default search action
39th ASE 2024: Sacramento, CA, USA
- Vladimir Filkov, Baishakhi Ray, Minghui Zhou:
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, ASE 2024, Sacramento, CA, USA, October 27 - November 1, 2024. ACM 2024, ISBN 979-8-4007-1248-7
Research Papers
- Ziyou Jiang, Lin Shi, Guowei Yang, Qing Wang:
PatUntrack: Automated Generating Patch Examples for Issue Reports without Tracked Insecure Code. 1-13 - Yujia Fan, Sinan Wang, Zebang Fei, Yao Qin, Huaxuan Li, Yepang Liu:
Can Cooperative Multi-Agent Reinforcement Learning Boost Automatic Web Testing? An Exploratory Study. 14-26 - Rui Ren, Jingbang Yang, Linxiao Yang, Xinyue Gu, Liang Sun:
SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice. 27-39 - Jaemin Hong, Sukyoung Ryu:
To Tag, or Not to Tag: Translating C's Unions to Rust's Tagged Unions. 40-52 - Yiheng Xiong, Ting Su, Jue Wang, Jingling Sun, Geguang Pu, Zhendong Su:
General and Practical Property-based Testing for Android Apps. 53-64 - Xinyu Gao, Yun Xiong, Deze Wang, Zhenhan Guan, Zejian Shi, Haofen Wang, Shanshan Li:
Preference-Guided Refactored Tuning for Retrieval Augmented Code Generation. 65-77 - Markus Böck, Michael Schröder, Jürgen Cito:
Language-Agnostic Static Analysis of Probabilistic Programs. 78-90 - Shaoheng Cao, Renyi Chen, Minxue Pan, Wenhua Yang, Xuandong Li:
Beyond Manual Modeling: Automating GUI Model Generation Using Design Documents. 91-103 - Lanxin Yang, Jinwei Xu, He Zhang, Fanghao Wu, Jun Lyu, Yue Li, Alberto Bacchelli:
GPP: A Graph-Powered Prioritizer for Code Review Requests. 104-116 - Zhuo Su, Zehong Yu, Dongyan Wang, Wanli Chang, Bin Gu, Yu Jiang:
Test Case Generation for Simulink Models using Model Fuzzing and State Solving. 117-128 - Tianyi Chen, Yanjie Jiang, Fu Fan, Bo Liu, Hui Liu:
A Position-Aware Approach to Decomposing God Classes. 129-140 - Jinhao Dong, Jun Sun, Yun Lin, Yedi Zhang, Murong Ma, Jin Song Dong, Dan Hao:
Revisiting the Conflict-Resolving Problem from a Semantic Perspective. 141-152 - Yi Xiao, Van-Hoang Le, Hongyu Zhang:
Demonstration-Free: Towards More Practical Log Parsing with Large Language Models. 153-165 - Florian Eder, Stefan Winter:
Efficient Detection of Test Interference in C Projects. 166-178 - Mengdan Fan, Wei Zhang, Haiyan Zhao, Guangtai Liang, Zhi Jin:
Detect Hidden Dependency to Untangle Commits. 179-190 - Jiawei Lu, Haoye Wang, Zhongxin Liu, Keyu Liang, Lingfeng Bao, Xiaohu Yang:
Instructive Code Retriever: Learn from Large Language Model's Feedback for Code Intelligence Tasks. 191-203 - Mingyi Zhou, Xiang Gao, Xiao Chen, Chunyang Chen, John Grundy, Li Li:
DynaMO: Protecting Mobile DL Models through Coupling Obfuscated DL Operators. 204-215 - Cong Li, Zhaogui Xu, Peng Di, Dongxia Wang, Zheng Li, Qian Zheng:
Understanding Code Changes Practically with Small-Scale Language Models. 216-228 - Zhihong Sun, Yao Wan, Jia Li, Hongyu Zhang, Zhi Jin, Ge Li, Chen Lyu:
Sifting through the Chaff: On Utilizing Execution Feedback for Ranking the Generated Code Candidates. 229-241 - Quan Zhang, Chijin Zhou, Gwihwan Go, Binqi Zeng, Heyuan Shi, Zichen Xu, Yu Jiang:
Imperceptible Content Poisoning in LLM-Powered Applications. 242-254 - Guoqing Bao, Heng Shi, Chengyi Cui, Yalin Zhang, Jianguo Yao:
UFront: Toward A Unified MLIR Frontend for Deep Learning. 255-267 - An Guo, Yuan Zhou, Haoxiang Tian, Chunrong Fang, Yunjian Sun, Weisong Sun, Xinyu Gao, Anh Tuan Luu, Yang Liu, Zhenyu Chen:
SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing. 268-280 - Chaozheng Wang, Shuzheng Gao, Cuiyun Gao, Wenxuan Wang, Chun Yong Chong, Shan Gao, Michael R. Lyu:
A Systematic Evaluation of Large Code Models in API Suggestion: When, Which, and How. 281-293 - Nariyoshi Chida, Tachio Terauchi:
Repairing Regex-Dependent String Functions. 294-305 - Chenyang Yang, Yining Hong, Grace A. Lewis, Tongshuang Wu, Christian Kästner:
What Is Wrong with My Model? Identifying Systematic Problems with Semantic Data Slicing. 306-318 - David Kaindlstorfer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis:
Interrogation Testing of Program Analyzers for Soundness and Precision Issues. 319-330 - Jingnan Zheng, Jiahao Liu, An Zhang, Jun Zeng, Ziqi Yang, Zhenkai Liang, Tat-Seng Chua:
MaskDroid: Robust Android Malware Detection with Masked Graph Representations. 331-343 - Markus Fleischmann, David Kaindlstorfer, Anastasia Isychev, Valentin Wüstholz, Maria Christakis:
Constraint-Based Test Oracles for Program Analyzers. 344-355 - Yichi Zhang, Zixi Liu, Yang Feng, Baowen Xu:
Leveraging Large Language Model to Assist Detecting Rust Code Comment Inconsistency. 356-366 - James Yoo, Michael D. Ernst, René Just:
Verifying the Option Type with Rely-Guarantee Reasoning. 367-380 - Qi Zhan, Xing Hu, Xin Xia, Shanping Li:
REACT: IR-Level Patch Presence Test for Binary. 381-392 - Yulun Wu, Ming Wen, Zeliang Yu, Xiaochen Guo, Hai Jin:
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models. 393-405 - Guangyuan Wu, Weining Cao, Yuan Yao, Hengfeng Wei, Taolue Chen, Xiaoxing Ma:
LLM Meets Bounded Model Checking: Neuro-symbolic Loop Invariant Inference. 406-417 - Sumit Lahiri, Pankaj Kumar Kalita, Akshay Kumar Chittora, Varun Vankudre, Subhajit Roy:
Program Synthesis Meets Visual What-Comes-Next Puzzles. 418-429 - Baijun Cheng, Cen Zhang, Kailong Wang, Ling Shi, Yang Liu, Haoyu Wang, Yao Guo, Ding Li, Xiangqun Chen:
Semantic-Enhanced Indirect Call Analysis with Large Language Models. 430-442 - Luca Traini, Federico Di Menna, Vittorio Cortellessa:
AI-driven Java Performance Testing: Balancing Result Quality with Testing Time. 443-454 - Yi Liu, Junzhe Yu, Huijia Sun, Ling Shi, Gelei Deng, Yuqi Chen, Yang Liu:
Efficient Detection of Toxic Prompts in Large Language Models. 455-467 - Jiuang Zhao, Zitian Yang, Li Zhang, Xiaoli Lian, Donghao Yang, Xin Tan:
DRMiner: Extracting Latent Design Rationale from Jira Issue Logs. 468-480 - Xinyu She, Yanjie Zhao, Haoyu Wang:
WaDec: Decompiling WebAssembly Using Large Language Model. 481-492 - Zhi Chen, Lingxiao Jiang:
Promise and Peril of Collaborative Code Generation Models: Balancing Effectiveness and Memorization. 493-505 - Dharun Anandayuvaraj, Matthew Campbell, Arav Tewari, James C. Davis:
FAIL: Analyzing Software Failures from the News Using LLMs. 506-518 - Kexin Sun, Yiding Ren, Hongyu Kuang, Hui Gao, Xiaoxing Ma, Guoping Rong, Dong Shao, He Zhang:
AVIATE: Exploiting Translation Variants of Artifacts to Improve IR-based Traceability Recovery in Bilingual Software Projects. 519-530 - Yifan Liao, Ming Xu, Yun Lin, Xiwen Teoh, Xiaofei Xie, Ruitao Feng, Frank Liaw, Hongyu Zhang, Jin Song Dong:
Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality. 531-543 - Zhiquan Huang, Yuan Huang, Xiangping Chen, Xiaocong Zhou, Changlin Yang, Zibin Zheng:
An Empirical Study on Learning-based Techniques for Explicit and Implicit Commit Messages Generation. 544-556 - Congying Xu, Songqiang Chen, Jiarong Wu, Shing-Chi Cheung, Valerio Terragni, Hengcheng Zhu, Jialun Cao:
MR-Adopt: Automatic Deduction of Input Transformation Function for Metamorphic Testing. 557-569 - Wei Liu, Ailun Yu, Daoguang Zan, Bo Shen, Wei Zhang, Haiyan Zhao, Zhi Jin, Qianxiang Wang:
GraphCoder: Enhancing Repository-Level Code Completion via Coarse-to-fine Retrieval Based on Code Context Graph. 570-581 - Cong Wu, Jing Chen, Ziwei Wang, Ruichao Liang, Ruiying Du:
Semantic Sleuth: Identifying Ponzi Contracts via Large Language Models. 582-593 - Gichan Lee, Hansae Ju, Scott Uk-Jin Lee:
NeuroJIT: Improving Just-In-Time Defect Prediction Using Neurophysiological and Empirical Perceptions of Modern Developers. 594-605 - Sicong Cao, Xiaobing Sun, Xiaoxue Wu, David Lo, Lili Bo, Bin Li, Xiaolei Liu, Xingwei Lin, Wei Liu:
Snopy: Bridging Sample Denoising with Causal Graph Learning for Effective Vulnerability Detection. 606-618 - Vittoriano Muttillo, Claudio Di Sipio, Riccardo Rubei, Luca Berardinelli, MohammadHadi Dehghani:
Towards Synthetic Trace Generation of Modeling Operations using In-Context Learning Approach. 619-630 - Wenzhang Yang, Cuifeng Gao, Xiaoyuan Liu, Yuekang Li, Yinxing Xue:
Rust-twins: Automatic Rust Compiler Testing through Program Mutation and Dual Macros Generation. 631-642 - Zhibo Zhang, Wuxia Bai, Yuxi Li, Mark Huasong Meng, Kailong Wang, Ling Shi, Li Li, Jun Wang, Haoyu Wang:
GlitchProber: Advancing Effective Detection and Mitigation of Glitch Tokens in Large Language Models. 643-655 - Xiao Yu, Zexian Zhang, Feifei Niu, Xing Hu, Xin Xia, John Grundy:
What Makes a High-Quality Training Dataset for Large Language Models: A Practitioners' Perspective. 656-668 - Fang Liu, Zhenwei Liu, Qianhui Zhao, Jing Jiang, Li Zhang, Zian Sun, Ge Li, Zhongqi Li, Yuchi Ma:
FastFixer: An Efficient and Effective Approach for Repairing Programming Assignments. 669-680 - Xinran Yu, Chun Li, Minxue Pan, Xuandong Li:
DroidCoder: Enhanced Android Code Completion with Context-Enriched Retrieval-Augmented Generation. 681-693 - Yifan Xie, Zhouyang Jia, Shanshan Li, Ying Wang, Jun Ma, Xiaoling Li, Haoran Liu, Ying Fu, Xiangke Liao:
How to Pet a Two-Headed Snake? Solving Cross-Repository Compatibility Issues with Hera. 694-705 - Luan Pham, Huong Ha, Hongyu Zhang:
Root Cause Analysis for Microservice System based on Causal Inference: How Far Are We? 706-715 - Guochang Li, Chen Zhi, Jialiang Chen, Junxiao Han, Shuiguang Deng:
Exploring Parameter-Efficient Fine-Tuning of Large Language Model on Automated Program Repair. 719-731 - Mohammad Hossein Amini, Shiva Nejati:
Bridging the Gap between Real-world and Synthetic Images for Testing Autonomous Driving Systems. 732-744 - Di Cui, Jiaqi Wang, Qiangqiang Wang, Peng Ji, Minglang Qiao, Yutong Zhao, Jingzhao Hu, Luqiao Wang, Qingshan Li:
Three Heads Are Better Than One: Suggesting Move Method Refactoring Opportunities with Inter-class Code Entity Dependency Enhanced Hybrid Hypergraph Neural Network. 745-757 - Yihui Xu, Yanhui Li, Jun Wang, Xiaofang Zhang:
Evaluating Terminology Translation in Machine Translation Systems via Metamorphic Testing. 758-769 - Weilong Li, Jintian Lu, Ruizhi Xiao, Pengfei Shao, Shuyuan Jin:
RCFG2Vec: Considering Long-Distance Dependency for Binary Code Similarity Detection. 770-782 - Yue Li, He Zhang, Yuzhe Jin, Zhong Ren, Liming Dong, Jun Lyu, Lanxin Yang, David Lo, Dong Shao:
An Explainable Automated Model for Measuring Software Engineer Contribution. 783-794 - Chao Hu, Yitian Chai, Hao Zhou, Fandong Meng, Jie Zhou, Xiaodong Gu:
How Effectively Do Code Language Models Understand Poor-Readability Code? 795-806 - Dohyun Ryu, Giyeol Kim, Daeun Lee, Seongjin Kim, Seungjin Bae, Junghwan Rhee, Taegyu Kim:
Differential Fuzzing for Data Distribution Service Programs with Dynamic Configuration. 807-818 - Yujie Liu, Mingxuan Zhu, Jinhao Dong, Junzhe Yu, Dan Hao:
Compiler Bug Isolation via Enhanced Test Program Mutation. 819-830 - Benedikt Schesch, Ryan Featherman, Kenneth J. Yang, Ben R. Roberts, Michael D. Ernst:
Evaluation of Version Control Merge Tools. 831-83 - Jian Wang, Shangqing Liu, Xiaofei Xie, Yi Li:
An Empirical Study to Evaluate AIGC Detectors on Code Content. 844-856 - Jialiang Wei, Anne-Lise Courbis, Thomas Lambolais, Binbin Xu, Pierre-Louis Bernard, Gérard Dray, Walid Maalej:
Getting Inspiration for Feature Elicitation: App Store- vs. LLM-based Approach. 857-869 - Jialun Cao, Zhiyong Chen, Jiarong Wu, Shing-Chi Cheung, Chang Xu:
JavaBench: A Benchmark of Object-Oriented Code Generation for Evaluating Large Language Models. 870-882 - Zhilin Li, Xutong Ma, Mengze Hu, Jun Yan:
Detecting Element Accessing Bugs in C++ Sequence Containers. 883-894 - Jialuo Chen, Jingyi Wang, Xiyue Zhang, Youcheng Sun, Marta Kwiatkowska, Jiming Chen, Peng Cheng:
FAST: Boosting Uncertainty-based Test Prioritization Methods for Neural Networks via Feature Selection. 895-906 - Steven (Jiaxun) Tang, Mingcan Xiang, Yang Wang, Bo Wu, Jianjun Chen, Tongping Liu:
Scaler: Efficient and Effective Cross Flow Analysis. 907-918 - Siyu Yu, Yifan Wu, Ying Li, Pinjia He:
Unlocking the Power of Numbers: Log Compression via Numeric Token Parsing. 919-930 - Yongqi Han, Qingfeng Du, Ying Huang, Jiaqi Wu, Fulong Tian, Cheng He:
The Potential of One-Shot Failure Root Cause Analysis: Collaboration of the Large Language Model and Small Classifier. 931-943 - Yuanhong Lan, Yifei Lu, Minxue Pan, Xuandong Li:
Navigating Mobile Testing Evaluation: A Comprehensive Statistical Analysis of Android GUI Testing Metrics. 944-956 - Yilun Wang, Pengfei Chen, Hui Dou, Yiwen Zhang, Guangba Yu, Zilong He, Haiyu Huang:
FaaSConf: QoS-aware Hybrid Resources Configuration for Serverless Workflows. 957-969 - Yinglong Zou, Juan Zhai, Chunrong Fang, Jiawei Liu, Tao Zheng, Zhenyu Chen:
Mutation-Based Deep Learning Framework Testing Method in JavaScript Environment. 970-981 - Xihao Zhang, Yi Song, Xiaoyuan Xie, Qi Xin, Chenliang Xing:
Do not neglect what's on your hands: localizing software faults with exception trigger stream. 982-994 - Jiachi Chen, Qingyuan Zhong, Yanlin Wang, Kaiwen Ning, Yongkun Liu, Zenan Xu, Zhe Zhao, Ting Chen, Zibin Zheng:
RMCBench: Benchmarking Large Language Models' Resistance to Malicious Code. 995-1006 - Zhenjiang Zhao, Takahisa Toda, Takashi Kitamura:
Approximation-guided Fairness Testing through Discriminatory Space Analysis. 1007-1018 - Yin Wu, Xiaofei Xie, Chenyang Peng, Dijun Liu, Hao Wu, Ming Fan, Ting Liu, Haijun Wang:
AdvSCanner: Generating Adversarial Smart Contracts to Exploit Reentrancy Vulnerabilities Using LLM and Static Analysis. 1019-1031 - Guilherme Cavalcanti, Paulo Borba, Leonardo dos Anjos, Jônatas Clementino:
Semistructured Merge with Language-Specific Syntactic Separators. 1032-1043 - Myungho Lee, Jiseong Bak, Seokhyeon Moon, Yoonchan Jhi, Hakjoo Oh:
Effective Unit Test Generation for Java Null Pointer Exceptions. 1044-1056 - Yidan Wang, Zhouruixing Zhu, Qiuai Fu, Yuchi Ma, Pinjia He:
MRCA: Metric-level Root Cause Analysis for Microservices via Multi-Modal Data. 1057-1068 - Junwei Chen, Yueling Zhang, Lingfeng Zhang, Min Zhang, Chengcheng Wan, Ting Su, Geguang Pu:
FIPSER: Improving Fairness Testing of DNN by Seed Prioritization. 1069-1081 - Zhongyi Wang, Linyu Yang, Mingshuai Chen, Yixuan Bu, Zhiyang Li, Qiuye Wang, Shengchao Qin, Xiao Yi, Jianwei Yin:
Parf: Adaptive Parameter Refining for Abstract Interpretation. 1082-1093 - Zifan Xie, Ming Wen, Zichao Wei, Hai Jin:
Unveiling the Characteristics and Impact of Security Patch Evolution. 1094-1106 - Lei Tao, Shenglin Zhang, Zedong Jia, Jinrui Sun, Minghua Ma, Zhengdan Li, Yongqian Sun, Canqun Yang, Yuzhi Zhang, Dan Pei:
Giving Every Modality a Voice in Microservice Failure Diagnosis via Multimodal Adaptive Optimization. 1107-1119 - Kallistos Weis, Leopoldo Teixeira, Clemens Dubslaff, Sven Apel:
Blackbox Observability of Features and Feature Interactions. 1120-1132 - Yifan Zhao, Yizhou Chen, Zeyu Sun, Qingyuan Liang, Guoqing Wang, Dan Hao:
Spotting Code Mutation for Predictive Mutation Testing. 1133-1145 - Yiheng Huang, Ruisi Wang, Wen Zheng, Zhuotong Zhou, Susheng Wu, Shulin Ke, Bihuan Chen, Shan Gao, Xin Peng:
SpiderScan: Practical Detection of Malicious NPM Packages Based on Graph-Based Behavior Modeling and Matching. 1146-1158 - Xiaobing Sun, Xingan Gao, Sicong Cao, Lili Bo, Xiaoxue Wu, Kaifeng Huang:
1+1>2: Integrating Deep Code Behaviors with Metadata Features for Malicious PyPI Package Detection. 1159-1170 - Feifei Li, Xiao Chen, Xi Xiao, Xiaoyu Sun, Chuan Chen, Shaohua Wang, Jitao Han:
Incremental Context-free Grammar Inference in Black Box Settings. 1171-1182 - Yongqian Sun, Binpeng Shi, Mingyu Mao, Minghua Ma, Sibo Xia, Shenglin Zhang, Dan Pei:
ART: A Unified Unsupervised Framework for Incident Management in Microservice Systems. 1183-1194 - Tobias Roth, Julius Näumann, Dominik Helm, Sven Keidel, Mira Mezini:
AXA: Cross-Language Analysis through Integration of Single-Language Analyses. 1195-1205 - Kisub Kim, Jounghoon Kim, Byeongjo Park, Dongsun Kim, Chun Yong Chong, Yuan Wang, Tiezhu Sun, Daniel Tang, Jacques Klein, Tegawendé F. Bissyandé:
DataRecipe - How to Cook the Data for CodeLLM? 1206-1218 - Jian Shen, Zhong Li, Minxue Pan, Xuandong Li:
Prioritizing Test Inputs for DNNs Using Training Dynamics. 1219-1231 - Narges Khakpour, Charilaos Skandylas:
Compositional Security Analysis of Dynamic Component-based Systems. 1232-1244 - Zhong Li, Chong Zhang, Minxue Pan, Tian Zhang, Xuandong Li:
AACEGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models. 1245-1257 - Zejun Wang, Kaibo Liu, Ge Li, Zhi Jin:
HITS: High-coverage LLM-based Unit Test Generation via Method Slicing. 1258-1268 - Zirui Song, Yutong Zhou, Shuaike Dong, Ke Zhang, Kehuan Zhang:
TypeFSL: Type Prediction from Binaries via Inter-procedural Data-flow Analysis and Few-shot Learning. 1269-1281 - Junjie Huang, Daya Guo, Chenglong Wang, Jiazhen Gu, Shuai Lu, Jeevana Priya Inala, Cong Yan, Jianfeng Gao, Nan Duan, Michael R. Lyu:
Contextualized Data-Wrangling Code Generation in Computational Notebooks. 1282-1294 - Yingying Wang, Sarah Bornais, Julia Rubin:
Microservice Decomposition Techniques: An Independent Tool Comparison. 1295-1307 - Muzi Qu, Jie Liu, Liangyi Kang, Shuai Wang, Dan Ye, Tao Huang:
Dynamic Scoring Code Token Tree: A Novel Decoding Strategy for Generating High-Performance Code. 1308-1318 - Huan Zhang, Wei Cheng, Yuhan Wu, Wei Hu:
A Pair Programming Framework for Code Generation via Multi-Plan Exploration and Feedback-Driven Refinement. 1319-1331 - Chico Sundermann, Jacob Loth, Thomas Thüm:
Efficient Slicing of Feature Models via Projected d-DNNF Compilation. 1332-1344 - Di Wu, Fangwen Mu, Lin Shi, Zhaoqiang Guo, Kui Liu, Weiguang Zhuang, Yuqi Zhong, Li Zhang:
iSMELL: Assembling LLMs with Expert Toolsets for Code Smell Detection and Refactoring. 1345-1357 - Wenkai Li, Xiaoqi Li, Zongwei Li, Yuqing Zhang:
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts. 1358-1369 - Chuan Yan, Ruomai Ren, Mark Huasong Meng, Liuhuo Wan, Tian Yang Ooi, Guangdong Bai:
Exploring ChatGPT App Ecosystem: Distribution, Deployment and Security. 1370-1382 - Davide Corradini, Zeno Montolli, Michele Pasqua, Mariano Ceccato:
DeepREST: Automated Test Case Generation for REST APIs Exploiting Deep Reinforcement Learning. 1383-1394 - Muhammad A. A. Pirzada, Giles Reger, Ahmed Bhayat, Lucas C. Cordeiro:
LLM-Generated Invariants for Bounded Model Checking Without Loop Unrolling. 1395-1407 - Zongze Jiang, Ming Wen, Jialun Cao, Xuanhua Shi, Hai Jin:
Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation. 1408-1420 - Mahtab Nejati, Mahmoud Alfadel, Shane McIntosh:
Understanding the Implications of Changes to Build Systems. 1421-1433 - Igor Wodiany, Antoniu Pop, Mikel Luján:
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries. 1434-1446 - Susheng Wu, Ruisi Wang, Kaifeng Huang, Yiheng Cao, Wenyan Song, Zhuotong Zhou, Yiheng Huang, Bihuan Chen, Xin Peng:
Vision: Identifying Affected Library Versions for Open Source Software Vulnerabilities. 1447-1459 - Xueyang Li, Guozhu Meng, Shangqing Liu, Lu Xiang, Kun Sun, Kai Chen, Xiapu Luo, Yang Liu:
Attribution-guided Adversarial Code Prompt Generation for Code Completion Models. 1460-1471 - Lili Bo, Wangjie Ji, Xiaobing Sun, Ting Zhang, Xiaoxue Wu, Ying Wei:
ChatBR: Automated assessment and improvement of bug report quality using ChatGPT. 1472-1483 - Yangsen Wang, Yizhou Chen, Yifan Zhao, Zhihao Gong, Junjie Chen, Dan Hao:
Mutual Learning-Based Framework for Enhancing Robustness of Code Models via Adversarial Training. 1484-1496 - Shuncheng Tang, Zhenya Zhang, Jixiang Zhou, Lei Lei, Yuan Zhou, Yinxing Xue:
LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language Models. 1497-1508 - Minghai Lu, Benjamin Delaware, Tianyi Zhang:
Proof Automation with Large Language Models. 1509-1520 - Nick Feng, Lina Marsso, Marsha Chechik:
Diagnosis via Proofs of Unsatisfiability for First-Order Logic with Relational Objects. 1521-1532 - Yanzhou Mu, Juan Zhai, Chunrong Fang, Xiang Chen, Zhixiang Cao, Peiran Yang, Yinglong Zou, Tao Zheng, Zhenyu Chen:
DevMuT: Testing Deep Learning Framework via Developer Expertise-Based Mutation. 1533-1544 - Ming Zhu, Mohimenul Karim, Ismini Lourentzou, Daphne Yao:
Semi-Supervised Code Translation Overcoming the Scarcity of Parallel Code Data. 1545-1556 - Guofeng Zhang, Luyao Liu, Zhenbang Chen, Ji Wang:
Hybrid Regression Test Selection by Integrating File and Method Dependences. 1557-1569 - Haijun Wang, Yurui Hu, Hao Wu, Dijun Liu, Chenyang Peng, Yin Wu, Ming Fan, Ting Liu:
Skyeye: Detecting Imminent Attacks via Analyzing Adversarial Smart Contracts. 1570-1582 - Noble Saji Mathews, Meiyappan Nagappan:
Test-Driven Development and LLM-based Code Generation. 1583-1594 - Ming Fan, Jifei Shi, Yin Wang, Le Yu, Xicheng Zhang, Haijun Wang, Wuxia Jin, Ting Liu:
Giving without Notifying: Assessing Compliance of Data Transmission in Android Apps. 1595-1606 - Lin Yang, Chen Yang, Shutao Gao, Weijing Wang, Bo Wang, Qihao Zhu, Xiao Chu, Jianyi Zhou, Guangtai Liang, Qianxiang Wang, Junjie Chen:
On the Evaluation of Large Language Models in Unit Test Generation. 1607-1619 - Shiwei Feng, Yapeng Ye, Qingkai Shi, Zhiyuan Cheng, Xiangzhe Xu, Siyuan Cheng, Hongjun Choi, Xiangyu Zhang:
ROCAS: Root Cause Analysis of Autonomous Driving Accidents via Cyber-Physical Co-mutation. 1620-1632 - Zhuotong Zhou, Yongzhuo Yang, Susheng Wu, Yiheng Huang, Bihuan Chen, Xin Peng:
Magneto: A Step-Wise Approach to Exploit Vulnerabilities in Dependent Libraries via LLM-Empowered Directed Fuzzing. 1633-1644 - Sunny Shree, Krishna Khadka, Yu Lei, Raghu N. Kacker, D. Richard Kuhn:
Constructing Surrogate Models in Machine Learning Using Combinatorial Testing and Active Learning. 1645-1654 - Mingyang Yin, Yutaro Kashiwa, Keheliya Gallaba, Mahmoud Alfadel, Yasutaka Kamei, Shane McIntosh:
Developer-Applied Accelerations in Continuous Integration: A Detection Approach and Catalog of Patterns. 1655-1666 - Yin Wang, Ming Fan, Hao Zhou, Haijun Wang, Wuxia Jin, Jiajia Li, Wenbo Chen, Shijie Li, Yu Zhang, Deqiang Han, Ting Liu:
MiniChecker: Detecting Data Privacy Risk of Abusive Permission Request Behavior in Mini-Programs. 1667-1679 - Shenglin Zhang, Yuhe Ji, Jiaqi Luan, Xiaohui Nie, Ziang Chen, Minghua Ma, Yongqian Sun, Dan Pei:
End-to-End AutoML for Unsupervised Log Anomaly Detection. 1680-1692 - Mouxiang Chen, Zhongxin Liu, He Tao, Yusu Hong, David Lo, Xin Xia, Jianling Sun:
B4: Towards Optimal Assessment of Plausible Code Solutions with Plausible Tests. 1693-1705 - Jiuang Zhao, Donghao Yang, Li Zhang, Xiaoli Lian, Zitian Yang, Fang Liu:
Enhancing Automated Program Repair with Solution Design. 1706-1718 - Youngjae Kim, Yechan Park, Seungheon Han, Jooyong Yi:
Enhancing the Efficiency of Automated Program Repair via Greybox Analysis. 1719-1731 - Yu Zhao, Lina Gong, Zhiqiu Huang, Yongwei Wang, Mingqiang Wei, Fei Wu:
Coding-PTMs: How to Find Optimal Code Pre-trained Models for Code Embedding in Vulnerability Detection? 1732-1744 - Elvan Kula, Arie van Deursen, Georgios Gousios:
Context-Aware Automated Sprint Plan Generation for Agile Software Development. 1745-1756 - Chengpeng Li, Abdelrahman Baz, August Shi:
Reducing Test Runtime by Transforming Test Fixtures. 1757-1769 - Huan Xie, Yan Lei, Maojin Li, Meng Yan, Sheng Zhang:
Combining Coverage and Expert Features with Semantic Representation for Coincidental Correctness Detection. 1770-1782 - Md Shafiuzzaman, Achintya Desai, Laboni Sarker, Tevfik Bultan:
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation. 1783-1794 - Zunchen Huang, Srivatsan Ravi, Chao Wang:
Discovering Likely Program Invariants for Persistent Memory. 1795-1807 - Wonseok Oh, Hakjoo Oh:
Towards Effective Static Type-Error Detection for Python. 1808-1820 - Syeda Mashal Abbas Zaidi, Shahpar Khan, Parjanya Vyas, Yousra Aafer:
A Longitudinal Analysis Of Replicas in the Wild Wild Android. 1821-1833 - Damien Jaime, Pascal Poizat, Joyce El Haddad, Thomas Degueule:
Balancing the Quality and Cost of Updating Dependencies. 1834-1845 - Fengjuan Gao, Hongyu Chen, Yuewei Zhou, Ke Wang:
Shoot Yourself in the Foot - Efficient Code Causes Inefficiency in Compiler Optimizations. 1846-1857 - Dominic Troppmann, Aurore Fass, Cristian-Alexandru Staicu:
Typed and Confused: Studying the Unexpected Dangers of Gradual Typing. 1858-1870 - Jingtao Xia, Junrui Liu, Nicholas Brown, Yanju Chen, Yu Feng:
Refinement Types for Visualization. 1871-1881 - Jiale Amber Wang, Kaiyuan Wang, Pengyu Nie:
Efficient Incremental Code Coverage Analysis for Regression Test Suites. 1882-1894 - Jia Feng, Jiachen Liu, Cuiyun Gao, Chun Yong Chong, Chaozheng Wang, Shan Gao, Xin Xia:
ComplexCodeEval: A Benchmark for Evaluating Large Code Models on More Complex Code. 1895-1906 - Yali Du, Hui Sun, Ming Li:
A Joint Learning Model with Variational Interaction for Multilingual Program Translation. 1907-1918 - Zifan Xie, Ming Wen, Tinghan Li, Yiding Zhu, Qinsheng Hou, Hai Jin:
How Does Code Optimization Impact Third-party Library Detection for Android Applications? 1919-1931 - Jian Zhang, Chong Wang, Anran Li, Wenhan Wang, Tianlin Li, Yang Liu:
VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair. 1932-1944
Industry Showcase
- Martin Schäf, Berk Çirisci, Linghui Luo, Muhammad Numair Mansur, Omer Tripp, Daniel Sanchez, Qiang Zhou, Muhammad Bilal Zafar:
Understanding Developer-Analyzer Interactions in Code Reviews. 1945-1955 - Arthur Vitui, Tse-Hsun Chen:
MLOLET - Machine Learning Optimized Load and Endurance Testing: An industrial experience report. 1956-1966 - Lei Liao, Junjie Wang, Zhensheng Xu, Fangwen Mu, Yukun Yang:
Vehicle Domain-Specific Language: Unifying Modeling and Code Generation for Low-Code Automotive Development. 1967-1972 - Sidong Feng, Haochuan Lu, Jianqin Jiang, Ting Xiong, Likun Huang, Yinglin Liang, Xiaoqin Li, Yuetang Deng, Aldeida Aleti:
Enabling Cost-Effective UI Automation Testing with Retrieval-Based LLMs: A Case Study in WeChat. 1973-1978 - Guillaume Haben, Sarra Habchi, John Micco, Mark Harman, Mike Papadakis, Maxime Cordy, Yves Le Traon:
The Importance of Accounting for Execution Failures when Predicting Test Flakiness. 1979-1989 - Xinyi Zheng, Chen Wei, Shenao Wang, Yanjie Zhao, Peiming Gao, Yuanchao Zhang, Kailong Wang, Haoyu Wang:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. 1990-2001 - Shinobu Saito, Yukako Iimura, Emad Aghayi, Thomas D. LaToza:
How many pomodoros do professional engineers need to complete a microtask of programming? 2002-2012 - Yifan Wang, Pierre Bourhis, Romain Rouvoy, Patrick Royer:
Challenges & Opportunities in Automating DBMS: A Qualitative Study. 2013-2023 - Man Zhang, Andrea Arcuri, Piyun Teng, Kaiming Xue, Wenhao Wang:
Seeding and Mocking in White-Box Fuzzing Enterprise RPC APIs: An Industrial Case Study. 2024-2034 - Shiyan Peng, Yuan Zhang, Jiarun Dai, Yue Gu, Zhuoxiang Shen, Jingcheng Liu, Lin Wang, Yong Chen, Yu Qin, Lei Ai, Xianfeng Lu, Min Yang:
Applying Fuzz Driver Generation to Native C/C++ Libraries of OEM Android Framework: Obstacles and Solutions. 2035-2040 - Lei Liu, So Hasegawa, Shailaja Keyur Sampat, Maria Xenochristou, Wei-Peng Chen, Takashi Kato, Taisei Kakibuchi, Tatsuya Asai:
AutoDW: Automatic Data Wrangling Leveraging Large Language Models. 2041-2052 - Haoyu Liao, Jianmei Guo, Bo Huang, Yujie Han, Dingyu Yang, Kai Shi, Jonathan Ding, Guoyao Xu, Guodong Yang, Liping Zhang:
DeployFix: Dynamic Repair of Software Deployment Failures via Constraint Solving. 2053-2064 - Haonan Zhang, Lizhi Liao, Zishuo Ding, Weiyi Shang, Nidhi Narula, Catalin Sporea, Andrei Toma, Sarah Sajedi:
Towards a Robust Waiting Strategy for Web GUI Testing for an Industrial Software System. 2065-2076 - Shivali Agarwal, Hiroaki Nakamura, Rami Katan:
Experience Report on Applying Program Analysis Techniques for Mainframe Application Understanding. 2077-2086 - Jian Zhao, Shenao Wang, Yanjie Zhao, Xinyi Hou, Kailong Wang, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. 2087-2098 - Zikan Dong, Yanjie Zhao, Tianming Liu, Chao Wang, Guosheng Xu, Guoai Xu, Lin Zhang, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. 2099-2109 - Stefan Alexander van Heijningen, Theo Wiik, Francisco Gomes de Oliveira Neto, Gregory Gay, Kim Viggedal, David Friberg:
Integrating Mutation Testing Into Developer Workflow: An Industrial Case Study. 2110-2120 - Dino Distefano, Matteo Marescotti, Cons Åhs, Sopot Cela, Gabriela Cunha Sampaio, Radu Grigore, Ákos Hajdu, Timotej Kapus, Ke Mao, Thibault Suzanne:
Enhancing Compositional Static Analysis with Dynamic Analysis. 2121-2129 - Asmar Muqeet, Shaukat Ali, Paolo Arcaini:
Quantum Program Testing Through Commuting Pauli Strings on IBM's Quantum Computers. 2130-2141 - Christian Gilbertson, Reed Milewicz, Eric Berquist, Aaron Brundage, John Engelmann, Brian Evans, Nicholas Francis, Ernest Friedman-Hill, Samuel Grayson, Evan Harvey, Eric Ho, Edward Hoffman, Kevin Irick, Anagha Krishna, Aaron Moreno, Joshua B. Teves:
Towards Long-Term Scientific Model Sustainment at Sandia National Laboratories. 2142-2147 - Priyam Sahoo, Saurabh Pujar, Ganesh Nalawade, Richard Genhardt, Louis Mandel, Luca Buratti:
Ansible Lightspeed: A Code Generation Service for IT Automation. 2148-2158 - Heyuan Shi, Shijun Chen, Runzhe Wang, Yuhan Chen, Weibo Zhang, Qiang Zhang, Yuheng Shen, Xiaohai Shi, Chao Hu, Yu Jiang:
Industry Practice of Directed Kernel Fuzzing for Open-source Linux Distribution. 2159-2169 - Zhixing Xu, Shengjian Guo, Oksana Tkachuk, Saeed Nejati, Niloofar Razavi, George Argyros:
Cloud Resource Protection via Automated Security Property Reasoning. 2170-2175 - Liu Wang, Haoyu Wang, Tao Zhang, Haitao Xu, Guozhu Meng, Peiming Gao, Chen Wei, Yi Wang:
Android Malware Family Labeling: Perspectives from the Industry. 2176-2186 - Dmytro Humeniuk, Houssem Ben Braiek, Thomas Reid, Foutse Khomh:
In-Simulation Testing of Deep Learning Vision Models in Autonomous Robotic Manipulators. 2187-2198
New Ideas and Emerging Results (NIER)
- Sriteja Kummita, Zenong Zhang, Eric Bodden, Shiyi Wei:
Visualizing and Understanding the Internals of Fuzzing. 2199-2204 - Sébastien Gios, Charles-Henry Bertrand Van Ouytsel, Mark Diamantino Caribé, Axel Legay:
A vision on a methodology for the application of an Intrusion Detection System for satellites. 2205-2209 - Elijah Kayode Adejumo, Brittany Johnson:
Towards Leveraging LLMs for Reducing Open Source Onboarding Information Overload. 2210-2214 - Omar I. Al-Bataineh:
Automated Repair of Multi-fault Programs: Obstacles, Approaches, and Prospects. 2215-2219 - Omar I. Al-Bataineh:
A Formal Treatment of Performance Bugs. 2220-2224 - Yuanlin Li, Zhiwei Xu, Min Zhou, Hai Wan, Xibin Zhao:
Trident: Detecting SQL Injection Attacks via Abstract Syntax Tree-based Neural Network. 2225-2229 - Beiqi Zhang, Peng Liang, Qiong Feng, Yujia Fu, Zengyang Li:
Copilot-in-the-Loop: Fixing Code Smells in Copilot-Generated Python Code using Copilot. 2230-2234 - Luqiao Wang, Yangtao Zhou, Huiying Zhuang, Qingshan Li, Di Cui, Yutong Zhao, Lu Wang:
Unity Is Strength: Collaborative LLM-Based Agents for Code Reviewer Recommendation. 2235-2239 - Mojtaba Eshghie, Cyrille Artho:
Oracle-Guided Vulnerability Diversity and Exploit Synthesis of Smart Contracts Using LLMs. 2240-2248 - Zheng Zhao, Hongxiang Jiang, Ran Zhao, Bing He:
Emergence of A Novel Domain Expert: A Generative AI-based Framework for Software Function Point Analysis. 2245-2250 - Aakash Sorathiya, Gouri Ginde:
Towards Extracting Ethical Concerns-related Software Requirements from App Reviews. 2251-2255 - Jobayer Ahmmed, Myra B. Cohen, Paul Gazzillo:
Towards Automated Configuration Documentation. 2256-2261 - Usman Gohar, Michael C. Hunter, Robyn R. Lutz, Myra B. Cohen:
