Write a Blog >>
ESEC/FSE 2022
Mon 14 - Fri 18 November 2022 Singapore

We invite high-quality submissions, from both industry and academia, describing original and unpublished results of theoretical, empirical, conceptual, and experimental software engineering research. Contributions should describe innovative and significant original research. Papers describing groundbreaking approaches to emerging problems will also be considered. Submissions that facilitate reproducibility by using available datasets or making the described tools and datasets publicly available are especially encouraged. For a list of specific topics of interest, please see the end of this call. Papers submitted for consideration to ESEC/FSE should not have been already published elsewhere and should not be under review or submitted for review elsewhere during the reviewing period. Specifically, authors are required to adhere to the ACM Policy and Procedures on Plagiarism and the ACM Policy on Prior Publication and Simultaneous Submissions.

How to Submit

At the time of submission, all papers must conform to the ESEC/FSE 2022 Format and Submission Guidelines, and must not exceed 10 pages for all text and figures plus 2 pages for references. For Microsoft Word users, please still use the “Interim Template” and not the New Workflow for ACM Publications. All submissions must be in English and in PDF format. You can submit, optionally, an additional file containing supplementary material (see details below). Submissions that do not comply with the above instructions will be desk rejected without review. Papers must be submitted electronically through the ESEC/FSE submission site:

https://esecfse22.hotcrp.com/

Each submission will be reviewed by at least three members of the program committee. Authors will have an opportunity to respond to reviews during a rebuttal period. Submissions will be evaluated on the basis of originality, importance of contribution, soundness, evaluation, quality of presentation and appropriate comparison to related work. Some papers may have more than three reviews, as PC chairs may solicit additional reviews based on factors such as reviewer expertise and strong disagreement between reviewers. The authors will have a chance to read the additional reviews and respond to them during the additional short response period. The program committee as a whole will make final decisions about which submissions to accept for presentation at the conference.

ESEC/FSE 2022 will employ a double-blind review process. The papers submitted must not reveal the authors’ identities in any way:

  • Authors should leave out author names and affiliations from the body of their submission.
  • Authors should ensure that any citation to related work by themselves is written in third person, that is, “the prior work of XYZ” as opposed to “our prior work”.
  • Authors should not include URLs to author-revealing sites (tools, datasets).
  • You are encouraged to submit a link to a Web site or repository containing supplementary material (raw data, datasets, experiments, etc.), as long as it is blinded. The visit of such sites should not be needed to conduct the review. The program committee will not necessarily consider it in the paper review process. For more information, please read How to disclose data for double-blind review and make it archived open data upon acceptance. As an alternative to having an external link, the submission form provides an option to attach a replication package.
  • Authors should anonymize author-revealing company names but instead provide general characteristics of the organizations involved needed to understand the context of the paper.
  • Authors should ensure that paper acknowledgements do not reveal the origin of their work.

The double-blind process used this year is “heavy”, i.e., the paper anonymity will be maintained during the reviewers’ discussion period and the authors’ rebuttal period. Authors must therefore maintain anonymity in their responses during the rebuttal phases, and provide no additional information that would otherwise be author-revealing.

Authors with further questions on double-blind reviewing are encouraged to contact the program chairs by email. Papers that do not comply with the double-blind review process will be desk-rejected.

To prevent double submissions, the chairs might compare the submissions with related conferences that have overlapping review periods. The double submission restriction applies only to refereed journals and conferences, not to unrefereed forums (e.g. arXiv.org). To check for plagiarism issues, the chairs might use external plagiarism detection software.

To facilitate double-blind reviewing, we advise the authors to postpone publishing their submitted work on arXiv or similar sites until after the notification of acceptance. However, if the authors have already published a version of their paper to arXiv or similar sites, we request authors to use a different title for their submission, so that author names are not inadvertently disclosed, e.g., via a notification on Google Scholar.

All publications are subject to the ACM Author Representations policy.

As a published ACM author, you and your co-authors are subject to all ACM Publications Policies, including ACM’s new Publications Policy on Research Involving Human Participants and Subjects.

Important Dates

All dates are 23:59:59 AoE (UTC-12h)

  • Paper registration: 10 March 2022 (to register a paper, only a paper title, an author list and some additional metadata are required)
  • Full paper submission: 17 March 2022
  • 1st Rebuttal period (all papers): 9-13 May, 2022
  • 2nd Additional short response period (selected papers): 30-31 May, 2022
  • Author notification: 14 June 2022
  • Camera-ready submission: 5 Sep 2022

Open Science Policy

The research track of ESEC/FSE has introduced an open science policy. Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. The steering principle is that all research results should be accessible to the public, if possible, and that empirical studies should be reproducible. In particular, we actively support the adoption of open data and open source principles and encourage all contributing authors to disclose (anonymized and curated) data to increase reproducibility and replicability.

Upon submission to the research track, authors are asked to make their data available to the program committee (via upload of anonymized supplemental material or a link to an anonymized private or public repository) or to comment on why this is not possible or desirable. While sharing such a repository is not mandatory for submission or acceptance, this information will be passed to the program committee to inform its decision. Furthermore, authors are asked to indicate whether they intend to make their data publicly available upon acceptance. For more details on ESEC/FSE open science policy, please refer to the official guidelines.

Authors of accepted papers will be given an opportunity (and encouragement) to submit their data and tools to the separate ESEC/FSE’21 artifact evaluation committee.

Topics of Interest

Topics of interest include, but are not limited to:

  • Artificial intelligence and machine learning for software engineering
  • Autonomic computing
  • Debugging and fault localization
  • Dependability, safety, and reliability
  • Distributed and collaborative software engineering
  • Embedded software, safety-critical systems, and cyber-physical systems
  • Empirical software engineering
  • Formal methods
  • Human-computer interaction
  • Mining software repositories
  • Mobile development
  • Model checking
  • Model-driven engineering
  • Parallel, distributed, and concurrent systems
  • Performance engineering
  • Program analysis
  • Program comprehension
  • Program repair
  • Program synthesis
  • Programming languages
  • Recommendation systems
  • Requirements engineering
  • Search-based software engineering
  • Services, components, and cloud
  • Software architectures
  • Software engineering education
  • Software engineering for machine learning and artificial intelligence
  • Software evolution
  • Software processes
  • Software security
  • Software testing
  • Software traceability
  • Symbolic execution
  • Tools and environments
Dates
Tracks
Plenary
You're viewing the program in a time zone which is different from your device's time zone - change time zone

