Research PapersESEC/FSE 2022
We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research. Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems will also be considered. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call. Papers submitted for consideration to ESEC/FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.
How to Submit
At the time of submission, all papers must conform to the ESEC/FSE 2022 Format and Submission Guidelines, and must not exceed 10 pages for all text and figures plus 2 pages for references. For Microsoft Word users, please still use the “Interim Template” and not the New Workflow for ACM Publications. All submissions must be in English and in PDF format. You can submit, optionally, an additional file containing supplementary material (see details below). Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the ESEC/FSE submission site:
Each submission will be reviewed by at least three members of the program committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The authors will have a chance to read the additional reviews and respond to them during the additional short response period. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.
ESEC/FSE 2022 will employ a double-blind review process. The papers submitted must not reveal the authors’ identities in any way:
- Authors should leave out author names and affiliations from the body of their submission.
- Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
- Authors should not include URLs to author-revealing sites (tools, datasets).
- You are encouraged to submit a link to a Web site or repository containing supplementary material (raw data, datasets, experiments, etc.), as long as it is blinded. The visit of such sites should not be needed to conduct the review. The program committee will not necessarily consider it in the paper review process. For more information, please read How to disclose data for double-blind review and make it archived open data upon acceptance. As an alternative to having an external link, the submission form provides an option to attach a replication package.
- Authors should anonymize author-revealing company names but instead provide general characteristics of the organizations involved needed to understand the context of the paper.
- Authors should ensure that paper acknowledgements do not reveal the origin of their work.
The double-blind process used this year is “heavy”, i.e., the paper anonymity will be maintained during the reviewers’ discussion period and the authors’ rebuttal period. Authors must therefore maintain anonymity in their responses during the rebuttal phases, and provide no additional information that would otherwise be author-revealing.
Authors with further questions on double-blind reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-blind review process will be desk-rejected.
To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.
To facilitate double-blind reviewing, we advise the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification of acceptance. However, if the authors have already published a version of their paper to arXiv or similar sites, we request authors to use a different title for their submission, so that author names are not inadvertently disclosed, e.g., via a notification on Google Scholar.
All publications are subject to the ACM Author Representations policy.
As a published ACM author, you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.
Important Dates
All dates are 23:59:59 AoE (UTC-12h)
- Paper registration: 10 March 2022 (to register a paper, only a paper title, an author list and some additional metadata are required)
- Full paper submission: 17 March 2022
- 1st Rebuttal period (all papers): 9-13 May, 2022
- 2nd Additional short response period (selected papers): 30-31 May, 2022
- Author notification: 14 June 2022
- Camera-ready submission: 5 Sep 2022
Open Science Policy
The research track of ESEC/FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.
Upon submission to the research track, authors are asked to make their data available to the program committee (via upload of anonymized supplemental material or a link to an anonymized private or public repository) or to comment on why this is not possible or desirable. While sharing such a repository is not mandatory for submission or acceptance, this information will be passed to the program committee to inform its decision. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. For more details on ESEC/FSE open science policy, please refer to the official guidelines.
Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate ESEC/FSE’21 artifact evaluation committee.
Topics of Interest
Topics of interest include, but are not limited to:
- Artificial intelligence and machine learning for software engineering
- Autonomic computing
- Debugging and fault localization
- Dependability, safety, and reliability
- Distributed and collaborative software engineering
- Embedded software, safety-critical systems, and cyber-physical systems
- Empirical software engineering
- Formal methods
- Human-computer interaction
- Mining software repositories
- Mobile development
- Model checking
- Model-driven engineering
- Parallel, distributed, and concurrent systems
- Performance engineering
- Program analysis
- Program comprehension
- Program repair
- Program synthesis
- Programming languages
- Recommendation systems
- Requirements engineering
- Search-based software engineering
- Services, components, and cloud
- Software architectures
- Software engineering education
- Software engineering for machine learning and artificial intelligence
- Software evolution
- Software processes
- Software security
- Software testing
- Software traceability
- Symbolic execution
- Tools and environments
Mon 14 NovDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
08:30 - 09:00 | Opening session + Distinguished paper awardsPlenary Events at SRC Auditorium 2 Chair(s): Abhik Roychoudhury National University of Singapore, Cristian Cadar Imperial College London, UK, Miryung Kim University of California at Los Angeles, USA, Thomas Zimmermann Microsoft Research | ||
09:00 - 10:30 | Keynote I - Sumit GulwaniPlenary Events at SRC Auditorium 2 Chair(s): Abhik Roychoudhury National University of Singapore | ||
