Write a Blog >>
ESEC/FSE 2022
Mon 14 - Fri 18 November 2022 Singapore

We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research. Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems will also be considered. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call. Papers submitted for consideration to ESEC/FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.

How to Submit

At the time of submission, all papers must conform to the ESEC/FSE 2022 Format and Submission Guidelines, and must not exceed 10 pages for all text and figures plus 2 pages for references. For Microsoft Word users, please still use the “Interim Template” and not the New Workflow for ACM Publications. All submissions must be in English and in PDF format. You can submit, optionally, an additional file containing supplementary material (see details below). Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the ESEC/FSE submission site:

https://esecfse22.hotcrp.com/

Each submission will be reviewed by at least three members of the program committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The authors will have a chance to read the additional reviews and respond to them during the additional short response period. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.

ESEC/FSE 2022 will employ a double-blind review process. The papers submitted must not reveal the authors’ identities in any way:

  • Authors should leave out author names and affiliations from the body of their submission.
  • Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
  • Authors should not include URLs to author-revealing sites (tools, datasets).
  • You are encouraged to submit a link to a Web site or repository containing supplementary material (raw data, datasets, experiments, etc.), as long as it is blinded. The visit of such sites should not be needed to conduct the review. The program committee will not necessarily consider it in the paper review process. For more information, please read How to disclose data for double-blind review and make it archived open data upon acceptance. As an alternative to having an external link, the submission form provides an option to attach a replication package.
  • Authors should anonymize author-revealing company names but instead provide general characteristics of the organizations involved needed to understand the context of the paper.
  • Authors should ensure that paper acknowledgements do not reveal the origin of their work.

The double-blind process used this year is “heavy”, i.e., the paper anonymity will be maintained during the reviewers’ discussion period and the authors’ rebuttal period. Authors must therefore maintain anonymity in their responses during the rebuttal phases, and provide no additional information that would otherwise be author-revealing.

Authors with further questions on double-blind reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-blind review process will be desk-rejected.

To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.

To facilitate double-blind reviewing, we advise the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification of acceptance. However, if the authors have already published a version of their paper to arXiv or similar sites, we request authors to use a different title for their submission, so that author names are not inadvertently disclosed, e.g., via a notification on Google Scholar.

All publications are subject to the ACM Author Representations policy.

As a published ACM author, you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.

Important Dates

All dates are 23:59:59 AoE (UTC-12h)

  • Paper registration: 10 March 2022 (to register a paper, only a paper title, an author list and some additional metadata are required)
  • Full paper submission: 17 March 2022
  • 1st Rebuttal period (all papers): 9-13 May, 2022
  • 2nd Additional short response period (selected papers): 30-31 May, 2022
  • Author notification: 14 June 2022
  • Camera-ready submission: 5 Sep 2022

Open Science Policy

The research track of ESEC/FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.

Upon submission to the research track, authors are asked to make their data available to the program committee (via upload of anonymized supplemental material or a link to an anonymized private or public repository) or to comment on why this is not possible or desirable. While sharing such a repository is not mandatory for submission or acceptance, this information will be passed to the program committee to inform its decision. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. For more details on ESEC/FSE open science policy, please refer to the official guidelines.

Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate ESEC/FSE’21 artifact evaluation committee.

Topics of Interest

Topics of interest include, but are not limited to:

  • Artificial intelligence and machine learning for software engineering
  • Autonomic computing
  • Debugging and fault localization
  • Dependability, safety, and reliability
  • Distributed and collaborative software engineering
  • Embedded software, safety-critical systems, and cyber-physical systems
  • Empirical software engineering
  • Formal methods
  • Human-computer interaction
  • Mining software repositories
  • Mobile development
  • Model checking
  • Model-driven engineering
  • Parallel, distributed, and concurrent systems
  • Performance engineering
  • Program analysis
  • Program comprehension
  • Program repair
  • Program synthesis
  • Programming languages
  • Recommendation systems
  • Requirements engineering
  • Search-based software engineering
  • Services, components, and cloud
  • Software architectures
  • Software engineering education
  • Software engineering for machine learning and artificial intelligence
  • Software evolution
  • Software processes
  • Software security
  • Software testing
  • Software traceability
  • Symbolic execution
  • Tools and environments
Dates
Plenary
You're viewing the program in a time zone which is different from your device's time zone change time zone