Mon 14 Nov

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

08:30 - 09:00
Opening session + Distinguished paper awardsPlenary Events
Chair(s): Abhik Roychoudhury National University of Singapore, Cristian Cadar Imperial College London, UK, Miryung Kim University of California at Los Angeles, USA
09:00 - 10:30
Keynote I - Sumit GulwaniPlenary Events
Chair(s): Abhik Roychoudhury National University of Singapore
09:00
90m
Keynote
AI-assisted Programming: Applications, User experiences, and Neuro-symbolic Techniques
Plenary Events
Sumit Gulwani Microsoft
10:30 - 11:00
Coffee/Tea BreakSocial
11:00 - 12:30
11:00
15m
Talk
Adaptive Fairnesss Improvement based on Causality Analysis
Research Papers
Mengdi Zhang Singapore Management University, Singapore, Jun Sun Singapore Management University
11:15
15m
Talk
Nalanda: A Socio-Technical Graph Platform for Building Software Analytics Tools at Enterprise Scale
Industry Paper
Chandra Maddila Microsoft Research, Suhas Shanbhogue Microsoft Research, Apoorva Agrawal Microsoft Research, Thomas Zimmermann Microsoft Research, Chetan Bansal Microsoft Research, Nicole Forsgren Microsoft Research, Divyanshu Agrawal Microsoft Research, Kim Herzig Tools for Software Engineers, Microsoft, Arie van Deursen Delft University of Technology, Netherlands
11:30
15m
Talk
NatGen: Generative pre-training by “Naturalizing” source code
Research Papers
Saikat Chakraborty Microsoft Research, USA, Toufique Ahmed University of California at Davis, Yangruibo Ding Columbia University, Prem Devanbu Department of Computer Science, University of California, Davis, Baishakhi Ray Columbia University
Pre-print
11:45
15m
Talk
Uncertainty-Aware Transfer Learning to Evolve Digital Twins for Industrial Elevators
Industry Paper
Xu Qinghua Simula Research Laboratory and University of Oslo, Norway, Shaukat Ali Simula Research Laboratory, Norway, Tao Yue Simula Research Laboratory, Norway, Maite Arratibel Orona
12:00
15m
Talk
All You Need Is Logs: Improving Code Completion by Learning from Anonymous IDE Usage Logs
Industry Paper
Vitaliy Bibaev JetBrains, Alexey Kalina JetBrains, Vadim Lomshakov JetBrains, Yaroslav Golubev JetBrains Research, Alexander Bezzubov JetBrains N.V, Nikita Povarov JetBrains, Timofey Bryksin JetBrains Research
DOI Pre-print
12:15
15m
Talk
MAAT: A Novel Ensemble Approach to Addressing Fairness and Performance Bugs for Machine Learning Software
Research Papers
Zhenpeng Chen University College London, UK, Jie M. Zhang King's College London, Federica Sarro University College London, Mark Harman University College London
Pre-print
11:00 - 12:30
Software Testing IResearch Papers at SRC LT 50
11:00
15m
Talk
Testing of Autonomous Driving Systems: Where are we and where should we go?
Research Papers
Guannan Lou Macquarie University, Yao Deng Macquarie University, Xi Zheng Macquarie University, Mengshi Zhang Meta, Tianyi Zhang Purdue University
11:15
15m
Talk
Fuzzing Deep-Learning Libraries via Automated Relational API Inference
Research Papers
Yinlin Deng University of Illinois at Urbana-Champaign, Chenyuan Yang University of Illinois at Urbana-Champaign, Anjiang Wei Stanford University, Lingming Zhang University of Illinois at Urbana-Champaign
11:30
15m
Talk
SEDiff: Scope-Aware Differential Fuzzing to Test Internal Function Models in Symbolic Execution
Research Papers
Penghui Li The Chinese University of Hong Kong, Wei Meng Chinese University of Hong Kong, Kangjie Lu University of Minnesota
11:45
15m
Talk
Perfect Is the Enemy of Test Oracle
Research Papers
Ali Reza Ibrahimzada University of Illinois, Urbana-Champaign, Yigit Varli Middle East Technical University, Dilara Tekinoglu University of Massachusetts, Amherst, Reyhaneh Jabbarvand University of Illinois, Urbana-Champain
12:00
15m
Talk
Scenario-based Test Reduction and Prioritization for Multi-Module Autonomous Driving Systems
Research Papers
Yao Deng Macquarie University, Xi Zheng Macquarie University, Mengshi Zhang Meta, Guannan Lou Macquarie University, Tianyi Zhang Purdue University
12:15
15m
Talk
MOSAT: Finding Safety Violations of Autonomous Driving Systems Using Multi-Objective Genetic Algorithm
Research Papers
Haoxiang Tian Institute of Software, Chinese Academy of Sciences, Yan Jiang Institute of Software, Chinese Academy of Sciences, Guoquan Wu Institute of Software at Chinese Academy of Sciences, China, Jiren Yan Institute of Software, Chinese Academy of Sciences, Jun Wei Institute of Software at Chinese Academy of Sciences; University of Chinese Academy of Sciences, Wei Chen Institute of Software at Chinese Academy of Sciences, China, Shuo Li Institute of Software, Chinese Academy of Sciences, Dan Ye Institute of Software at Chinese Academy of Sciences
DOI
11:00 - 12:30
11:00
15m
Talk
What Improves Developer Productivity at Google? Code Quality.
Industry Paper
Lan Cheng Google, Emerson Murphy-Hill Google, Mark Canning Google, Ciera Jaspan , Collin Green Google, Andrea Knight Google, Nan Zhang Google, Liz Kammer Google
11:15
15m
Talk
Understanding why we cannot model how long a code review will take at Meta
Industry Paper
Lawrence Chen Meta, Peter Rigby Concordia University, Montreal, Canada, Nachiappan Nagappan
11:30
15m
Talk
Are We Building on the Rock? On the Importance of Data Preprocessing for Code Summarization
Research Papers
Lin Shi ISCAS, Fangwen Mu Institute of Software Chinese Academy of Sciences, Xiao Chen Institute of Software at Chinese Academy of Sciences, Song Wang York University, Junjie Wang Institute of Software at Chinese Academy of Sciences, Ye Yang Stevens Institute of Technology, Ge Li Peking University, Xin Xia Huawei Software Engineering Application Technology Lab, Qing Wang Institute of Software at Chinese Academy of Sciences
Pre-print
11:45
15m
Talk
Leveraging Test Plan Quality to Improve Code Review Efficacy
Industry Paper
Lawrence Chen Meta, Rui Abreu Faculty of Engineering, University of Porto, Portugal, Tobi Akomolede Facebook, Peter Rigby Concordia University, Montreal, Canada, Satish Chandra Facebook, Nachiappan Nagappan
12:00
15m
Talk
Correlates of Programmer Efficacy and their Link to Experience: A Combined EEG and Eye-Tracking Study
Research Papers
Norman Peitek Saarland University, Saarland Informatics Campus, Annabelle Bergum Saarland University, Saarland Informatics Campus, Graduate School of Computer Science, Maurice Rekrut German Research Center for Artificial Intelligence, Jonas Mucke Chemnitz University of Technology, Matthias Nadig German Research Center for Artificial Intelligence, Chris Parnin Microsoft | North Carolina State University, Janet Siegmund Chemnitz University of Technology, Sven Apel Saarland University
12:15
15m
Talk
What Motivates Software Practitioners to Contribute to Inner Source?
Research Papers
Zhiyuan Wan Zhejiang University, Xin Xia Huawei Software Engineering Application Technology Lab, Yun Zhang Zhejiang University City College, David Lo Singapore Management University, zhou daibing Huawei, Qiuyuan Chen Zhejiang University, Ahmed E. Hassan Queen's University
12:30 - 14:00
Newcomer's LunchSocial
Chair(s): Michael Pradel University of Stuttgart, Yi Li Nanyang Technological University, Singapore
14:00 - 15:30
14:00
15m
Talk
In War and Peace: The Impact of World Politics on Software Ecosystems
Ideas, Visions and Reflections
Raula Gaikovina Kula Nara Institute of Science and Technology
14:15
15m
Talk
A Retrospective Study of one Decade of Artifact Evaluations