09:00 90mKeynote | AI-Assisted Programming: Applications, User Experiences, and Neuro-Symbolic Techniques (Keynote) Plenary Events Sumit Gulwani Microsoft DOI |
10:30 - 11:00 | Coffee/Tea BreakSocial | ||
11:00 - 12:30 | |||
11:00 15mTalk | Testing of Autonomous Driving Systems: Where Are We and Where Should We Go? Research Papers Guannan Lou Macquarie University, Yao Deng Macquarie University, Xi Zheng Macquarie University, Mengshi Zhang Meta, Tianyi Zhang Purdue University DOI | ||
11:15 15mTalk | Fuzzing Deep-Learning Libraries via Automated Relational API Inference Research Papers Yinlin Deng University of Illinois at Urbana-Champaign, Chenyuan Yang University of Illinois at Urbana-Champaign, Anjiang Wei Stanford University, Lingming Zhang University of Illinois at Urbana-Champaign DOI | ||
11:30 15mTalk | Perfect Is the Enemy of Test Oracle Research Papers Ali Reza Ibrahimzada University of Illinois Urbana-Champaign, Yigit Varli Middle East Technical University, Dilara Tekinoglu University of Massachusetts at Amherst, Reyhaneh Jabbarvand University of Illinois at Urbana-Champaign DOI Pre-print Media Attached | ||
11:45 15mTalk | Scenario-Based Test Reduction and Prioritization for Multi-Module Autonomous Driving Systems Research Papers Yao Deng Macquarie University, Xi Zheng Macquarie University, Mengshi Zhang Meta, Guannan Lou Macquarie University, Tianyi Zhang Purdue University DOI |
11:00 - 12:30 | Empirical IResearch Papers / Industry Paper at SRC LT 51 Chair(s): Lingxiao Jiang Singapore Management University | ||
11:00 15mTalk | What Improves Developer Productivity at Google? Code Quality Industry Paper Lan Cheng Google, Emerson Murphy-Hill Google, Mark Canning Google, Ciera Jaspan Google, Collin Green Google, Andrea Knight Google, Nan Zhang Google, Liz Kammer Google DOI | ||
11:15 15mTalk | Understanding Why We Cannot Model How Long a Code Review Will Take: An Industrial Case Study Industry Paper DOI | ||
11:30 15mTalk | Are We Building on the Rock? On the Importance of Data Preprocessing for Code Summarization Research Papers Lin Shi ISCAS, Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software at Chinese Academy of Sciences, Song Wang York University, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Ye Yang Stevens Institute of Technology, Ge Li Peking University, Xin Xia Huawei, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI Pre-print | ||
11:45 15mTalk | Leveraging Test Plan Quality to Improve Code Review Efficacy Industry Paper Lawrence Chen Meta, Rui Abreu Meta Platforms, Tobi Akomolede Meta Platforms, Peter Rigby Concordia University; Meta, Satish Chandra Meta Platforms, Nachiappan Nagappan Facebook DOI |
12:30 - 14:00 | Newcomer's LunchSocial at SRC GLR Chair(s): Michael Pradel University of Stuttgart, Yi Li Nanyang Technological University | ||
14:00 - 15:30 | CommunityResearch Papers / Ideas, Visions and Reflections / Demonstrations / Industry Paper at SRC LT 51 Chair(s): Dirk Riehle University of Bavaria, Erlangen | ||
14:00 15mTalk | In War and Peace: The Impact of World Politics on Software Ecosystems Ideas, Visions and Reflections Raula Gaikovina Kula Nara Institute of Science and Technology, Christoph Treude University of Melbourne DOI | ||
14:15 15mTalk | A Retrospective Study of One Decade of Artifact Evaluations Research Papers Stefan Winter LMU Munich, Christopher Steven Timperley Carnegie Mellon University, Ben Hermann TU Dortmund, Jürgen Cito TU Wien, Jonathan Bell Northeastern University, Michael Hilton Carnegie Mellon University, Dirk Beyer LMU Munich DOI | ||
14:30 15mTalk | Understanding Skills for OSS Communities on GitHub Research Papers Jenny T. Liang University of Washington, Thomas Zimmermann Microsoft Research, Denae Ford Microsoft Research DOI Pre-print Media Attached | ||
14:45 15mTalk | Achievement Unlocked: A Case Study on Gamifying DevOps Practices in Industry Industry Paper Patrick Ayoup Concordia University, Diego Costa Concordia University, Canada, Emad Shihab Concordia University DOI | ||
15:00 7mTalk | iTiger: An Automatic Issue Title Generation Tool Demonstrations Ting Zhang Singapore Management University, Ivana Clairine Irsan Singapore Management University, Ferdian Thung Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University, Lingxiao Jiang Singapore Management University | ||
15:08 7mTalk | CodeMatcher: A Tool for Large-Scale Code Search Based on Query Semantics Matching Demonstrations Chao Liu Chongqing University, Xuanlin Bao Chongqing University, Xin Xia Huawei, Meng Yan Chongqing University, David Lo Singapore Management University, Ting Zhang Singapore Management University | ||
15:15 15mTalk | Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study Research Papers Yu Nong Washington State University, Yuzhe Ou University of Texas at Dallas, Michael Pradel University of Stuttgart, Feng Chen University of Texas at Dallas, Haipeng Cai Washington State University DOI Pre-print |
15:30 - 16:00 | Coffee/Tea BreakSocial | ||
16:00 - 17:30 | Program Analysis IResearch Papers / Industry Paper at SRC LT 50 Chair(s): Marcel Böhme MPI-SP, Germany and Monash University, Australia | ||
16:00 15mTalk | Input Splitting for Cloud-Based Static Application Security Testing Platforms Industry Paper Maria Christakis MPI-SWS, Thomas Cottenier Amazon Web Services, Antonio Filieri AWS and Imperial College London, Linghui Luo Amazon Web Services, Muhammad Numair Mansur MPI-SWS, Lee Pike Amazon Web Services, Nico Rosner Amazon Web Services, Martin Schäf Amazon Web Services, Aritra Sengupta Amazon Web Services, Willem Visser Amazon Web Services DOI Media Attached | ||
16:15 15mTalk | Static Executes-Before Analysis for Event Driven Programs Research Papers Rekha Pai IISc Bangalore, Abhishek Uppar IISc Bangalore, Akshatha Shenoy TCS Research, Pranshul Kushwaha IISc Bangalore, Deepak D'Souza IISc Bangalore DOI | ||
16:30 15mTalk | Security Code Smells in Apps: Are We Getting Better? Research Papers Steven Arzt Fraunhofer SIT; ATHENE DOI | ||
16:45 15mTalk | Large-Scale Analysis of Non-Termination Bugs in Real-World OSS Projects Research Papers Xiuhan Shi Tianjin University, Xiaofei Xie Singapore Management University, Yi Li Nanyang Technological University, Yao Zhang Tianjin University, Sen Chen Tianjin University, Xiaohong Li Tianjin University DOI | ||