Mon 14 Nov

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

08:30 - 09:00
Opening session + Distinguished paper awardsPlenary Events at SRC Auditorium 2
Chair(s): Abhik Roychoudhury National University of Singapore, Cristian Cadar Imperial College London, UK, Miryung Kim University of California at Los Angeles, USA, Thomas Zimmermann Microsoft Research
09:00 - 10:30
Keynote I - Sumit GulwaniPlenary Events at SRC Auditorium 2
Chair(s): Abhik Roychoudhury National University of Singapore
09:00
90m
Keynote
AI-Assisted Programming: Applications, User Experiences, and Neuro-Symbolic Techniques (Keynote)
Plenary Events
Sumit Gulwani Microsoft
DOI
10:30 - 11:00
Coffee/Tea BreakSocial
11:00 - 12:30
Machine Learning IIndustry Paper / Research Papers at SRC Auditorium 2
Chair(s): Shin Yoo KAIST
11:00
15m
Talk
Adaptive Fairness Improvement Based on Causality Analysis
Research Papers
Mengdi Zhang Singapore Management University, Jun Sun Singapore Management University
DOI
11:15
15m
Talk
Nalanda: A Socio-technical Graph Platform for Building Software Analytics Tools at Enterprise Scale
Industry Paper
Chandra Sekhar Maddila Microsoft Research, Suhas Shanbhogue Microsoft Research, Apoorva Agrawal Microsoft Research, Thomas Zimmermann Microsoft Research, Chetan Bansal Microsoft, Nicole Forsgren Microsoft Research, Divyanshu Agrawal Microsoft Research, Kim Herzig Microsoft, Arie van Deursen Delft University of Technology
DOI Pre-print
11:30
15m
Talk
NatGen: Generative Pre-training by “Naturalizing” Source Code
Research Papers
Saikat Chakraborty Microsoft Research, Toufique Ahmed University of California at Davis, Yangruibo Ding Columbia University, Prem Devanbu University of California at Davis, Baishakhi Ray Columbia University
DOI Pre-print Media Attached
11:45
15m
Talk
Uncertainty-Aware Transfer Learning to Evolve Digital Twins for Industrial Elevators
Industry Paper
Xu Qinghua Simula Research Laboratory; University of Oslo, Shaukat Ali Simula Research Laboratory, Tao Yue Simula Research Laboratory, Maite Arratibel Orona
DOI
12:00
15m
Talk
All You Need Is Logs: Improving Code Completion by Learning from Anonymous IDE Usage Logs
Industry Paper
Vitaliy Bibaev JetBrains, Alexey Kalina JetBrains, Vadim Lomshakov JetBrains, Yaroslav Golubev JetBrains Research, Alexander Bezzubov JetBrains, Nikita Povarov JetBrains, Timofey Bryksin JetBrains Research
DOI Pre-print
11:00 - 12:30
Software Testing IResearch Papers at SRC LT 50
Chair(s): Paolo Tonella USI Lugano
11:00
15m
Talk
Testing of Autonomous Driving Systems: Where Are We and Where Should We Go?
Research Papers
Guannan Lou Macquarie University, Yao Deng Macquarie University, Xi Zheng Macquarie University, Mengshi Zhang Meta, Tianyi Zhang Purdue University
DOI
11:15
15m
Talk
Fuzzing Deep-Learning Libraries via Automated Relational API Inference
Research Papers
Yinlin Deng University of Illinois at Urbana-Champaign, Chenyuan Yang University of Illinois at Urbana-Champaign, Anjiang Wei Stanford University, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
11:30
15m
Talk
Perfect Is the Enemy of Test Oracle
Research Papers
Ali Reza Ibrahimzada University of Illinois Urbana-Champaign, Yigit Varli Middle East Technical University, Dilara Tekinoglu University of Massachusetts at Amherst, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign
DOI Pre-print Media Attached
11:45
15m
Talk
Scenario-Based Test Reduction and Prioritization for Multi-Module Autonomous Driving Systems
Research Papers
Yao Deng Macquarie University, Xi Zheng Macquarie University, Mengshi Zhang Meta, Guannan Lou Macquarie University, Tianyi Zhang Purdue University
DOI
11:00 - 12:30
Empirical IResearch Papers / Industry Paper at SRC LT 51
Chair(s): Lingxiao Jiang Singapore Management University
11:00
15m
Talk
What Improves Developer Productivity at Google? Code Quality
Industry Paper
Lan Cheng Google, Emerson Murphy-Hill Google, Mark Canning Google, Ciera Jaspan Google, Collin Green Google, Andrea Knight Google, Nan Zhang Google, Liz Kammer Google
DOI
11:15
15m
Talk
Understanding Why We Cannot Model How Long a Code Review Will Take: An Industrial Case Study
Industry Paper
Lawrence Chen Meta, Peter Rigby Concordia University; Meta, Nachiappan Nagappan Facebook
DOI
11:30
15m
Talk
Are We Building on the Rock? On the Importance of Data Preprocessing for Code Summarization
Research Papers
Lin Shi ISCAS, Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software at Chinese Academy of Sciences, Song Wang York University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Ye Yang Stevens Institute of Technology, Ge Li Peking University, Xin Xia Huawei, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI Pre-print
11:45
15m
Talk
Leveraging Test Plan Quality to Improve Code Review Efficacy
Industry Paper
Lawrence Chen Meta, Rui Abreu Meta Platforms, Tobi Akomolede Meta Platforms, Peter Rigby Concordia University; Meta, Satish Chandra Meta Platforms, Nachiappan Nagappan Facebook
DOI
12:30 - 14:00
Newcomer's LunchSocial at SRC GLR
Chair(s): Michael Pradel University of Stuttgart, Yi Li Nanyang Technological University
14:00 - 15:30
CommunityResearch Papers / Ideas, Visions and Reflections / Demonstrations / Industry Paper at SRC LT 51
Chair(s): Dirk Riehle University of Bavaria, Erlangen
14:00
15m
Talk
In War and Peace: The Impact of World Politics on Software Ecosystems
Ideas, Visions and Reflections
Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne
DOI
14:15
15m
Talk
A Retrospective Study of One Decade of Artifact Evaluations
Research Papers
Stefan Winter LMU Munich, Christopher Steven Timperley Carnegie Mellon University, Ben Hermann TU Dortmund, Jürgen Cito TU Wien, Jonathan Bell Northeastern University, Michael Hilton Carnegie Mellon University, Dirk Beyer LMU Munich
DOI
14:30
15m
Talk
Understanding Skills for OSS Communities on GitHub
Research Papers
Jenny T. Liang University of Washington, Thomas Zimmermann Microsoft Research, Denae Ford Microsoft Research
DOI Pre-print Media Attached
14:45
15m
Talk
Achievement Unlocked: A Case Study on Gamifying DevOps Practices in Industry
Industry Paper
Patrick Ayoup Concordia University, Diego Costa Concordia University, Canada, Emad Shihab Concordia University
DOI
15:00
7m
Talk
iTiger: An Automatic Issue Title Generation Tool
Demonstrations