Research Papers
Stefan Winter LMU Munich, Christopher Steven Timperley Carnegie Mellon University, Ben Hermann Technical University Dortmund, Jürgen Cito TU Wien, Jonathan Bell Northeastern University, Michael Hilton Carnegie Mellon University, USA, Dirk Beyer LMU Munich, Germany
14:30
15m
Talk
Quantifying Community Evolution in Developer Social Networks
Research Papers
Liang Wang State Key Laboratory for Novel Software Technology, Nanjing University, Ying Li Nanjing University, Jierui Zhang Nanjing University, Xianping Tao Nanjing University
14:45
15m
Talk
Understanding Skills for OSS Communities on GitHub
Research Papers
Jenny Liang University of Washington, Thomas Zimmermann Microsoft Research, Denae Ford Microsoft Research
Pre-print
15:00
15m
Talk
Achievement Unlocked: A Case Study on Gamifying DevOps Practices in Industry
Industry Paper
Patrick Ayoup Concordia University, Diego Costa Concordia University, Canada, Emad Shihab Concordia University
15:15
7m
Talk
iTiger: An Automatic Issue Title Generation Tool
Demonstrations
Ting Zhang Singapore Management University, Ivana Clairine Irsan Singapore Management University, Ferdian Thung Singapore Management University, DongGyun Han Royal Holloway, University of London, David Lo Singapore Management University, Lingxiao Jiang Singapore Management University
15:23
7m
Talk
CodeMatcher: A Tool for Large-Scale Code Search Based on Query Semantics Matching
Demonstrations
Chao Liu Chongqing University, Xuanlin Bao Chongqing University, Xin Xia Huawei Software Engineering Application Technology Lab, Meng Yan Chongqing University, David Lo Singapore Management University, Ting Zhang Singapore Management University
15:30 - 16:00
Coffee/Tea BreakSocial
16:00 - 17:30
16:00
15m
Research paper
Accurate Method and Variable Tracking in Commit History
Research Papers
Mehran Jodavi Concordia University, Nikolaos Tsantalis Concordia University
Link to publication Pre-print
16:15
15m
Research paper
Classifying Edits to Variability in Source Code
Research Papers
Paul Maximilian Bittner University of Ulm, Christof Tinnes Saarland University, Alexander Schultheiß Humboldt University of Berlin, Sören Viegener University of Ulm, Timo Kehrer University of Bern, Thomas Thüm University of Ulm
DOI
16:30
15m
Talk
The Evolution of Type Annotations in Python: An Empirical StudyDistinguished Paper Award
Research Papers
Luca Di Grazia University of Stuttgart, Michael Pradel University of Stuttgart
DOI Pre-print
16:45
15m
Talk
UTANGO: Untangling Commits with Context-aware, Graph-based, Code Change Clustering Learning Model
Research Papers
Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas
17:00
15m
Talk
Sometimes You Have to Treat the Symptoms: Tackling Model Drift in an Industrial Clone-and-Own Software Product Line
Industry Paper
Christof Tinnes Saarland University, Wolfgang Rössler Siemens Mobility GmbH, Uwe Hohenstein Siemens AG, Torsten Kühn Siemens Mobility GmbH, Andreas Biesdorf Trier University of Applied Sciences and Siemens AG, Munich, Germany, Sven Apel Saarland University
17:15
7m
Talk
Context Aware Code Recommendation in Intellij IDEA
Demonstrations
Shamsa Abid Lahore University of Management Sciences, Hamid Abdul Basit Prince Sultan University, Shafay Shamail LUMS, DHA, Lahore
17:23
7m
Talk
Python-by-Contract Dataset
Demonstrations
Jiyang Zhang University of Texas at Austin, Marko Ristin ZHAW School of Engineering, Phillip Schanely , Hans Wernher van de Venn Zurich University of Applied Sciences (ZHAW), Milos Gligoric University of Texas at Austin
16:00 - 17:30
Program Analysis IResearch Papers / Industry Paper at SRC LT 50
16:00
15m
Talk
Input Splitting for Cloud-Based Static Application Security Testing Platforms
Industry Paper
Maria Christakis MPI-SWS, Thomas Cottenier Amazon Web Services, Antonio Filieri AWS and Imperial College London, Linghui Luo Amazon Web Services, Muhammad Numair Mansur MPI-SWS, Lee Pike Amazon Web Services, Nicolás Rosner Amazon Web Services, Martin Schäf Amazon Web Services, Aritra Sengupta Amazon Web Services, Willem Visser Amazon Web Services
16:15
15m
Talk
Static Executes-Before Analysis for Event Driven Programs
Research Papers
Rekha Pai Indian Institute of Science, Bangalore, Abhishek Uppar Indian Institute of Science, Bangalore, Akshatha Shenoy TCS Research, Pune, Pranshul Kushwaha Indian Institute of Science, Bangalore, Deepak D'Souza IISc Bangalore
16:30
15m
Talk
App Security - Are We Getting Better?
Research Papers
Steven Arzt Fraunhofer SIT
16:45
15m
Talk
Large-Scale Analysis of Non-Termination Bugs in Real-World OSS Projects
Research Papers
Xiuhan Shi College of Intelligence and Computing, Tianjin University, China, Xiaofei Xie Singapore Management University, Singapore, Yi Li Nanyang Technological University, Singapore, Zhang Yao , Sen Chen Tianjin University, Li Xiaohong TianJin University
17:00
15m
Talk
On-the-Fly Syntax Highlighting Using Neural Networks
Research Papers
Marco Edoardo Palma University of Zurich, Pasquale Salza University of Zurich, Harald Gall University of Zurich
DOI Pre-print
17:15
15m
Talk
Declarative smart contracts
Research Papers
Haoxian Chen University of Pennsylvania, Gerald Whitters University of Pennsylvania, Mohammad Javad Amiri University of Pennsylvania, Yuepeng Wang Simon Fraser University, Boon Thau Loo University of Pennsylvania
16:00 - 17:30
Human/Computer InteractionResearch Papers / Demonstrations at SRC LT 51
16:00
15m
Talk
Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication AbilityDistinguished Paper Award
Research Papers
Mahnaz (Mana) Behroozi IBM, USA, Chris Brown Virginia Tech, USA, Chris Parnin Microsoft | North Carolina State University
16:15
15m
Talk
How to Formulate Specific How-To Questions in Software Development?
Research Papers
Mingwei Liu Fudan University, Xin Peng Fudan University, Andrian Marcus University of Texas at Dallas, Christoph Treude University of Melbourne, Jiazhan Xie Fudan University, Huanjun Xu Fudan University, Yanjun Yang Fudan University
16:30
15m
Talk
Pair Programming Conversations with Agents vs. Developers: Challenges & Opportunities for SE Community
Research Papers
Peter Robe The University of Tulsa, Sandeep Kuttal The University of Tulsa, Jake AuBuchon University of Tulsa, Jacob Hart University of Tulsa
16:45
15m
Talk
Psychologically-Inspired, Unsupervised Inference of Perceptual Groups of GUI Widgets from GUI Images
Research Papers
Mulong Xie Australian National University, Australia, Zhenchang Xing Australian National University, Sidong Feng Monash University, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW, Chunyang Chen Monash University
17:00
15m
Talk
Toward Interactive Bug Reporting for (Android App) End-Users
Research Papers
Yang Song The College of William & Mary, Junayed Mahmud George Mason University, Ying Zhou University of Texas at Dallas, Oscar Chaparro College of William & Mary, Kevin Moran George Mason University, Andrian Marcus University of Texas at Dallas, Denys Poshyvanyk William and Mary
17:15
7m
Talk
MultIPAs : Applying Program Transformations to Introductory Programming Assignments for Data Augmentation
Demonstrations
Pedro Orvalho INESC-ID/IST - U. Lisboa, Mikoláš Janota Czech Technical University in Prague, Vasco Manquinho INESC-ID; Universidade de Lisboa
17:23
7m
Talk
PolyFax: A Toolkit for Characterizing Multi-Language Software
Demonstrations
Wen Li , Li Li Monash University, Haipeng Cai Washington State University, USA
Pre-print