17:00 15mTalk | On-the-Fly Syntax Highlighting using Neural Networks Research Papers Marco Edoardo Palma University of Zurich, Pasquale Salza University of Zurich, Harald Gall University of Zurich DOI Pre-print | ||
17:15 15mTalk | Declarative Smart Contracts Research Papers Haoxian Chen University of Pennsylvania, Gerald Whitters University of Pennsylvania, Mohammad Javad Amiri University of Pennsylvania, Yuepeng Wang Simon Fraser University, Boon Thau Loo University of Pennsylvania DOI |
16:00 - 17:30 | Human/Computer InteractionResearch Papers / Demonstrations at SRC LT 51 Chair(s): Saikat Chakraborty Microsoft Research | ||
16:00 15mTalk | How to Formulate Specific How-To Questions in Software Development? Research Papers Mingwei Liu Fudan University, Xin Peng Fudan University, Andrian Marcus University of Texas at Dallas, Christoph Treude University of Melbourne, Jiazhan Xie Fudan University, Huanjun Xu Fudan University, Yanjun Yang Fudan University DOI | ||
16:15 15mTalk | Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication AbilityDistinguished Paper Award Research Papers DOI | ||
16:30 15mTalk | Pair Programming Conversations with Agents vs. Developers: Challenges and Opportunities for SE Community Research Papers Peter Robe University of Tulsa, Sandeep Kuttal University of Tulsa, Jake AuBuchon University of Tulsa, Jacob Hart University of Tulsa DOI | ||
16:45 15mTalk | Toward Interactive Bug Reporting for (Android App) End-Users Research Papers Yang Song College of William and Mary, Junayed Mahmud George Mason University, Ying Zhou University of Texas at Dallas, Oscar Chaparro College of William and Mary, Kevin Moran George Mason University, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk College of William and Mary DOI | ||
17:00 7mTalk | MultIPAs : Applying Program Transformations to Introductory Programming Assignments for Data Augmentation Demonstrations Pedro Orvalho INESC-ID, Instituto Superior Técnico, University of Lisbon, Mikoláš Janota Czech Technical University in Prague, Vasco Manquinho INESC-ID; Universidade de Lisboa Pre-print | ||
17:08 7mTalk | PolyFax: A Toolkit for Characterizing Multi-Language Software Demonstrations Wen Li Washington State University, Li Li Monash University, Haipeng Cai Washington State University Pre-print |
Tue 15 NovDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
08:00 - 09:15 | Women's BreakfastSocial at SRC GLR Chair(s): Baishakhi Ray Columbia University, Rashina Hoda Monash University | ||
09:15 - 10:15 | Test of time award - Mayur NaikPlenary Events at SRC Auditorium 2 Chair(s): Kelly Blincoe University of Auckland, Paolo Tonella USI Lugano | ||
09:15 60mTalk | Automated concolic testing of smartphone apps Plenary Events Saswat Anand , Mayur Naik University of Pennsylvania, Hongseok Yang KAIST, Mary Jean Harrold Georgia Institute of Technology |
10:15 - 10:45 | Coffee/Tea BreakSocial | ||
10:45 - 12:15 | Machine Learning IIResearch Papers / Ideas, Visions and Reflections / Industry Paper at SRC Auditorium 2 Chair(s): Atif Memon Apple | ||
10:45 15mTalk | Understanding Performance Problems in Deep Learning Systems Research Papers Junming Cao Fudan University, Bihuan Chen Fudan University, Chao Sun Fudan University, Longjie Hu Fudan University, Shuaihong Wu Fudan University, Xin Peng Fudan University DOI | ||
11:00 15mTalk | API Recommendation for Machine Learning Libraries: How Far Are We? Research Papers Moshi Wei York University, Yuchao Huang Institute of Software at Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jiho Shin York University, Nima Shiri Harzevili York University, Song Wang York University DOI Pre-print | ||
11:15 15mTalk | No More Fine-Tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence Research Papers Chaozheng Wang Harbin Institute of Technology, Yuanhang Yang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Yun Peng Chinese University of Hong Kong, Hongyu Zhang University of Newcastle, Michael Lyu Chinese University of Hong Kong DOI | ||
11:30 15mTalk | Improving ML-Based Information Retrieval Software with User-Driven Functional Testing and Defect Class Analysis Industry Paper DOI | ||
11:45 15mTalk | Discrepancies among Pre-trained Deep Neural Networks: A New Threat to Model Zoo Reliability Ideas, Visions and Reflections Diego Montes Purdue University, Pongpatapee Peerapatanapokin Purdue University, Jeff Schultz Purdue University, Chengjun Guo Purdue University, Wenxin Jiang Purdue University, James C. Davis Purdue University DOI |
10:45 - 12:15 | Software Testing IIResearch Papers / Demonstrations at SRC LT 50 Chair(s): Baishakhi Ray Columbia University | ||
10:45 15mTalk | Online Testing of RESTful APIs: Promises and ChallengesDistinguished Paper Award Research Papers Alberto Martin-Lopez University of Seville, Sergio Segura University of Seville, Antonio Ruiz-Cortés University of Seville DOI Pre-print | ||
11:00 15mTalk | Avgust: Automating Usage-Based Test Generation from Videos of App Executions Research Papers Yixue Zhao University of Massachusetts at Amherst, Saghar Talebipour University of Southern California, Kesina Baral George Mason University, Hyojae Park Sharon High School, Leon Yee Valley Christian High School, Safwat Ali Khan George Mason University, Yuriy Brun University of Massachusetts, Nenad Medvidović University of Southern California, Kevin Moran George Mason University DOI Pre-print Media Attached | ||
11:15 15mTalk | RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs Research Papers DOI | ||
11:30 7mTalk | CLIFuzzer: Mining Grammars for Command-Line Invocations Demonstrations Abhilash Gupta CISPA Helmholtz Center for Information Security, Rahul Gopinath University of Sydney, Andreas Zeller CISPA Helmholtz Center for Information Security Link to publication DOI Pre-print Media Attached | ||
11:38 7mTalk | RecipeGen++: An Automated Trigger Action Programs Generator Demonstrations Imam Nur Bani Yusuf Singapore Management University, Singapore, Diyanah Binte Abdul Jamal Singapore Management University, Lingxiao Jiang Singapore Management University, David Lo Singapore Management University |
12:30 - 14:00 | LunchSocial | ||