Ting Zhang Singapore Management University, Ivana Clairine Irsan Singapore Management University, Ferdian Thung Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University, Lingxiao Jiang Singapore Management University
15:08
7m
Talk
CodeMatcher: A Tool for Large-Scale Code Search Based on Query Semantics Matching
Demonstrations
Chao Liu Chongqing University, Xuanlin Bao Chongqing University, Xin Xia Huawei, Meng Yan Chongqing University, David Lo Singapore Management University, Ting Zhang Singapore Management University
15:15
15m
Talk
Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study
Research Papers
Yu Nong Washington State University, Yuzhe Ou University of Texas at Dallas, Michael Pradel University of Stuttgart, Feng Chen University of Texas at Dallas, Haipeng Cai Washington State University
DOI Pre-print
15:30 - 16:00
Coffee/Tea BreakSocial
16:00 - 17:30
Software EvolutionDemonstrations / Research Papers / Industry Paper at SRC Auditorium 2
Chair(s): Miryung Kim University of California at Los Angeles, USA
16:00
15m
Research paper
Accurate Method and Variable Tracking in Commit History
Research Papers
Mehran Jodavi Concordia University, Nikolaos Tsantalis Concordia University
Link to publication DOI Pre-print
16:15
15m
Research paper
Classifying Edits to Variability in Source Code
Research Papers
Paul Maximilian Bittner University of Ulm, Christof Tinnes Siemens, Alexander Schultheiß Humboldt University of Berlin, Sören Viegener University of Ulm, Timo Kehrer University of Bern, Thomas Thüm University of Ulm
Link to publication DOI Pre-print Media Attached
16:30
15m
Talk
The Evolution of Type Annotations in Python: An Empirical StudyDistinguished Paper Award
Research Papers
Luca Di Grazia University of Stuttgart, Michael Pradel University of Stuttgart
DOI Pre-print Media Attached
16:45
15m
Talk
UTANGO: Untangling Commits with Context-Aware, Graph-Based, Code Change Clustering Learning Model
Research Papers
Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas
DOI
17:00
15m
Talk
Sometimes You Have to Treat the Symptoms: Tackling Model Drift in an Industrial Clone-and-Own Software Product Line
Industry Paper
Christof Tinnes Siemens, Wolfgang Rössler Siemens Mobility, Uwe Hohenstein Siemens, Torsten Kühn Siemens Mobility, Andreas Biesdorf Siemens, Sven Apel Saarland University
DOI
17:15
7m
Talk
Context Aware Code Recommendation in Intellij IDEA
Demonstrations
Shamsa Abid Lahore University of Management Sciences, Hamid Abdul Basit Prince Sultan University, Shafay Shamail LUMS, DHA, Lahore
17:23
7m
Talk
Python-by-Contract Dataset
Demonstrations
Jiyang Zhang University of Texas at Austin, Marko Ristin ZHAW School of Engineering, Phillip Schanely , Hans Wernher van de Venn Zurich University of Applied Sciences (ZHAW), Milos Gligoric University of Texas at Austin
16:00 - 17:30
Program Analysis IResearch Papers / Industry Paper at SRC LT 50
Chair(s): Marcel Böhme MPI-SP, Germany and Monash University, Australia
16:00
15m
Talk
Input Splitting for Cloud-Based Static Application Security Testing Platforms
Industry Paper
Maria Christakis MPI-SWS, Thomas Cottenier Amazon Web Services, Antonio Filieri AWS and Imperial College London, Linghui Luo Amazon Web Services, Muhammad Numair Mansur MPI-SWS, Lee Pike Amazon Web Services, Nico Rosner Amazon Web Services, Martin Schäf Amazon Web Services, Aritra Sengupta Amazon Web Services, Willem Visser Amazon Web Services
DOI Media Attached
16:15
15m
Talk
Static Executes-Before Analysis for Event Driven Programs
Research Papers
Rekha Pai IISc Bangalore, Abhishek Uppar IISc Bangalore, Akshatha Shenoy TCS Research, Pranshul Kushwaha IISc Bangalore, Deepak D'Souza IISc Bangalore
DOI
16:30
15m
Talk
Security Code Smells in Apps: Are We Getting Better?
Research Papers
Steven Arzt Fraunhofer SIT; ATHENE
DOI
16:45
15m
Talk
Large-Scale Analysis of Non-Termination Bugs in Real-World OSS Projects
Research Papers
Xiuhan Shi Tianjin University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University, Yao Zhang Tianjin University, Sen Chen Tianjin University, Xiaohong Li Tianjin University
DOI
17:00
15m
Talk
On-the-Fly Syntax Highlighting using Neural Networks
Research Papers
Marco Edoardo Palma University of Zurich, Pasquale Salza University of Zurich, Harald Gall University of Zurich
DOI Pre-print
17:15
15m
Talk
Declarative Smart Contracts
Research Papers
Haoxian Chen University of Pennsylvania, Gerald Whitters University of Pennsylvania, Mohammad Javad Amiri University of Pennsylvania, Yuepeng Wang Simon Fraser University, Boon Thau Loo University of Pennsylvania
DOI
16:00 - 17:30
Human/Computer InteractionResearch Papers / Demonstrations at SRC LT 51
Chair(s): Saikat Chakraborty Microsoft Research
16:00
15m
Talk
How to Formulate Specific How-To Questions in Software Development?
Research Papers
Mingwei Liu Fudan University, Xin Peng Fudan University, Andrian Marcus University of Texas at Dallas, Christoph Treude University of Melbourne, Jiazhan Xie Fudan University, Huanjun Xu Fudan University, Yanjun Yang Fudan University
DOI
16:15
15m
Talk
Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication AbilityDistinguished Paper Award
Research Papers
Mahnaz (Mana) Behroozi IBM, Chris Parnin North Carolina State University, Chris Brown Virginia Tech
DOI
16:30
15m
Talk
Pair Programming Conversations with Agents vs. Developers: Challenges and Opportunities for SE Community
Research Papers
Peter Robe University of Tulsa, Sandeep Kuttal University of Tulsa, Jake AuBuchon University of Tulsa, Jacob Hart University of Tulsa
DOI
16:45
15m
Talk
Toward Interactive Bug Reporting for (Android App) End-Users
Research Papers
Yang Song College of William and Mary, Junayed Mahmud George Mason University, Ying Zhou University of Texas at Dallas, Oscar Chaparro College of William and Mary, Kevin Moran George Mason University, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk College of William and Mary
DOI
17:00
7m
Talk
MultIPAs : Applying Program Transformations to Introductory Programming Assignments for Data Augmentation
Demonstrations
Pedro Orvalho INESC-ID, Instituto Superior Técnico, University of Lisbon, Mikoláš Janota Czech Technical University in Prague, Vasco Manquinho INESC-ID; Universidade de Lisboa
Pre-print
17:08
7m
Talk
PolyFax: A Toolkit for Characterizing Multi-Language Software
Demonstrations
Wen Li Washington State University, Li Li Monash University, Haipeng Cai Washington State University
Pre-print