Tue 15 Nov

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

08:00 - 09:00
Women's BreakfastSocial
Chair(s): Baishakhi Ray Columbia University, Rashina Hoda Monash University
09:00 - 10:30
Keynote II - Marsha ChechikPlenary Events
Chair(s): Miryung Kim University of California at Los Angeles, USA
09:00
90m
Keynote
On Safety, Assurance and Reliability: A Software Engineering Perspective
Plenary Events
Marsha Chechik University of Toronto
10:30 - 11:00
Coffee/Tea BreakSocial
11:00 - 12:30
11:00
15m
Talk
Testing of Machine Learning Models with Limited Samples: An Industrial Vacuum Pumping Application
Industry Paper
Ayan Chatterjee Karlstad University, Bestoun S. Ahmed Karlstad University Sweden, Erik Hallin Uddeholms AB, Sweden, Anton Engman Uddeholms AB, Sweden
Pre-print
11:15
15m
Talk
Understanding Performance Problems in Deep Learning Systems
Research Papers
Junming Cao Fudan University, Bihuan Chen Fudan University, China, Chao Sun Fudan University, Longjie Hu Fudan University, Shuaihong Wu Fudan University, Xin Peng Fudan University
11:30
15m
Talk
API Recommendation for Machine Learning Libraries: How Far Are We?
Research Papers
Moshi Wei York University, Yuchao Huang Institute of Software Chinese Academy of Sciences, Junjie Wang Institute of Software at Chinese Academy of Sciences, Jiho Shin York University, Nima Shiri harzevili York University, Song Wang York University
Pre-print
11:45
15m
Talk
No More Fine-tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence
Research Papers
Chaozheng Wang Harbin Institute of Technology, Yuanhang Yang Harbin Institute of Technology, Cuiyun Gao Harbin Institute of Technology, Yun Peng The Chinese University of Hong Kong, Hongyu Zhang University of Newcastle, Michael Lyu The Chinese University of Hong Kong
12:00
15m
Talk
Improving ML-based Information Retrieval Software with User-Driven Functional Testing and Defect Class Analysis
Industry Paper
Junjie Zhu Apple Inc., Teng Long Apple, Wei Wang Apple Inc., Atif Memon Apple Inc.
12:15
15m
Talk
Discrepancies among Pre-trained Deep Neural Networks: A New Threat to Model Zoo Reliability
Ideas, Visions and Reflections
Diego Montes Purdue University
11:00 - 12:30
Software Testing IIResearch Papers / Demonstrations at SRC LT 50
11:00
15m
Talk
Cross-Device Record and Replay for Android Apps
Research Papers
Cong Li Nanjing University, Yanyan Jiang Nanjing University, Chang Xu Nanjing University
11:15
15m
Talk
Online Testing of RESTful APIs: Promises and ChallengesDistinguished Paper Award
Research Papers
Alberto Martin-Lopez Universidad de Sevilla, Sergio Segura Universidad de Sevilla, Antonio Ruiz-Cortés University of Seville
Pre-print
11:30
15m
Talk
AVGUST: Automating Usage-Based Test Generation from Videos of App Executions
Research Papers
Yixue Zhao University of Massachusetts Amherst, Saghar Talebipour University of Southern California, Kesina Baral George Mason University, Hyojae Park Sharon High School, Leon Yee Valley Christian High School, Safwat Ali Khan George Mason University, Yuriy Brun University of Massachusetts Amherst, Nenad Medvidović University of Southern California, USA, Kevin Moran George Mason University
DOI Pre-print
11:45
15m
Talk
Detecting Non-crashing Functional Bugs in Android Apps via Deep-State Differential Analysis
Research Papers
Jue Wang Nanjing University, Yanyan Jiang Nanjing University, Ting Su East China Normal University, Shaohua Li ETH Zürich, Chang Xu Nanjing University, Jian Lu Nanjing University, China, Zhendong Su ETH Zurich
12:00
15m
Talk
RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs
Research Papers
Seulbae Kim Georgia Institute of Technology, Taesoo Kim Georgia Tech
12:15
7m
Talk
CLIFuzzer: Mining Grammars for Command-Line Invocations
Demonstrations
Abhilash Gupta CISPA Helmholtz Center for Information Security, Rahul Gopinath University of Sydney, Andreas Zeller CISPA
12:23
7m
Talk
RecipeGen++: An Automated Trigger Action Programs Generator
Demonstrations
Imam Nur Bani Yusuf Singapore Management University, Singapore, Diyanah Binte Abdul Jamal Singapore Management University, Lingxiao Jiang Singapore Management University, David Lo Singapore Management University
11:00 - 12:30
11:00
15m
Talk
AgileCtrl: A Self-adaptive Framework for Configuration Tuning
Research Papers
Shu Wang Linkedin, Henry Hoffmann University of Chicago, Shan Lu University of Chicago
11:15
15m
Talk
Using Nudges to Accelerate Code Reviews at ScaleDistinguished Paper Award
Research Papers
Qianhua Shan University of Michigan, David Sukhdeo Meta, Qianying Huang Meta, Seth Rogers Meta, Lawrence Chen Meta, Elise Paradis Facebook Inc, Peter Rigby Concordia University, Montreal, Canada, Nachiappan Nagappan
11:30
15m
Talk
First Come First Served: The Impact of File Position on Code ReviewDistinguished Paper Award
Research Papers
Enrico Fregnan University of Zurich, Larissa Braz University of Zurich, Marco D'Ambros CodeLounge@Software Institute, Università della Svizzera italiana, Gül Calikli University of Glasgow, Alberto Bacchelli University of Zurich
DOI Pre-print Media Attached
11:45
15m
Talk
Code, Quality, and Process Metrics in Graduated and Retired ASFI Projects
Research Papers
Ştefan Stănciulescu University of California, Davis, Likang Yin University of California, Davis, Vladimir Filkov University of California at Davis
12:00
15m
Talk
Are Elevator Software Robust Against Uncertainties? Results and Experiences from an Industrial Case Study
Industry Paper
Liping Han Nanjing University of Aeronautics and Astronautics & Simula Research Laboratory, Tao Yue Simula Research Laboratory, Norway, Shaukat Ali Simula Research Laboratory, Norway, Aitor Arrieta Mondragon University, Maite Arratibel Orona
12:15
7m
Talk
COREQQA - A COmpliance REQuirements Understanding using Question Answering Tool
Demonstrations
Sallam Abualhaija University of Luxembourg, Chetan Arora Deakin University, Lionel Briand University of Luxembourg; University of Ottawa
12:23
7m
Talk
TAPHSIR: Towards AnaPHoric Ambiguity Detection and ReSolution In Requirements
Demonstrations
Saad Ezzini University of Luxembourg, Sallam Abualhaija University of Luxembourg, Chetan Arora Deakin University, Mehrdad Sabetzadeh University of Ottawa
12:30 - 14:00
LunchSocial
14:00 - 15:30
14:00
15m
Talk
AutoPruner: Tranformer-based Call Graph Pruning
Research Papers
Le-Cong Thanh Singapore Management University, Singapore, Hong Jin Kang Singapore Management University, Singapore, Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Stefanus Agus Haryono Singapore Management University, David Lo Singapore Management University, Xuan-Bach D. Le Singapore Management University, Singapore, Huynh Quyet Thang Hanoi University of Science and Technology
Pre-print
14:15
15m
Talk
Exploring and Evaluating Personalized Models for Code Generation
Industry Paper
Andrei Zlotchevski McGill University, Dawn Drain , Alexey Svyatkovskiy Microsoft, Colin Clement Microsoft, Neel Sundaresan Microsoft Corporation, Michele Tufano Microsoft
DOI Pre-print
14:30
15m
Talk
Lighting Up Supervised Learning in User Review-Based Code Localization: Dataset and Benchmark
Research Papers
Xinwen Hu State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Yu Guo State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Jianjie Lu State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Zheling Zhu State Key Laboratory for Novel Software and Technology, Nanjing University, 22 Hankou Road, Nanjing, China, Chuanyi Li State Key Laboratory for Novel Software Technology, Nanjing University, Jidong Ge , Liguo Huang Dept. of Computer Science, Southern Methodist University, Dallas, TX, 75205, Bin Luo Software Institute, Nanjing University
14:45
15m
Talk
CORMS: A GitHub and Gerrit based Hybrid Code Reviewer Recommendation Approach for Modern Code Review
Research Papers
Pandya Prahar Hemantkumar DAIICT Gandhinagar, India, Saurabh Tiwari DAIICT Gandhinagar, India
15:00
15m
Full-paper
Hierarchical Multi-Kernel Relevant Vector Machines for Requirement Extraction from App Reviews
Research Papers
Moayad Alshangiti University of Jeddah, Weishi Shi Rochester Institute of Technology, Eduardo Coelho de Lima Rochester Institute of Technology, Xumin Liu Rochester Institute of Technology, Qi Yu RIT
15:15
15m
Talk
Semi-Supervised Pre-processing for Learning-based Traceability Framework on Real-World Software Projects
Research Papers
Liming Dong Nanjing University, He Zhang Nanjing University, Wei Liu Nanjing University, Zhiluo Weng Nanjing University, Hongyu Kuang Nanjing University
14:00 - 15:30
14:00
15m
Talk
Parasol: Efficient Parallel Synthesis of Large Model Spaces
Research Papers
Clay Stevens University of Nebraska-Lincoln, Hamid Bagheri University of Nebraska-Lincoln
14:15
15m
Talk
Modus: A Datalog Dialect for Building Container Images
Research Papers
Chris Tomy University College London, Tingmao Wang University College London, Earl T. Barr University College London, UK, Sergey Mechtaev University College London
14:30
15m
Talk
Multi-Phase Invariant Synthesis
Research Papers
Daniel Riley Florida State University, Grigory Fedyukovich Florida State University
14:45
15m
Talk
Input Invariants
Research Papers
Dominic Steinhöfel CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA
15:00
15m
Talk
Neural Termination Analysis
Research Papers
Mirco Giacobbe University of Birmingham, Daniel Kroening University of Oxford, Julian Parsert University of Innsbruck, Austria
15:15
7m
Talk
SolSEE: A Source-Level Symbolic Execution Engine for Solidity
Demonstrations
Shang-Wei Lin Nanyang Technological University, Palina Tolmach Nanyang Technological University, Singapore, Institute of High Performance Computing, Agency for Science, Technology and Research (A*STAR), Singapore, Ye Liu , Yi Li Nanyang Technological University, Singapore
15:23
7m
Talk
MpBP: Verifying Robustness of Neural Networks with Multi-Path Bound Propagation
Demonstrations
Ye Zheng Shenzhen University, Shenzhen, China, Jiaxiang Liu Shenzhen University, Xiaomu Shi Shenzhen University
14:00 - 15:30
14:00
15m
Talk
Metadata-based Retrieval for Resolution Recommendation in AIOps
Industry Paper
Harshit Kumar IBM, Ruchi Mahindru IBM Research, Debanjana Kar IBM Research
14:15
15m
Talk
PaReco: Patched Clones and Missed Patches among the Divergent Variants of a Software Family
Research Papers
Poedjadevie Ramkisoen University of Antwerp, Belgium, John Businge University of Antwerp, Belgium, Brent van Bladel University of Antwerp, Belgium, Alexandre Decan University of Mons, Serge Demeyer University of Antwerp, Belgium, Coen De Roover Vrije Universiteit Brussel, Foutse Khomh Polytechnique Montréal
14:30
15m
Talk
Fault Localization to Detect Co-Change Fixing Locations
Research Papers
Yi Li New Jersey Institute of Technology, Shaohua Wang New Jersey Institute of Technology, Tien N. Nguyen University of Texas at Dallas
14:45
15m
Talk
The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Prediction and Localization
Research Papers
Chao Ni Zhejiang University, Wei Wang Fudan University, Kaiwen Yang Zhejiang University, Xin Xia Huawei Software Engineering Application Technology Lab, Kui Liu Huawei Software Engineering Application Technology Lab, David Lo Singapore Management University
15:00
15m
Talk
Reflections on Software Failure Analysis
Ideas, Visions and Reflections
15:15
7m
Talk
eGEN: An Energy-saving Modeling Language and Code Generator for Location-sensing of Mobile Apps
Demonstrations
Kowndinya Boyalakuntla Indian Institute of Technology Tirupati, Marimuthu Chinnakali National Institute of Technology Karnataka, Sridhar Chimalakonda Indian Institute of Technology Tirupati, K. Chandrasekaran National Institute of Technology Karnataka
15:23
7m
Talk
SFLKit: A Workbench for Statistical Fault Localization
Demonstrations
Marius Smytzek CISPA Helmholtz Center for Information Security, Andreas Zeller CISPA
15:30 - 16:00
Coffee/Tea BreakSocial
16:00 - 17:30
Transportation to Banquet from 16:30Social

