default search action
37th ASE 2022: Rochester, MI, USA
- 37th IEEE/ACM International Conference on Automated Software Engineering, ASE 2022, Rochester, MI, USA, October 10-14, 2022. ACM 2022, ISBN 978-1-4503-9475-8
Research Papers
- Jiwei Yan, Shixin Zhang, Yepang Liu, Xi Deng, Jun Yan, Jian Zhang:
A Comprehensive Evaluation of Android ICC Resolution Techniques. 1:1-1:13 - Hoan Anh Nguyen, Hung Dang Phan, Syeda Khairunnesa Samantha, Son Nguyen, Aashish Yadavally, Shaohua Wang, Hridesh Rajan, Tien N. Nguyen:
A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications. 2:1-2:13 - Jaehyung Lee, Kisun Han, Hwanjo Yu:
A Light Bug Triage Framework for Applying Large Pre-trained Language Model. 3:1-3:11 - Tao Huang, Pengfei Chen, Jingrun Zhang, Ruipeng Li, Rui Wang:
A Transferable Time Series Forecasting Service Using Deep Transformer Model for Online Systems. 4:1-4:12 - Rongxin Wu, Minglei Chen, Chengpeng Wang, Gang Fan, Jiguang Qiu, Charles Zhang:
Accelerating Build Dependency Error Detection via Virtual Build. 5:1-5:12 - Ju Qian, Yingwei Ma, Chenghao Lin, Lin Chen:
Accelerating OCR-Based Widget Localization for Test Automation of GUI Applications. 6:1-6:13 - Nesara Dissanayake, Asangi Jayatilaka, Mansooreh Zahedi, Muhammad Ali Babar:
An Empirical Study of Automation in Software Security Patch Management. 7:1-7:13 - Chengran Yang, Bowen Xu, Ferdian Thung, Yucen Shi, Ting Zhang, Zhou Yang, Xin Zhou, Jieke Shi, Junda He, DongGyun Han, David Lo:
Answer Summarization for Technical Queries: Benchmark and New Approach. 8:1-8:13 - Cedric Richter, Jan Haltermann, Marie-Christine Jakobs, Felix Pauck, Stefan Schott, Heike Wehrheim:
Are Neural Bug Detectors Comparable to Software Developers on Variable Misuse Bugs? 9:1-9:12 - Yuxi Ling, Kailong Wang, Guangdong Bai, Haoyu Wang, Jin Song Dong:
Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions. 10:1-10:12 - José Antonio Hernández López, Martin Weyssow, Jesús Sánchez Cuadrado, Houari A. Sahraoui:
AST-Probe: Recovering abstract syntax trees from hidden representations of pre-trained language models. 11:1-11:11 - Tomasz Kuchta, Bartosz Zator:
Auto Off-Target: Enabling Thorough and Scalable Testing for Complex Software Systems. 12:1-12:12 - Jialu Zhang, De Li, John Charles Kolesar, Hanyuan Shi, Ruzica Piskac:
Automated Feedback Generation for Competition-Level Code. 13:1-13:13 - Fangwen Mu, Xiao Chen, Lin Shi, Song Wang, Qing Wang:
Automatic Comment Generation via Multi-Pass Deliberation. 14:1-14:12 - Finlay Macklon, Mohammad Reza Taesiri, Markos Viggiato, Stefan Antoszko, Natalia Romanova, Dale Paas, Cor-Paul Bezemer:
Automatically Detecting Visual Bugs in HTML5 Canvas Games. 15:1-15:11 - Hamed Barzamini, Mona Rahimi:
B-AIS: An Automated Process for Black-box Evaluation of Visual Perception in AI-enabled Software against Domain Semantics. 16:1-16:13 - Xiaoyuan Xie, Pengbo Yin, Songqiang Chen:
Boosting the Revealing of Detected Violations in Deep Learning Testing: A Diversity-Guided Method. 17:1-17:13 - Chen Zhang, Bihuan Chen, Junhao Hu, Xin Peng, Wenyun Zhao:
BuildSonic: Detecting and Repairing Performance-Related Configuration Smells for Continuous Integration Builds. 18:1-18:13 - Arianna Blasi, Alessandra Gorla, Michael D. Ernst, Mauro Pezzè:
Call Me Maybe: Using NLP to Automatically Generate Unit Test Cases Respecting Temporal Constraints. 19:1-19:11 - Vikram Nitin, Shubhi Asthana, Baishakhi Ray, Rahul Krishna:
CARGO: AI-Guided Dependency Analysis for Migrating Monolithic Applications to Microservices Architecture. 20:1-20:12 - Weilin Luo, Hai Wan, Delong Zhang, Jianfeng Du, Hengdi Su:
Checking LTL Satisfiability via End-to-end Learning. 21:1-21:13 - Jiyang Zhang, Sheena Panthaplackel, Pengyu Nie, Junyi Jessy Li, Milos Gligoric:
CoditT5: Pretraining for Source Code and Natural Language Editing. 22:1-22:12 - Zhiqiang Zang, Nathan Wiatrek, Milos Gligoric, August Shi:
Compiler Testing using Template Java Programs. 23:1-23:13 - Jieke Shi, Zhou Yang, Bowen Xu, Hong Jin Kang, David Lo:
Compressing Pre-trained Models of Code into 3 MB. 24:1-24:12 - Boqi Chen, Kristóf Marussy, Sebastian Pilarski, Oszkár Semeráth, Dániel Varró:
Consistent Scene Graph Generation by Constraint Optimization. 25:1-25:13 - Yanqi Su, Zheming Han, Zhenchang Xing, Xin Xia, Xiwei Xu, Liming Zhu, Qinghua Lu:
Constructing a System Knowledge Graph of User Tasks and Failures from Bug Reports to Support Soap Opera Testing. 26:1-26:13 - Vidush Singhal, Akul Abhilash Pillai, Charitha Saumya, Milind Kulkarni, Aravind Machiry:
Cornucopia : A Framework for Feedback Guided Generation of Binaries. 27:1-27:13 - Aryaz Eghbali, Michael Pradel:
CrystalBLEU: Precisely and Efficiently Measuring the Similarity of Code. 28:1-28:12 - Mia Mohammad Imran, Yashasvi Jain, Preetha Chatterjee, Kostadin Damevski:
Data Augmentation for Improving Emotion Recognition in Software Engineering Communication. 29:1-29:13 - Chenyang Yang, Rachel A. Brower-Sinning, Grace A. Lewis, Christian Kästner:
Data Leakage in Notebooks: Static Detection and Better Processes. 30:1-30:12 - Simin Chen, Mirazul Haque, Cong Liu, Wei Yang:
DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks. 31:1-31:13 - Oskar Haarklou Veileborg, Georgian-Vlad Saioc, Anders Møller:
Detecting Blocking Errors in Go Programs using Localized Abstract Interpretation. 32:1-32:12 - Sheikh Shadab Towqir, Bowen Shen, Muhammad Ali Gulzar, Na Meng:
Detecting Build Conflicts in Software Merge for Java Programs via Static Analysis. 33:1-33:13 - Yueming Wu, Siyue Feng, Deqing Zou, Hai Jin:
Detecting Semantic Code Clones by Building AST-based Markov Chains Model. 34:1-34:13 - Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, Dan Ye:
Differentially Testing Database Transactions for Fun and Profit. 35:1-35:12 - Jianzhong Su, Hong-Ning Dai, Lingjun Zhao, Zibin Zheng, Xiapu Luo:
Effectively Generating Vulnerable Transaction Sequences in Smart Contracts with Reinforcement Learning-guided Fuzzing. 36:1-36:12 - Jinsheng Ba, Gregory J. Duck, Abhik Roychoudhury:
Efficient Greybox Fuzzing to Detect Memory Errors. 37:1-37:12 - Yunfan Zhang, Ruidong Zhu, Yingfei Xiong, Tao Xie:
Efficient Synthesis of Method Call Sequences for Test Generation and Bounded Verification. 38:1-38:12 - Zijing Yin, Yiwen Xu, Chijin Zhou, Yu Jiang:
Empirical Study of System Resources Abused by IoT Attackers. 39:1-39:13 - Hao Zhong:
Enriching Compiler Testing with Real Program from Bug Report. 40:1-40:12 - Yi Song, Xiaoyuan Xie, Xihao Zhang, Quanming Liu, Ruizhi Gao:
Evolving Ranking-Based Failure Proximities for Better Clustering in Fault Isolation. 41:1-41:13 - Rishabh Ranjan, Ishita Agrawal, Subodh Sharma:
Exploiting Epochs and Symmetries in Analysing MPI Programs. 42:1-42:12 - Mauro Bringolf, Dominik Winterer, Zhendong Su:
Finding and Understanding Incompleteness Bugs in SMT Solvers. 43:1-43:10 - Ashwin Kallingal Joshy, Wei Le:
FuzzerAid: Grouping Fuzzed Crashes Based On Fault Signatures. 44:1-44:12 - Haeun Lee, Soomin Kim, Sang Kil Cha:
Fuzzle: Making a Puzzle for Fuzzers. 45:1-45:12 - Haoxiang Tian, Guoquan Wu, Jiren Yan, Yan Jiang, Jun Wei, Wei Chen, Shuo Li, Dan Ye:
Generating Critical Test Scenarios for Autonomous Driving Systems via Influential Behavior Patterns. 46:1-46:12 - Nuno Saavedra, João F. Ferreira:
GLITCH: Automated Polyglot Security Smell Detection in Infrastructure as Code. 47:1-47:12 - Zilong He, Pengfei Chen, Yu Luo, Qiuyu Yan, Hongyang Chen, Guangba Yu, Fangyuan Li:
Graph based Incident Extraction and Diagnosis in Large-Scale Online Systems. 48:1-48:13 - Jingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, Yu Jiang:
Griffin : Grammar-Free DBMS Fuzzing. 49:1-49:12 - Navid Salehnamadi, Forough Mehralian, Sam Malek:
Groundhog: An Automated Accessibility Crawler for Mobile Apps. 50:1-50:12 - Lyuye Zhang, Chengwei Liu, Zhengzi Xu, Sen Chen, Lingling Fan, Bihuan Chen, Yang Liu:
Has My Release Disobeyed Semantic Versioning? Static Detection Based on Semantic Differencing. 51:1-51:12 - An Ran Chen, Tse-Hsun (Peter) Chen, Junjie Chen:
How Useful is Code Change Information for Fault Localization in Continuous Integration? 52:1-52:12 - Yuanping Yu, Xiangkun Jia, Yuwei Liu, Yanhao Wang, Qian Sang, Chao Zhang, Purui Su:
HTFuzz: Heap Operation Sequence Sensitive Fuzzing. 53:1-53:13 - Quentin Le Dilavrec, Djamel Eddine Khelladi, Arnaud Blouin, Jean-Marc Jézéquel:
HyperAST: Enabling Efficient Analysis of Software Histories at Scale. 54:1-54:12 - Simón Gutiérrez Brida, Germán Regis, Guolong Zheng, Hamid Bagheri, ThanhVu Nguyen, Nazareno Aguirre, Marcelo F. Frias:
ICEBAR: Feedback-Driven Iterative Repair of Alloy Specifications. 55:1-55:13 - Chenguang Zhu, Ye Liu, Xiuheng Wu, Yi Li:
Identifying Solidity Smart Contract API Documentation Errors. 56:1-56:13 - Yu Liu, Pengyu Nie, Owolabi Legunsen, Milos Gligoric:
Inline Tests. 57:1-57:13 - Meiqiu Xu, Ying Wang, Shing-Chi Cheung, Hai Yu, Zhiliang Zhu:
Insight: Exploring Cross-Ecosystem Vulnerability Impacts. 58:1-58:13 - Haoye Tian, Xunzhu Tang, Andrew Habib, Shangwen Wang, Kui Liu, Xin Xia, Jacques Klein, Tegawendé F. Bissyandé:
Is this Change the Answer to that Problem?: Correlating Descriptions of Bug and Code Changes for Evaluating Patch Correctness. 59:1-59:13 - Miao Chen, Tengfei Tu, Hua Zhang, Qiaoyan Wen, Weihang Wang:
Jasmine: A Static Analysis Framework for Spring Core Technologies. 60:1-60:13 - Ibrahim Mesecan, Daniel Blackwell, David Clark, Myra B. Cohen, Justyna Petke:
Keeping Secrets: Multi-objective Genetic Improvement for Detecting and Reducing Information Leakage. 61:1-61:12 - Yang Sun, Christopher M. Poskitt, Jun Sun, Yuqi Chen, Zijiang Yang:
LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles. 62:1-62:12 - Junrui Liu, Yanju Chen, Bryan Tan, Isil Dillig, Yu Feng:
Learning Contract Invariants Using Reinforcement Learning. 63:1-63:11 - Zhao Tian, Junjie Chen, Qihao Zhu, Junjie Yang, Lingming Zhang:
Learning to Construct Better Mutation Faults. 64:1-64:13 - Jingbo Wang, Chao Wang:
Learning to Synthesize Relational Invariants. 65:1-65:12 - Sofia Reis, Rui Abreu, Marcelo d'Amorim, Daniel Fortunato:
Leveraging Practitioners' Feedback to Improve a Security Linter. 66:1-66:12 - Juan Manuel Copia, Pablo Ponzio, Nazareno Aguirre, Alessandra Gorla, Marcelo F. Frias:
LISSA: Lazy Initialization with Specialized Solver Aid. 67:1-67:12 - Rui Xie, Tianxiang Hu, Wei Ye, Shikun Zhang:
Low-Resources Project-Specific Code Summarization. 68:1-68:12 - Liu Wang, Haoyu Wang, Xiapu Luo, Yulei Sui:
MalWhiteout: Reducing Label Errors in Android Malware Detection. 69:1-69:13 - Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. 70:1-70:13 - Qingchao Shen, Junjie Chen, Jie M. Zhang, Haoyu Wang, Shuang Liu, Menghan Tian:
Natural Test Generation for Precise Testing of Question Answering Software. 71:1-71:12 - Patric Feldmeier, Gordon Fraser:
Neuroevolution-Based Generation of Tests and Oracles for Games. 72:1-72:13 - Jasmine Latendresse, Suhaib Mujahid, Diego Elias Costa, Emad Shihab:
Not All Dependencies are Equal: An Empirical Study on Production Dependencies in NPM. 73:1-73:12 - Binhang Qi, Hailong Sun, Xiang Gao, Hongyu Zhang:
Patching Weak Convolutional Neural Network Models through Modularization and Composition. 74:1-74:12 - Xianchang Luo, Yinxing Xue, Zhenchang Xing, Jiamou Sun:
PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language Models. 75:1-75:13 - Youkun Shi, Yuan Zhang, Tianhan Luo, Xiangyu Mao, Min Yang:
Precise (Un)Affected Version Analysis for Web Vulnerabilities. 76:1-76:13 - Tahmid Rafi, Xueling Zhang, Xiaoyin Wang:
PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing. 77:1-77:13 - Jie Su, Cong Tian, Zuchao Yang, Jiyu Yang, Bin Yu, Zhenhua Duan:
Prioritized Constraint-Aided Dynamic Partial-Order Reduction. 78:1-78:13 - Qing Huang, Zhiqiang Yuan, Zhenchang Xing, Xiwei Xu, Liming Zhu, Qinghua Lu:
Prompt-tuned Code Language Model as a Neural Knowledge Base for Type Inference in Statically-Typed Partial Code. 79:1-79:13 - Zhaodi Zhang, Yiting Wu, Si Liu, Jing Liu, Min Zhang:
Provably Tightest Linear Approximation for Robustness Verification of Sigmoid-like Neural Networks. 80:1-80:13 - Zixi Liu, Yang Feng, Yining Yin, Jingyu Sun, Zhenyu Chen, Baowen Xu:
QATest: A Uniform Fuzzing Framework for Question Answering Systems. 81:1-81:12 - Yedi Zhang, Zhe Zhao, Guangke Chen, Fu Song, Min Zhang, Taolue Chen, Jun Sun:
QVIP: An ILP-based Formal Verification Approach for Quantized Neural Networks. 82:1-82:13 - Zhuo Zhang, Yan Lei, Meng Yan, Yue Yu, Jiachi Chen, Shangwen Wang, Xiaoguang Mao:
Reentrancy Vulnerability Detection and Localization: A Deep Learning Based Two-phase Approach. 83:1-83:13 - Alexi Turcotte, Mark W. Aldrich, Frank Tip:
reformulator: Automated Refactoring of the N+1 Problem in Database-Backed Applications. 84:1-84:12 - Yan Xiao, Yun Lin, Ivan Beschastnikh, Changsheng Sun, David S. Rosenblum, Jin Song Dong:
Repairing Failure-inducing Inputs with Input Reflection. 85:1-85:13 - Zhong Li, Minxue Pan, Yu Pei, Tian Zhang, Linzhang Wang, Xuandong Li:
Robust Learning of Deep Predictive Models from Noisy and Imbalanced Software Engineering Datasets. 86:1-86:13 - Max Taylor, Johnathon Aurand, Feng Qin, Xiaorui Wang, Brandon Henry, Xiangyu Zhang:
SA4U: Practical Static Analysis for Unit Type Error Detection. 87:1-87:11 - Jie Zhu, Leye Wang, Xiao Han:
Safety and Performance, Why not Both? Bi-Objective Optimized Model Compression toward AI Software Deployment. 88:1-88:13 - David Fernández-Amorós, Ruben Heradio, Christoph Mayr-Dorn, Alexander Egyed:
Scalable Sampling of Highly-Configurable Systems: Generating Random Instances of the Linux Kernel. 89:1-89:12 - Fuman Xie, Yanjun Zhang, Chuan Yan, Suwan Li, Lei Bu, Kai Chen, Zi Huang, Guangdong Bai:
Scrutinizing Privacy Policy Compliance of Virtual Personal Assistant Apps. 90:1-90:13 - Zhichao Zhou, Yuming Zhou, Chunrong Fang, Zhenyu Chen, Yutian Tang:
Selectively Combining Multiple Coverage Goals in Search-Based Unit Test Generation. 91:1-91:12 - He Ye, Matias Martinez, Xiapu Luo, Tao Zhang, Martin Monperrus:
SelfAPR: Self-supervised Program Repair with Test Execution Diagnostics. 92:1-92:13 - Chao Wang, Rongxin Wu, Haohao Song, Jiwu Shu, Guoqing Li:
smartPip: A Smart Approach to Resolving Python Dependency Conflict Issues. 93:1-93:12 - Houssem Ben Braiek, Ali Tfaily, Foutse Khomh, Thomas Reid, Ciro Guida:
SmOOD: Smoothness-based Out-of-Distribution Detection Approach for Surrogate Neural Networks in Aircraft Design. 94:1-94:13 - Clement Poncelet, Konstantinos Sagonas, Nicolas Tsiftes:
So Many Fuzzers, So Little Time✱: Experience from Evaluating Fuzzers on the Contiki-NG Network (Hay)Stack. 95:1-95:12 - Emanuela Guglielmi, Giovanni Rosa, Simone Scalabrino, Gabriele Bavota, Rocco Oliveto:
Sorry, I don't Understand: Improving Voice User Interface Testing. 96:1-96:12 - Wenkang Zhong, Hongliang Ge, Hongfei Ai, Chuanyi Li, Kui Liu, Jidong Ge, Bin Luo:
StandUp4NPR: Standardizing SetUp for Empirically Comparing Neural Program Repair Systems. 97:1-97:13 - Ke Sun, Yifan Zhao, Dan Hao, Lu Zhang:
Static Type Recommendation for Python. 98:1-98:13 - Qi Xin, Qirun Zhang, Alessandro Orso:
Studying and Understanding the Tradeoffs Between Generality and Reduction in Software Debloating. 99:1-99:13 - Emilio Coppa, Heng Yin, Camil Demetrescu:
SymFusion: Hybrid Instrumentation for Concolic Execution. 100:1-100:12 - Yuhui Su, Chunyang Chen, Junjie Wang, Zhe Liu, Dandan Wang, Shoubin Li, Qing Wang:
The Metamorphosis: Automatic Detection of Scaling Issues for Mobile Apps. 101:1-101:12 - Andrea Stocco, Paulo J. Nunes, Marcelo d'Amorim, Paolo Tonella:
ThirdEye: Attention Maps for Safe Autonomous Driving Systems. 102:1-102:12 - Forough Mehralian, Navid Salehnamadi, Syed Fatiul Huq, Sam Malek:
Too Much Accessibility is Harmful! Automated Detection and Analysis of Overly Accessible Elements in Mobile Apps. 103:1-103:13 - Yingyi Zhang, Zan Wang, Jiajun Jiang, Hanmo You, Junjie Chen:
Toward Improving the Robustness of Deep Learning Models via Model Transformation. 104:1-104:13 - Lili Quan, Qianyu Guo, Xiaofei Xie, Sen Chen, Xiaohong Li, Yang Liu:
Towards Understanding the Faults of JavaScript-Based Deep Learning Systems. 105:1-105:13 - Wei Tang, Zhengzi Xu, Chengwei Liu, Jiahui Wu, Shouguo Yang, Yi Li, Ping Luo, Yang Liu:
Towards Understanding Third-party Library Dependency in C/C++ Ecosystem. 106:1-106:12 - Deheng Yang, Xiaoguang Mao, Liqian Chen, Xuezheng Xu, Yan Lei, David Lo, Jiayu He:
TransplantFix: Graph Differencing-based Code Transplantation for Automated Program Repair. 107:1-107:13 - Xueyang Li, Shangqing Liu, Ruitao Feng, Guozhu Meng, Xiaofei Xie, Kai Chen, Yang Liu:
TransRepair: Context-aware Program Repair for Compilation Errors. 108:1-108:13 - Yutao Hu, Deqing Zou, Junru Peng, Yueming Wu, Junjie Shan, Hai Jin:
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection. 109:1-109:12