Tue 15 Nov

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

08:00 - 09:15
Women's BreakfastSocial at SRC GLR
Chair(s): Baishakhi Ray Columbia University, Rashina Hoda Monash University
09:15 - 10:15
Test of time award - Mayur NaikPlenary Events at SRC Auditorium 2
Chair(s): Kelly Blincoe University of Auckland, Paolo Tonella USI Lugano
09:15
60m
Talk
Automated concolic testing of smartphone apps
Plenary Events
Saswat Anand , Mayur Naik University of Pennsylvania, Hongseok Yang KAIST, Mary Jean Harrold Georgia Institute of Technology
10:15 - 10:45
Coffee/Tea BreakSocial
10:45 - 12:15
10:45
15m
Talk
Understanding Performance Problems in Deep Learning Systems
Research Papers
Junming Cao Fudan University, Bihuan Chen Fudan University, Chao Sun Fudan University, Longjie Hu Fudan University, Shuaihong Wu Fudan University, Xin Peng Fudan University
DOI
11:00
15m
Talk
API Recommendation for Machine Learning Libraries: How Far Are We?
Research Papers
Moshi Wei York University, Yuchao Huang Institute of Software at Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiho Shin York University, Nima Shiri Harzevili York University, Song Wang York University
DOI Pre-print
11:15
15m
Talk
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence
Research Papers
Chaozheng Wang Harbin Institute of Technology, Yuanhang Yang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Yun Peng Chinese University of Hong Kong, Hongyu Zhang University of Newcastle, Michael Lyu Chinese University of Hong Kong
DOI
11:30
15m
Talk
Improving ML-Based Information Retrieval Software with User-Driven Functional Testing and Defect Class Analysis
Industry Paper
Junjie Zhu Apple, Teng Long Apple, Wei Wang Apple, Atif Memon Apple
DOI
11:45
15m
Talk
Discrepancies among Pre-trained Deep Neural Networks: A New Threat to Model Zoo Reliability
Ideas, Visions and Reflections
Diego Montes Purdue University, Pongpatapee Peerapatanapokin Purdue University, Jeff Schultz Purdue University, Chengjun Guo Purdue University, Wenxin Jiang Purdue University, James C. Davis Purdue University
DOI
10:45 - 12:15
Software Testing IIResearch Papers / Demonstrations at SRC LT 50
Chair(s): Baishakhi Ray Columbia University
10:45
15m
Talk
Online Testing of RESTful APIs: Promises and ChallengesDistinguished Paper Award
Research Papers
Alberto Martin-Lopez University of Seville, Sergio Segura University of Seville, Antonio Ruiz-Cortés University of Seville
DOI Pre-print
11:00
15m
Talk
Avgust: Automating Usage-Based Test Generation from Videos of App Executions
Research Papers
Yixue Zhao University of Massachusetts at Amherst, Saghar Talebipour University of Southern California, Kesina Baral George Mason University, Hyojae Park Sharon High School, Leon Yee Valley Christian High School, Safwat Ali Khan George Mason University, Yuriy Brun University of Massachusetts, Nenad Medvidović University of Southern California, Kevin Moran George Mason University
DOI Pre-print Media Attached
11:15
15m
Talk
RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs
Research Papers
Seulbae Kim Georgia Institute of Technology, Taesoo Kim Georgia Institute of Technology
DOI
11:30
7m
Talk
CLIFuzzer: Mining Grammars for Command-Line Invocations
Demonstrations
Abhilash Gupta CISPA Helmholtz Center for Information Security, Rahul Gopinath University of Sydney, Andreas Zeller CISPA Helmholtz Center for Information Security
Link to publication DOI Pre-print Media Attached
11:38
7m
Talk
RecipeGen++: An Automated Trigger Action Programs Generator
Demonstrations
Imam Nur Bani Yusuf Singapore Management University, Singapore, Diyanah Binte Abdul Jamal Singapore Management University, Lingxiao Jiang Singapore Management University, David Lo Singapore Management University
10:45 - 12:30
Empirical IIIndustry Paper / Research Papers / Demonstrations at SRC LT 51
Chair(s): Lwin Khin Shar Singapore Management University
10:45
15m
Talk
Using Nudges to Accelerate Code Reviews at ScaleDistinguished Paper Award
Research Papers
Qianhua Shan Meta, David Sukhdeo Meta, Qianying Huang Meta, Seth Rogers Meta, Lawrence Chen Meta, Elise Paradis Meta, Peter Rigby Concordia University; Meta, Nachiappan Nagappan Facebook
DOI
11:00
15m
Talk
First Come First Served: The Impact of File Position on Code ReviewDistinguished Paper Award
Research Papers
Enrico Fregnan University of Zurich, Larissa Braz University of Zurich, Marco D'Ambros USI Lugano, Gül Calikli University of Glasgow, Alberto Bacchelli University of Zurich
DOI Pre-print Media Attached
11:15
15m
Talk
Code, Quality, and Process Metrics in Graduated and Retired ASFI Projects
Research Papers
Ştefan Stănciulescu University of California at Davis, Likang Yin University of California at Davis, Vladimir Filkov University of California at Davis
DOI Pre-print Media Attached
11:30
15m
Talk
Are Elevator Software Robust against Uncertainties? Results and Experiences from an Industrial Case Study
Industry Paper
Liping Han Nanjing University of Aeronautics and Astronautics; Simula Research Laboratory, Tao Yue Simula Research Laboratory, Shaukat Ali Simula Research Laboratory, Aitor Arrieta Mondragon University, Maite Arratibel Orona
DOI
11:45
15m
Talk
CommentFinder: A Simpler, Faster, More Accurate Code Review Comments Recommendation
Research Papers
Yang Hong Monash University, Kla Tantithamthavorn Monash University, Patanamon Thongtanunam University of Melbourne, Aldeida Aleti Monash University
DOI
12:00
7m
Talk
TAPHSIR: Towards AnaPHoric Ambiguity Detection and ReSolution In Requirements
Demonstrations
Saad Ezzini University of Luxembourg, Sallam Abualhaija University of Luxembourg, Chetan Arora Deakin University, Mehrdad Sabetzadeh University of Ottawa
12:08
7m
Talk
COREQQA - A COmpliance REQuirements Understanding using Question Answering Tool
Demonstrations
Sallam Abualhaija University of Luxembourg, Chetan Arora Deakin University, Lionel Briand University of Luxembourg; University of Ottawa
12:30 - 14:00
LunchSocial
14:00 - 15:30
Machine Learning IIIResearch Papers / Ideas, Visions and Reflections at SRC Auditorium 2
Chair(s): Xi Zheng Macquarie University
14:00
15m
Talk
AutoPruner: Transformer-Based Call Graph Pruning
Research Papers
Le-Cong Thanh Singapore Management University, Hong Jin Kang Singapore Management University, Truong Giang Nguyen Singapore Management University, Stefanus Agus Haryono Singapore Management University, David Lo Singapore Management University, Xuan-Bach D. Le University of Melbourne, Quyet Thang Huynh Hanoi University of Science and Technology
DOI Pre-print
14:15
15m
Talk
Exploring the Under-Explored Terrain of Non-open Source Data for Software Engineering through the Lens of Federated Learning
Ideas, Visions and Reflections
Shriram Shanbhag IIT Tirupati, Sridhar Chimalakonda IIT Tirupati
DOI Pre-print
14:30
15m
Talk
CORMS: A GitHub and Gerrit Based Hybrid Code Reviewer Recommendation Approach for Modern Code Review
Research Papers
Pandya Prahar Hemantkumar DA-IICT Gandhinagar, Saurabh Tiwari DA-IICT Gandhinagar
DOI
14:45
15m
Full-paper
Hierarchical Bayesian Multi-kernel Learning for Integrated Classification and Summarization of App Reviews
Research Papers
Moayad Alshangiti University of Jeddah; Rochester Institute of Technology, Weishi Shi Rochester Institute of Technology, Eduardo Coelho de Lima Rochester Institute of Technology, Xumin Liu Rochester Institute of Technology, Qi Yu Rochester Institute of Technology
DOI
14:00 - 15:30
Formal MethodsResearch Papers / Demonstrations at SRC LT 50
Chair(s): Dirk Beyer LMU Munich
14:00
15m
Talk
Input Invariants
Research Papers
Dominic Steinhöfel CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security
DOI Pre-print
14:15
15m
Talk
Modus: A Datalog Dialect for Building Container Images
Research Papers
Chris Tomy University College London, Tingmao Wang University College London, Earl T. Barr University College London, Sergey Mechtaev University College London
DOI
14:30
15m
Talk
Multi-Phase Invariant Synthesis
Research Papers
Daniel Riley Florida State University, Grigory Fedyukovich Florida State University
DOI
14:45
15m
Talk
Parasol: Efficient Parallel Synthesis of Large Model Spaces
Research Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln
DOI
15:00
15m
Talk
Neural Termination Analysis
Research Papers
Mirco Giacobbe University of Birmingham, Daniel Kroening University of Oxford, Julian Parsert University of Oxford
DOI
15:15
7m
Talk
SolSEE: A Source-Level Symbolic Execution Engine for Solidity
Demonstrations
Shang-Wei Lin Nanyang Technological University, Palina Tolmach Nanyang Technological University, Singapore, Institute of High Performance Computing, Agency for Science, Technology and Research (A*STAR), Singapore, Ye Liu , Yi Li Nanyang Technological University
Pre-print
15:23
7m
Talk
MpBP: Verifying Robustness of Neural Networks with Multi-Path Bound Propagation
Demonstrations
Ye Zheng Shenzhen University, Shenzhen, China, Jiaxiang Liu Shenzhen University, Xiaomu Shi Shenzhen University
14:00 - 15:30
Debugging/localizationResearch Papers / Industry Paper / Demonstrations / Ideas, Visions and Reflections at SRC LT 51
Chair(s): Mauro Pezze USI Lugano; Schaffhausen Institute of Technology
14:00
15m
Talk
Metadata-Based Retrieval for Resolution Recommendation in AIOps
Industry Paper
Harshit Kumar IBM Research, Ruchi Mahindru IBM Research, Debanjana Kar IBM Research
DOI
14:15
15m
Talk
PaReco: Patched Clones and Missed Patches among the Divergent Variants of a Software Family
Research Papers
Poedjadevie Kadjel Ramkisoen University of Antwerp; Flanders Make, John Businge University of Antwerp; Flanders Make; University of Nevada at Las Vegas, Brent van Bladel University of Antwerp; Flanders Make, Alexandre Decan University of Mons; F.R.S.-FNRS, Serge Demeyer University of Antwerp; Flanders Make, Coen De Roover Vrije Universiteit Brussel, Foutse Khomh Polytechnique Montréal
DOI
14:30
15m
Talk
Fault Localization to Detect Co-change Fixing Locations
Research Papers
Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas
DOI
14:45
15m
Talk
Reflections on Software Failure Analysis
Ideas, Visions and Reflections
Paschal Amusuo Purdue University, Aishwarya Sharma Purdue University, Siddharth R. Rao Purdue University, Abbey Vincent Purdue University, James C. Davis Purdue University
DOI
15:00
7m
Talk
eGEN: An Energy-saving Modeling Language and Code Generator for Location-sensing of Mobile Apps
Demonstrations
Kowndinya Boyalakuntla Indian Institute of Technology Tirupati, Marimuthu Chinnakali National Institute of Technology Karnataka, Sridhar Chimalakonda IIT Tirupati, K. Chandrasekaran National Institute of Technology Karnataka
15:08
7m
Talk
SFLKit: A Workbench for Statistical Fault Localization
Demonstrations
Marius Smytzek CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security
Pre-print
15:30 - 16:00
Coffee/Tea BreakSocial
16:00 - 17:30
Transportation to Banquet from 16:30Social