Wed 16 Nov

Displayed time zone: Beijing, Chongqing, Hong Kong, Urumqi change

08:00 - 09:00
Regional BreakfastSocial
Chair(s): Aldeida Aleti Monash University, David Lo Singapore Management University
09:00 - 10:30
Keynote III - Impact Paper Award by Gail Murphy Plenary Events
Chair(s): Cristian Cadar Imperial College London, UK
09:00
90m
Keynote
Task Modularity and the Emergence of Software Value Streams
Plenary Events
Mik Kersten , Gail Murphy University of British Columbia
10:30 - 11:00
Coffee/Tea BreakSocial
11:00 - 12:30
Mining Software RepositoriesResearch Papers / Demonstrations at SRC Auditorium 2
11:00
15m
Talk
An Exploratory Study on the Predominant Programming Paradigms in Python Code
Research Papers
Robert Dyer University of Nebraska-Lincoln, Jigyasa Chauhan University of Nebraska-Lincoln
Pre-print Media Attached
11:15
15m
Talk
Making Python Code Idiomatic by Automatic Refactoring Non-Idiomatic Python Code with Pythonic Idioms
Research Papers
zejun zhang , Zhenchang Xing Australian National University, Xin Xia Huawei Software Engineering Application Technology Lab, Xiwei (Sherry) Xu CSIRO Data61, Liming Zhu CSIRO’s Data61; UNSW
11:30
15m
Talk
An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
Research Papers
Xiao Yi The Chinese University of Hong Kong, Daoyuan Wu The Chinese University of Hong Kong, Lingxiao Jiang Singapore Management University, Yuzhou Fang The Chinese University of Hong Kong, Kehuan Zhang The Chinese University of Hong Kong, Wei Zhang Nanjing University of Posts and Telecommunications
11:45
15m
Talk
How to Better Utilize Code Graphs in Semantic Code Search?
Research Papers
Yucen Shi Northeastern University, China, Ying Yin Northeastern University, China, Zhengkui Wang Singapore Institute of Technology, David Lo Singapore Management University, Tao Zhang Macau University of Science and Technology (MUST), Xin Xia Huawei Software Engineering Application Technology Lab, Yuhai Zhao Northeastern University, Bowen Xu School of Information Systems, Singapore Management University
12:00
15m
Talk
23 Shades of Self-Admitted Technical Debt: An Empirical Study on Machine Learning Software
Research Papers
David OBrien Dept. of Computer Science, Iowa State University, Sumon Biswas Carnegie Mellon University, Sayem Imtiaz Dept. of Computer Science, Iowa State University, Rabe Abdalkareem Carleton University, Emad Shihab Concordia University, Hridesh Rajan Iowa State University
12:15
7m
Talk
WikiDoMiner: Wikipedia Domain-specific Miner
Demonstrations
Saad Ezzini University of Luxembourg, Sallam Abualhaija University of Luxembourg, Mehrdad Sabetzadeh University of Ottawa
12:23
7m
Talk
RegMiner: Mining Replicable Regression Dataset from Code Repositories
Demonstrations
Xuezhi Song Fudan University, Yun Lin Shanghai Jiao Tong University; National University of Singapore, Yijian Wu Fudan University, Yifan Zhang National University of Singapore, Siang Hwee Ng National University of Singapore, Xin Peng Fudan University, Jin Song Dong National University of Singapore, Hong Mei Peking University
11:00 - 12:30
11:00
15m
Talk
NeuDep: Neural Binary Memory Dependence Analysis
Research Papers
Kexin Pei Columbia University, Dongdong She Columbia University, USA, Michael Wang Massachusetts Institute of Technology, Scott Geng Columbia University, Zhou Xuan Purdue University, Yaniv David Columbia University, Junfeng Yang Columbia University, Suman Jana Columbia University, Baishakhi Ray Columbia University
11:15
15m
Talk
DynaPyt: A Dynamic Analysis Framework for Python
Research Papers
Aryaz Eghbali, Michael Pradel University of Stuttgart
Pre-print
11:30
15m
Talk
Language-Agnostic Dynamic Analysis of Multilingual Code: Promises, Pitfalls, and Prospects
Ideas, Visions and Reflections
Haoran Yang Washington State University, USA
11:45
15m
Talk
Cross-Language Android Permission Specification
Research Papers
Chaoran Li Swinburne University of Technology, Xiao Chen Monash University, Ruoxi Sun The University of Adelaide, Minhui (Jason) Xue University of Adelaide, Sheng Wen Swinburne University of Technology, Muhammad Ejaz Ahmed Data61, CSIRO, Seyit Camtepe CSIRO Data61, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology
12:00
15m
Talk
Peahen: Fast and Precise Static Deadlock Detection via Context Reduction
Research Papers
Yuandao Cai The Hong Kong University of Science and Technology, Chengfeng Ye The Hong Kong University of Science and Technology, Qingkai Shi Purdue University, Charles Zhang Hong Kong University of Science and Technology
12:15
7m
Talk
FIM: Fault Injection and Mutation for Simulink
Demonstrations
Ezio Bartocci , Leonardo Mariani University of Milano-Bicocca, Dejan Nickovic Austrian Institute of Technology, Drishti Yadav Technische Universität Wien
12:23
7m
Talk
JSIMutate: Understanding Performance Results through Mutations
Demonstrations
Thomas Laurent Lero & University College Dublin, Paolo Arcaini National Institute of Informatics , Catia Trubiani Gran Sasso Science Institute, Anthony Ventresque University College Dublin & Lero, Ireland
11:00 - 12:30
11:00
15m
Talk
A Case Study of Implicit Mentoring, its Prevalence, and Impact in Apache
Research Papers
Zixuan Feng Oregon State University, Amreeta Chatterjee Oregon State University, Anita Sarma Oregon State University, Iftekhar Ahmed University of California, Irvine
11:15
15m
Talk
Workgraph: Personal Focus vs. Interruption for Engineers at Meta
Industry Paper
Yifen Chen Meta Inc, Peter Rigby Concordia University, Montreal, Canada, Yulin Chen Meta Inc, Kun Jiang Meta Inc, Nader Dehghani Meta Inc, Qianying Huang Meta, Peter Cottle Meta Inc, Clayton Andrews Meta Inc, Noah Lee Meta Platforms, Inc., Nachiappan Nagappan
11:30
15m
Talk
Understanding Automated Code Review Process and Developer Experience in Industry
Industry Paper
Hyungjin Kim Samsung Research, Samsung Electronics, Yonghwi Kwon Samsung Research, Samsung Electronics, Sangwoo Joh Samsung Research, Samsung Electronics, Hyukin Kwon Samsung Research, Samsung Electronics, Yeonhee Ryou Samsung Research, Samsung Electronics, Taeksu Kim Samsung Research, Samsung Electronics
11:45
15m
Talk
Software Security during Modern Code Review: The Developer's Perspective
Research Papers
Larissa Braz University of Zurich, Alberto Bacchelli University of Zurich
DOI Pre-print Media Attached
12:00
15m
Talk
Program Merge Conflict Resolution via Neural Transformers
Research Papers
Alexey Svyatkovskiy Microsoft, Sarah Fakhoury Microsoft Research, Negar Ghorbani University of California, Irvine, Todd Mytkowicz Microsoft Research, Elizabeth Dinella , Christian Bird Microsoft Research, Jinu Jang Microsoft, Neel Sundaresan Microsoft Corporation, Shuvendu K. Lahiri Microsoft Research
14:00 - 15:30
14:00
15m
Talk
Automated Unearthing of Dangerous Issue Reports
Research Papers
shengyi pan Zhejiang University, Jiayuan Zhou Centre for Software Excellence, Huawei, Canada, Filipe Cogo Centre for Software Excellence, Huawei, Canada, Xin Xia Huawei Software Engineering Application Technology Lab, Lingfeng Bao Zhejiang University, Xing Hu Zhejiang University, Shanping Li Zhejiang University, Ahmed E. Hassan Queen's University
14:15
15m
Talk
On the Vulnerability Proneness of Multilingual Code
Research Papers
Wen Li , Li Li Monash University, Haipeng Cai Washington State University, USA
Pre-print
14:30
15m
Talk
Tracking Patches for Open Source Software Vulnerabilities
Research Papers
Congying Xu , Bihuan Chen Fudan University, China, Chenhao Lu Fudan University, Kaifeng Huang Fudan University, Xin Peng Fudan University, Yang Liu Nanyang Technological University
14:45
15m
Talk
DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks
Research Papers
Qi Qin ShanghaiTech University, JulianAndres JiYang ShanghaiTech University, Fu Song ShanghaiTech University, Taolue Chen Birkbeck University of London, Xinyu Xing Northwestern University
15:00
7m
Talk
VulCurator: A Vulnerability-Fixing Commit Detector
Demonstrations
Truong Giang Nguyen School of Computing and Information Systems, Singapore Management University, Le-Cong Thanh Singapore Management University, Singapore, Hong Jin Kang Singapore Management University, Singapore, Xuan-Bach D. Le Singapore Management University, Singapore, David Lo Singapore Management University
15:08
7m
Talk
KVS: A Tool for Knowledge-Driven Vulnerability Searching
Demonstrations
Xingqi Cheng Yangzhou University, Xiaobing Sun Yangzhou University, Lili Bo Yangzhou University, Ying Wei Yangzhou University
15:15
7m
Talk
MANDO-GURU: Vulnerability Detection for Smart Contract Source Code By Heterogeneous Graph Embeddings
Demonstrations
Hoang H. Nguyen L3S Research Center, Leibniz Universität Hannover, Hannover, Germany, Nhat-Minh Nguyen Singapore Management University, Singapore, Hong-Phuc Doan Hanoi University of Science and Technology, Hanoi, Vietnam, Zahra Ahmadi L3S Research Center, Leibniz Universität Hannover, Hannover, Germany, Thanh-Nam Doan Independent Researcher, Atlanta, Georgia, USA, Lingxiao Jiang Singapore Management University
15:23
7m
Talk
FastKLEE: Faster Symbolic Execution via Reducing Redundant Bound Checking of Type-Safe Pointers
Demonstrations
Haoxin Tu Singapore Management University, Singapore, Lingxiao Jiang Singapore Management University, Xuhua Ding Singapore Management University, He Jiang School of Software, Dalian University of Technology
14:00 - 15:30
14:00
15m
Talk
Unite: An Adapter for Transforming Analysis Tools to Web Services via OSLC
Industry Paper
Ondřej Vašíček Brno University of Technology, Jan Fiedor Brno University of Technology, Tomáš Kratochvíla Honeywell International, Křena Bohuslav Brno University of Technology, Aleš Smrčka Brno University of Technology, Tomáš Vojnar Brno University of Technology
14:15
15m
Talk
Discovering Feature Flag Interdependencies in Microsoft Office
Industry Paper
Michael Schröder TU Wien, Katja Kevic Microsoft, Dan Gopstein Microsoft, Brendan Murphy Microsoft, Jennifer Beckmann Microsoft
Pre-print
14:30
15m
Talk
What Did You Pack in My App? A Systematic Analysis of Commercial Android Packers
Industry Paper
Zikan Dong Beijing University of Posts and Telecommunications, Hongxuan Liu Peking University, Liu Wang Beijing University of Posts and Telecommunications, Xiapu Luo Hong Kong Polytechnic University, Yao Guo Peking University, Guoai Xu Beijing University of Posts and Telecommunications, Xusheng Xiao Case Western Reserve University, Haoyu Wang Huazhong University of Science and Technology, China
14:45
15m
Research paper
Quantitative relational modelling with QAlloy
Research Papers
Pedro Silva University of Minho & INESC TEC, Jose Nuno Oliveira University of Minho, Portugal / INESC TEC, Portugal, Nuno Macedo Faculty of Engineering, University of Porto and INESC TEC, Alcino Cunha University of Minho and INESC TEC, Portugal
15:00
15m
Talk
Demystifying the Underground Ecosystem of Account Registration Bots
Research Papers
Yuhao Gao University of Technology Sydney, Australia / Beijing University of Posts and Telecommunications, China, Guoai Xu Beijing University of Posts and Telecommunications, Li Li Monash University, Xiapu Luo Hong Kong Polytechnic University, Chenyu Wang Beijing University of Posts and Telecommunications, Yulei Sui University of Technology Sydney
15:15
15m
Talk
Using Graph Neural Networks for Program Termination
Research Papers
Yoav Alon University of Bristol, Cristina David University of Bristol, UK
14:00 - 15:30
Program Repair/SynthesisResearch Papers / Industry Paper at SRC LT 53
14:00
15m
Talk
PyTER: Effective Program Repair for Python Type Errors
Research Papers
Wonseok Oh Korea University, Hakjoo Oh Korea University
14:15
15m
Talk
VulRepair: A T5-based Automated Software Vulnerability Repair
Research Papers
Micheal Fu Monash University, Chakkrit Tantithamthavorn Monash University, Trung Le Monash University, Australia, Van Nguyen Monash University, Australia, Dinh Phung Monash University, Australia
14:30
15m
Talk
An Empirical Study of Deep Transfer Learning-based Program Repair for Kotlin Projects
Industry Paper
Misoo Kim Sungkyunkwan University, Youngkyoung Kim Sungkyunkwan University, Hohyeon Jeong Sungkyunkwan University, Jinseok Heo Sungkyunkwan University, Sungoh Kim Samsung Electronics, Hyunhee Chung Samsung Electronics, Eunseok Lee Sungkyunkwan University
14:45
15m
Talk
DeepDev-PERF: A Deep Learning-Based Approach For Improving Software Performance
Research Papers
Spandan Garg Microsoft Corporation, Roshanak Zilouchian Moghaddam Microsoft, Colin Clement Microsoft, Neel Sundaresan Microsoft Corporation, Chen Wu Microsoft Corporation
15:00
15m
Talk
Less Training, More Repairing Please: Revisiting Automated Program Repair via Zero-shot Learning
Research Papers
Chunqiu Xia UIUC, Lingming Zhang University of Illinois at Urbana-Champaign
15:15
15m
Talk
NL2Viz: Natural Language to Visualization via Constrained Syntax-Guided Synthesis
Research Papers
Zhengkai Wu University of Illinois at Urbana-Champaign, Vu Le Microsoft, Ashish Tiwari Microsoft, Sumit Gulwani Microsoft, Arjun Radhakrishna Microsoft, Ivan Radiček Microsoft, Gustavo Soares Microsoft, Xinyu Wang University of Michigan, Zhenwen Li Peking University, China, Tao Xie Peking University
15:30 - 16:00
Coffee/Tea BreakSocial
16:00 - 17:00
Test of time awardPlenary Events
Chair(s): Cristian Cadar Imperial College London, UK, Miryung Kim University of California at Los Angeles, USA
17:00 - 17:30
Closing sessionPlenary Events
Chair(s): Abhik Roychoudhury National University of Singapore