14:00 - 15:30 | Machine Learning IIIResearch Papers / Ideas, Visions and Reflections at SRC Auditorium 2 Chair(s): Xi Zheng Macquarie University | ||
14:00 15mTalk | AutoPruner: Transformer-Based Call Graph Pruning Research Papers Le-Cong Thanh Singapore Management University, Hong Jin Kang Singapore Management University, Truong Giang Nguyen Singapore Management University, Stefanus Agus Haryono Singapore Management University, David Lo Singapore Management University, Xuan-Bach D. Le University of Melbourne, Quyet Thang Huynh Hanoi University of Science and Technology DOI Pre-print | ||
14:15 15mTalk | Exploring the Under-Explored Terrain of Non-open Source Data for Software Engineering through the Lens of Federated Learning Ideas, Visions and Reflections DOI Pre-print | ||
14:30 15mTalk | CORMS: A GitHub and Gerrit Based Hybrid Code Reviewer Recommendation Approach for Modern Code Review Research Papers DOI | ||
14:45 15mFull-paper | Hierarchical Bayesian Multi-kernel Learning for Integrated Classification and Summarization of App Reviews Research Papers Moayad Alshangiti University of Jeddah; Rochester Institute of Technology, Weishi Shi Rochester Institute of Technology, Eduardo Coelho de Lima Rochester Institute of Technology, Xumin Liu Rochester Institute of Technology, Qi Yu Rochester Institute of Technology DOI |
14:00 - 15:30 | |||
14:00 15mTalk | Input Invariants Research Papers Dominic Steinhöfel CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security DOI Pre-print | ||
14:15 15mTalk | Modus: A Datalog Dialect for Building Container Images Research Papers Chris Tomy University College London, Tingmao Wang University College London, Earl T. Barr University College London, Sergey Mechtaev University College London DOI | ||
14:30 15mTalk | Multi-Phase Invariant Synthesis Research Papers DOI | ||
14:45 15mTalk | Parasol: Efficient Parallel Synthesis of Large Model Spaces Research Papers DOI | ||
15:00 15mTalk | Neural Termination Analysis Research Papers Mirco Giacobbe University of Birmingham, Daniel Kroening University of Oxford, Julian Parsert University of Oxford DOI | ||
15:15 7mTalk | SolSEE: A Source-Level Symbolic Execution Engine for Solidity Demonstrations Shang-Wei Lin Nanyang Technological University, Palina Tolmach Nanyang Technological University, Singapore, Institute of High Performance Computing, Agency for Science, Technology and Research (A*STAR), Singapore, Ye Liu , Yi Li Nanyang Technological University Pre-print | ||
15:23 7mTalk | MpBP: Verifying Robustness of Neural Networks with Multi-Path Bound Propagation Demonstrations Ye Zheng Shenzhen University, Shenzhen, China, Jiaxiang Liu Shenzhen University, Xiaomu Shi Shenzhen University |
14:00 - 15:30 | Debugging/localizationResearch Papers / Industry Paper / Demonstrations / Ideas, Visions and Reflections at SRC LT 51 Chair(s): Mauro Pezze USI Lugano; Schaffhausen Institute of Technology | ||
14:00 15mTalk | Metadata-Based Retrieval for Resolution Recommendation in AIOps Industry Paper DOI | ||
14:15 15mTalk | PaReco: Patched Clones and Missed Patches among the Divergent Variants of a Software Family Research Papers Poedjadevie Kadjel Ramkisoen University of Antwerp; Flanders Make, John Businge University of Antwerp; Flanders Make; University of Nevada at Las Vegas, Brent van Bladel University of Antwerp; Flanders Make, Alexandre Decan University of Mons; F.R.S.-FNRS, Serge Demeyer University of Antwerp; Flanders Make, Coen De Roover Vrije Universiteit Brussel, Foutse Khomh Polytechnique Montréal DOI | ||
14:30 15mTalk | Fault Localization to Detect Co-change Fixing Locations Research Papers Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas DOI | ||
14:45 15mTalk | Reflections on Software Failure Analysis Ideas, Visions and Reflections Paschal Amusuo Purdue University, Aishwarya Sharma Purdue University, Siddharth R. Rao Purdue University, Abbey Vincent Purdue University, James C. Davis Purdue University DOI | ||
15:00 7mTalk | eGEN: An Energy-saving Modeling Language and Code Generator for Location-sensing of Mobile Apps Demonstrations Kowndinya Boyalakuntla Indian Institute of Technology Tirupati, Marimuthu Chinnakali National Institute of Technology Karnataka, Sridhar Chimalakonda IIT Tirupati, K. Chandrasekaran National Institute of Technology Karnataka | ||
15:08 7mTalk | SFLKit: A Workbench for Statistical Fault Localization Demonstrations Marius Smytzek CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA Helmholtz Center for Information Security Pre-print |
15:30 - 16:00 | Coffee/Tea BreakSocial | ||
16:00 - 17:30 | Transportation to Banquet from 16:30Social | ||
Wed 16 NovDisplayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change
08:00 - 09:00 | Regional BreakfastSocial at SRC GLR Chair(s): Aldeida Aleti Monash University, David Lo Singapore Management University | ||
09:00 - 10:30 | Keynote II - Impact Paper Award by Gail Murphy Plenary Events at SRC Auditorium 2 Chair(s): Cristian Cadar Imperial College London, UK | ||
09:00 90mKeynote | Task Modularity and the Emergence of Software Value Streams (Impact Award Paper Keynote) Plenary Events DOI |
10:30 - 11:00 | Coffee/Tea BreakSocial | ||
11:00 - 12:30 | Mining Software RepositoriesResearch Papers / Demonstrations at SRC Auditorium 2 Chair(s): Timofey Bryksin JetBrains Research | ||
11:00 15mTalk | An Exploratory Study on the Predominant Programming Paradigms in Python Code Research Papers DOI Pre-print Media Attached | ||
11:15 15mTalk | An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns Research Papers Xiao Yi Chinese University of Hong Kong, Daoyuan Wu Chinese University of Hong Kong, Lingxiao Jiang Singapore Management University, Yuzhou Fang Chinese University of Hong Kong, Kehuan Zhang Chinese University of Hong Kong, Wei Zhang Nanjing University of Posts and Telecommunications DOI | ||
11:30 15mTalk | How to Better Utilize Code Graphs in Semantic Code Search? Research Papers Yucen Shi Northeastern University, Ying Yin Northeastern University, Zhengkui Wang Singapore Institute of Technology, David Lo Singapore Management University, Tao Zhang Macau University of Science and Technology, Xin Xia Huawei, Yuhai Zhao Northeastern University, Bowen Xu Singapore Management University DOI | ||