Wed 16 Nov

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

08:00 - 09:00
Regional BreakfastSocial at SRC GLR
Chair(s): Aldeida Aleti Monash University, David Lo Singapore Management University
09:00 - 10:30
Keynote II - Impact Paper Award by Gail Murphy Plenary Events at SRC Auditorium 2
Chair(s): Cristian Cadar Imperial College London, UK
09:00
90m
Keynote
Task Modularity and the Emergence of Software Value Streams (Impact Award Paper Keynote)
Plenary Events
Gail Murphy University of British Columbia, Mik Kersten Tasktop Technologies
DOI
10:30 - 11:00
Coffee/Tea BreakSocial
11:00 - 12:30
Mining Software RepositoriesResearch Papers / Demonstrations at SRC Auditorium 2
Chair(s): Timofey Bryksin JetBrains Research
11:00
15m
Talk
An Exploratory Study on the Predominant Programming Paradigms in Python Code
Research Papers
Robert Dyer University of Nebraska-Lincoln, Jigyasa Chauhan University of Nebraska-Lincoln
DOI Pre-print Media Attached
11:15
15m
Talk
An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
Research Papers
Xiao Yi Chinese University of Hong Kong, Daoyuan Wu Chinese University of Hong Kong, Lingxiao Jiang Singapore Management University, Yuzhou Fang Chinese University of Hong Kong, Kehuan Zhang Chinese University of Hong Kong, Wei Zhang Nanjing University of Posts and Telecommunications
DOI
11:30
15m
Talk
How to Better Utilize Code Graphs in Semantic Code Search?
Research Papers
Yucen Shi Northeastern University, Ying Yin Northeastern University, Zhengkui Wang Singapore Institute of Technology, David Lo Singapore Management University, Tao Zhang Macau University of Science and Technology, Xin Xia Huawei, Yuhai Zhao Northeastern University, Bowen Xu Singapore Management University
DOI
11:45
15m
Talk
23 Shades of Self-Admitted Technical Debt: An Empirical Study on Machine Learning Software
Research Papers
David OBrien Iowa State University, Sumon Biswas Carnegie Mellon University, Sayem Mohammad Imtiaz Iowa State University, Rabe Abdalkareem Carleton University, Emad Shihab Concordia University, Hridesh Rajan Iowa State University
DOI
12:00
7m
Talk
WikiDoMiner: Wikipedia Domain-specific Miner
Demonstrations
Saad Ezzini University of Luxembourg, Sallam Abualhaija University of Luxembourg, Mehrdad Sabetzadeh University of Ottawa
12:08
7m
Talk
RegMiner: Mining Replicable Regression Dataset from Code Repositories
Demonstrations
Xuezhi Song Fudan University, Yun Lin Shanghai Jiao Tong University; National University of Singapore, Yijian Wu Fudan University, Yifan Zhang National University of Singapore, Siang Hwee Ng National University of Singapore, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University
11:00 - 12:30
Program Analysis IIResearch Papers / Demonstrations / Ideas, Visions and Reflections at SRC LT 50
Chair(s): Marsha Chechik University of Toronto
11:00
15m
Talk
NeuDep: Neural Binary Memory Dependence Analysis
Research Papers
Kexin Pei Columbia University, Dongdong She Columbia University, Michael Wang Massachusetts Institute of Technology, Scott Geng Columbia University, Zhou Xuan Purdue University, Yaniv David Columbia University, Junfeng Yang Columbia University, Suman Jana Columbia University, Baishakhi Ray Columbia University
DOI
11:15
15m
Talk
DynaPyt: A Dynamic Analysis Framework for Python
Research Papers
Aryaz Eghbali University of Stuttgart, Michael Pradel University of Stuttgart
DOI Pre-print
11:30
15m
Talk
Language-Agnostic Dynamic Analysis of Multilingual Code: Promises, Pitfalls, and Prospects
Ideas, Visions and Reflections
Haoran Yang Washington State University, Wen Li Washington State University, Haipeng Cai Washington State University
DOI
11:45
15m
Talk
Cross-Language Android Permission Specification
Research Papers
Chaoran Li Swinburne University of Technology, Xiao Chen Monash University, Ruoxi Sun The University of Adelaide, Minhui (Jason) Xue University of Adelaide, Sheng Wen Swinburne University of Technology, Muhammad Ejaz Ahmed Data61, CSIRO, Seyit Camtepe CSIRO Data61, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology
DOI
12:00
15m
Talk
Peahen: Fast and Precise Static Deadlock Detection via Context Reduction
Research Papers
Yuandao Cai Hong Kong University of Science and Technology, Chengfeng Ye Hong Kong University of Science and Technology, Qingkai Shi Purdue University, Charles Zhang Hong Kong University of Science and Technology
DOI
12:15
7m
Talk
FIM: Fault Injection and Mutation for Simulink
Demonstrations
Ezio Bartocci TU Wien, Leonardo Mariani University of Milano-Bicocca, Dejan Nickovic Austrian Institute of Technology, Drishti Yadav Technische Universität Wien
12:23
7m
Talk
JSIMutate: Understanding Performance Results through Mutations
Demonstrations
Thomas Laurent Lero & University College Dublin, Paolo Arcaini National Institute of Informatics , Catia Trubiani Gran Sasso Science Institute, Anthony Ventresque University College Dublin & Lero, Ireland
DOI Media Attached
11:00 - 12:30
CollaborationIndustry Paper / Research Papers at SRC LT 51
Chair(s): Paul Marinescu Meta
11:00
15m
Talk
Workgraph: Personal Focus vs. Interruption for Engineers at Meta
Industry Paper
Yifen Chen Meta, Peter Rigby Concordia University; Meta, Yulin Chen Meta, Kun Jiang Meta, Nader Dehghani Meta, Qianying Huang Meta, Peter Cottle Meta, Clayton Andrews Meta, Noah Lee Meta, Nachiappan Nagappan Facebook
DOI
11:15
15m
Talk
Understanding Automated Code Review Process and Developer Experience in Industry
Industry Paper
Hyungjin Kim Samsung Research, Yonghwi Kwon Samsung Research, Sangwoo Joh Samsung Research, Hyukin Kwon Samsung Research, Yeonhee Ryou Samsung Research, Taeksu Kim Samsung Research
DOI
11:30
15m
Talk
Software Security during Modern Code Review: The Developer’s Perspective
Research Papers
Larissa Braz University of Zurich, Alberto Bacchelli University of Zurich
DOI Pre-print Media Attached
11:45
15m
Talk
Program Merge Conflict Resolution via Neural Transformers