Not scheduled yet

Not scheduled yet
Talk
Do Bugs Lead to Unnaturalness of Source Code?
Research Papers
Yanjie Jiang Beijing Institute of Technology, Hui Liu Beijing Institute of Technology, Yuxia Zhang Beijing Institute of Technology, Weixing Ji Beijing Institute of Technology, Hao Zhong Shanghai Jiao Tong University, Lu Zhang Peking University
Not scheduled yet
Talk
Actionable and Interpretable Fault Localization for Recurring Failures in Online Service Systems
Research Papers
Zeyan Li Tsinghua University, Nengwen Zhao Tsinghua University, Mingjie Li Tsinghua University, Xianglin Lu Tsinghua University, Lixin Wang , Dongdong Chang , Xiaohui Nie , Li Cao , Wenchi Zhang BizSeer, Kaixin Sui BizSeer, Yanhua Wang , Xu Du , Guoqiang Duan , Dan Pei Tsinghua University
Not scheduled yet
Talk
TraceCRL: Contrastive Representation Learning for Microservice Trace Analysis
Research Papers
Chenxi Zhang Fudan University, Xin Peng Fudan University, Tong Zhou Fudan University, Chaofeng Sha Fudan University, Zhenghui Yan Fudan University, Yiru Chen Fudan University, Yang Hong Monash University
Not scheduled yet
Talk
Automating Code Review Activities by Large-Scale Pre-Training
Research Papers
Zhiyu Li Peking University, Shuai Lu Microsoft Research Asia, Daya Guo Sun Yat-sen University, Nan Duan Microsoft Research Asia, Shailesh Jannu LinkedIn, Grant Jenks LinkedIn, Deep Majumder LinkedIn, Jared Green LinkedIn, Alexey Svyatkovskiy Microsoft, Shengyu Fu Microsoft, USA, Neel Sundaresan Microsoft Corporation
Not scheduled yet
Talk
SamplingCA: Effective and Efficient Sampling-Based Pairwise Testing for Highly Configurable Software Systems
Research Papers
Chuan Luo Beihang University, Qiyuan Zhao Shanghai Jiao Tong University, China, Shaowei Cai Institute of Software at Chinese Academy of Sciences, China, Hongyu Zhang University of Newcastle, Chunming Hu Beihang University, China
Not scheduled yet
Talk
NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems
Research Papers
SiminChen University of Texas at Dallas, USA, Cong Liu University of Texas at Dallas, USA, Mirazul Haque UT Dallas, Zihe Song The University of Texas at Dallas, Wei Yang University of Texas at Dallas
Not scheduled yet
Talk
AccessiText: Automated Detection of Text Accessibility Issues in Android Apps
Research Papers
Abdulaziz Alshayban University of California, Irvine, Sam Malek University of California at Irvine, USA
Not scheduled yet
Talk
SymMC: Approximate Model Enumeration and Counting Using Symmetry Information for Alloy Specifications
Research Papers
Wenxi Wang University of Texas at Austin, Yang Hu The University of Texas at Austin, Kenneth L. McMillan University of Texas at Austin, Sarfraz Khurshid University of Texas at Austin
Pre-print
Not scheduled yet
Talk
SPINE: A Scalable Log Parser with Feedback GuidanceDistinguished Paper Award
Research Papers
Xuheng Wang Tsinghua University, Xu Zhang Microsoft Research, Liqun Li Microsoft Research, China, Shilin He Microsoft Research, Hongyu Zhang University of Newcastle, Yudong Liu Microsoft Research, Beijing, China, Lingling Zheng Microsoft Azure, Yu Kang Microsoft Research, Beijing, China, Qingwei Lin Microsoft Research, Yingnong Dang Microsoft Azure, Saravan Rajmohan Microsoft 365, Dongmei Zhang Microsoft Research
Not scheduled yet
Talk
Automatically Deriving JavaScript Static Analyzers from Specifications using Meta-Level Static Analysis
Research Papers
Jihyeok Park Oracle Labs, Australia, Seungmin An KAIST, Sukyoung Ryu KAIST
Not scheduled yet
Talk
RULER: Discriminative and Iterative Adversarial Training for Deep Neural Network Fairness
Research Papers
Guanhong Tao Purdue University, USA, Weisong Sun State Key Laboratory for Novel Software Technology, Nanjing University, Tingxu Han Nanjing University, Chunrong Fang Nanjing University, Xiangyu Zhang Purdue University
Not scheduled yet
Talk
Corporate Dominance in Open Source Ecosystems: A Case Study of OpenStack
Research Papers
Yuxia Zhang Beijing Institute of Technology, Klaas-Jan Stol University College Cork, Lero, SINTEF, Hui Liu Beijing Institute of Technology, Minghui Zhou Peking University, China
Not scheduled yet
Talk
SlimCodeBERT: Accelerating Pre-trained Code Models with Program Reduction
Research Papers
zhangzhaowei School of Software, Shanghai Jiao Tong University, Hongyu Zhang University of Newcastle, Beijun Shen School of Electronic Information and Electrical Engineering, Shanghai Jiao Tong University, Xiaodong Gu Shanghai Jiao Tong University, China
Pre-print File Attached
Not scheduled yet
Talk
CommentFinder: A Simpler, Faster, More Accurate Code Review Comments Recommendation
Research Papers
Yang Hong Monash University, Chakkrit Tantithamthavorn Monash University, Patanamon Thongtanunam University of Melbourne, Aldeida Aleti Monash University
Not scheduled yet
Talk
Minerva: Browser API Fuzzing with Dynamic Mod-Ref AnalysisDistinguished Paper Award
Research Papers
Chijin Zhou Tsinghua University, Quan Zhang Tsinghua University, Mingzhe Wang Tsinghua University, Lihua Guo Tsinghua University, Jie Liang Tsinghua University, Zhe Liu Nanjing University of Aeronautics and Astronautics, Mathias Payer EPFL, Yu Jiang Tsinghua University
Not scheduled yet
Talk
Putting Them under Microscope: A Fine-grained Approach for Detecting Redundant Test Cases in Natural Language
Research Papers
Zhiyuan Chang Institute of Software, Chinese Academy of Sciences, Mingyang Li Institute of Software at Chinese Academy of Sciences, China, Junjie Wang Institute of Software at Chinese Academy of Sciences, Qing Wang Institute of Software at Chinese Academy of Sciences, Shoubin Li ISCAS
Not scheduled yet
Talk
Generic Sensitivity: Customizing Context-Sensitive Pointer Analysis for Generics
Research Papers
Haofeng Li Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, JieLu State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Haining Meng Institute of Computing Technology, CAS; University of Chinese Academy of Sciences, Liqing Cao Institute of Computing Technology, Chinese Academy of Sciences, Yongheng Huang State Key Laboratory of Computer Architecture, Institute of Computing Technology, Chinese Academy of Sciences, Lian Li Institute of Computing Technology at Chinese Academy of Sciences, China, Lin Gao TianqiSoft Inc
Not scheduled yet
Talk
AUGER: Automatically Generating Review Comments with Pre-training Models
Research Papers
Lingwei Li Institute of Software, Chinese Academy of Sciences, Li Yang Institute of Software, Chinese Academy of Sciences, Huaxi Jiang Institute of Software, Chinese Academy of Sciences, Jun Yan Institute of Software at Chinese Academy of Sciences, China, Tiejian Luo University of Chinese Academy of Sciences, Zihan Hua Wuhan University, Geng Liang Institute of Software, Chinese Academy of Sciences, Chun Zuo Sinosoft Company Limited
Pre-print
Not scheduled yet
Talk
Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study
Research Papers
Yu Nong Washington State University, Yuzhe Ou The University of Texas at Dallas, Michael Pradel University of Stuttgart, Feng Chen The University of Texas at Dallas, Haipeng Cai Washington State University, USA
Pre-print
Not scheduled yet
Talk
You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search
Research Papers
Yao Wan Huazhong University of Science and Technology, Shijie Zhang Huazhong University of Science and Technology, Hongyu Zhang University of Newcastle, Yulei Sui University of Technology Sydney, Guandong Xu University of Technology, Sydney, Dezhong Yao Huazhong University of Science and Technology, Hai Jin Huazhong University of Science and Technology, Lichao Sun Lehigh University
Not scheduled yet
Talk
Detecting Simulink Compiler Bugs via Controllable Zombie Blocks Mutation
Research Papers
Shikai Guo Dalian Maritime University, He Jiang School of Software, Dalian University of Technology, Zhihao Xu Dalian Maritime University, Xiaochen Li Dalian University of Technology, Zhilei Ren Dalian University of Technology, Zhide Zhou Dalian University of Technology, Rong Chen Dalian Maritime University