11:45 15mTalk | 23 Shades of Self-Admitted Technical Debt: An Empirical Study on Machine Learning Software Research Papers David OBrien Iowa State University, Sumon Biswas Carnegie Mellon University, Sayem Mohammad Imtiaz Iowa State University, Rabe Abdalkareem Carleton University, Emad Shihab Concordia University, Hridesh Rajan Iowa State University DOI | ||
12:00 7mTalk | WikiDoMiner: Wikipedia Domain-specific Miner Demonstrations Saad Ezzini University of Luxembourg, Sallam Abualhaija University of Luxembourg, Mehrdad Sabetzadeh University of Ottawa | ||
12:08 7mTalk | RegMiner: Mining Replicable Regression Dataset from Code Repositories Demonstrations Xuezhi Song Fudan University, Yun Lin Shanghai Jiao Tong University; National University of Singapore, Yijian Wu Fudan University, Yifan Zhang National University of Singapore, Siang Hwee Ng National University of Singapore, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University |
11:00 - 12:30 | Program Analysis IIResearch Papers / Demonstrations / Ideas, Visions and Reflections at SRC LT 50 Chair(s): Marsha Chechik University of Toronto | ||
11:00 15mTalk | NeuDep: Neural Binary Memory Dependence Analysis Research Papers Kexin Pei Columbia University, Dongdong She Columbia University, Michael Wang Massachusetts Institute of Technology, Scott Geng Columbia University, Zhou Xuan Purdue University, Yaniv David Columbia University, Junfeng Yang Columbia University, Suman Jana Columbia University, Baishakhi Ray Columbia University DOI | ||
11:15 15mTalk | DynaPyt: A Dynamic Analysis Framework for Python Research Papers DOI Pre-print | ||
11:30 15mTalk | Language-Agnostic Dynamic Analysis of Multilingual Code: Promises, Pitfalls, and Prospects Ideas, Visions and Reflections Haoran Yang Washington State University, Wen Li Washington State University, Haipeng Cai Washington State University DOI | ||
11:45 15mTalk | Cross-Language Android Permission Specification Research Papers Chaoran Li Swinburne University of Technology, Xiao Chen Monash University, Ruoxi Sun The University of Adelaide, Minhui (Jason) Xue University of Adelaide, Sheng Wen Swinburne University of Technology, Muhammad Ejaz Ahmed Data61, CSIRO, Seyit Camtepe CSIRO Data61, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology DOI | ||
12:00 15mTalk | Peahen: Fast and Precise Static Deadlock Detection via Context Reduction Research Papers Yuandao Cai Hong Kong University of Science and Technology, Chengfeng Ye Hong Kong University of Science and Technology, Qingkai Shi Purdue University, Charles Zhang Hong Kong University of Science and Technology DOI | ||
12:15 7mTalk | FIM: Fault Injection and Mutation for Simulink Demonstrations Ezio Bartocci TU Wien, Leonardo Mariani University of Milano-Bicocca, Dejan Nickovic Austrian Institute of Technology, Drishti Yadav Technische Universität Wien | ||
12:23 7mTalk | JSIMutate: Understanding Performance Results through Mutations Demonstrations Thomas Laurent Lero & University College Dublin, Paolo Arcaini National Institute of Informatics
, Catia Trubiani Gran Sasso Science Institute, Anthony Ventresque University College Dublin & Lero, Ireland DOI Media Attached |
14:00 - 15:30 | SecurityDemonstrations / Research Papers at SRC LT 50 Chair(s): Andreea Costea School of Computing, National University Of Singapore | ||
14:00 15mTalk | Automated Unearthing of Dangerous Issue Reports Research Papers Shengyi Pan Zhejiang University, Jiayuan Zhou Huawei, Filipe Cogo Huawei, Xin Xia Huawei, Lingfeng Bao Zhejiang University, Xing Hu Zhejiang University, Shanping Li Zhejiang University, Ahmed E. Hassan Queen’s University DOI | ||
14:15 15mTalk | On the Vulnerability Proneness of Multilingual Code Research Papers Wen Li Washington State University, Li Li Monash University, Haipeng Cai Washington State University DOI Pre-print | ||
14:30 7mTalk | VulCurator: A Vulnerability-Fixing Commit Detector Demonstrations Truong Giang Nguyen Singapore Management University, Le-Cong Thanh Singapore Management University, Hong Jin Kang Singapore Management University, Xuan-Bach D. Le University of Melbourne, David Lo Singapore Management University | ||
14:38 7mTalk | KVS: A Tool for Knowledge-Driven Vulnerability Searching Demonstrations Xingqi Cheng Yangzhou University, Xiaobing Sun Yangzhou University, Lili Bo Yangzhou University, Ying Wei Yangzhou University | ||
14:45 7mTalk | MANDO-GURU: Vulnerability Detection for Smart Contract Source Code By Heterogeneous Graph Embeddings Demonstrations Hoang H. Nguyen L3S Research Center, Leibniz Universität Hannover, Hannover, Germany, Nhat-Minh Nguyen Singapore Management University, Singapore, Hong-Phuc Doan Hanoi University of Science and Technology, Hanoi, Vietnam, Zahra Ahmadi L3S Research Center, Leibniz Universität Hannover, Hannover, Germany, Thanh-Nam Doan Independent Researcher, Atlanta, Georgia, USA, Lingxiao Jiang Singapore Management University DOI Pre-print Media Attached | ||
14:53 7mTalk | FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers Demonstrations Haoxin Tu Singapore Management University, Singapore, Lingxiao Jiang Singapore Management University, Xuhua Ding Singapore Management University, He Jiang Dalian University of Technology |
14:00 - 15:30 | DependabilityIndustry Paper / Research Papers at SRC LT 51 Chair(s): Tao Yue Simula Research Laboratory | ||
14:00 15mTalk | Unite: An Adapter for Transforming Analysis Tools to Web Services via OSLC Industry Paper Ondřej Vašíček Brno University of Technology; Honeywell International, Jan Fiedor Brno University of Technology; Honeywell International, Tomáš Kratochvíla Honeywell International, Bohuslav Křena Brno University of Technology, Aleš Smrčka Brno University of Technology, Tomáš Vojnar Brno University of Technology DOI | ||
14:15 15mTalk | Discovering Feature Flag Interdependencies in Microsoft Office Industry Paper Michael Schröder TU Wien, Katja Kevic Microsoft, Dan Gopstein Microsoft, Brendan Murphy Microsoft, Jennifer Beckmann Microsoft DOI Pre-print Media Attached | ||
14:30 15mTalk | Demystifying the Underground Ecosystem of Account Registration Bots Research Papers Yuhao Gao University of Technology Sydney; Beijing University of Posts and Telecommunications, Guoai Xu Harbin Institute of Technology; Beijing University of Posts and Telecommunications, Li Li Monash University, Xiapu Luo Hong Kong Polytechnic University, Chenyu Wang Beijing University of Posts and Telecommunications, Yulei Sui University of New South Wales DOI | ||