Research Papers
Alexey Svyatkovskiy Microsoft, Sarah Fakhoury Washington State University, Negar Ghorbani University of California at Irvine, Todd Mytkowicz Microsoft Research, Elizabeth Dinella University of Pennsylvania, Christian Bird Microsoft Research, Jinu Jang Microsoft, Neel Sundaresan Microsoft, Shuvendu K. Lahiri Microsoft Research
DOI
14:00 - 15:30
SecurityDemonstrations / Research Papers at SRC LT 50
Chair(s): Andreea Costea School of Computing, National University Of Singapore
14:00
15m
Talk
Automated Unearthing of Dangerous Issue Reports
Research Papers
Shengyi Pan Zhejiang University, Jiayuan Zhou Huawei, Filipe Cogo Huawei, Xin Xia Huawei, Lingfeng Bao Zhejiang University, Xing Hu Zhejiang University, Shanping Li Zhejiang University, Ahmed E. Hassan Queen’s University
DOI
14:15
15m
Talk
On the Vulnerability Proneness of Multilingual Code
Research Papers
Wen Li Washington State University, Li Li Monash University, Haipeng Cai Washington State University
DOI Pre-print
14:30
7m
Talk
VulCurator: A Vulnerability-Fixing Commit Detector
Demonstrations
Truong Giang Nguyen Singapore Management University, Le-Cong Thanh Singapore Management University, Hong Jin Kang Singapore Management University, Xuan-Bach D. Le University of Melbourne, David Lo Singapore Management University
14:38
7m
Talk
KVS: A Tool for Knowledge-Driven Vulnerability Searching
Demonstrations
Xingqi Cheng Yangzhou University, Xiaobing Sun Yangzhou University, Lili Bo Yangzhou University, Ying Wei Yangzhou University
14:45
7m
Talk
MANDO-GURU: Vulnerability Detection for Smart Contract Source Code By Heterogeneous Graph Embeddings
Demonstrations
Hoang H. Nguyen L3S Research Center, Leibniz Universität Hannover, Hannover, Germany, Nhat-Minh Nguyen Singapore Management University, Singapore, Hong-Phuc Doan Hanoi University of Science and Technology, Hanoi, Vietnam, Zahra Ahmadi L3S Research Center, Leibniz Universität Hannover, Hannover, Germany, Thanh-Nam Doan Independent Researcher, Atlanta, Georgia, USA, Lingxiao Jiang Singapore Management University
DOI Pre-print Media Attached
14:53
7m
Talk
FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers
Demonstrations
Haoxin Tu Singapore Management University, Singapore, Lingxiao Jiang Singapore Management University, Xuhua Ding Singapore Management University, He Jiang Dalian University of Technology
14:00 - 15:30
DependabilityIndustry Paper / Research Papers at SRC LT 51
Chair(s): Tao Yue Simula Research Laboratory
14:00
15m
Talk
Unite: An Adapter for Transforming Analysis Tools to Web Services via OSLC
Industry Paper
Ondřej Vašíček Brno University of Technology; Honeywell International, Jan Fiedor Brno University of Technology; Honeywell International, Tomáš Kratochvíla Honeywell International, Bohuslav Křena Brno University of Technology, Aleš Smrčka Brno University of Technology, Tomáš Vojnar Brno University of Technology
DOI
14:15
15m
Talk
Discovering Feature Flag Interdependencies in Microsoft Office
Industry Paper
Michael Schröder TU Wien, Katja Kevic Microsoft, Dan Gopstein Microsoft, Brendan Murphy Microsoft, Jennifer Beckmann Microsoft
DOI Pre-print Media Attached
14:30
15m
Talk
Demystifying the Underground Ecosystem of Account Registration Bots
Research Papers
Yuhao Gao University of Technology Sydney; Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology; Beijing University of Posts and Telecommunications, Li Li Monash University, Xiapu Luo Hong Kong Polytechnic University, Chenyu Wang Beijing University of Posts and Telecommunications, Yulei Sui University of New South Wales
DOI
14:45
15m
Research paper
Quantitative Relational Modelling with QAlloy
Research Papers
Pedro Silva University of Minho; INESC TEC, Jose Nuno Oliveira University of Minho; INESC TEC, Nuno Macedo University of Porto; INESC TEC, Alcino Cunha University of Minho; INESC TEC
DOI Pre-print
15:00
15m
Talk
Using Graph Neural Networks for Program Termination
Research Papers
Yoav Alon University of Bristol, Cristina David University of Bristol
DOI
14:00 - 15:30
Program Repair/SynthesisResearch Papers / Industry Paper at SRC LT 53
Chair(s): Saikat Chakraborty Microsoft Research
14:00
15m
Talk
PyTER: Effective Program Repair for Python Type Errors
Research Papers
Wonseok Oh Korea University, Hakjoo Oh Korea University
DOI
14:15
15m
Talk
VulRepair: A T5-Based Automated Software Vulnerability Repair
Research Papers
Micheal Fu Monash University, Kla Tantithamthavorn Monash University, Trung Le Monash University, Australia, Van Nguyen Monash University, Australia, Dinh Phung Monash University, Australia
DOI
14:30
15m
Talk
An Empirical Study of Deep Transfer Learning-Based Program Repair for Kotlin Projects
Industry Paper
Misoo Kim Sungkyunkwan University, Youngkyoung Kim Sungkyunkwan University, Hohyeon Jeong Sungkyunkwan University, Jinseok Heo Sungkyunkwan University, Sungoh Kim Samsung Electronics, Hyunhee Chung Samsung Electronics, Eunseok Lee Sungkyunkwan University
DOI
14:45
15m
Talk
DeepDev-PERF: A Deep Learning-Based Approach for Improving Software Performance
Research Papers
Spandan Garg Microsoft, Roshanak Zilouchian Moghaddam Microsoft, Colin Clement Microsoft, Neel Sundaresan Microsoft, Chen Wu Microsoft
DOI
15:00
15m
Talk
Less Training, More Repairing Please: Revisiting Automated Program Repair via Zero-Shot Learning
Research Papers
Chunqiu Steven Xia University of Illinois at Urbana-Champaign, Lingming Zhang University of Illinois at Urbana-Champaign
DOI
15:30 - 16:00
Coffee/Tea BreakSocial
16:00 - 17:30
Keynote III - Marsha ChechikPlenary Events at SRC Auditorium 2
Chair(s): Miryung Kim University of California at Los Angeles, USA
16:00
90m
Keynote
On Safety, Assurance, and Reliability: A Software Engineering Perspective (Keynote)
Plenary Events
Marsha Chechik University of Toronto
DOI
17:30 - 18:00
Closing sessionPlenary Events at SRC Auditorium 2
Chair(s): Abhik Roychoudhury National University of Singapore