Accepted Papers

Title
23 Shades of Self-Admitted Technical Debt: An Empirical Study on Machine Learning Software
Research Papers
A Case Study of Implicit Mentoring, its Prevalence, and Impact in Apache
Research Papers
AccessiText: Automated Detection of Text Accessibility Issues in Android Apps
Research Papers
Accurate Method and Variable Tracking in Commit History
Research Papers
Link to publication Pre-print
Actionable and Interpretable Fault Localization for Recurring Failures in Online Service Systems
Research Papers
Adaptive Fairnesss Improvement based on Causality Analysis
Research Papers
AgileCtrl: A Self-adaptive Framework for Configuration Tuning
Research Papers
An Empirical Study of Blockchain System Vulnerabilities: Modules, Types, and Patterns
Research Papers
An Exploratory Study on the Predominant Programming Paradigms in Python Code
Research Papers
Pre-print Media Attached
API Recommendation for Machine Learning Libraries: How Far Are We?
Research Papers
Pre-print
App Security - Are We Getting Better?
Research Papers
A Retrospective Study of one Decade of Artifact Evaluations
Research Papers
Are We Building on the Rock? On the Importance of Data Preprocessing for Code Summarization
Research Papers
Pre-print
Asynchronous Technical Interviews: Reducing the Effect of Supervised Think-Aloud on Communication AbilityDistinguished Paper Award
Research Papers
AUGER: Automatically Generating Review Comments with Pre-training Models
Research Papers
Pre-print
Automated Unearthing of Dangerous Issue Reports
Research Papers
Automatically Deriving JavaScript Static Analyzers from Specifications using Meta-Level Static Analysis
Research Papers
Automating Code Review Activities by Large-Scale Pre-Training
Research Papers
AutoPruner: Tranformer-based Call Graph Pruning
Research Papers
Pre-print
AVGUST: Automating Usage-Based Test Generation from Videos of App Executions
Research Papers
DOI Pre-print
Classifying Edits to Variability in Source Code
Research Papers
DOI
Code, Quality, and Process Metrics in Graduated and Retired ASFI Projects
Research Papers
CommentFinder: A Simpler, Faster, More Accurate Code Review Comments Recommendation
Research Papers
CORMS: A GitHub and Gerrit based Hybrid Code Reviewer Recommendation Approach for Modern Code Review
Research Papers
Corporate Dominance in Open Source Ecosystems: A Case Study of OpenStack
Research Papers
Correlates of Programmer Efficacy and their Link to Experience: A Combined EEG and Eye-Tracking Study
Research Papers
Cross-Device Record and Replay for Android Apps
Research Papers
Cross-Language Android Permission Specification
Research Papers
Declarative smart contracts
Research Papers
DeepDev-PERF: A Deep Learning-Based Approach For Improving Software Performance
Research Papers
DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks
Research Papers
Demystifying the Underground Ecosystem of Account Registration Bots
Research Papers
Detecting Non-crashing Functional Bugs in Android Apps via Deep-State Differential Analysis
Research Papers
Detecting Simulink Compiler Bugs via Controllable Zombie Blocks Mutation
Research Papers
Do Bugs Lead to Unnaturalness of Source Code?
Research Papers
DynaPyt: A Dynamic Analysis Framework for Python
Research Papers
Pre-print
Fault Localization to Detect Co-Change Fixing Locations
Research Papers
First Come First Served: The Impact of File Position on Code ReviewDistinguished Paper Award
Research Papers
DOI Pre-print Media Attached
Fuzzing Deep-Learning Libraries via Automated Relational API Inference
Research Papers
Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study
Research Papers
Pre-print
Generic Sensitivity: Customizing Context-Sensitive Pointer Analysis for Generics
Research Papers
Hierarchical Multi-Kernel Relevant Vector Machines for Requirement Extraction from App Reviews
Research Papers
How to Better Utilize Code Graphs in Semantic Code Search?
Research Papers
How to Formulate Specific How-To Questions in Software Development?
Research Papers
Input Invariants
Research Papers
Large-Scale Analysis of Non-Termination Bugs in Real-World OSS Projects
Research Papers
Less Training, More Repairing Please: Revisiting Automated Program Repair via Zero-shot Learning
Research Papers
Lighting Up Supervised Learning in User Review-Based Code Localization: Dataset and Benchmark
Research Papers
MAAT: A Novel Ensemble Approach to Addressing Fairness and Performance Bugs for Machine Learning Software
Research Papers
Pre-print
Making Python Code Idiomatic by Automatic Refactoring Non-Idiomatic Python Code with Pythonic Idioms
Research Papers
Minerva: Browser API Fuzzing with Dynamic Mod-Ref AnalysisDistinguished Paper Award
Research Papers
Modus: A Datalog Dialect for Building Container Images
Research Papers
MOSAT: Finding Safety Violations of Autonomous Driving Systems Using Multi-Objective Genetic Algorithm
Research Papers
DOI
Multi-Phase Invariant Synthesis
Research Papers
NatGen: Generative pre-training by “Naturalizing” source code
Research Papers
Pre-print
NeuDep: Neural Binary Memory Dependence Analysis
Research Papers
Neural Termination Analysis
Research Papers
NL2Viz: Natural Language to Visualization via Constrained Syntax-Guided Synthesis
Research Papers
NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems
Research Papers
No More Fine-tuning? An Experimental Evaluation of Prompt Tuning in Code Intelligence
Research Papers
Online Testing of RESTful APIs: Promises and ChallengesDistinguished Paper Award
Research Papers
Pre-print
On-the-Fly Syntax Highlighting Using Neural Networks
Research Papers
DOI Pre-print
On the Vulnerability Proneness of Multilingual Code
Research Papers
Pre-print
Pair Programming Conversations with Agents vs. Developers: Challenges & Opportunities for SE Community
Research Papers
Parasol: Efficient Parallel Synthesis of Large Model Spaces
Research Papers
PaReco: Patched Clones and Missed Patches among the Divergent Variants of a Software Family
Research Papers
Peahen: Fast and Precise Static Deadlock Detection via Context Reduction
Research Papers
Perfect Is the Enemy of Test Oracle
Research Papers
Program Merge Conflict Resolution via Neural Transformers
Research Papers
Psychologically-Inspired, Unsupervised Inference of Perceptual Groups of GUI Widgets from GUI Images
Research Papers
Putting Them under Microscope: A Fine-grained Approach for Detecting Redundant Test Cases in Natural Language
Research Papers
PyTER: Effective Program Repair for Python Type Errors
Research Papers
Quantifying Community Evolution in Developer Social Networks
Research Papers
Quantitative relational modelling with QAlloy
Research Papers
RoboFuzz: Fuzzing Robotic Systems over Robot Operating System (ROS) for Finding Correctness Bugs
Research Papers
RULER: Discriminative and Iterative Adversarial Training for Deep Neural Network Fairness
Research Papers
SamplingCA: Effective and Efficient Sampling-Based Pairwise Testing for Highly Configurable Software Systems
Research Papers
Scenario-based Test Reduction and Prioritization for Multi-Module Autonomous Driving Systems
Research Papers
SEDiff: Scope-Aware Differential Fuzzing to Test Internal Function Models in Symbolic Execution
Research Papers
Semi-Supervised Pre-processing for Learning-based Traceability Framework on Real-World Software Projects
Research Papers
SlimCodeBERT: Accelerating Pre-trained Code Models with Program Reduction
Research Papers
Pre-print File Attached
Software Security during Modern Code Review: The Developer's Perspective
Research Papers
DOI Pre-print Media Attached
SPINE: A Scalable Log Parser with Feedback GuidanceDistinguished Paper Award
Research Papers
Static Executes-Before Analysis for Event Driven Programs
Research Papers
SymMC: Approximate Model Enumeration and Counting Using Symmetry Information for Alloy Specifications
Research Papers
Pre-print
Testing of Autonomous Driving Systems: Where are we and where should we go?
Research Papers
The Best of Both Worlds: Integrating Semantic Features with Expert Features for Defect Prediction and Localization
Research Papers
The Evolution of Type Annotations in Python: An Empirical StudyDistinguished Paper Award
Research Papers
DOI Pre-print
Toward Interactive Bug Reporting for (Android App) End-Users
Research Papers
TraceCRL: Contrastive Representation Learning for Microservice Trace Analysis
Research Papers
Tracking Patches for Open Source Software Vulnerabilities
Research Papers
Understanding Performance Problems in Deep Learning Systems
Research Papers
Understanding Skills for OSS Communities on GitHub
Research Papers
Pre-print
Using Graph Neural Networks for Program Termination
Research Papers
Using Nudges to Accelerate Code Reviews at ScaleDistinguished Paper Award
Research Papers
UTANGO: Untangling Commits with Context-aware, Graph-based, Code Change Clustering Learning Model
Research Papers
VulRepair: A T5-based Automated Software Vulnerability Repair
Research Papers
What Motivates Software Practitioners to Contribute to Inner Source?
Research Papers
You See What I Want You to See: Poisoning Vulnerabilities in Neural Code Search
Research Papers