14:45 15mResearch paper | Quantitative Relational Modelling with QAlloy Research Papers Pedro Silva University of Minho; INESC TEC, Jose Nuno Oliveira University of Minho; INESC TEC, Nuno Macedo University of Porto; INESC TEC, Alcino Cunha University of Minho; INESC TEC DOI Pre-print | ||
15:00 15mTalk | Using Graph Neural Networks for Program Termination Research Papers DOI |
15:30 - 16:00 | Coffee/Tea BreakSocial | ||
16:00 - 17:30 | Keynote III - Marsha ChechikPlenary Events at SRC Auditorium 2 Chair(s): Miryung Kim University of California at Los Angeles, USA | ||
16:00 90mKeynote | On Safety, Assurance, and Reliability: A Software Engineering Perspective (Keynote) Plenary Events Marsha Chechik University of Toronto DOI |
17:30 - 18:00 | Closing sessionPlenary Events at SRC Auditorium 2 Chair(s): Abhik Roychoudhury National University of Singapore | ||
Not scheduled yet
Not scheduled yet Talk | Do Bugs Lead to Unnaturalness of Source Code? Research Papers Yanjie Jiang Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Weixing Ji Beijing Institute of Technology, Hao Zhong Shanghai Jiao Tong University, Lu Zhang Peking University DOI | ||
Not scheduled yet Talk | Actionable and Interpretable Fault Localization for Recurring Failures in Online Service Systems Research Papers Zeyan Li Tsinghua University, Nengwen Zhao Tsinghua University, Mingjie Li Tsinghua University, Xianglin Lu Tsinghua University, Lixin Wang China Construction Bank, Dongdong Chang China Construction Bank, Xiaohui Nie BizSeer, Li Cao BizSeer, Wenchi Zhang BizSeer, Kaixin Sui BizSeer, Yanhua Wang China Construction Bank, Xu Du China Construction Bank, Guoqiang Duan China Construction Bank, Dan Pei Tsinghua University DOI | ||
Not scheduled yet Talk | DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks Research Papers Qi Qin ShanghaiTech University, JulianAndres JiYang ShanghaiTech University, Fu Song ShanghaiTech University, Taolue Chen Birkbeck University of London, Xinyu Xing Northwestern University DOI | ||
Not scheduled yet Talk | Detecting Non-crashing Functional Bugs in Android Apps via Deep-State Differential Analysis Research Papers Jue Wang Nanjing University, Yanyan Jiang Nanjing University, Ting Su East China Normal University, Shaohua Li ETH Zurich, Chang Xu Nanjing University, Jian Lu Nanjing University, Zhendong Su ETH Zurich DOI | ||
Not scheduled yet Talk | NL2Viz: Natural Language to Visualization via Constrained Syntax-Guided Synthesis Research Papers Zhengkai Wu University of Illinois at Urbana-Champaign, Vu Le Microsoft, Ashish Tiwari Microsoft, Sumit Gulwani Microsoft, Arjun Radhakrishna Microsoft, Ivan Radiček Microsoft, Gustavo Soares Microsoft, Xinyu Wang University of Michigan, Zhenwen Li Peking University, Tao Xie Peking University DOI | ||
Not scheduled yet Talk | Lighting Up Supervised Learning in User Review-Based Code Localization: Dataset and Benchmark Research Papers Xinwen Hu Nanjing University, Yu Guo Nanjing University, Jianjie Lu Nanjing University, Zheling Zhu Nanjing University, Chuanyi Li Nanjing University, Jidong Ge Nanjing University, Liguo Huang Southern Methodist University, Bin Luo Nanjing University DOI Media Attached | ||
Not scheduled yet Talk | TraceCRL: Contrastive Representation Learning for Microservice Trace Analysis Research Papers Chenxi Zhang Fudan University, Xin Peng Fudan University, Tong Zhou Fudan University, Chaofeng Sha Fudan University, Zhenghui Yan Fudan University, Yiru Chen Fudan University, Yang Hong Monash University DOI | ||
Not scheduled yet Talk | SEDiff: Scope-Aware Differential Fuzzing to Test Internal Function Models in Symbolic Execution Research Papers Penghui Li Chinese University of Hong Kong, Wei Meng Chinese University of Hong Kong, Kangjie Lu University of Minnesota DOI | ||
Not scheduled yet Talk | Automating Code Review Activities by Large-Scale Pre-training Research Papers Zhiyu Li Peking University, Shuai Lu Microsoft Research, Daya Guo Sun Yat-sen University, Nan Duan Microsoft Research, Shailesh Jannu LinkedIn, Grant Jenks LinkedIn, Deep Majumder LinkedIn, Jared Green LinkedIn, Alexey Svyatkovskiy Microsoft, Shengyu Fu Microsoft, Neel Sundaresan Microsoft DOI | ||
Not scheduled yet Talk | SamplingCA: Effective and Efficient Sampling-Based Pairwise Testing for Highly Configurable Software Systems Research Papers Chuan Luo Beihang University, Qiyuan Zhao Shanghai Jiao Tong University, Shaowei Cai Institute of Software at Chinese Academy of Sciences, Hongyu Zhang University of Newcastle, Chunming Hu Beihang University DOI | ||
Not scheduled yet Talk | Tracking Patches for Open Source Software Vulnerabilities Research Papers Congying Xu Fudan University, Bihuan Chen Fudan University, Chenhao Lu Fudan University, Kaifeng Huang Fudan University, Xin Peng Fudan University, Yang Liu Nanyang Technological University DOI | ||
Not scheduled yet Talk | NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems Research Papers Simin Chen University of Texas at Dallas, Cong Liu University of Texas at Dallas, Mirazul Haque University of Texas at Dallas, Zihe Song University of Texas at Dallas, Wei Yang University of Texas at Dallas DOI | ||
Not scheduled yet Talk | AgileCtrl: A Self-Adaptive Framework for Configuration Tuning Research Papers DOI | ||
Not scheduled yet Talk | AccessiText: Automated Detection of Text Accessibility Issues in Android Apps Research Papers Abdulaziz Alshayban University of California at Irvine, Sam Malek University of California at Irvine DOI | ||
Not scheduled yet Talk | SymMC: Approximate Model Enumeration and Counting using Symmetry Information for Alloy Specifications Research Papers Wenxi Wang University of Texas at Austin, Yang Hu University of Texas at Austin, Kenneth L. McMillan University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin DOI Pre-print | ||
Not scheduled yet Talk | Psychologically-Inspired, Unsupervised Inference of Perceptual Groups of GUI Widgets from GUI Images Research Papers Mulong Xie Australian National University, Zhenchang Xing CSIRO’s Data61; Australian National University, Sidong Feng Monash University, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61, Chunyang Chen Monash University DOI | ||