Unscheduled Events

Not scheduled
Talk
Do Bugs Lead to Unnaturalness of Source Code?
Research Papers
Yanjie Jiang Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Weixing Ji Beijing Institute of Technology, Hao Zhong Shanghai Jiao Tong University, Lu Zhang Peking University
DOI
Not scheduled
Talk
Actionable and Interpretable Fault Localization for Recurring Failures in Online Service Systems
Research Papers
Zeyan Li Tsinghua University, Nengwen Zhao Tsinghua University, Mingjie Li Tsinghua University, Xianglin Lu Tsinghua University, Lixin Wang China Construction Bank, Dongdong Chang China Construction Bank, Xiaohui Nie BizSeer, Li Cao BizSeer, Wenchi Zhang BizSeer, Kaixin Sui BizSeer, Yanhua Wang China Construction Bank, Xu Du China Construction Bank, Guoqiang Duan China Construction Bank, Dan Pei Tsinghua University
DOI
Not scheduled
Talk
DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks
Research Papers
Qi Qin ShanghaiTech University, JulianAndres JiYang ShanghaiTech University, Fu Song ShanghaiTech University, Taolue Chen Birkbeck University of London, Xinyu Xing Northwestern University
DOI
Not scheduled
Talk
Detecting Non-crashing Functional Bugs in Android Apps via Deep-State Differential Analysis
Research Papers
Jue Wang Nanjing University, Yanyan Jiang Nanjing University, Ting Su East China Normal University, Shaohua Li ETH Zurich, Chang Xu Nanjing University, Jian Lu Nanjing University, Zhendong Su ETH Zurich
DOI
Not scheduled
Talk
NL2Viz: Natural Language to Visualization via Constrained Syntax-Guided Synthesis
Research Papers
Zhengkai Wu University of Illinois at Urbana-Champaign, Vu Le Microsoft, Ashish Tiwari Microsoft, Sumit Gulwani Microsoft, Arjun Radhakrishna Microsoft, Ivan Radiček Microsoft, Gustavo Soares Microsoft, Xinyu Wang University of Michigan, Zhenwen Li Peking University, Tao Xie Peking University
DOI
Not scheduled
Talk
Lighting Up Supervised Learning in User Review-Based Code Localization: Dataset and Benchmark
Research Papers
Xinwen Hu Nanjing University, Yu Guo Nanjing University, Jianjie Lu Nanjing University, Zheling Zhu Nanjing University, Chuanyi Li Nanjing University, Jidong Ge Nanjing University, Liguo Huang Southern Methodist University, Bin Luo Nanjing University
DOI Media Attached
Not scheduled
Talk
TraceCRL: Contrastive Representation Learning for Microservice Trace Analysis
Research Papers
Chenxi Zhang Fudan University, Xin Peng Fudan University, Tong Zhou Fudan University, Chaofeng Sha Fudan University, Zhenghui Yan Fudan University, Yiru Chen Fudan University, Yang Hong Monash University
DOI
Not scheduled
Talk
SEDiff: Scope-Aware Differential Fuzzing to Test Internal Function Models in Symbolic Execution
Research Papers
Penghui Li Chinese University of Hong Kong, Wei Meng Chinese University of Hong Kong, Kangjie Lu University of Minnesota
DOI
Not scheduled
Talk
Automating Code Review Activities by Large-Scale Pre-training
Research Papers
Zhiyu Li Peking University, Shuai Lu Microsoft Research, Daya Guo Sun Yat-sen University, Nan Duan Microsoft Research, Shailesh Jannu LinkedIn, Grant Jenks LinkedIn, Deep Majumder LinkedIn, Jared Green LinkedIn, Alexey Svyatkovskiy Microsoft, Shengyu Fu Microsoft, Neel Sundaresan Microsoft
DOI
Not scheduled
Talk
SamplingCA: Effective and Efficient Sampling-Based Pairwise Testing for Highly Configurable Software Systems
Research Papers
Chuan Luo Beihang University, Qiyuan Zhao Shanghai Jiao Tong University, Shaowei Cai Institute of Software at Chinese Academy of Sciences, Hongyu Zhang University of Newcastle, Chunming Hu Beihang University
DOI
Not scheduled
Talk
Tracking Patches for Open Source Software Vulnerabilities
Research Papers
Congying Xu Fudan University, Bihuan Chen Fudan University, Chenhao Lu Fudan University, Kaifeng Huang Fudan University, Xin Peng Fudan University, Yang Liu Nanyang Technological University
DOI
Not scheduled
Talk
NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems
Research Papers
Simin Chen University of Texas at Dallas, Cong Liu University of Texas at Dallas, Mirazul Haque University of Texas at Dallas, Zihe Song University of Texas at Dallas, Wei Yang University of Texas at Dallas
DOI
Not scheduled
Talk
AgileCtrl: A Self-Adaptive Framework for Configuration Tuning
Research Papers
Shu Wang LinkedIn, Henry Hoffmann University of Chicago, Shan Lu University of Chicago
DOI
Not scheduled
Talk
AccessiText: Automated Detection of Text Accessibility Issues in Android Apps
Research Papers
Abdulaziz Alshayban University of California at Irvine, Sam Malek University of California at Irvine
DOI
Not scheduled
Talk
SymMC: Approximate Model Enumeration and Counting using Symmetry Information for Alloy Specifications
Research Papers
Wenxi Wang University of Texas at Austin, Yang Hu University of Texas at Austin, Kenneth L. McMillan University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin
DOI Pre-print
Not scheduled
Talk
Psychologically-Inspired, Unsupervised Inference of Perceptual Groups of GUI Widgets from GUI Images
Research Papers
Mulong Xie Australian National University, Zhenchang Xing CSIRO’s Data61; Australian National University, Sidong Feng Monash University, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Chunyang Chen Monash University
DOI
Not scheduled
Talk
SPINE: A Scalable Log Parser with Feedback GuidanceDistinguished Paper Award
Research Papers
Xuheng Wang Tsinghua University, Xu Zhang Microsoft Research, Liqun Li Microsoft Research, Shilin He Microsoft Research, Hongyu Zhang University of Newcastle, Yudong Liu Microsoft Research, Lingling Zheng Microsoft Azure, Yu Kang Microsoft Research, Qingwei Lin Microsoft Research, Yingnong Dang Microsoft Azure, Saravanakumar Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research
DOI
Not scheduled
Talk
Correlates of Programmer Efficacy and Their Link to Experience: A Combined EEG and Eye-Tracking Study
Research Papers
Norman Peitek Saarland University, Annabelle Bergum Saarland University, Maurice Rekrut German Research Center for Artificial Intelligence, Jonas Mucke Chemnitz University of Technology, Matthias Nadig German Research Center for Artificial Intelligence, Chris Parnin North Carolina State University, Janet Siegmund Chemnitz University of Technology, Sven Apel Saarland University
DOI Pre-print Media Attached
Not scheduled
Talk
What Motivates Software Practitioners to Contribute to Inner Source?
Research Papers
Zhiyuan Wan Zhejiang University, Xin Xia Huawei, Yun Zhang Zhejiang University City College, David Lo Singapore Management University, zhou daibing Huawei, Qiuyuan Chen Zhejiang University, Ahmed E. Hassan Queen’s University
DOI Pre-print
Not scheduled
Talk
Automatically Deriving JavaScript Static Analyzers from Specifications using Meta-level Static Analysis
Research Papers
DOI
Not scheduled
Talk
RULER: Discriminative and Iterative Adversarial Training for Deep Neural Network Fairness
Research Papers
Guanhong Tao Purdue University, Weisong Sun Nanjing University, Tingxu Han Nanjing University, Chunrong Fang Nanjing University, Xiangyu Zhang Purdue University
DOI Pre-print
Not scheduled
Talk
Corporate Dominance in Open Source Ecosystems: A Case Study of OpenStack
Research Papers
Yuxia Zhang Beijing Institute of Technology, Klaas-Jan Stol Lero; University College Cork, Hui Liu Beijing Institute of Technology, Minghui Zhou Peking University
DOI
Not scheduled
Talk
Semi-supervised Pre-processing for Learning-Based Traceability Framework on Real-World Software Projects
Research Papers
Liming Dong Nanjing University, He Zhang Nanjing University, Wei Liu Nanjing University, Zhiluo Weng Nanjing University, Hongyu Kuang Nanjing University
DOI
Not scheduled
Talk
Diet Code Is Healthy: Simplifying Programs for Pre-trained Models of Code
Research Papers
Zhaowei Zhang Shanghai Jiao Tong University, Hongyu Zhang University of Newcastle, Beijun Shen Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University
DOI Pre-print Media Attached File Attached
Not scheduled
Talk
Minerva: Browser API Fuzzing with Dynamic Mod-Ref AnalysisDistinguished Paper Award
Research Papers
Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Mingzhe Wang Tsinghua University, Lihua Guo Tsinghua University, Jie Liang Tsinghua University, Zhe Liu Nanjing University of Aeronautics and Astronautics, Mathias Payer EPFL, Yu Jiang Tsinghua University
DOI
Not scheduled
Talk
Putting Them under Microscope: A Fine-Grained Approach for Detecting Redundant Test Cases in Natural Language
Research Papers
Zhiyuan Chang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences
DOI
Not scheduled
Talk
Generic Sensitivity: Customizing Context-Sensitive Pointer Analysis for Generics
Research Papers
Haofeng Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jie Lu Institute of Computing Technology at Chinese Academy of Sciences, Haining Meng Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liqing Cao Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yongheng Huang Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lin Gao TianqiSoft
DOI
Not scheduled
Talk
AUGER: Automatically Generating Review Comments with Pre-training Models
Research Papers
Lingwei Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Li Yang Institute of Software at Chinese Academy of Sciences, Huaxi Jiang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tiejian Luo University of Chinese Academy of Sciences, Zihan Hua Wuhan University; University of Chinese Academy of Sciences, Geng Liang Institute of Software at Chinese Academy of Sciences, Chun Zuo Sinosoft
DOI Pre-print
Not scheduled
Talk
MAAT: A Novel Ensemble Approach to Addressing Fairness and Performance Bugs for Machine Learning Software
Research Papers
Zhenpeng Chen University College London, UK, Jie M. Zhang King's College London, Federica Sarro University College London, Mark Harman University College London
DOI Pre-print
Not scheduled
Talk
Quantifying Community Evolution in Developer Social Networks
Research Papers
Liang Wang Nanjing University, Ying Li Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University
DOI
Not scheduled
Talk
A Case Study of Implicit Mentoring, Its Prevalence, and Impact in Apache
Research Papers
Zixuan Feng Oregon State University, Amreeta Chatterjee Oregon State University, Anita Sarma Oregon State University, Iftekhar Ahmed University of California at Irvine
DOI Media Attached
Not scheduled
Talk
The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Prediction and Localization
Research Papers
Chao Ni Zhejiang University, Wei Wang Fudan University, Kaiwen Yang Zhejiang University, Xin Xia Huawei, Kui Liu Huawei Software Engineering Application Technology Lab, David Lo Singapore Management University
DOI
Not scheduled
Talk
MOSAT: Finding Safety Violations of Autonomous Driving Systems using Multi-objective Genetic Algorithm
Research Papers
Haoxiang Tian Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yan Jiang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Jiren Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Shuo Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Nanjing Institute of Software Technology, Dan Ye Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Nanjing Institute of Software Technology
DOI
Not scheduled
Talk
Cross-Device Record and Replay for Android Apps
Research Papers
Cong Li Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University
DOI Pre-print Media Attached
Not scheduled
Talk
You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search
Research Papers
Yao Wan Huazhong University of Science and Technology, Shijie Zhang Huazhong University of Science and Technology, Hongyu Zhang University of Newcastle, Yulei Sui University of New South Wales, Guandong Xu University of Technology Sydney, Dezhong Yao Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology, Lichao Sun Lehigh University
DOI
Not scheduled
Talk
Making Python Code Idiomatic by Automatic Refactoring Non-idiomatic Python Code with Pythonic Idioms
Research Papers
zejun zhang Australian National University, Zhenchang Xing CSIRO’s Data61; Australian National University, Xin Xia Huawei, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61
DOI
Not scheduled
Talk
Detecting Simulink Compiler Bugs via Controllable Zombie Blocks Mutation
Research Papers
Shikai Guo Dalian Maritime University, He Jiang Dalian University of Technology, Zhihao Xu Dalian Maritime University, Xiaochen Li Dalian University of Technology, Zhilei Ren Dalian University of Technology, Zhide Zhou Dalian University of Technology, Rong Chen Dalian Maritime University
DOI

