tracking the NPM EcosystemDonald Pinckney, Federico Cassano, Arjun Guha, Jonathan Bell 0001. 2132-2136 [doi]
- Ad Hoc Syntax-Guided Program ReductionJia Le Tian, Mengxiao Zhang, ZhenYang Xu, Yongqiang Tian 0001, Yiwen Dong 0002, Chengnian Sun. 2137-2141 [doi]
- On Using Information Retrieval to Recommend Machine Learning Good Practices for Software EngineersLaura Cabra-Acela, Anamaria Mojica-Hanke, Mario Linares Vásquez, Steffen Herbold. 2142-2146 [doi]
- Helion: Enabling Natural Testing of Smart HomesPrianka Mandal, Sunil Manandhar, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni. 2147-2151 [doi]
- A Language Model of Java Methods with Train/Test DeduplicationChia-Yi Su, Aakash Bansal, Vijayanta Jain, Sepideh Ghanavati, Collin McMillan. 2152-2156 [doi]
- DENT: A Tool for Tagging Stack Overflow Posts with Deep Learning Energy PatternsShriram Shanbhag, Sridhar Chimalakonda, Vibhu Saujanya Sharma, Vikrant Kaulgud. 2157-2161 [doi]
- MASC: A Tool for Mutation-Based Evaluation of Static Crypto-API Misuse DetectorsAmit Seal Ami, Syed Yusuf Ahmed, Radowan Mahmud Redoy, Nathan Cooper, Kaushal Kafle, Kevin Moran, Denys Poshyvanyk, Adwait Nadkarni. 2162-2166 [doi]
- llvm2CryptoLine: Verifying Arithmetic in Cryptographic C ProgramsRuiling Chen, Jiaxiang Liu 0001, Xiaomu Shi, Ming-Hsien Tsai 0001, Bow-Yaw Wang, Bo-Yin Yang. 2167-2171 [doi]
- P4b: A Translator from P4 Programs to BoogieChong Ye, Fei He. 2172-2176 [doi]
- D2S2: Drag 'n' Drop Mobile App Screen SearchSoumik Mohian, Tony Tang, Tuan Trinh, Don Dang, Christoph Csallner. 2177-2181 [doi]
- CONAN: Statically Detecting Connectivity Issues in Android ApplicationsAlejandro Mazuera-Rozo, Camilo Escobar-Velásquez, Juan Espitia-Acero, Mario Linares Vásquez, Gabriele Bavota. 2182-2186 [doi]
- A Data Set of Extracted Rationale from Linux Kernel Commit MessagesMouna Dhaouadi. 2187-2188 [doi]
- Detecting Overfitting of Machine Learning Techniques for Automatic Vulnerability DetectionNiklas Risse. 2189-2191 [doi]
- Detection of Optimizations Missed by the CompilerYi Zhang. 2192-2194 [doi]
- Do All Software Projects Die When Not Maintained? Analyzing Developer Maintenance to Predict OSS UsageEmily Nguyen. 2195-2197 [doi]
- Inferring Complexity Bounds from Recurrence RelationsDidier Ishimwe. 2198-2200 [doi]
- LLM-Based Code Generation Method for Golang Compiler TestingQiuhan Gu. 2201-2203 [doi]
- Privacy-Centric Log Parsing for Timely, Proactive Personal Data ProtectionIssam Sedki. 2204-2206 [doi]
- STraceBERT: Source Code Retrieval using Semantic Application TracesClaudio Spiess. 2207-2209 [doi]
- The Call Graph Chronicles: Unleashing the Power WithinMasudul Hasan Masud Bhuiyan. 2210-2212 [doi]
- The State of Survival in OSS: The Impact of DiversityZixuan Feng. 2213-2215 [doi]