Not scheduled yet Talk | SPINE: A Scalable Log Parser with Feedback GuidanceDistinguished Paper Award Research Papers Xuheng Wang Tsinghua University, Xu Zhang Microsoft Research, Liqun Li Microsoft Research, Shilin He Microsoft Research, Hongyu Zhang University of Newcastle, Yudong Liu Microsoft Research, Lingling Zheng Microsoft Azure, Yu Kang Microsoft Research, Qingwei Lin Microsoft Research, Yingnong Dang Microsoft Azure, Saravanakumar Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research DOI | ||
Not scheduled yet Talk | Correlates of Programmer Efficacy and Their Link to Experience: A Combined EEG and Eye-Tracking Study Research Papers Norman Peitek Saarland University, Annabelle Bergum Saarland University, Maurice Rekrut German Research Center for Artificial Intelligence, Jonas Mucke Chemnitz University of Technology, Matthias Nadig German Research Center for Artificial Intelligence, Chris Parnin North Carolina State University, Janet Siegmund Chemnitz University of Technology, Sven Apel Saarland University DOI Pre-print Media Attached | ||
Not scheduled yet Talk | What Motivates Software Practitioners to Contribute to Inner Source? Research Papers Zhiyuan Wan Zhejiang University, Xin Xia Huawei, Yun Zhang Zhejiang University City College, David Lo Singapore Management University, zhou daibing Huawei, Qiuyuan Chen Zhejiang University, Ahmed E. Hassan Queen’s University DOI Pre-print | ||
Not scheduled yet Talk | Automatically Deriving JavaScript Static Analyzers from Specifications using Meta-level Static Analysis Research Papers DOI | ||
Not scheduled yet Talk | RULER: Discriminative and Iterative Adversarial Training for Deep Neural Network Fairness Research Papers Guanhong Tao Purdue University, Weisong Sun Nanjing University, Tingxu Han Nanjing University, Chunrong Fang Nanjing University, Xiangyu Zhang Purdue University DOI Pre-print | ||
Not scheduled yet Talk | Corporate Dominance in Open Source Ecosystems: A Case Study of OpenStack Research Papers Yuxia Zhang Beijing Institute of Technology, Klaas-Jan Stol Lero; University College Cork, Hui Liu Beijing Institute of Technology, Minghui Zhou Peking University DOI | ||
Not scheduled yet Talk | Semi-supervised Pre-processing for Learning-Based Traceability Framework on Real-World Software Projects Research Papers Liming Dong Nanjing University, He Zhang Nanjing University, Wei Liu Nanjing University, Zhiluo Weng Nanjing University, Hongyu Kuang Nanjing University DOI | ||
Not scheduled yet Talk | Diet Code Is Healthy: Simplifying Programs for Pre-trained Models of Code Research Papers Zhaowei Zhang Shanghai Jiao Tong University, Hongyu Zhang University of Newcastle, Beijun Shen Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University DOI Pre-print Media Attached File Attached | ||
Not scheduled yet Talk | Minerva: Browser API Fuzzing with Dynamic Mod-Ref AnalysisDistinguished Paper Award Research Papers Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Mingzhe Wang Tsinghua University, Lihua Guo Tsinghua University, Jie Liang Tsinghua University, Zhe Liu Nanjing University of Aeronautics and Astronautics, Mathias Payer EPFL, Yu Jiang Tsinghua University DOI | ||
Not scheduled yet Talk | Putting Them under Microscope: A Fine-Grained Approach for Detecting Redundant Test Cases in Natural Language Research Papers Zhiyuan Chang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Mingyang Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Shoubin Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences DOI | ||
Not scheduled yet Talk | Generic Sensitivity: Customizing Context-Sensitive Pointer Analysis for Generics Research Papers Haofeng Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jie Lu Institute of Computing Technology at Chinese Academy of Sciences, Haining Meng Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Liqing Cao Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yongheng Huang Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Lin Gao TianqiSoft DOI | ||
Not scheduled yet Talk | AUGER: Automatically Generating Review Comments with Pre-training Models Research Papers Lingwei Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Li Yang Institute of Software at Chinese Academy of Sciences, Huaxi Jiang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Tiejian Luo University of Chinese Academy of Sciences, Zihan Hua Wuhan University; University of Chinese Academy of Sciences, Geng Liang Institute of Software at Chinese Academy of Sciences, Chun Zuo Sinosoft DOI Pre-print | ||
Not scheduled yet Talk | MAAT: A Novel Ensemble Approach to Addressing Fairness and Performance Bugs for Machine Learning Software Research Papers Zhenpeng Chen University College London, UK, Jie M. Zhang King's College London, Federica Sarro University College London, Mark Harman University College London DOI Pre-print | ||
Not scheduled yet Talk | Quantifying Community Evolution in Developer Social Networks Research Papers Liang Wang Nanjing University, Ying Li Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University DOI | ||
Not scheduled yet Talk | A Case Study of Implicit Mentoring, Its Prevalence, and Impact in Apache Research Papers Zixuan Feng Oregon State University, Amreeta Chatterjee Oregon State University, Anita Sarma Oregon State University, Iftekhar Ahmed University of California at Irvine DOI Media Attached | ||
Not scheduled yet Talk | The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Prediction and Localization Research Papers Chao Ni Zhejiang University, Wei Wang Fudan University, Kaiwen Yang Zhejiang University, Xin Xia Huawei, Kui Liu Huawei Software Engineering Application Technology Lab, David Lo Singapore Management University DOI | ||
Not scheduled yet Talk | MOSAT: Finding Safety Violations of Autonomous Driving Systems using Multi-objective Genetic Algorithm Research Papers Haoxiang Tian Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Yan Jiang Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College; China Southern Power Grid, Jiren Yan Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Chongqing School, Wei Chen Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; University of Chinese Academy of Sciences Nanjing College, Shuo Li Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Nanjing Institute of Software Technology, Dan Ye Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences; Nanjing Institute of Software Technology DOI | ||