Accepted Papers

Title
23 Shades of Self-Admitted Technical Debt: An Empirical Study on Machine Learning Software
Research Papers
DOI
A Case Study of Implicit Mentoring, Its Prevalence, and Impact in Apache
Research Papers
DOI Media Attached
AccessiText: Automated Detection of Text Accessibility Issues in Android Apps
Research Papers
DOI
Accurate Method and Variable Tracking in Commit History
Research Papers
Link to publication DOI Pre-print
Actionable and Interpretable Fault Localization for Recurring Failures in Online Service Systems
Research Papers
DOI
Adaptive Fairness Improvement Based on Causality Analysis
Research Papers
DOI
AgileCtrl: A Self-Adaptive Framework for Configuration Tuning
Research Papers
DOI
An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
Research Papers
DOI
An Exploratory Study on the Predominant Programming Paradigms in Python Code
Research Papers
DOI Pre-print Media Attached
API Recommendation for Machine Learning Libraries: How Far Are We?
Research Papers
DOI Pre-print
A Retrospective Study of One Decade of Artifact Evaluations
Research Papers
DOI
Are We Building on the Rock? On the Importance of Data Preprocessing for Code Summarization
Research Papers
DOI Pre-print
Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication AbilityDistinguished Paper Award
Research Papers
DOI
AUGER: Automatically Generating Review Comments with Pre-training Models
Research Papers
DOI Pre-print
Automated Unearthing of Dangerous Issue Reports
Research Papers
DOI
Automatically Deriving JavaScript Static Analyzers from Specifications using Meta-level Static Analysis
Research Papers
DOI
Automating Code Review Activities by Large-Scale Pre-training
Research Papers
DOI
AutoPruner: Transformer-Based Call Graph Pruning
Research Papers
DOI Pre-print
Avgust: Automating Usage-Based Test Generation from Videos of App Executions
Research Papers
DOI Pre-print Media Attached
Classifying Edits to Variability in Source Code
Research Papers
Link to publication DOI Pre-print Media Attached
Code, Quality, and Process Metrics in Graduated and Retired ASFI Projects
Research Papers
DOI Pre-print Media Attached
CommentFinder: A Simpler, Faster, More Accurate Code Review Comments Recommendation
Research Papers
DOI
CORMS: A GitHub and Gerrit Based Hybrid Code Reviewer Recommendation Approach for Modern Code Review
Research Papers
DOI
Corporate Dominance in Open Source Ecosystems: A Case Study of OpenStack
Research Papers
DOI
Correlates of Programmer Efficacy and Their Link to Experience: A Combined EEG and Eye-Tracking Study
Research Papers
DOI Pre-print Media Attached
Cross-Device Record and Replay for Android Apps
Research Papers
DOI Pre-print Media Attached
Cross-Language Android Permission Specification
Research Papers
DOI
Declarative Smart Contracts
Research Papers
DOI
DeepDev-PERF: A Deep Learning-Based Approach for Improving Software Performance
Research Papers
DOI
DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks
Research Papers
DOI
Demystifying the Underground Ecosystem of Account Registration Bots
Research Papers
DOI
Detecting Non-crashing Functional Bugs in Android Apps via Deep-State Differential Analysis
Research Papers
DOI
Detecting Simulink Compiler Bugs via Controllable Zombie Blocks Mutation
Research Papers
DOI
Diet Code Is Healthy: Simplifying Programs for Pre-trained Models of Code
Research Papers
DOI Pre-print Media Attached File Attached
Do Bugs Lead to Unnaturalness of Source Code?
Research Papers
DOI
DynaPyt: A Dynamic Analysis Framework for Python
Research Papers
DOI Pre-print
Fault Localization to Detect Co-change Fixing Locations
Research Papers
DOI
First Come First Served: The Impact of File Position on Code ReviewDistinguished Paper Award
Research Papers
DOI Pre-print Media Attached
Fuzzing Deep-Learning Libraries via Automated Relational API Inference
Research Papers
DOI
Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study
Research Papers
DOI Pre-print
Generic Sensitivity: Customizing Context-Sensitive Pointer Analysis for Generics
Research Papers
DOI
Hierarchical Bayesian Multi-kernel Learning for Integrated Classification and Summarization of App Reviews
Research Papers
DOI
How to Better Utilize Code Graphs in Semantic Code Search?
Research Papers
DOI
How to Formulate Specific How-To Questions in Software Development?
Research Papers
DOI
Input Invariants
Research Papers
DOI Pre-print
Large-Scale Analysis of Non-Termination Bugs in Real-World OSS Projects
Research Papers
DOI
Less Training, More Repairing Please: Revisiting Automated Program Repair via Zero-Shot Learning
Research Papers
DOI
Lighting Up Supervised Learning in User Review-Based Code Localization: Dataset and Benchmark
Research Papers
DOI Media Attached
MAAT: A Novel Ensemble Approach to Addressing Fairness and Performance Bugs for Machine Learning Software
Research Papers
DOI Pre-print
Making Python Code Idiomatic by Automatic Refactoring Non-idiomatic Python Code with Pythonic Idioms
Research Papers
DOI
Minerva: Browser API Fuzzing with Dynamic Mod-Ref AnalysisDistinguished Paper Award
Research Papers
DOI
Modus: A Datalog Dialect for Building Container Images
Research Papers
DOI
MOSAT: Finding Safety Violations of Autonomous Driving Systems using Multi-objective Genetic Algorithm
Research Papers
DOI
Multi-Phase Invariant Synthesis
Research Papers
DOI
NatGen: Generative Pre-training by “Naturalizing” Source Code
Research Papers
DOI Pre-print Media Attached
NeuDep: Neural Binary Memory Dependence Analysis
Research Papers
DOI
Neural Termination Analysis
Research Papers
DOI
NL2Viz: Natural Language to Visualization via Constrained Syntax-Guided Synthesis
Research Papers
DOI
NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems
Research Papers
DOI
No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence
Research Papers
DOI
Online Testing of RESTful APIs: Promises and ChallengesDistinguished Paper Award
Research Papers
DOI Pre-print
On-the-Fly Syntax Highlighting using Neural Networks
Research Papers
DOI Pre-print
On the Vulnerability Proneness of Multilingual Code
Research Papers
DOI Pre-print
Pair Programming Conversations with Agents vs. Developers: Challenges and Opportunities for SE Community
Research Papers
DOI
Parasol: Efficient Parallel Synthesis of Large Model Spaces
Research Papers
DOI
PaReco: Patched Clones and Missed Patches among the Divergent Variants of a Software Family
Research Papers
DOI
Peahen: Fast and Precise Static Deadlock Detection via Context Reduction
Research Papers
DOI
Perfect Is the Enemy of Test Oracle
Research Papers
DOI Pre-print Media Attached
Program Merge Conflict Resolution via Neural Transformers
Research Papers
DOI
Psychologically-Inspired, Unsupervised Inference of Perceptual Groups of GUI Widgets from GUI Images
Research Papers
DOI
Putting Them under Microscope: A Fine-Grained Approach for Detecting Redundant Test Cases in Natural Language
Research Papers
DOI
PyTER: Effective Program Repair for Python Type Errors
Research Papers
DOI
Quantifying Community Evolution in Developer Social Networks
Research Papers
DOI
Quantitative Relational Modelling with QAlloy
Research Papers
DOI Pre-print
RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs
Research Papers
DOI
RULER: Discriminative and Iterative Adversarial Training for Deep Neural Network Fairness
Research Papers
DOI Pre-print
SamplingCA: Effective and Efficient Sampling-Based Pairwise Testing for Highly Configurable Software Systems
Research Papers
DOI
Scenario-Based Test Reduction and Prioritization for Multi-Module Autonomous Driving Systems
Research Papers
DOI
Security Code Smells in Apps: Are We Getting Better?
Research Papers
DOI
SEDiff: Scope-Aware Differential Fuzzing to Test Internal Function Models in Symbolic Execution
Research Papers
DOI
Semi-supervised Pre-processing for Learning-Based Traceability Framework on Real-World Software Projects
Research Papers
DOI
Software Security during Modern Code Review: The Developer’s Perspective
Research Papers
DOI Pre-print Media Attached
SPINE: A Scalable Log Parser with Feedback GuidanceDistinguished Paper Award
Research Papers
DOI
Static Executes-Before Analysis for Event Driven Programs
Research Papers
DOI
SymMC: Approximate Model Enumeration and Counting using Symmetry Information for Alloy Specifications
Research Papers
DOI Pre-print
Testing of Autonomous Driving Systems: Where Are We and Where Should We Go?
Research Papers
DOI
The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Prediction and Localization
Research Papers
DOI
The Evolution of Type Annotations in Python: An Empirical StudyDistinguished Paper Award
Research Papers
DOI Pre-print Media Attached
Toward Interactive Bug Reporting for (Android App) End-Users
Research Papers
DOI
TraceCRL: Contrastive Representation Learning for Microservice Trace Analysis
Research Papers
DOI
Tracking Patches for Open Source Software Vulnerabilities
Research Papers
DOI
Understanding Performance Problems in Deep Learning Systems
Research Papers
DOI
Understanding Skills for OSS Communities on GitHub
Research Papers
DOI Pre-print Media Attached
Using Graph Neural Networks for Program Termination
Research Papers
DOI
Using Nudges to Accelerate Code Reviews at ScaleDistinguished Paper Award
Research Papers
DOI
UTANGO: Untangling Commits with Context-Aware, Graph-Based, Code Change Clustering Learning Model
Research Papers
DOI
VulRepair: A T5-Based Automated Software Vulnerability Repair
Research Papers
DOI
What Motivates Software Practitioners to Contribute to Inner Source?
Research Papers
DOI Pre-print
You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search
Research Papers
DOI

FAQ on Review Process and Double-Anonymous Reviewing

Open Science Policy

Q: What is the ESEC/FSE 2021 open science policy and how can I follow it?

Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:

  • make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
  • include in the paper an explanation as to why this is not possible or desirable; and
  • indicate if they intend to make their data publicly available upon acceptance.

Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?

To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site.

Rationale for Double-Anonymous Reviewing (DAR)

Q: Why are you using double-anonymous reviewing?

A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.

Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.

A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.

For Authors

Q: What exactly do I have to do to anonymize my paper?

A: Use common sense. Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors

Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?

On the submission site, there will be an option to submit supplementary material along with your main paper. This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-blind guidelines.

Q: My submission is based on code available in a public repository. How do I deal with this?

A: Making your code publicly available is not incompatible with double-blind reviewing. You should do the following. You can cite the code in your paper, but remove the actual URL. Instead create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy.

Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission?

A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Chair.

Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?

A: No. But we recommend you do not use the same title for your ESEC/FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.

Q: Am I allowed to post my (non-blinded) paper on my web page or arXiv?

A: If the authors have already published a version of their paper to arXiv or similar sites, we request authors to consider using a different title for their submission, so that author names are not inadvertently disclosed, e.g., via a notification on Google Scholar. Another option would be to postpone publishing their submitted work on arXiv or similar sites, until after the notification of acceptance. If the paper is accepted, you may request a title change to the PC chairs (via email to esecfse2022pc-chairs@googlegroups.com, with subject “ESEC/FSE 2022 [PAPER-ID]: Title change request”), which will be subject to reviewers’ approval.

Q: Can I give a talk about my work while it is under review? How do I handle social media?

A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are gray areas and trade-offs; we cannot describe every possible scenario.

Things you may do:

  • Put your submission on your home page.
  • Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
  • Present your work at professional meetings, job interviews, etc.
  • Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.

Things you should not do:

  • Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
  • Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
  • Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, ESEC/FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.

Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.

Q: Will the fact that ESEC/FSE is double-anonymous have an impact on handling conflicts of interest?

A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Cal for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.

For Reviewers

Q: What should I do if I learn the authors’ identity? What should I do if a prospective ESEC/FSE author contacts me and asks to visit my institution?

A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgment.

Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?

A: Contact the Program Chairs, who will download the material on your behalf and make it available to you.

Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?

A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Chairs, especially since additional reviewers might have a different set of conflicts of interest.

Q: How do we handle potential conflicts of interest since I cannot see the author names?

A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.

Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?

A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.


These guidelines are partly based on the PLDI FAQ on double-blind reviewing and the ICSE 2022 guidelines on double-anonymous submissions.

Review Process

Q: Can I withdraw my paper?

A: Yes, papers can be withdrawn at any time using HotCRP.