CoDefeater: Using LLMs To Find Defeaters in Assurance Cases. 2262-2267 - Chi Zhang, Zifan Wang, Ruoshi Zhao, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina S. Pasareanu:
Attacks and Defenses for Large Language Models on Coding Tasks. 2268-2272 - Abdelrahman Baz, Minchao Huang, August Shi:
Prioritizing Tests for Improved Runtime. 2273-2278 - Chao Peng, Qinyun Wu, Jiangchao Liu, Jierui Liu, Bo Jiang, Mengqian Xu, Yinghao Wang, Xia Liu, Ping Yang:
RepoSim: Evaluating Prompt Strategies for Code Completion via User Behavior Simulation. 2279-2283 - Takashi Kitamura, Sousuke Amasaki, Jun Inoue, Yoshinao Isobe, Takahisa Toda:
Toward Individual Fairness Testing with Data Validity. 2284-2288 - Hala Abdelkader, Jean-Guy Schneider, Mohamed Abdelrazek, Priya Rani, Rajesh Vasa:
Towards Robust ML-enabled Software Systems: Detecting Out-of-Distribution data using Gini Coefficients. 2289-2293 - Mohamad Fazelnia, Mehdi Mirakhorli, Hamid Bagheri:
Translation Titans, Reasoning Challenges: Satisfiability-Aided Language Models for Detecting Conflicting Requirements. 2294-2298 - Diganta Mukhopadhyay, Sanaa Siddiqui, Hrishikesh Karmarkar, Kumar Madhukar, Guy Katz:
Learning DNN Abstractions using Gradient Descent. 2299-2303 - Sunzhou Huang, Xiaoyin Wang:
Build Issue Resolution from the Perspective of Non-Contributors. 2304-2308 - Quentin Capdepon, Nicolas Hlad, Benoît Verhaeghe, Abdelhak-Djamel Seriai:
Assessing the feasibility of Micro frontend architecture in native mobile app development. 2309-2313 - Luciano Baresi, Matteo Camilli, Tommaso Dolci, Giovanni Quattrocchi:
A Conceptual Framework for Quality Assurance of LLM-based Socio-critical Systems. 2314-2318 - Yueming Wu, Chengwei Liu, Zhengzi Xu, Lyuye Zhang, Yiran Zhang, Zhiling Zhu, Yang Liu:
The Software Genome Project: Unraveling Software Through Genetic Principles. 2319-2323 - Ilya Kosorukov, Daniel Blackwell, David Clark, Myra B. Cohen, Justyna Petke:
Mining for Mutation Operators for Reduction of Information Flow Control Violations. 2324-2328 - Xinyi Hou, Yanjie Zhao, Shenao Wang, Haoyu Wang:
GPTZoo: A Large-scale Dataset of GPTs for the Research Community. 2329-2333
DEMONSTRATION SESSION: Tool Demonstrations
- Bonan Ruan, Jiahao Liu, Weibo Zhao, Zhenkai Liang:
VulZoo: A Comprehensive Vulnerability Intelligence Dataset. 2334-2337 - Mahja Sarschar, Gefei Zhang, Annika Nowak:
PACGBI: A Pipeline for Automated Code Generation from Backlog Items. 2338-2341 - Marius Smytzek, Martin Eberlein, Kai Werk, Lars Grunske, Andreas Zeller:
FixKit: A Program Repair Collection for Python. 2342-2345 - Moritz Mock, Jorge Melegati, Max Kretschmann, Nicolás E. Díaz Ferreyra, Barbara Russo:
MADE-WIC: Multiple Annotated Datasets for Exploring Weaknesses In Code. 2346-2349 - Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen:
ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts. 2350-2353 - Kristian Kolthoff, Christian Bartelt, Simone Paolo Ponzetto, Kurt Schneider:
Self-Elicitation of Requirements with Automated GUI Prototyping. 2354-2357 - Bohan Zhang, Ankit Agrawal:
DroneWiS: Automated Simulation Testing of small Unmanned Aerial System in Realistic Windy Conditions. 2358-2361 - Jana Chadt, Christoph Hochrainer, Valentin Wüstholz, Maria Christakis:
Olympia: Fuzzer Benchmarking for Solidity. 2362-2365 - Orlando Amaral Cejas, Sallam Abualhaija, Lionel C. Briand:
CompAi: A Tool for GDPR Completeness Checking of Privacy Policies using Artificial Intelligence. 2366-2369 - Qiong Feng, Xiaotian Ma, Huan Ji, Wei Song, Peng Liang:
Depends-Kotlin: A Cross-Language Kotlin Dependency Extractor. 2370-2373 - Mengzhen Li, Mattia Fazzini:
ARUS: A Tool for Automatically Removing Unnecessary Stubbings from Test Suites. 2374-2377 - Mojtaba Eshghie, Cyrille Artho, Hans Stammler, Wolfgang Ahrendt, Thomas T. Hildebrandt, Gerardo Schneider:
HighGuard: Cross-Chain Business Logic Monitoring of Smart Contracts. 2378-2381 - Andrei Kozyrev, Gleb Solovev, Nikita Khramov, Anton Podkopaev:
CoqPilot, a plugin for LLM-based generation of proofs. 2382-2385 - Dirk Beyer, Po-Chun Chien, Marek Jankola:
BenchCloud: A Platform for Scalable Performance Benchmarking. 2386-2389 - Florian Sihler, Matthias Tichy:
flowR: A Static Program Slicer for R. 2390-2393 - Jia Xu, Weilin Du, Xiao Liu, Xuejun Li:
LLM4Workflow: An LLM-based Automated Workflow Model Generation Tool. 2394-2398 - Zhiyang Chen, Ye Liu, Sidi Mohamed Beillahi, Yi Li, Fan Long:
OpenTracer: A Dynamic Transaction Trace Analyzer for Smart Contract Invariant Generation and Beyond. 2399-2402 - Runlin Liu, Yuhang Lin, Yunge Hu, Zhe Zhang, Xiang Gao:
LLM-Based Java Concurrent Program to ArkTS Converter. 2403-2406 - Sahar Badihi, Sami Nourji, Julia Rubin:
Slicer4D: A Slicing-based Debugger for Java. 2407-2410 - Yige Chen, Sinan Wang, Yida Tao, Yepang Liu:
Model-based GUI Testing For HarmonyOS Apps. 2411-2414 - Atul Kumar, Diptikalyan Saha, Toshiaki Yasue, Kohichi Ono, Saravanan Krishnan, Sandeep Hans, Fumiko Satoh, Gerald Mitchell, Sachin Kumar:
Automated Validation of COBOL to Java Transformation. 2415-2418 - Thomas Lemberger, Henrik Wachowitz:
CoVeriTeam GUI: A No-Code Approach to Cooperative Software Verification. 2419-2422
Student Research Competition
- Chenhao Cui:
Finding Performance Issues in Rust Projects. 2423-2425 - Hongyu Chen:
Efficient Code Causes Inefficiency in Compiler Optimizations. 2426-2428 - Atish Kumar Dipongkor:
Can Large Language Models Comprehend Code Stylometry? 2429-2431 - Ramsha Ali:
Mining and Recommending Mobile App Features using Data-driven Analytics. 2432-2434 - Zihao Rao:
Semi-Automated Verification of Interior Unsafe Code Encapsulation in Real-World Rust Systems. 2435-2437
POSTER SESSION: Posters
- Yoli Shavit, Kathy Razmadze, Gary Mataev, Hanan Shteingart, Eitan Zahavi, Zachi Binshtock:
SemantiLog: Log-based Anomaly Detection with Semantic Similarity. 2438-2439 - Andrea Lops, Fedelucio Narducci, Azzurra Ragone, Michelantonio Trizio:
AgoneTest: Automated creation and assessment of Unit tests leveraging Large Language Models. 2440-2441 - Tao Wang, Wei Chen, Liwei Liu, Guoquan Wu, Jun Wei, Tao Huang:
Match Word with Deed: Maintaining Consistency for IoT Systems with Behavior Models. 2442-2443 - Haitao Zhang, Jing Wang, Ziyue Wang, Ziyi Zhao, Zhuo Cheng:
A Pixel-Level Explainable Approach of Convolutional Neural Networks and Its Application. 2444-2445 - Uwe Gropengießer, Julian Liphardt, Michael Matthé, Max Mühlhäuser:
Feature Model Slicing for Real-time Selection of Mission-critical Edge Applicaiton. 2446-2447 - Yang Luo, Richard Yu, Fajun Zhang, Ling Liang, Yongqiang Xiong:
Bridging Gaps in LLM Code Translation: Reducing Errors with Call Graphs and Bridged Debuggers. 2448-2449 - Yonghao Long, Yuanyuan Chen, Xiangping Chen:
GUI Test Repair Based on Test-Extension. 2450-2451 - Laboni Sarker, Tevfik Bultan:
Quantitative Symbolic Non-Equivalence Analysis. 2452-2453 - Ruixue Li, Bin Yu, Xu Lu, Lei Ke, Jiawei Chen, Zixuan Yuan, Jingxian Wang, Cong Tian, Yansong Dong:
Detecting Atomicity Violations for Interrupt-driven Programs via Systematic Scheduling and Prefix-directed Feedback. 2454-2455 - Yiyun Chen, Fuxiang Chen, Mijung Kim, Fatemeh H. Fard:
Studying Versioning in Stack Overflow. 2456-2457 - Xiaofan Liu, Xunjin Zheng, Cai Fu, Xiaoheng Xie, Peng Di:
GrayDuck: The Sword of Damocles for Duck Typing in Dynamic Language Deserialization. 2458-2459 - Björn Karthein, Cristian-Alexandru Staicu, Andreas Zeller:
A Generalized Approach for Solving Web Form Constraints. 2460-2461 - Yanchun Sun, Jiawei Wu, Xiaohan Zhao, Haizhou Xu, Sihan Wang, Jiaqi Zhang, Ye Zhu, Gang Huang:
Automatically Deriving Developers' Technical Expertise from the GitHub Social Network. 2462-2463 - Wendkûuni C. Ouédraogo, Abdoul Kader Kaboré, Haoye Tian, Yewei Song, Anil Koyuncu, Jacques Klein, David Lo, Tegawendé F. Bissyandé:
LLMs and Prompting for Unit Test Generation: A Large-Scale Evaluation. 2464-2465 - Ming Liang, Xiaoheng Xie, Gehao Zhang, Xunjin Zheng, Peng Di, Wei Jiang, Hongwei Chen, Chengpeng Wang, Gang Fan:
RepoGenix: Dual Context-Aided Repository-Level Code Completion with Language Models. 2466-2467 - Mashal Afzal Memon, Marco Autili, Gianluca Filippone, Gian Luca Scoccia, Paola Inverardi:
A High-level Architecture of an Automated Context-aware Ethics-based Negotiation Approach. 2468-2469 - Sohee Park, Ryeonggu Kwon, Gihwon Kwon:
Assessing Open Source Software Survivability using Kaplan-Meier Survival Function and Polynomial Regression. 2470-2471 - Mojtaba Mostafavi Ghahfarokhi, Hamed Jahantigh, Sepehr Kianiangolafshani, Ashkan Khademian, Alireza Asadi, Abbas Heydarnoori:
Can Code Metrics Enhance Documentation Generation for Computational Notebooks? 2472-2473 - Micheline Bénédicte Moumoula, Abdoul Kader Kaboré, Jacques Klein, Tegawendé F. Bissyandé:
Cross-lingual Code Clone Detection: When LLMs Fail Short Against Embedding-based Classifier. 2474-2475 - Konrad Cinkusz, Jaroslaw A. Chudziak:
Towards LLM-augmented multiagent systems for agile software engineering. 2476-2477 - Yang Yue, Yi Wang, David F. Redmiles:
IdeoRate: Towards a Semi-automated Assessment Methodology for OSS Ideologies. 2478-2479 - Daniel Ogenrwot, John Businge:
PatchTrack: Analyzing ChatGPT's Impact on Software Patch Decision-Making in Pull Requests. 2480-2481 - Wenkai Li, Zhijie Liu, Xiaoqi Li, Sen Nie:
Detecting Malicious Accounts in Web3 through Transaction Graph. 2482-2483 - Zhiyuan Chen, Soham Sanjay Deo, Poorna Chander Reddy Puttaparthi, Yiming Tang, Xueling Zhang, Weiyi Shang:
From Logging to Leakage: A Study of Privacy Leakage in Android App Logs. 2484-2485 - Hieu Huynh, Quoc-Tri Le, Tien N. Nguyen, Vu Nguyen:
Using LLM for Mining and Testing Constraints in API Testing. 2486-2487 - Khubaib Amjad Alam, Ramsha Ali, Zyena Kamran, Sabeen Fatima, Irum Inayat:
A Data-driven Approach for Mining Software Features based on Similar App Descriptions and User Reviews Analysis. 2488-2489
Doctoral Symposium
- Florian Sihler:
Improving the Comprehension of R Programs by Hybrid Dataflow Analysis. 2490-2493 - Yangruibo Ding:
Semantic-aware Source Code Modeling. 2494-2497 - Simin Sun:
Enhancing Software Design and Developer Experience Via LLMs. 2498-2501 - Bachir Bendrissou:
Syntactic Resilience in Greybox Fuzzing: Automated Error Recovery. 2502-2505 - Alexis Butler:
Software Supply Chain Risk: Characterization, Measurement & Attenuation. 2506-2509 - Zhiyuan Chen:
A Comprehensive Study of Privacy Leakage Vulnerability in Android App Logs. 2510-2513 - Vikram Nitin:
Using AI to Automate the Modernization of Legacy Software Applications. 2514-2517
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.