Not scheduled yet Talk | Cross-Device Record and Replay for Android Apps Research Papers DOI Pre-print Media Attached | ||
Not scheduled yet Talk | You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search Research Papers Yao Wan Huazhong University of Science and Technology, Shijie Zhang Huazhong University of Science and Technology, Hongyu Zhang University of Newcastle, Yulei Sui University of New South Wales, Guandong Xu University of Technology Sydney, Dezhong Yao Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology, Lichao Sun Lehigh University DOI | ||
Not scheduled yet Talk | Making Python Code Idiomatic by Automatic Refactoring Non-idiomatic Python Code with Pythonic Idioms Research Papers zejun zhang Australian National University, Zhenchang Xing CSIRO’s Data61; Australian National University, Xin Xia Huawei, Xiwei (Sherry) Xu CSIRO’s Data61, Liming Zhu CSIRO’s Data61 DOI | ||
Not scheduled yet Talk | Detecting Simulink Compiler Bugs via Controllable Zombie Blocks Mutation Research Papers Shikai Guo Dalian Maritime University, He Jiang Dalian University of Technology, Zhihao Xu Dalian Maritime University, Xiaochen Li Dalian University of Technology, Zhilei Ren Dalian University of Technology, Zhide Zhou Dalian University of Technology, Rong Chen Dalian Maritime University DOI |
Accepted Papers
FAQ
FAQ on Review Process and Double-Anonymous Reviewing
Open Science Policy
Q: What is the ESEC/FSE 2021 open science policy and how can I follow it?
Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:
- make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
- include in the paper an explanation as to why this is not possible or desirable; and
- indicate if they intend to make their data publicly available upon acceptance.
Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?
To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site.
Rationale for Double-Anonymous Reviewing (DAR)
Q: Why are you using double-anonymous reviewing?
A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.
Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.
A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.
For Authors
Q: What exactly do I have to do to anonymize my paper?
A: Use common sense. Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors
Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?
On the submission site, there will be an option to submit supplementary material along with your main paper. This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-blind guidelines.
Q: My submission is based on code available in a public repository. How do I deal with this?
A: Making your code publicly available is not incompatible with double-blind reviewing. You should do the following. You can cite the code in your paper, but remove the actual URL. Instead create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy.
Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission?
A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Chair.
Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?
A: No. But we recommend you do not use the same title for your ESEC/FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.
Q: Am I allowed to post my (non-blinded) paper on my web page or arXiv?
A: If the authors have already published a version of their paper to arXiv or similar sites, we request authors to consider using a different title for their submission, so that author names are not inadvertently disclosed, e.g., via a notification on Google Scholar. Another option would be to postpone publishing their submitted work on arXiv or similar sites, until after the notification of acceptance. If the paper is accepted, you may request a title change to the PC chairs (via email to esecfse2022pc-chairs@googlegroups.com, with subject “ESEC/FSE 2022 [PAPER-ID]: Title change request”), which will be subject to reviewers’ approval.
Q: Can I give a talk about my work while it is under review? How do I handle social media?
A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are gray areas and trade-offs; we cannot describe every possible scenario.
Things you may do:
- Put your submission on your home page.
- Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
- Present your work at professional meetings, job interviews, etc.
- Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.
Things you should not do:
- Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
- Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
- Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, ESEC/FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.
Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.
Q: Will the fact that ESEC/FSE is double-anonymous have an impact on handling conflicts of interest?
A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Cal for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.
For Reviewers
Q: What should I do if I learn the authors’ identity? What should I do if a prospective ESEC/FSE author contacts me and asks to visit my institution?
A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgment.
Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?
A: Contact the Program Chairs, who will download the material on your behalf and make it available to you.
Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?
A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Chairs, especially since additional reviewers might have a different set of conflicts of interest.
Q: How do we handle potential conflicts of interest since I cannot see the author names?
A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.
Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?
A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.
These guidelines are partly based on the PLDI FAQ on double-blind reviewing and the ICSE 2022 guidelines on double-anonymous submissions.
Review Process
Q: Can I withdraw my paper?
A: Yes, papers can be withdrawn at any time using HotCRP.