FAQ on Review Process and Double-Anonymous Reviewing

Open Science Policy

Q: What is the ESEC/FSE 2021 open science policy and how can I follow it?

Openness in science is key to fostering scientific progress via transparency, reproducibility, and replicability. Upon submission to the research track, authors are asked to:

  • make their data available to the program committee (via upload of supplemental material or a link to an anonymous repository) and provide instructions on how to access this data in the paper; or
  • include in the paper an explanation as to why this is not possible or desirable; and
  • indicate if they intend to make their data publicly available upon acceptance.

Q: How can I upload supplementary material via the HotCRP site and make it anonymous for double-anonymous review?

To conform to the double-anonymous policy, please include an anonymized URL. Code and data repositories may be exported to remove version control history, scrubbed of names in comments and metadata, and anonymously uploaded to a sharing site.

Rationale for Double-Anonymous Reviewing (DAR)

Q: Why are you using double-anonymous reviewing?

A: Studies have shown that a reviewer’s attitude toward a submission may be affected, even unconsciously, by the identity of the authors.

Q: Do you really think DAR actually works? I suspect reviewers can often guess who the authors are anyway.

A: It is rare for authorship to be guessed correctly, even by expert reviewers, as detailed in this study.

For Authors

Q: What exactly do I have to do to anonymize my paper?

A: Use common sense. Your job is not to make your identity undiscoverable but simply to make it possible for reviewers to evaluate your submission without having to know who you are: omit authors’ names from your title page, and when you cite your own work, refer to it in the third person. Also, be sure not to include any acknowledgements that would give away your identity. You should also avoid revealing the institutional affiliation of authors

Q: I would like to provide supplementary material for consideration, e.g., the code of my implementation or proofs of theorems. How do I do this?

On the submission site, there will be an option to submit supplementary material along with your main paper. This supplementary material should also be anonymized; it may be viewed by reviewers during the review period, so it should adhere to the same double-blind guidelines.

Q: My submission is based on code available in a public repository. How do I deal with this?

A: Making your code publicly available is not incompatible with double-blind reviewing. You should do the following. You can cite the code in your paper, but remove the actual URL. Instead create an anonymized version of the repository and include a new URL that points to the anonymized version of the repository, similar to how you would include supplementary materials to adhere to the Open Science policy.

Q: I am building on my own past work on the WizWoz system. Do I need to rename this system in my paper for purposes of anonymity, so as to remove the implied connection between my authorship of past work on this system and my present submission?

A: Maybe. The core question is really whether the system is one that, once identified, automatically identifies the author(s) and/or the institution. If the system is widely available, and especially if it has a substantial body of contributors and has been out for a while, then these conditions may not hold (e.g., LLVM or HotSpot), because there would be considerable doubt about authorship. By contrast, a paper on a modification to a proprietary system (e.g., Visual C++, or a research project that has not open-sourced its code) implicitly reveals the identity of the authors or their institution. If naming your system essentially reveals your identity (or institution), then anonymize it. In your submission, point out that the system name has been anonymized. If you have any doubts, please contact the Program Chair.

Q: I am submitting a paper that extends my own work that previously appeared at a workshop. Should I anonymize any reference to that prior work?

A: No. But we recommend you do not use the same title for your ESEC/FSE submission, so that it is clearly distinguished from the prior paper. In general, there is rarely a good reason to anonymize a citation. When in doubt, contact the Program Co-Chairs.

Q: Am I allowed to post my (non-blinded) paper on my web page or arXiv?

A: If the authors have already published a version of their paper to arXiv or similar sites, we request authors to consider using a different title for their submission, so that author names are not inadvertently disclosed, e.g., via a notification on Google Scholar. Another option would be to postpone publishing their submitted work on arXiv or similar sites, until after the notification of acceptance. If the paper is accepted, you may request a title change to the PC chairs (via email to esecfse2022pc-chairs@googlegroups.com, with subject “ESEC/FSE 2022 [PAPER-ID]: Title change request”), which will be subject to reviewers’ approval.

Q: Can I give a talk about my work while it is under review? How do I handle social media?

A: We have developed guidelines, described here, to help everyone navigate in the same way the tension between the normal communication of scientific results, which double-anonymous reviewing should not impede, and actions that essentially force potential reviewers to learn the identity of the authors for a submission. Roughly speaking, you may (of course!) discuss work under submission, but you should not broadly advertise your work through media that is likely to reach your reviewers. We acknowledge there are gray areas and trade-offs; we cannot describe every possible scenario.

Things you may do:

  • Put your submission on your home page.
  • Discuss your work with anyone who is not on the review committees, or with people on the committees with whom you already have a conflict.
  • Present your work at professional meetings, job interviews, etc.
  • Submit work previously discussed at an informal workshop, previously posted on arXiv or a similar site, previously submitted to a conference not using double-anonymous reviewing, etc.

Things you should not do:

  • Contact members of the review committees about your work, or deliberately present your work where you expect them to be.
  • Publicize your work on major mailing lists used by the community (because potential reviewers likely read these lists).
  • Publicize your work on social media if wide public [re-]propagation is common (e.g., Twitter) and therefore likely to reach potential reviewers. For example, on Facebook, a post with a broad privacy setting (public or all friends) saying, “Whew, ESEC/FSE paper in, time to sleep” is okay, but one describing the work or giving its title is not appropriate. Alternatively, a post to a group including only the colleagues at your institution is fine.

Reviewers will not be asked to recuse themselves from reviewing your paper unless they feel you have gone out of your way to advertise your authorship information to them. If you are unsure about what constitutes “going out of your way”, please contact the Program Co-Chairs.

Q: Will the fact that ESEC/FSE is double-anonymous have an impact on handling conflicts of interest?

A: Double-anonymous reviewing does not change the principle that reviewers should not review papers with which they have a conflict of interest, even if they do not immediately know who the authors are. Authors declare conflicts of interest when submitting their papers using the guidelines in the Cal for Papers. Papers will not be assigned to reviewers who have a conflict. Note that you should not declare gratuitous conflicts of interest and the chairs will compare the conflicts declared by the authors with those declared by the reviewers. Papers abusing the system will be desk-rejected.

For Reviewers

Q: What should I do if I learn the authors’ identity? What should I do if a prospective ESEC/FSE author contacts me and asks to visit my institution?

A: If you feel that the authors’ actions are largely aimed at ensuring that potential reviewers know their identity, contact the Program Chairs. Otherwise, you should not treat double-anonymous reviewing differently from other reviewing. In particular, refrain from seeking out information on the authors’ identity, but if you discover it accidentally this will not automatically disqualify you as a reviewer. Use your best judgment.

Q: The authors have provided a URL to supplemental material. I would like to see the material but I worry they will snoop my IP address and learn my identity. What should I do?

A: Contact the Program Chairs, who will download the material on your behalf and make it available to you.

Q: If I am assigned a paper for which I feel I am not an expert, how do I seek an outside review?

A: PC members should do their own reviews, not delegate them to someone else. Please contact the Program Chairs, especially since additional reviewers might have a different set of conflicts of interest.

Q: How do we handle potential conflicts of interest since I cannot see the author names?

A: The conference review system will ask that you identify conflicts of interest when you get an account on the submission system.

Q: How should I avoid learning the authors’ identity, if I am using web-search in the process of performing my review?

A: You should make a good-faith effort not to find the authors’ identity during the review period, but if you inadvertently do so, this does not disqualify you from reviewing the paper. As part of the good-faith effort, please turn off Google Scholar auto-notifications. Please do not use search engines with terms like the paper’s title or the name of a new system being discussed. If you need to search for related work you believe exists, do so after completing a preliminary review of the paper.


These guidelines are partly based on the PLDI FAQ on double-blind reviewing and the ICSE 2022 guidelines on double-anonymous submissions.

Review Process

Q: Can I withdraw my paper?

A: Yes, papers can be withdrawn at any time using HotCRP.